Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bicep refactor #470

Merged
merged 15 commits into from
Mar 16, 2023
1 change: 1 addition & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -8,3 +8,4 @@ bicep/main.json
helper/localsite.html
helper/prodsite.html
helper/build/**
container-azm-ms-agentconfig.yaml
2 changes: 1 addition & 1 deletion bicep/acragentpool.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ param location string = resourceGroup().location
param acrName string
param acrPoolSubnetId string = ''

resource acr 'Microsoft.ContainerRegistry/registries@2021-06-01-preview' existing = {
resource acr 'Microsoft.ContainerRegistry/registries@2023-01-01-preview' existing = {
name: acrName
}

Expand Down
6 changes: 3 additions & 3 deletions bicep/aksagentpool.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -59,8 +59,8 @@ resource userNodepool 'Microsoft.ContainerService/managedClusters/agentPools@202
mode: 'User'
vmSize: agentVMSize
count: agentCount
minCount: autoScale ? agentCount : json('null')
maxCount: autoScale ? agentCountMax : json('null')
minCount: autoScale ? agentCount : null
maxCount: autoScale ? agentCountMax : null
enableAutoScaling: autoScale
availabilityZones: !empty(availabilityZones) ? availabilityZones : null
osDiskType: osDiskType
Expand All @@ -69,7 +69,7 @@ resource userNodepool 'Microsoft.ContainerService/managedClusters/agentPools@202
osType: osType
maxPods: maxPods
type: 'VirtualMachineScaleSets'
vnetSubnetID: !empty(subnetId) ? subnetId : json('null')
vnetSubnetID: !empty(subnetId) ? subnetId : null
upgradeSettings: {
maxSurge: '33%'
}
Expand Down
8 changes: 4 additions & 4 deletions bicep/aksnetcontrib.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -15,15 +15,15 @@ var networkContributorRole = subscriptionResourceId('Microsoft.Authorization/rol
var existingAksSubnetName = !empty(byoAKSSubnetId) ? split(byoAKSSubnetId, '/')[10] : ''
var existingAksVnetName = !empty(byoAKSSubnetId) ? split(byoAKSSubnetId, '/')[8] : ''

resource existingvnet 'Microsoft.Network/virtualNetworks@2021-02-01' existing = {
resource existingvnet 'Microsoft.Network/virtualNetworks@2022-07-01' existing = {
name: existingAksVnetName
}
resource existingAksSubnet 'Microsoft.Network/virtualNetworks/subnets@2020-08-01' existing = {
resource existingAksSubnet 'Microsoft.Network/virtualNetworks/subnets@2022-07-01' existing = {
parent: existingvnet
name: existingAksSubnetName
}

resource subnetRbac 'Microsoft.Authorization/roleAssignments@2020-04-01-preview' = if (rbacAssignmentScope == 'subnet') {
resource subnetRbac 'Microsoft.Authorization/roleAssignments@2022-04-01' = if (rbacAssignmentScope == 'subnet') {
name: guid(user_identity_principalId, networkContributorRole, existingAksSubnetName)
scope: existingAksSubnet
properties: {
Expand All @@ -33,7 +33,7 @@ resource subnetRbac 'Microsoft.Authorization/roleAssignments@2020-04-01-preview'
}
}

resource existingVnetRbac 'Microsoft.Authorization/roleAssignments@2020-04-01-preview' = if (rbacAssignmentScope != 'subnet') {
resource existingVnetRbac 'Microsoft.Authorization/roleAssignments@2022-04-01' = if (rbacAssignmentScope != 'subnet') {
name: guid(user_identity_principalId, networkContributorRole, existingAksVnetName)
scope: existingvnet
properties: {
Expand Down
2 changes: 1 addition & 1 deletion bicep/appgw.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ resource appgwpip 'Microsoft.Network/publicIPAddresses@2020-07-01' = {
var frontendPublicIpConfig = {
properties: {
publicIPAddress: {
id: '${appgwpip.id}'
id: appgwpip.id
}
}
name: 'appGatewayFrontendIP'
Expand Down
4 changes: 4 additions & 0 deletions bicep/bicepconfig.json
Original file line number Diff line number Diff line change
@@ -1,9 +1,13 @@

{
"analyzers": {
"core": {
"enabled": true,
"verbose": false,
"rules": {
"use-recent-api-versions" : {
"level": "warning"
},
"no-hardcoded-location" : {
"level": "error"
},
Expand Down
4 changes: 2 additions & 2 deletions bicep/dnsZone.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ resource privateDns 'Microsoft.Network/privateDnsZones@2020-06-01' existing = if
}

var DNSZoneContributor = subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'befefa01-2a29-4197-83a8-272ff33ce314')
resource dnsContributor 'Microsoft.Authorization/roleAssignments@2020-04-01-preview' = if (!isPrivate) {
resource dnsContributor 'Microsoft.Authorization/roleAssignments@2022-04-01' = if (!isPrivate) {
scope: dns
name: guid(dns.id, principalId, DNSZoneContributor)
properties: {
Expand All @@ -23,7 +23,7 @@ resource dnsContributor 'Microsoft.Authorization/roleAssignments@2020-04-01-prev
}

var PrivateDNSZoneContributor = subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'b12aa53e-6015-4669-85d0-8515ebb3ae7f')
resource privateDnsContributor 'Microsoft.Authorization/roleAssignments@2020-04-01-preview' = if (isPrivate) {
resource privateDnsContributor 'Microsoft.Authorization/roleAssignments@2022-04-01' = if (isPrivate) {
scope: privateDns
name: guid(privateDns.id, principalId, PrivateDNSZoneContributor)
properties: {
Expand Down
2 changes: 1 addition & 1 deletion bicep/dnsZoneRbac.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ var dnsZoneName = !empty(dnsZoneId) ? split(dnsZoneId, '/')[8] : ''
var isDnsZonePrivate = !empty(dnsZoneId) ? split(dnsZoneId, '/')[7] == 'privateDnsZones' : false

module dnsZone './dnsZone.bicep' = if (!empty(dnsZoneId)) {
name: 'dns-${dnsZoneName}'
name: take('${deployment().name}-dns-${dnsZoneName}',64)
scope: resourceGroup(dnsZoneRg)
params: {
dnsZoneName: dnsZoneName
Expand Down
4 changes: 2 additions & 2 deletions bicep/firewall.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ var managementIpConfig = {
}
}

resource fw_pip 'Microsoft.Network/publicIPAddresses@2021-03-01' = {
resource fw_pip 'Microsoft.Network/publicIPAddresses@2022-07-01' = {
name: firewallPublicIpName
location: location
sku: {
Expand All @@ -38,7 +38,7 @@ resource fw_pip 'Microsoft.Network/publicIPAddresses@2021-03-01' = {
}
}

resource fwManagementIp_pip 'Microsoft.Network/publicIPAddresses@2021-03-01' = if(fwSku=='Basic') {
resource fwManagementIp_pip 'Microsoft.Network/publicIPAddresses@2022-07-01' = if(fwSku=='Basic') {
name: firewallManagementPublicIpName
location: location
sku: {
Expand Down
7 changes: 3 additions & 4 deletions bicep/keyvault.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -21,14 +21,13 @@ param keyVaultIPAllowlist array = []

param logAnalyticsWorkspaceId string = ''

var akvRawName = 'kv-${replace(resourceName, '-', '')}${uniqueString(resourceGroup().id, resourceName)}'
var akvName = length(akvRawName) > 24 ? substring(akvRawName, 0, 24) : akvRawName
var akvName = take('kv-${replace(resourceName, '-', '')}${uniqueString(resourceGroup().id, resourceName)}',24)

var kvIPRules = [for kvIp in keyVaultIPAllowlist: {
value: kvIp
}]

resource kv 'Microsoft.KeyVault/vaults@2021-11-01-preview' = {
resource kv 'Microsoft.KeyVault/vaults@2022-07-01' = {
name: akvName
location: location
properties: {
Expand All @@ -52,7 +51,7 @@ resource kv 'Microsoft.KeyVault/vaults@2021-11-01-preview' = {
enabledForDiskEncryption: false
enabledForTemplateDeployment: false
enableSoftDelete: keyVaultSoftDelete
enablePurgeProtection: keyVaultPurgeProtection ? true : json('null')
enablePurgeProtection: keyVaultPurgeProtection ? true : null
}
}

Expand Down
4 changes: 2 additions & 2 deletions bicep/keyvaultkey.bicep
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
param keyVaultName string

resource kv 'Microsoft.KeyVault/vaults@2021-11-01-preview' existing = {
resource kv 'Microsoft.KeyVault/vaults@2022-07-01' existing = {
name: keyVaultName
}

resource kvKmsKey 'Microsoft.KeyVault/vaults/keys@2021-11-01-preview' = {
resource kvKmsKey 'Microsoft.KeyVault/vaults/keys@2022-07-01' = {
name: 'kmskey'
parent: kv
properties: {
Expand Down
2 changes: 1 addition & 1 deletion bicep/keyvaultrbac.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ var keyVaultCryptoUserRole = subscriptionResourceId('Microsoft.Authorization/rol
var keyVaultCryptoOfficerRole = subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '14b46e9e-c2b7-41b4-b07b-48a6ebf60603')
var keyVaultCryptoServiceEncrpytionRole = subscriptionResourceId('Microsoft.Authorization/roleDefinitions','e147488a-f6f5-4113-8e2d-b22465e65bf6')

resource kv 'Microsoft.KeyVault/vaults@2021-11-01-preview' existing = {
resource kv 'Microsoft.KeyVault/vaults@2022-07-01' existing = {
name: keyVaultName
}

Expand Down
Loading