@microsoft/terraform-cdk-constructs 1.7.1 → 1.9.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +46476 -27231
- package/API.md +68443 -28286
- package/lib/azure-actiongroup/lib/action-group.js +1 -1
- package/lib/azure-activitylogalert/lib/activity-log-alert.js +1 -1
- package/lib/azure-aks/lib/aks-cluster.js +1 -1
- package/lib/azure-diagnosticsettings/lib/diagnostic-settings.js +1 -1
- package/lib/azure-dnsforwardingruleset/lib/dns-forwarding-ruleset.js +1 -1
- package/lib/azure-dnsforwardingruleset/lib/forwarding-rule.js +1 -1
- package/lib/azure-dnsforwardingruleset/lib/virtual-network-link.js +1 -1
- package/lib/azure-dnsresolver/lib/dns-resolver.js +1 -1
- package/lib/azure-dnsresolver/lib/inbound-endpoint.js +1 -1
- package/lib/azure-dnsresolver/lib/outbound-endpoint.js +1 -1
- package/lib/azure-dnszone/lib/dns-zone.js +1 -1
- package/lib/azure-dnszone/lib/index.d.ts +1 -0
- package/lib/azure-dnszone/lib/index.js +2 -1
- package/lib/azure-dnszone/lib/records/dns-record-schemas.d.ts +68 -0
- package/lib/azure-dnszone/lib/records/dns-record-schemas.js +813 -0
- package/lib/azure-dnszone/lib/records/dns-records.d.ts +688 -0
- package/lib/azure-dnszone/lib/records/dns-records.js +924 -0
- package/lib/azure-dnszone/lib/records/index.d.ts +19 -0
- package/lib/azure-dnszone/lib/records/index.js +38 -0
- package/lib/azure-dnszone/test/dns-records.integ.d.ts +21 -0
- package/lib/azure-dnszone/test/dns-records.integ.js +321 -0
- package/lib/azure-dnszone/test/dns-records.spec.d.ts +20 -0
- package/lib/azure-dnszone/test/dns-records.spec.js +950 -0
- package/lib/azure-loganalyticsworkspace/index.d.ts +6 -0
- package/lib/azure-loganalyticsworkspace/index.js +23 -0
- package/lib/azure-loganalyticsworkspace/lib/index.d.ts +5 -0
- package/lib/azure-loganalyticsworkspace/lib/index.js +22 -0
- package/lib/azure-loganalyticsworkspace/lib/log-analytics-workspace-schemas.d.ts +51 -0
- package/lib/azure-loganalyticsworkspace/lib/log-analytics-workspace-schemas.js +255 -0
- package/lib/azure-loganalyticsworkspace/lib/log-analytics-workspace.d.ts +301 -0
- package/lib/azure-loganalyticsworkspace/lib/log-analytics-workspace.js +213 -0
- package/lib/azure-loganalyticsworkspace/test/log-analytics-workspace.integ.d.ts +9 -0
- package/lib/azure-loganalyticsworkspace/test/log-analytics-workspace.integ.js +71 -0
- package/lib/azure-loganalyticsworkspace/test/log-analytics-workspace.spec.d.ts +8 -0
- package/lib/azure-loganalyticsworkspace/test/log-analytics-workspace.spec.js +504 -0
- package/lib/azure-metricalert/lib/metric-alert.js +1 -1
- package/lib/azure-networkinterface/lib/network-interface.js +1 -1
- package/lib/azure-networksecuritygroup/lib/network-security-group.js +1 -1
- package/lib/azure-networkwatcher/index.d.ts +14 -0
- package/lib/azure-networkwatcher/index.js +31 -0
- package/lib/azure-networkwatcher/lib/index.d.ts +5 -0
- package/lib/azure-networkwatcher/lib/index.js +22 -0
- package/lib/azure-networkwatcher/lib/network-watcher-schemas.d.ts +47 -0
- package/lib/azure-networkwatcher/lib/network-watcher-schemas.js +167 -0
- package/lib/azure-networkwatcher/lib/network-watcher.d.ts +181 -0
- package/lib/azure-networkwatcher/lib/network-watcher.js +187 -0
- package/lib/azure-networkwatcher/test/network-watcher.integ.d.ts +12 -0
- package/lib/azure-networkwatcher/test/network-watcher.integ.js +84 -0
- package/lib/azure-networkwatcher/test/network-watcher.spec.d.ts +8 -0
- package/lib/azure-networkwatcher/test/network-watcher.spec.js +312 -0
- package/lib/azure-policyassignment/lib/policy-assignment.js +1 -1
- package/lib/azure-policydefinition/lib/policy-definition.js +1 -1
- package/lib/azure-policysetdefinition/index.d.ts +10 -0
- package/lib/azure-policysetdefinition/index.js +27 -0
- package/lib/azure-policysetdefinition/lib/index.d.ts +5 -0
- package/lib/azure-policysetdefinition/lib/index.js +22 -0
- package/lib/azure-policysetdefinition/lib/policy-set-definition-schemas.d.ts +50 -0
- package/lib/azure-policysetdefinition/lib/policy-set-definition-schemas.js +255 -0
- package/lib/azure-policysetdefinition/lib/policy-set-definition.d.ts +426 -0
- package/lib/azure-policysetdefinition/lib/policy-set-definition.js +255 -0
- package/lib/azure-policysetdefinition/test/policy-set-definition.integ.d.ts +9 -0
- package/lib/azure-policysetdefinition/test/policy-set-definition.integ.js +56 -0
- package/lib/azure-policysetdefinition/test/policy-set-definition.spec.d.ts +8 -0
- package/lib/azure-policysetdefinition/test/policy-set-definition.spec.js +745 -0
- package/lib/azure-privatednszone/lib/index.d.ts +1 -0
- package/lib/azure-privatednszone/lib/index.js +2 -1
- package/lib/azure-privatednszone/lib/private-dns-zone.d.ts +0 -2
- package/lib/azure-privatednszone/lib/private-dns-zone.js +6 -13
- package/lib/azure-privatednszone/lib/records/index.d.ts +7 -0
- package/lib/azure-privatednszone/lib/records/index.js +26 -0
- package/lib/azure-privatednszone/lib/records/private-dns-record-schemas.d.ts +52 -0
- package/lib/azure-privatednszone/lib/records/private-dns-record-schemas.js +683 -0
- package/lib/azure-privatednszone/lib/records/private-dns-records.d.ts +523 -0
- package/lib/azure-privatednszone/lib/records/private-dns-records.js +739 -0
- package/lib/azure-privatednszone/test/private-dns-records.integ.d.ts +19 -0
- package/lib/azure-privatednszone/test/private-dns-records.integ.js +245 -0
- package/lib/azure-privatednszone/test/private-dns-records.spec.d.ts +18 -0
- package/lib/azure-privatednszone/test/private-dns-records.spec.js +756 -0
- package/lib/azure-privatednszone/test/private-dns-zone.spec.js +5 -5
- package/lib/azure-privatednszonelink/lib/private-dns-zone-link.js +1 -1
- package/lib/azure-publicipaddress/lib/public-ip-address.js +1 -1
- package/lib/azure-resourcegroup/lib/resource-group.js +1 -1
- package/lib/azure-roleassignment/lib/role-assignment.js +1 -1
- package/lib/azure-roledefinition/lib/role-definition.js +1 -1
- package/lib/azure-storageaccount/lib/storage-account.js +1 -1
- package/lib/azure-subnet/lib/subnet.js +1 -1
- package/lib/azure-virtualmachine/lib/virtual-machine.js +1 -1
- package/lib/azure-virtualnetwork/lib/virtual-network.js +1 -1
- package/lib/azure-virtualnetworkgateway/lib/virtual-network-gateway-schemas.js +2 -2
- package/lib/azure-virtualnetworkgateway/lib/virtual-network-gateway.d.ts +4 -2
- package/lib/azure-virtualnetworkgateway/lib/virtual-network-gateway.js +8 -5
- package/lib/azure-virtualnetworkgateway/test/virtual-network-gateway.spec.js +109 -1
- package/lib/azure-virtualnetworkgatewayconnection/lib/virtual-network-gateway-connection.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/connectivity-configuration.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/ipam-pool-static-cidr.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/ipam-pool.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/network-group-static-member.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/network-group.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/security-admin-configuration.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/security-admin-rule-collection.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/security-admin-rule.js +1 -1
- package/lib/azure-virtualnetworkmanager/lib/virtual-network-manager.js +1 -1
- package/lib/azure-vmss/lib/virtual-machine-scale-set.js +1 -1
- package/lib/core-azure/lib/azapi/azapi-resource.js +4 -4
- package/lib/core-azure/lib/azapi/providers-azapi/data-azapi-client-config/index.js +2 -2
- package/lib/core-azure/lib/azapi/providers-azapi/data-azapi-resource/index.js +5 -5
- package/lib/core-azure/lib/azapi/providers-azapi/provider/index.js +1 -1
- package/lib/core-azure/lib/azapi/providers-azapi/resource/index.js +5 -5
- package/lib/core-azure/lib/azapi/providers-azapi/resource-action/index.js +3 -3
- package/lib/core-azure/lib/azapi/providers-azapi/update-resource/index.js +3 -3
- package/lib/core-azure/lib/azapi/schema-mapper/schema-mapper.js +1 -1
- package/lib/core-azure/lib/version-manager/api-version-manager.js +1 -1
- package/lib/core-azure/lib/version-manager/interfaces/version-interfaces.js +7 -7
- package/lib/index.d.ts +23 -0
- package/lib/index.js +25 -2
- package/lib/testing/index.js +2 -2
- package/lib/testing/lib/cleanup.js +1 -1
- package/lib/testing/lib/metadata.js +1 -1
- package/package.json +1 -1
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Azure Public DNS Zone Records module
|
|
3
|
+
*
|
|
4
|
+
* This module exports all Public DNS Zone record types and their schemas.
|
|
5
|
+
*
|
|
6
|
+
* Supported Record Types:
|
|
7
|
+
* - DnsARecord (A records with IPv4 addresses)
|
|
8
|
+
* - DnsAaaaRecord (AAAA records with IPv6 addresses)
|
|
9
|
+
* - DnsCaaRecord (CAA records - PUBLIC DNS ONLY)
|
|
10
|
+
* - DnsCnameRecord (CNAME records)
|
|
11
|
+
* - DnsMxRecord (MX records)
|
|
12
|
+
* - DnsNsRecord (NS records - PUBLIC DNS ONLY)
|
|
13
|
+
* - DnsPtrRecord (PTR records)
|
|
14
|
+
* - DnsSoaRecord (SOA records)
|
|
15
|
+
* - DnsSrvRecord (SRV records)
|
|
16
|
+
* - DnsTxtRecord (TXT records)
|
|
17
|
+
*/
|
|
18
|
+
export * from "./dns-record-schemas";
|
|
19
|
+
export * from "./dns-records";
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Azure Public DNS Zone Records module
|
|
4
|
+
*
|
|
5
|
+
* This module exports all Public DNS Zone record types and their schemas.
|
|
6
|
+
*
|
|
7
|
+
* Supported Record Types:
|
|
8
|
+
* - DnsARecord (A records with IPv4 addresses)
|
|
9
|
+
* - DnsAaaaRecord (AAAA records with IPv6 addresses)
|
|
10
|
+
* - DnsCaaRecord (CAA records - PUBLIC DNS ONLY)
|
|
11
|
+
* - DnsCnameRecord (CNAME records)
|
|
12
|
+
* - DnsMxRecord (MX records)
|
|
13
|
+
* - DnsNsRecord (NS records - PUBLIC DNS ONLY)
|
|
14
|
+
* - DnsPtrRecord (PTR records)
|
|
15
|
+
* - DnsSoaRecord (SOA records)
|
|
16
|
+
* - DnsSrvRecord (SRV records)
|
|
17
|
+
* - DnsTxtRecord (TXT records)
|
|
18
|
+
*/
|
|
19
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
20
|
+
if (k2 === undefined) k2 = k;
|
|
21
|
+
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
22
|
+
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
23
|
+
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
24
|
+
}
|
|
25
|
+
Object.defineProperty(o, k2, desc);
|
|
26
|
+
}) : (function(o, m, k, k2) {
|
|
27
|
+
if (k2 === undefined) k2 = k;
|
|
28
|
+
o[k2] = m[k];
|
|
29
|
+
}));
|
|
30
|
+
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
31
|
+
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
32
|
+
};
|
|
33
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
34
|
+
// Export schemas
|
|
35
|
+
__exportStar(require("./dns-record-schemas"), exports);
|
|
36
|
+
// Export record implementations
|
|
37
|
+
__exportStar(require("./dns-records"), exports);
|
|
38
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Integration test for Azure Public DNS Zone Records
|
|
3
|
+
*
|
|
4
|
+
* This test demonstrates usage of all Public DNS record types
|
|
5
|
+
* and validates deployment, idempotency, and cleanup for child resources.
|
|
6
|
+
*
|
|
7
|
+
* Supported Record Types:
|
|
8
|
+
* - A record (IPv4 addresses, including alias records)
|
|
9
|
+
* - AAAA record (IPv6 addresses, including alias records)
|
|
10
|
+
* - CAA record (Certificate Authority Authorization - PUBLIC ONLY)
|
|
11
|
+
* - CNAME record (including alias records)
|
|
12
|
+
* - MX record
|
|
13
|
+
* - NS record (Name Server - PUBLIC ONLY)
|
|
14
|
+
* - PTR record
|
|
15
|
+
* - SRV record
|
|
16
|
+
* - TXT record
|
|
17
|
+
* - (SOA is managed by Azure automatically)
|
|
18
|
+
*
|
|
19
|
+
* Run with: npm run integration:nostream
|
|
20
|
+
*/
|
|
21
|
+
import "cdktf/lib/testing/adapters/jest";
|
|
@@ -0,0 +1,321 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Integration test for Azure Public DNS Zone Records
|
|
4
|
+
*
|
|
5
|
+
* This test demonstrates usage of all Public DNS record types
|
|
6
|
+
* and validates deployment, idempotency, and cleanup for child resources.
|
|
7
|
+
*
|
|
8
|
+
* Supported Record Types:
|
|
9
|
+
* - A record (IPv4 addresses, including alias records)
|
|
10
|
+
* - AAAA record (IPv6 addresses, including alias records)
|
|
11
|
+
* - CAA record (Certificate Authority Authorization - PUBLIC ONLY)
|
|
12
|
+
* - CNAME record (including alias records)
|
|
13
|
+
* - MX record
|
|
14
|
+
* - NS record (Name Server - PUBLIC ONLY)
|
|
15
|
+
* - PTR record
|
|
16
|
+
* - SRV record
|
|
17
|
+
* - TXT record
|
|
18
|
+
* - (SOA is managed by Azure automatically)
|
|
19
|
+
*
|
|
20
|
+
* Run with: npm run integration:nostream
|
|
21
|
+
*/
|
|
22
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
23
|
+
const cdktf_1 = require("cdktf");
|
|
24
|
+
require("cdktf/lib/testing/adapters/jest");
|
|
25
|
+
const resource_group_1 = require("../../azure-resourcegroup/lib/resource-group");
|
|
26
|
+
const provider_1 = require("../../core-azure/lib/azapi/providers-azapi/provider");
|
|
27
|
+
const testing_1 = require("../../testing");
|
|
28
|
+
const metadata_1 = require("../../testing/lib/metadata");
|
|
29
|
+
const dns_zone_1 = require("../lib/dns-zone");
|
|
30
|
+
const records_1 = require("../lib/records");
|
|
31
|
+
// Generate unique test run metadata for this test suite
|
|
32
|
+
const testMetadata = new metadata_1.TestRunMetadata("dnsrec-integration", {
|
|
33
|
+
maxAgeHours: 4,
|
|
34
|
+
});
|
|
35
|
+
/**
|
|
36
|
+
* Example stack demonstrating Public DNS Records usage
|
|
37
|
+
*
|
|
38
|
+
* Creates a Public DNS Zone and various record types within it.
|
|
39
|
+
*/
|
|
40
|
+
class DnsRecordsExampleStack extends testing_1.BaseTestStack {
|
|
41
|
+
constructor(scope, id) {
|
|
42
|
+
super(scope, id, {
|
|
43
|
+
testRunOptions: {
|
|
44
|
+
maxAgeHours: testMetadata.maxAgeHours,
|
|
45
|
+
autoCleanup: testMetadata.autoCleanup,
|
|
46
|
+
cleanupPolicy: testMetadata.cleanupPolicy,
|
|
47
|
+
},
|
|
48
|
+
});
|
|
49
|
+
// Configure AZAPI provider
|
|
50
|
+
new provider_1.AzapiProvider(this, "azapi", {});
|
|
51
|
+
// Generate unique names
|
|
52
|
+
const resourceGroupName = this.generateResourceName("Microsoft.Resources/resourceGroups", "dnsrec");
|
|
53
|
+
// Create resource group for the DNS zone and records
|
|
54
|
+
const resourceGroup = new resource_group_1.ResourceGroup(this, "test-rg", {
|
|
55
|
+
name: resourceGroupName,
|
|
56
|
+
location: "eastus2",
|
|
57
|
+
tags: {
|
|
58
|
+
...this.systemTags(),
|
|
59
|
+
purpose: "public-dns-records-testing",
|
|
60
|
+
},
|
|
61
|
+
});
|
|
62
|
+
// Create Public DNS Zone - using a unique zone name
|
|
63
|
+
// Note: Public DNS zones require globally unique names
|
|
64
|
+
const zoneName = this.generateResourceName("Microsoft.Network/dnsZones", "rec");
|
|
65
|
+
const zone = new dns_zone_1.DnsZone(this, "public-dns-zone", {
|
|
66
|
+
name: `${zoneName}.com`,
|
|
67
|
+
location: "global",
|
|
68
|
+
resourceGroupId: resourceGroup.id,
|
|
69
|
+
tags: {
|
|
70
|
+
...this.systemTags(),
|
|
71
|
+
purpose: "dns-records-testing",
|
|
72
|
+
},
|
|
73
|
+
});
|
|
74
|
+
// =========================================================================
|
|
75
|
+
// A Record - Single IP
|
|
76
|
+
// =========================================================================
|
|
77
|
+
new records_1.DnsARecord(this, "a-record-single", {
|
|
78
|
+
name: "web",
|
|
79
|
+
dnsZoneId: zone.id,
|
|
80
|
+
ttl: 300,
|
|
81
|
+
records: [{ ipv4Address: "20.30.40.50" }],
|
|
82
|
+
metadata: {
|
|
83
|
+
purpose: "web-server",
|
|
84
|
+
},
|
|
85
|
+
});
|
|
86
|
+
// =========================================================================
|
|
87
|
+
// A Record - Multiple IPs (load balancing)
|
|
88
|
+
// =========================================================================
|
|
89
|
+
new records_1.DnsARecord(this, "a-record-multi", {
|
|
90
|
+
name: "api",
|
|
91
|
+
dnsZoneId: zone.id,
|
|
92
|
+
ttl: 300,
|
|
93
|
+
records: [
|
|
94
|
+
{ ipv4Address: "20.30.40.51" },
|
|
95
|
+
{ ipv4Address: "20.30.40.52" },
|
|
96
|
+
{ ipv4Address: "20.30.40.53" },
|
|
97
|
+
],
|
|
98
|
+
metadata: {
|
|
99
|
+
purpose: "api-servers-loadbalanced",
|
|
100
|
+
},
|
|
101
|
+
});
|
|
102
|
+
// =========================================================================
|
|
103
|
+
// AAAA Record - IPv6 addresses
|
|
104
|
+
// =========================================================================
|
|
105
|
+
new records_1.DnsAaaaRecord(this, "aaaa-record", {
|
|
106
|
+
name: "ipv6host",
|
|
107
|
+
dnsZoneId: zone.id,
|
|
108
|
+
ttl: 300,
|
|
109
|
+
records: [
|
|
110
|
+
{ ipv6Address: "2001:db8:85a3::8a2e:370:7334" },
|
|
111
|
+
{ ipv6Address: "2001:db8:85a3::8a2e:370:7335" },
|
|
112
|
+
],
|
|
113
|
+
metadata: {
|
|
114
|
+
purpose: "ipv6-servers",
|
|
115
|
+
},
|
|
116
|
+
});
|
|
117
|
+
// =========================================================================
|
|
118
|
+
// CAA Record - Certificate Authority Authorization (PUBLIC DNS ONLY)
|
|
119
|
+
// Specifies which CAs are allowed to issue certificates for this domain
|
|
120
|
+
// =========================================================================
|
|
121
|
+
new records_1.DnsCaaRecord(this, "caa-record", {
|
|
122
|
+
name: "@",
|
|
123
|
+
dnsZoneId: zone.id,
|
|
124
|
+
ttl: 3600,
|
|
125
|
+
records: [
|
|
126
|
+
{ flags: 0, tag: "issue", value: "letsencrypt.org" },
|
|
127
|
+
{ flags: 0, tag: "issue", value: "digicert.com" },
|
|
128
|
+
{ flags: 0, tag: "issuewild", value: "letsencrypt.org" },
|
|
129
|
+
{ flags: 0, tag: "iodef", value: "mailto:security@example.com" },
|
|
130
|
+
],
|
|
131
|
+
metadata: {
|
|
132
|
+
purpose: "certificate-authority-authorization",
|
|
133
|
+
},
|
|
134
|
+
});
|
|
135
|
+
// =========================================================================
|
|
136
|
+
// CNAME Record - Alias
|
|
137
|
+
// =========================================================================
|
|
138
|
+
new records_1.DnsCnameRecord(this, "cname-record", {
|
|
139
|
+
name: "www",
|
|
140
|
+
dnsZoneId: zone.id,
|
|
141
|
+
ttl: 3600,
|
|
142
|
+
cname: `web.${zoneName}.com`,
|
|
143
|
+
metadata: {
|
|
144
|
+
purpose: "alias-to-web",
|
|
145
|
+
},
|
|
146
|
+
});
|
|
147
|
+
// =========================================================================
|
|
148
|
+
// MX Record - Mail exchange servers
|
|
149
|
+
// =========================================================================
|
|
150
|
+
new records_1.DnsMxRecord(this, "mx-record", {
|
|
151
|
+
name: "@",
|
|
152
|
+
dnsZoneId: zone.id,
|
|
153
|
+
ttl: 3600,
|
|
154
|
+
records: [
|
|
155
|
+
{ preference: 10, exchange: `mail1.${zoneName}.com` },
|
|
156
|
+
{ preference: 20, exchange: `mail2.${zoneName}.com` },
|
|
157
|
+
{ preference: 30, exchange: "mail.backup-provider.com" },
|
|
158
|
+
],
|
|
159
|
+
metadata: {
|
|
160
|
+
purpose: "mail-servers",
|
|
161
|
+
},
|
|
162
|
+
});
|
|
163
|
+
// =========================================================================
|
|
164
|
+
// NS Record - Name server delegation (PUBLIC DNS ONLY)
|
|
165
|
+
// Used for delegating a subdomain to different name servers
|
|
166
|
+
// =========================================================================
|
|
167
|
+
new records_1.DnsNsRecord(this, "ns-record", {
|
|
168
|
+
name: "subdomain",
|
|
169
|
+
dnsZoneId: zone.id,
|
|
170
|
+
ttl: 3600,
|
|
171
|
+
records: [
|
|
172
|
+
{ nsdname: "ns1.subdomain-provider.com" },
|
|
173
|
+
{ nsdname: "ns2.subdomain-provider.com" },
|
|
174
|
+
],
|
|
175
|
+
metadata: {
|
|
176
|
+
purpose: "subdomain-delegation",
|
|
177
|
+
},
|
|
178
|
+
});
|
|
179
|
+
// =========================================================================
|
|
180
|
+
// PTR Record - Reverse DNS
|
|
181
|
+
// Note: In practice, PTR records are created in reverse DNS zones
|
|
182
|
+
// managed by IP address providers. This demonstrates the record structure.
|
|
183
|
+
// =========================================================================
|
|
184
|
+
new records_1.DnsPtrRecord(this, "ptr-record", {
|
|
185
|
+
name: "ptr",
|
|
186
|
+
dnsZoneId: zone.id,
|
|
187
|
+
ttl: 3600,
|
|
188
|
+
records: [{ ptrdname: `server1.${zoneName}.com` }],
|
|
189
|
+
metadata: {
|
|
190
|
+
purpose: "reverse-dns-example",
|
|
191
|
+
},
|
|
192
|
+
});
|
|
193
|
+
// =========================================================================
|
|
194
|
+
// SRV Record - Service location
|
|
195
|
+
// Format: _service._protocol (e.g., _sip._tcp)
|
|
196
|
+
// =========================================================================
|
|
197
|
+
new records_1.DnsSrvRecord(this, "srv-record-sip", {
|
|
198
|
+
name: "_sip._tcp",
|
|
199
|
+
dnsZoneId: zone.id,
|
|
200
|
+
ttl: 3600,
|
|
201
|
+
records: [
|
|
202
|
+
{
|
|
203
|
+
priority: 10,
|
|
204
|
+
weight: 60,
|
|
205
|
+
port: 5060,
|
|
206
|
+
target: `sipserver1.${zoneName}.com`,
|
|
207
|
+
},
|
|
208
|
+
{
|
|
209
|
+
priority: 10,
|
|
210
|
+
weight: 40,
|
|
211
|
+
port: 5060,
|
|
212
|
+
target: `sipserver2.${zoneName}.com`,
|
|
213
|
+
},
|
|
214
|
+
],
|
|
215
|
+
metadata: {
|
|
216
|
+
purpose: "sip-service-discovery",
|
|
217
|
+
},
|
|
218
|
+
});
|
|
219
|
+
// =========================================================================
|
|
220
|
+
// SRV Record - Microsoft 365 Autodiscover
|
|
221
|
+
// =========================================================================
|
|
222
|
+
new records_1.DnsSrvRecord(this, "srv-record-autodiscover", {
|
|
223
|
+
name: "_autodiscover._tcp",
|
|
224
|
+
dnsZoneId: zone.id,
|
|
225
|
+
ttl: 3600,
|
|
226
|
+
records: [
|
|
227
|
+
{
|
|
228
|
+
priority: 0,
|
|
229
|
+
weight: 1,
|
|
230
|
+
port: 443,
|
|
231
|
+
target: "autodiscover.outlook.com",
|
|
232
|
+
},
|
|
233
|
+
],
|
|
234
|
+
metadata: {
|
|
235
|
+
purpose: "outlook-autodiscover",
|
|
236
|
+
},
|
|
237
|
+
});
|
|
238
|
+
// =========================================================================
|
|
239
|
+
// TXT Record - Root domain TXT records (SPF + Domain Verification)
|
|
240
|
+
// Note: In Azure DNS, all TXT records for the same name must be in a single record set.
|
|
241
|
+
// Each TXT record in the set can have multiple string values.
|
|
242
|
+
// =========================================================================
|
|
243
|
+
new records_1.DnsTxtRecord(this, "txt-record-root", {
|
|
244
|
+
name: "@",
|
|
245
|
+
dnsZoneId: zone.id,
|
|
246
|
+
ttl: 3600,
|
|
247
|
+
records: [
|
|
248
|
+
{
|
|
249
|
+
value: [
|
|
250
|
+
"v=spf1 include:spf.protection.outlook.com include:_spf.google.com ~all",
|
|
251
|
+
],
|
|
252
|
+
},
|
|
253
|
+
{ value: ["MS=ms12345678"] },
|
|
254
|
+
],
|
|
255
|
+
metadata: {
|
|
256
|
+
purpose: "root-txt-records",
|
|
257
|
+
},
|
|
258
|
+
});
|
|
259
|
+
// =========================================================================
|
|
260
|
+
// TXT Record - DKIM record
|
|
261
|
+
// =========================================================================
|
|
262
|
+
new records_1.DnsTxtRecord(this, "txt-record-dkim", {
|
|
263
|
+
name: "selector1._domainkey",
|
|
264
|
+
dnsZoneId: zone.id,
|
|
265
|
+
ttl: 3600,
|
|
266
|
+
records: [
|
|
267
|
+
{
|
|
268
|
+
value: [
|
|
269
|
+
"v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC...",
|
|
270
|
+
],
|
|
271
|
+
},
|
|
272
|
+
],
|
|
273
|
+
metadata: {
|
|
274
|
+
purpose: "dkim-record",
|
|
275
|
+
},
|
|
276
|
+
});
|
|
277
|
+
// =========================================================================
|
|
278
|
+
// TXT Record - DMARC record
|
|
279
|
+
// =========================================================================
|
|
280
|
+
new records_1.DnsTxtRecord(this, "txt-record-dmarc", {
|
|
281
|
+
name: "_dmarc",
|
|
282
|
+
dnsZoneId: zone.id,
|
|
283
|
+
ttl: 3600,
|
|
284
|
+
records: [
|
|
285
|
+
{
|
|
286
|
+
value: [
|
|
287
|
+
"v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@example.com; pct=100",
|
|
288
|
+
],
|
|
289
|
+
},
|
|
290
|
+
],
|
|
291
|
+
metadata: {
|
|
292
|
+
purpose: "dmarc-policy",
|
|
293
|
+
},
|
|
294
|
+
});
|
|
295
|
+
// =========================================================================
|
|
296
|
+
// Additional A Record - subdomain
|
|
297
|
+
// =========================================================================
|
|
298
|
+
new records_1.DnsARecord(this, "a-record-subdomain", {
|
|
299
|
+
name: "blog",
|
|
300
|
+
dnsZoneId: zone.id,
|
|
301
|
+
ttl: 300,
|
|
302
|
+
records: [{ ipv4Address: "20.30.40.100" }],
|
|
303
|
+
metadata: {
|
|
304
|
+
purpose: "blog-server",
|
|
305
|
+
},
|
|
306
|
+
});
|
|
307
|
+
}
|
|
308
|
+
}
|
|
309
|
+
describe("DnsRecords Integration Test", () => {
|
|
310
|
+
it("should deploy, validate idempotency, and cleanup resources", () => {
|
|
311
|
+
const app = cdktf_1.Testing.app();
|
|
312
|
+
const stack = new DnsRecordsExampleStack(app, "test-dnsrecords");
|
|
313
|
+
const synthesized = cdktf_1.Testing.fullSynth(stack);
|
|
314
|
+
// This will:
|
|
315
|
+
// 1. Run terraform apply to deploy resources (including parent-child relationships)
|
|
316
|
+
// 2. Run terraform plan to check idempotency (no changes expected)
|
|
317
|
+
// 3. Run terraform destroy to cleanup resources (child resources cleanup before parent)
|
|
318
|
+
(0, testing_1.TerraformApplyCheckAndDestroy)(synthesized, { verifyCleanup: true });
|
|
319
|
+
}, 600000); // 10 minute timeout for deployment and cleanup
|
|
320
|
+
});
|
|
321
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"dns-records.integ.js","sourceRoot":"","sources":["../../../src/azure-dnszone/test/dns-records.integ.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;;;;;;;;;GAmBG;;AAEH,iCAAgC;AAEhC,2CAAyC;AACzC,iFAA6E;AAC7E,kFAAoF;AACpF,2CAA6E;AAC7E,yDAA6D;AAC7D,8CAA0C;AAC1C,4CAUwB;AAExB,wDAAwD;AACxD,MAAM,YAAY,GAAG,IAAI,0BAAe,CAAC,oBAAoB,EAAE;IAC7D,WAAW,EAAE,CAAC;CACf,CAAC,CAAC;AAEH;;;;GAIG;AACH,MAAM,sBAAuB,SAAQ,uBAAa;IAChD,YAAY,KAAgB,EAAE,EAAU;QACtC,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE;YACf,cAAc,EAAE;gBACd,WAAW,EAAE,YAAY,CAAC,WAAW;gBACrC,WAAW,EAAE,YAAY,CAAC,WAAW;gBACrC,aAAa,EAAE,YAAY,CAAC,aAAa;aAC1C;SACF,CAAC,CAAC;QAEH,2BAA2B;QAC3B,IAAI,wBAAa,CAAC,IAAI,EAAE,OAAO,EAAE,EAAE,CAAC,CAAC;QAErC,wBAAwB;QACxB,MAAM,iBAAiB,GAAG,IAAI,CAAC,oBAAoB,CACjD,oCAAoC,EACpC,QAAQ,CACT,CAAC;QAEF,qDAAqD;QACrD,MAAM,aAAa,GAAG,IAAI,8BAAa,CAAC,IAAI,EAAE,SAAS,EAAE;YACvD,IAAI,EAAE,iBAAiB;YACvB,QAAQ,EAAE,SAAS;YACnB,IAAI,EAAE;gBACJ,GAAG,IAAI,CAAC,UAAU,EAAE;gBACpB,OAAO,EAAE,4BAA4B;aACtC;SACF,CAAC,CAAC;QAEH,oDAAoD;QACpD,uDAAuD;QACvD,MAAM,QAAQ,GAAG,IAAI,CAAC,oBAAoB,CACxC,4BAA4B,EAC5B,KAAK,CACN,CAAC;QACF,MAAM,IAAI,GAAG,IAAI,kBAAO,CAAC,IAAI,EAAE,iBAAiB,EAAE;YAChD,IAAI,EAAE,GAAG,QAAQ,MAAM;YACvB,QAAQ,EAAE,QAAQ;YAClB,eAAe,EAAE,aAAa,CAAC,EAAE;YACjC,IAAI,EAAE;gBACJ,GAAG,IAAI,CAAC,UAAU,EAAE;gBACpB,OAAO,EAAE,qBAAqB;aAC/B;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,uBAAuB;QACvB,4EAA4E;QAC5E,IAAI,oBAAU,CAAC,IAAI,EAAE,iBAAiB,EAAE;YACtC,IAAI,EAAE,KAAK;YACX,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,GAAG,EAAE,GAAG;YACR,OAAO,EAAE,CAAC,EAAE,WAAW,EAAE,aAAa,EAAE,CAAC;YACzC,QAAQ,EAAE;gBACR,OAAO,EAAE,YAAY;aACtB;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,2CAA2C;QAC3C,4EAA4E;QAC5E,IAAI,oBAAU,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACrC,IAAI,EAAE,KAAK;YACX,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,GAAG,EAAE,GAAG;YACR,OAAO,EAAE;gBACP,EAAE,WAAW,EAAE,aAAa,EAAE;gBAC9B,EAAE,WAAW,EAAE,aAAa,EAAE;gBAC9B,EAAE,WAAW,EAAE,aAAa,EAAE;aAC/B;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,0BAA0B;aACpC;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,+BAA+B;QAC/B,4EAA4E;QAC5E,IAAI,uBAAa,CAAC,IAAI,EAAE,aAAa,EAAE;YACrC,IAAI,EAAE,UAAU;YAChB,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,GAAG,EAAE,GAAG;YACR,OAAO,EAAE;gBACP,EAAE,WAAW,EAAE,8BAA8B,EAAE;gBAC/C,EAAE,WAAW,EAAE,8BAA8B,EAAE;aAChD;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,cAAc;aACxB;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,qEAAqE;QACrE,wEAAwE;QACxE,4EAA4E;QAC5E,IAAI,sBAAY,CAAC,IAAI,EAAE,YAAY,EAAE;YACnC,IAAI,EAAE,GAAG;YACT,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE;gBACP,EAAE,KAAK,EAAE,CAAC,EAAE,GAAG,EAAE,OAAO,EAAE,KAAK,EAAE,iBAAiB,EAAE;gBACpD,EAAE,KAAK,EAAE,CAAC,EAAE,GAAG,EAAE,OAAO,EAAE,KAAK,EAAE,cAAc,EAAE;gBACjD,EAAE,KAAK,EAAE,CAAC,EAAE,GAAG,EAAE,WAAW,EAAE,KAAK,EAAE,iBAAiB,EAAE;gBACxD,EAAE,KAAK,EAAE,CAAC,EAAE,GAAG,EAAE,OAAO,EAAE,KAAK,EAAE,6BAA6B,EAAE;aACjE;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,qCAAqC;aAC/C;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,uBAAuB;QACvB,4EAA4E;QAC5E,IAAI,wBAAc,CAAC,IAAI,EAAE,cAAc,EAAE;YACvC,IAAI,EAAE,KAAK;YACX,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,GAAG,EAAE,IAAI;YACT,KAAK,EAAE,OAAO,QAAQ,MAAM;YAC5B,QAAQ,EAAE;gBACR,OAAO,EAAE,cAAc;aACxB;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,oCAAoC;QACpC,4EAA4E;QAC5E,IAAI,qBAAW,CAAC,IAAI,EAAE,WAAW,EAAE;YACjC,IAAI,EAAE,GAAG;YACT,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE;gBACP,EAAE,UAAU,EAAE,EAAE,EAAE,QAAQ,EAAE,SAAS,QAAQ,MAAM,EAAE;gBACrD,EAAE,UAAU,EAAE,EAAE,EAAE,QAAQ,EAAE,SAAS,QAAQ,MAAM,EAAE;gBACrD,EAAE,UAAU,EAAE,EAAE,EAAE,QAAQ,EAAE,0BAA0B,EAAE;aACzD;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,cAAc;aACxB;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,uDAAuD;QACvD,4DAA4D;QAC5D,4EAA4E;QAC5E,IAAI,qBAAW,CAAC,IAAI,EAAE,WAAW,EAAE;YACjC,IAAI,EAAE,WAAW;YACjB,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE;gBACP,EAAE,OAAO,EAAE,4BAA4B,EAAE;gBACzC,EAAE,OAAO,EAAE,4BAA4B,EAAE;aAC1C;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,sBAAsB;aAChC;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,2BAA2B;QAC3B,kEAAkE;QAClE,2EAA2E;QAC3E,4EAA4E;QAC5E,IAAI,sBAAY,CAAC,IAAI,EAAE,YAAY,EAAE;YACnC,IAAI,EAAE,KAAK;YACX,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE,CAAC,EAAE,QAAQ,EAAE,WAAW,QAAQ,MAAM,EAAE,CAAC;YAClD,QAAQ,EAAE;gBACR,OAAO,EAAE,qBAAqB;aAC/B;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,gCAAgC;QAChC,+CAA+C;QAC/C,4EAA4E;QAC5E,IAAI,sBAAY,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACvC,IAAI,EAAE,WAAW;YACjB,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE;gBACP;oBACE,QAAQ,EAAE,EAAE;oBACZ,MAAM,EAAE,EAAE;oBACV,IAAI,EAAE,IAAI;oBACV,MAAM,EAAE,cAAc,QAAQ,MAAM;iBACrC;gBACD;oBACE,QAAQ,EAAE,EAAE;oBACZ,MAAM,EAAE,EAAE;oBACV,IAAI,EAAE,IAAI;oBACV,MAAM,EAAE,cAAc,QAAQ,MAAM;iBACrC;aACF;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,uBAAuB;aACjC;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,0CAA0C;QAC1C,4EAA4E;QAC5E,IAAI,sBAAY,CAAC,IAAI,EAAE,yBAAyB,EAAE;YAChD,IAAI,EAAE,oBAAoB;YAC1B,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE;gBACP;oBACE,QAAQ,EAAE,CAAC;oBACX,MAAM,EAAE,CAAC;oBACT,IAAI,EAAE,GAAG;oBACT,MAAM,EAAE,0BAA0B;iBACnC;aACF;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,sBAAsB;aAChC;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,mEAAmE;QACnE,wFAAwF;QACxF,8DAA8D;QAC9D,4EAA4E;QAC5E,IAAI,sBAAY,CAAC,IAAI,EAAE,iBAAiB,EAAE;YACxC,IAAI,EAAE,GAAG;YACT,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE;gBACP;oBACE,KAAK,EAAE;wBACL,wEAAwE;qBACzE;iBACF;gBACD,EAAE,KAAK,EAAE,CAAC,eAAe,CAAC,EAAE;aAC7B;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,kBAAkB;aAC5B;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,2BAA2B;QAC3B,4EAA4E;QAC5E,IAAI,sBAAY,CAAC,IAAI,EAAE,iBAAiB,EAAE;YACxC,IAAI,EAAE,sBAAsB;YAC5B,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE;gBACP;oBACE,KAAK,EAAE;wBACL,8DAA8D;qBAC/D;iBACF;aACF;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,aAAa;aACvB;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,4BAA4B;QAC5B,4EAA4E;QAC5E,IAAI,sBAAY,CAAC,IAAI,EAAE,kBAAkB,EAAE;YACzC,IAAI,EAAE,QAAQ;YACd,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,GAAG,EAAE,IAAI;YACT,OAAO,EAAE;gBACP;oBACE,KAAK,EAAE;wBACL,uEAAuE;qBACxE;iBACF;aACF;YACD,QAAQ,EAAE;gBACR,OAAO,EAAE,cAAc;aACxB;SACF,CAAC,CAAC;QAEH,4EAA4E;QAC5E,kCAAkC;QAClC,4EAA4E;QAC5E,IAAI,oBAAU,CAAC,IAAI,EAAE,oBAAoB,EAAE;YACzC,IAAI,EAAE,MAAM;YACZ,SAAS,EAAE,IAAI,CAAC,EAAE;YAClB,GAAG,EAAE,GAAG;YACR,OAAO,EAAE,CAAC,EAAE,WAAW,EAAE,cAAc,EAAE,CAAC;YAC1C,QAAQ,EAAE;gBACR,OAAO,EAAE,aAAa;aACvB;SACF,CAAC,CAAC;IACL,CAAC;CACF;AAED,QAAQ,CAAC,6BAA6B,EAAE,GAAG,EAAE;IAC3C,EAAE,CAAC,4DAA4D,EAAE,GAAG,EAAE;QACpE,MAAM,GAAG,GAAG,eAAO,CAAC,GAAG,EAAE,CAAC;QAC1B,MAAM,KAAK,GAAG,IAAI,sBAAsB,CAAC,GAAG,EAAE,iBAAiB,CAAC,CAAC;QACjE,MAAM,WAAW,GAAG,eAAO,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;QAE7C,aAAa;QACb,oFAAoF;QACpF,mEAAmE;QACnE,wFAAwF;QACxF,IAAA,uCAA6B,EAAC,WAAW,EAAE,EAAE,aAAa,EAAE,IAAI,EAAE,CAAC,CAAC;IACtE,CAAC,EAAE,MAAM,CAAC,CAAC,CAAC,+CAA+C;AAC7D,CAAC,CAAC,CAAC","sourcesContent":["/**\n * Integration test for Azure Public DNS Zone Records\n *\n * This test demonstrates usage of all Public DNS record types\n * and validates deployment, idempotency, and cleanup for child resources.\n *\n * Supported Record Types:\n * - A record (IPv4 addresses, including alias records)\n * - AAAA record (IPv6 addresses, including alias records)\n * - CAA record (Certificate Authority Authorization - PUBLIC ONLY)\n * - CNAME record (including alias records)\n * - MX record\n * - NS record (Name Server - PUBLIC ONLY)\n * - PTR record\n * - SRV record\n * - TXT record\n * - (SOA is managed by Azure automatically)\n *\n * Run with: npm run integration:nostream\n */\n\nimport { Testing } from \"cdktf\";\nimport { Construct } from \"constructs\";\nimport \"cdktf/lib/testing/adapters/jest\";\nimport { ResourceGroup } from \"../../azure-resourcegroup/lib/resource-group\";\nimport { AzapiProvider } from \"../../core-azure/lib/azapi/providers-azapi/provider\";\nimport { BaseTestStack, TerraformApplyCheckAndDestroy } from \"../../testing\";\nimport { TestRunMetadata } from \"../../testing/lib/metadata\";\nimport { DnsZone } from \"../lib/dns-zone\";\nimport {\n  DnsARecord,\n  DnsAaaaRecord,\n  DnsCaaRecord,\n  DnsCnameRecord,\n  DnsMxRecord,\n  DnsNsRecord,\n  DnsPtrRecord,\n  DnsSrvRecord,\n  DnsTxtRecord,\n} from \"../lib/records\";\n\n// Generate unique test run metadata for this test suite\nconst testMetadata = new TestRunMetadata(\"dnsrec-integration\", {\n  maxAgeHours: 4,\n});\n\n/**\n * Example stack demonstrating Public DNS Records usage\n *\n * Creates a Public DNS Zone and various record types within it.\n */\nclass DnsRecordsExampleStack extends BaseTestStack {\n  constructor(scope: Construct, id: string) {\n    super(scope, id, {\n      testRunOptions: {\n        maxAgeHours: testMetadata.maxAgeHours,\n        autoCleanup: testMetadata.autoCleanup,\n        cleanupPolicy: testMetadata.cleanupPolicy,\n      },\n    });\n\n    // Configure AZAPI provider\n    new AzapiProvider(this, \"azapi\", {});\n\n    // Generate unique names\n    const resourceGroupName = this.generateResourceName(\n      \"Microsoft.Resources/resourceGroups\",\n      \"dnsrec\",\n    );\n\n    // Create resource group for the DNS zone and records\n    const resourceGroup = new ResourceGroup(this, \"test-rg\", {\n      name: resourceGroupName,\n      location: \"eastus2\",\n      tags: {\n        ...this.systemTags(),\n        purpose: \"public-dns-records-testing\",\n      },\n    });\n\n    // Create Public DNS Zone - using a unique zone name\n    // Note: Public DNS zones require globally unique names\n    const zoneName = this.generateResourceName(\n      \"Microsoft.Network/dnsZones\",\n      \"rec\",\n    );\n    const zone = new DnsZone(this, \"public-dns-zone\", {\n      name: `${zoneName}.com`,\n      location: \"global\",\n      resourceGroupId: resourceGroup.id,\n      tags: {\n        ...this.systemTags(),\n        purpose: \"dns-records-testing\",\n      },\n    });\n\n    // =========================================================================\n    // A Record - Single IP\n    // =========================================================================\n    new DnsARecord(this, \"a-record-single\", {\n      name: \"web\",\n      dnsZoneId: zone.id,\n      ttl: 300,\n      records: [{ ipv4Address: \"20.30.40.50\" }],\n      metadata: {\n        purpose: \"web-server\",\n      },\n    });\n\n    // =========================================================================\n    // A Record - Multiple IPs (load balancing)\n    // =========================================================================\n    new DnsARecord(this, \"a-record-multi\", {\n      name: \"api\",\n      dnsZoneId: zone.id,\n      ttl: 300,\n      records: [\n        { ipv4Address: \"20.30.40.51\" },\n        { ipv4Address: \"20.30.40.52\" },\n        { ipv4Address: \"20.30.40.53\" },\n      ],\n      metadata: {\n        purpose: \"api-servers-loadbalanced\",\n      },\n    });\n\n    // =========================================================================\n    // AAAA Record - IPv6 addresses\n    // =========================================================================\n    new DnsAaaaRecord(this, \"aaaa-record\", {\n      name: \"ipv6host\",\n      dnsZoneId: zone.id,\n      ttl: 300,\n      records: [\n        { ipv6Address: \"2001:db8:85a3::8a2e:370:7334\" },\n        { ipv6Address: \"2001:db8:85a3::8a2e:370:7335\" },\n      ],\n      metadata: {\n        purpose: \"ipv6-servers\",\n      },\n    });\n\n    // =========================================================================\n    // CAA Record - Certificate Authority Authorization (PUBLIC DNS ONLY)\n    // Specifies which CAs are allowed to issue certificates for this domain\n    // =========================================================================\n    new DnsCaaRecord(this, \"caa-record\", {\n      name: \"@\",\n      dnsZoneId: zone.id,\n      ttl: 3600,\n      records: [\n        { flags: 0, tag: \"issue\", value: \"letsencrypt.org\" },\n        { flags: 0, tag: \"issue\", value: \"digicert.com\" },\n        { flags: 0, tag: \"issuewild\", value: \"letsencrypt.org\" },\n        { flags: 0, tag: \"iodef\", value: \"mailto:security@example.com\" },\n      ],\n      metadata: {\n        purpose: \"certificate-authority-authorization\",\n      },\n    });\n\n    // =========================================================================\n    // CNAME Record - Alias\n    // =========================================================================\n    new DnsCnameRecord(this, \"cname-record\", {\n      name: \"www\",\n      dnsZoneId: zone.id,\n      ttl: 3600,\n      cname: `web.${zoneName}.com`,\n      metadata: {\n        purpose: \"alias-to-web\",\n      },\n    });\n\n    // =========================================================================\n    // MX Record - Mail exchange servers\n    // =========================================================================\n    new DnsMxRecord(this, \"mx-record\", {\n      name: \"@\",\n      dnsZoneId: zone.id,\n      ttl: 3600,\n      records: [\n        { preference: 10, exchange: `mail1.${zoneName}.com` },\n        { preference: 20, exchange: `mail2.${zoneName}.com` },\n        { preference: 30, exchange: \"mail.backup-provider.com\" },\n      ],\n      metadata: {\n        purpose: \"mail-servers\",\n      },\n    });\n\n    // =========================================================================\n    // NS Record - Name server delegation (PUBLIC DNS ONLY)\n    // Used for delegating a subdomain to different name servers\n    // =========================================================================\n    new DnsNsRecord(this, \"ns-record\", {\n      name: \"subdomain\",\n      dnsZoneId: zone.id,\n      ttl: 3600,\n      records: [\n        { nsdname: \"ns1.subdomain-provider.com\" },\n        { nsdname: \"ns2.subdomain-provider.com\" },\n      ],\n      metadata: {\n        purpose: \"subdomain-delegation\",\n      },\n    });\n\n    // =========================================================================\n    // PTR Record - Reverse DNS\n    // Note: In practice, PTR records are created in reverse DNS zones\n    // managed by IP address providers. This demonstrates the record structure.\n    // =========================================================================\n    new DnsPtrRecord(this, \"ptr-record\", {\n      name: \"ptr\",\n      dnsZoneId: zone.id,\n      ttl: 3600,\n      records: [{ ptrdname: `server1.${zoneName}.com` }],\n      metadata: {\n        purpose: \"reverse-dns-example\",\n      },\n    });\n\n    // =========================================================================\n    // SRV Record - Service location\n    // Format: _service._protocol (e.g., _sip._tcp)\n    // =========================================================================\n    new DnsSrvRecord(this, \"srv-record-sip\", {\n      name: \"_sip._tcp\",\n      dnsZoneId: zone.id,\n      ttl: 3600,\n      records: [\n        {\n          priority: 10,\n          weight: 60,\n          port: 5060,\n          target: `sipserver1.${zoneName}.com`,\n        },\n        {\n          priority: 10,\n          weight: 40,\n          port: 5060,\n          target: `sipserver2.${zoneName}.com`,\n        },\n      ],\n      metadata: {\n        purpose: \"sip-service-discovery\",\n      },\n    });\n\n    // =========================================================================\n    // SRV Record - Microsoft 365 Autodiscover\n    // =========================================================================\n    new DnsSrvRecord(this, \"srv-record-autodiscover\", {\n      name: \"_autodiscover._tcp\",\n      dnsZoneId: zone.id,\n      ttl: 3600,\n      records: [\n        {\n          priority: 0,\n          weight: 1,\n          port: 443,\n          target: \"autodiscover.outlook.com\",\n        },\n      ],\n      metadata: {\n        purpose: \"outlook-autodiscover\",\n      },\n    });\n\n    // =========================================================================\n    // TXT Record - Root domain TXT records (SPF + Domain Verification)\n    // Note: In Azure DNS, all TXT records for the same name must be in a single record set.\n    // Each TXT record in the set can have multiple string values.\n    // =========================================================================\n    new DnsTxtRecord(this, \"txt-record-root\", {\n      name: \"@\",\n      dnsZoneId: zone.id,\n      ttl: 3600,\n      records: [\n        {\n          value: [\n            \"v=spf1 include:spf.protection.outlook.com include:_spf.google.com ~all\",\n          ],\n        },\n        { value: [\"MS=ms12345678\"] },\n      ],\n      metadata: {\n        purpose: \"root-txt-records\",\n      },\n    });\n\n    // =========================================================================\n    // TXT Record - DKIM record\n    // =========================================================================\n    new DnsTxtRecord(this, \"txt-record-dkim\", {\n      name: \"selector1._domainkey\",\n      dnsZoneId: zone.id,\n      ttl: 3600,\n      records: [\n        {\n          value: [\n            \"v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC...\",\n          ],\n        },\n      ],\n      metadata: {\n        purpose: \"dkim-record\",\n      },\n    });\n\n    // =========================================================================\n    // TXT Record - DMARC record\n    // =========================================================================\n    new DnsTxtRecord(this, \"txt-record-dmarc\", {\n      name: \"_dmarc\",\n      dnsZoneId: zone.id,\n      ttl: 3600,\n      records: [\n        {\n          value: [\n            \"v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@example.com; pct=100\",\n          ],\n        },\n      ],\n      metadata: {\n        purpose: \"dmarc-policy\",\n      },\n    });\n\n    // =========================================================================\n    // Additional A Record - subdomain\n    // =========================================================================\n    new DnsARecord(this, \"a-record-subdomain\", {\n      name: \"blog\",\n      dnsZoneId: zone.id,\n      ttl: 300,\n      records: [{ ipv4Address: \"20.30.40.100\" }],\n      metadata: {\n        purpose: \"blog-server\",\n      },\n    });\n  }\n}\n\ndescribe(\"DnsRecords Integration Test\", () => {\n  it(\"should deploy, validate idempotency, and cleanup resources\", () => {\n    const app = Testing.app();\n    const stack = new DnsRecordsExampleStack(app, \"test-dnsrecords\");\n    const synthesized = Testing.fullSynth(stack);\n\n    // This will:\n    // 1. Run terraform apply to deploy resources (including parent-child relationships)\n    // 2. Run terraform plan to check idempotency (no changes expected)\n    // 3. Run terraform destroy to cleanup resources (child resources cleanup before parent)\n    TerraformApplyCheckAndDestroy(synthesized, { verifyCleanup: true });\n  }, 600000); // 10 minute timeout for deployment and cleanup\n});\n"]}
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Unit tests for Azure Public DNS Zone Record implementations
|
|
3
|
+
*
|
|
4
|
+
* This test suite validates all 10 Public DNS record types:
|
|
5
|
+
* - DnsARecord
|
|
6
|
+
* - DnsAaaaRecord
|
|
7
|
+
* - DnsCaaRecord (Public DNS only)
|
|
8
|
+
* - DnsCnameRecord
|
|
9
|
+
* - DnsMxRecord
|
|
10
|
+
* - DnsNsRecord (Public DNS only)
|
|
11
|
+
* - DnsPtrRecord
|
|
12
|
+
* - DnsSoaRecord
|
|
13
|
+
* - DnsSrvRecord
|
|
14
|
+
* - DnsTxtRecord
|
|
15
|
+
*
|
|
16
|
+
* Tests verify basic creation, correct resource types, API versions,
|
|
17
|
+
* parent ID resolution, resource body structure, TTL handling,
|
|
18
|
+
* record-specific properties, metadata handling, and alias record support.
|
|
19
|
+
*/
|
|
20
|
+
export {};
|