Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions bicepconfig.json
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,9 @@
"rules": {
"explicit-values-for-loc-params": {
"level": "off" // Reason: Our modules default to e.g. the location of their parent resource group which is sufficient if deploying a self-contained solution
},
"no-deployments-resources": {
"level": "off" // Reason: The telemetry resource only has a single output and is self-contained in a deployment
}
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -46,4 +46,4 @@ resource privateDNSZone 'Microsoft.Network/privateDnsZones@2020-06-01' = {
output subnetResourceId string = virtualNetwork.properties.subnets[0].id

@description('The resource ID of the created Private DNS Zone.')
output privateDNSResourceId string = privateDNSZone.id
output privateDNSZoneResourceId string = privateDNSZone.id
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ module testDeployment '../../main.bicep' = {
{
privateDnsZoneGroup: {
privateDNSResourceIds: [
nestedDependencies.outputs.privateDNSResourceId
nestedDependencies.outputs.privateDNSZoneResourceId
]
}
service: 'configurationStores'
Expand Down
4 changes: 2 additions & 2 deletions modules/app-configuration/configuration-store/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -413,7 +413,7 @@ module configurationStore 'br:bicep/modules/app-configuration.configuration-stor
{
privateDnsZoneGroup: {
privateDNSResourceIds: [
'<privateDNSResourceId>'
'<privateDNSZoneResourceId>'
]
}
service: 'configurationStores'
Expand Down Expand Up @@ -469,7 +469,7 @@ module configurationStore 'br:bicep/modules/app-configuration.configuration-stor
{
"privateDnsZoneGroup": {
"privateDNSResourceIds": [
"<privateDNSResourceId>"
"<privateDNSZoneResourceId>"
]
},
"service": "configurationStores",
Expand Down
7 changes: 4 additions & 3 deletions modules/app-configuration/configuration-store/main.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -250,14 +250,15 @@ module configurationStore_privateEndpoints '../../network/private-endpoint/main.
subnetResourceId: privateEndpoint.subnetResourceId
enableDefaultTelemetry: enableReferencedModulesTelemetry
location: contains(privateEndpoint, 'location') ? privateEndpoint.location : reference(split(privateEndpoint.subnetResourceId, '/subnets/')[0], '2020-06-01', 'Full').location
lock: contains(privateEndpoint, 'lock') ? privateEndpoint.lock : lock
privateDnsZoneGroup: contains(privateEndpoint, 'privateDnsZoneGroup') ? privateEndpoint.privateDnsZoneGroup : {}
lock: contains(privateEndpoint, 'lock') ? privateEndpoint.lock : null
privateDnsZoneGroupName: contains(privateEndpoint, 'privateDnsZoneGroupName') ? privateEndpoint.privateDnsZoneGroupName : 'default'
privateDnsZoneResourceIds: contains(privateEndpoint, 'privateDnsZoneResourceIds') ? privateEndpoint.privateDnsZoneResourceIds : []
roleAssignments: contains(privateEndpoint, 'roleAssignments') ? privateEndpoint.roleAssignments : []
tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {}
manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : []
customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : []
ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : []
applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : []
applicationSecurityGroupResourceIds: contains(privateEndpoint, 'applicationSecurityGroupResourceIds') ? privateEndpoint.applicationSecurityGroupResourceIds : []
customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : ''
}
}]
Expand Down
419 changes: 191 additions & 228 deletions modules/app-configuration/configuration-store/main.json

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -97,11 +97,9 @@ module testDeployment '../../main.bicep' = {
]
privateEndpoints: [
{
privateDnsZoneGroup: {
privateDNSResourceIds: [
nestedDependencies.outputs.privateDNSZoneResourceId
]
}
privateDnsZoneResourceIds: [
nestedDependencies.outputs.privateDNSZoneResourceId
]
service: 'Webhook'
subnetResourceId: nestedDependencies.outputs.subnetResourceId
tags: {
Expand All @@ -111,11 +109,9 @@ module testDeployment '../../main.bicep' = {
}
}
{
privateDnsZoneGroup: {
privateDNSResourceIds: [
nestedDependencies.outputs.privateDNSZoneResourceId
]
}
privateDnsZoneResourceIds: [
nestedDependencies.outputs.privateDNSZoneResourceId
]
service: 'DSCAndHybridWorker'
subnetResourceId: nestedDependencies.outputs.subnetResourceId
tags: {
Expand Down
32 changes: 12 additions & 20 deletions modules/automation/automation-account/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -87,11 +87,9 @@ module automationAccount 'br:bicep/modules/automation.automation-account:1.0.0'
]
privateEndpoints: [
{
privateDnsZoneGroup: {
privateDNSResourceIds: [
'<privateDNSZoneResourceId>'
]
}
privateDnsZoneResourceIds: [
'<privateDNSZoneResourceId>'
]
service: 'Webhook'
subnetResourceId: '<subnetResourceId>'
tags: {
Expand All @@ -101,11 +99,9 @@ module automationAccount 'br:bicep/modules/automation.automation-account:1.0.0'
}
}
{
privateDnsZoneGroup: {
privateDNSResourceIds: [
'<privateDNSZoneResourceId>'
]
}
privateDnsZoneResourceIds: [
'<privateDNSZoneResourceId>'
]
service: 'DSCAndHybridWorker'
subnetResourceId: '<subnetResourceId>'
tags: {
Expand Down Expand Up @@ -312,11 +308,9 @@ module automationAccount 'br:bicep/modules/automation.automation-account:1.0.0'
"privateEndpoints": {
"value": [
{
"privateDnsZoneGroup": {
"privateDNSResourceIds": [
"<privateDNSZoneResourceId>"
]
},
"privateDnsZoneResourceIds": [
"<privateDNSZoneResourceId>"
],
"service": "Webhook",
"subnetResourceId": "<subnetResourceId>",
"tags": {
Expand All @@ -326,11 +320,9 @@ module automationAccount 'br:bicep/modules/automation.automation-account:1.0.0'
}
},
{
"privateDnsZoneGroup": {
"privateDNSResourceIds": [
"<privateDNSZoneResourceId>"
]
},
"privateDnsZoneResourceIds": [
"<privateDNSZoneResourceId>"
],
"service": "DSCAndHybridWorker",
"subnetResourceId": "<subnetResourceId>",
"tags": {
Expand Down
7 changes: 4 additions & 3 deletions modules/automation/automation-account/main.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -381,14 +381,15 @@ module automationAccount_privateEndpoints '../../network/private-endpoint/main.b
subnetResourceId: privateEndpoint.subnetResourceId
enableDefaultTelemetry: enableReferencedModulesTelemetry
location: contains(privateEndpoint, 'location') ? privateEndpoint.location : reference(split(privateEndpoint.subnetResourceId, '/subnets/')[0], '2020-06-01', 'Full').location
lock: contains(privateEndpoint, 'lock') ? privateEndpoint.lock : lock
privateDnsZoneGroup: contains(privateEndpoint, 'privateDnsZoneGroup') ? privateEndpoint.privateDnsZoneGroup : {}
lock: contains(privateEndpoint, 'lock') ? privateEndpoint.lock : null
privateDnsZoneGroupName: contains(privateEndpoint, 'privateDnsZoneGroupName') ? privateEndpoint.privateDnsZoneGroupName : 'default'
privateDnsZoneResourceIds: contains(privateEndpoint, 'privateDnsZoneResourceIds') ? privateEndpoint.privateDnsZoneResourceIds : []
roleAssignments: contains(privateEndpoint, 'roleAssignments') ? privateEndpoint.roleAssignments : []
tags: contains(privateEndpoint, 'tags') ? privateEndpoint.tags : {}
manualPrivateLinkServiceConnections: contains(privateEndpoint, 'manualPrivateLinkServiceConnections') ? privateEndpoint.manualPrivateLinkServiceConnections : []
customDnsConfigs: contains(privateEndpoint, 'customDnsConfigs') ? privateEndpoint.customDnsConfigs : []
ipConfigurations: contains(privateEndpoint, 'ipConfigurations') ? privateEndpoint.ipConfigurations : []
applicationSecurityGroups: contains(privateEndpoint, 'applicationSecurityGroups') ? privateEndpoint.applicationSecurityGroups : []
applicationSecurityGroupResourceIds: contains(privateEndpoint, 'applicationSecurityGroupResourceIds') ? privateEndpoint.applicationSecurityGroupResourceIds : []
customNetworkInterfaceName: contains(privateEndpoint, 'customNetworkInterfaceName') ? privateEndpoint.customNetworkInterfaceName : ''
}
}]
Expand Down
Loading