auto-format bicep code

This commit is contained in:
Josh Bradley 2025-01-06 19:20:45 -05:00
parent 743d587d94
commit b6153f3524
14 changed files with 14 additions and 21 deletions

View File

@ -10,7 +10,7 @@ param location string = resourceGroup().location
@description('Array of objects with fields principalId, principalType, roleDefinitionId') @description('Array of objects with fields principalId, principalType, roleDefinitionId')
param roleAssignments array = [] param roleAssignments array = []
@allowed([ 'enabled', 'disabled' ]) @allowed(['enabled', 'disabled'])
param publicNetworkAccess string = 'enabled' param publicNetworkAccess string = 'enabled'
resource aiSearch 'Microsoft.Search/searchServices@2024-03-01-preview' = { resource aiSearch 'Microsoft.Search/searchServices@2024-03-01-preview' = {

View File

@ -117,9 +117,9 @@ resource aks 'Microsoft.ContainerService/managedClusters@2024-09-02-preview' = {
} }
} }
networkProfile: { networkProfile: {
serviceCidr: '10.3.0.0/16' // must not overlap with any subnet IP ranges serviceCidr: '10.3.0.0/16' // must not overlap with any subnet IP ranges
dnsServiceIP: '10.3.0.10' // must be within the range specified in serviceCidr dnsServiceIP: '10.3.0.10' // must be within the range specified in serviceCidr
podCidr: '10.244.0.0/16' // IP range from which to assign pod IPs podCidr: '10.244.0.0/16' // IP range from which to assign pod IPs
} }
autoUpgradeProfile: autoUpgradeProfile autoUpgradeProfile: autoUpgradeProfile
oidcIssuerProfile: { oidcIssuerProfile: {

View File

@ -19,7 +19,6 @@ param textEmbeddingAdaTpm int = 10
@description('Array of objects with fields principalId, roleDefinitionId') @description('Array of objects with fields principalId, roleDefinitionId')
param roleAssignments array = [] param roleAssignments array = []
resource aoai 'Microsoft.CognitiveServices/accounts@2024-10-01' = { resource aoai 'Microsoft.CognitiveServices/accounts@2024-10-01' = {
name: openAiName name: openAiName
location: location location: location

View File

@ -7,7 +7,7 @@ param cosmosDbName string
@description('The location of the CosmosDB resource.') @description('The location of the CosmosDB resource.')
param location string = resourceGroup().location param location string = resourceGroup().location
@allowed([ 'Enabled', 'Disabled' ]) @allowed(['Enabled', 'Disabled'])
param publicNetworkAccess string = 'Disabled' param publicNetworkAccess string = 'Disabled'
@description('Role definition id to assign to the principal. Learn more: https://learn.microsoft.com/en-us/azure/cosmos-db/how-to-setup-rbac') @description('Role definition id to assign to the principal. Learn more: https://learn.microsoft.com/en-us/azure/cosmos-db/how-to-setup-rbac')
@ -22,7 +22,6 @@ param roleDefinitionId array = [
param principalId string param principalId string
resource cosmosDb 'Microsoft.DocumentDB/databaseAccounts@2024-11-15' = { resource cosmosDb 'Microsoft.DocumentDB/databaseAccounts@2024-11-15' = {
name: cosmosDbName name: cosmosDbName
location: location location: location

View File

@ -10,7 +10,6 @@ param location string = resourceGroup().location
@description('federated name: FederatedIdentityCredentialProperties. See https://learn.microsoft.com/en-us/azure/templates/microsoft.managedidentity/userassignedidentities/federatedidentitycredentials?pivots=deployment-language-bicep#federatedidentitycredentialproperties') @description('federated name: FederatedIdentityCredentialProperties. See https://learn.microsoft.com/en-us/azure/templates/microsoft.managedidentity/userassignedidentities/federatedidentitycredentials?pivots=deployment-language-bicep#federatedidentitycredentialproperties')
param federatedCredentials object = {} param federatedCredentials object = {}
resource identity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = { resource identity 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' = {
name: name name: name
location: location location: location

View File

@ -10,7 +10,6 @@ param location string = resourceGroup().location
@description('The public network access for ingestion.') @description('The public network access for ingestion.')
param publicNetworkAccessForIngestion string = 'Disabled' param publicNetworkAccessForIngestion string = 'Disabled'
resource logAnalyticsWorkspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = { resource logAnalyticsWorkspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = {
name: name name: name
location: location location: location

View File

@ -6,7 +6,6 @@ param privateLinkScopedResources array = []
param queryAccessMode string = 'Open' param queryAccessMode string = 'Open'
param ingestionAccessMode string = 'PrivateOnly' param ingestionAccessMode string = 'PrivateOnly'
resource privateLinkScope 'microsoft.insights/privateLinkScopes@2021-07-01-preview' = { resource privateLinkScope 'microsoft.insights/privateLinkScopes@2021-07-01-preview' = {
name: privateLinkScopeName name: privateLinkScopeName
location: 'global' location: 'global'

View File

@ -7,13 +7,13 @@ param name string
@description('The location of the Storage Account resource.') @description('The location of the Storage Account resource.')
param location string = resourceGroup().location param location string = resourceGroup().location
@allowed([ 'Hot', 'Cool', 'Premium' ]) @allowed(['Hot', 'Cool', 'Premium'])
param accessTier string = 'Hot' param accessTier string = 'Hot'
@allowed([ 'AzureDnsZone', 'Standard' ]) @allowed(['AzureDnsZone', 'Standard'])
param dnsEndpointType string = 'Standard' param dnsEndpointType string = 'Standard'
@allowed([ 'Enabled', 'Disabled' ]) @allowed(['Enabled', 'Disabled'])
param publicNetworkAccess string = 'Disabled' param publicNetworkAccess string = 'Disabled'
@description('Array of objects with fields principalId, principalType, roleDefinitionId') @description('Array of objects with fields principalId, principalType, roleDefinitionId')
@ -29,7 +29,6 @@ param kind string = 'StorageV2'
param minimumTlsVersion string = 'TLS1_2' param minimumTlsVersion string = 'TLS1_2'
param containers array = [] param containers array = []
resource storage 'Microsoft.Storage/storageAccounts@2023-01-01' = { resource storage 'Microsoft.Storage/storageAccounts@2023-01-01' = {
name: name name: name
location: location location: location

View File

@ -5,7 +5,6 @@ param vnetId string
param privateDnsZoneName string param privateDnsZoneName string
var vnet_id_hash = uniqueString(vnetId) var vnet_id_hash = uniqueString(vnetId)
resource dnsZone 'Microsoft.Network/privateDnsZones@2020-06-01' = { resource dnsZone 'Microsoft.Network/privateDnsZones@2020-06-01' = {
name: privateDnsZoneName name: privateDnsZoneName
location: 'global' location: 'global'

View File

@ -13,7 +13,6 @@ param ttl int = 900
@description('The IP address') @description('The IP address')
param ipv4Address string param ipv4Address string
resource dnsZone 'Microsoft.Network/privateDnsZones@2020-06-01' existing = { resource dnsZone 'Microsoft.Network/privateDnsZones@2020-06-01' existing = {
name: dnsZoneName name: dnsZoneName
} }

View File

@ -7,7 +7,6 @@ param name string
@description('The name of the virtual networks the DNS zone should be associated with.') @description('The name of the virtual networks the DNS zone should be associated with.')
param vnetNames string[] param vnetNames string[]
resource dnsZone 'Microsoft.Network/privateDnsZones@2020-06-01' = { resource dnsZone 'Microsoft.Network/privateDnsZones@2020-06-01' = {
name: name name: name
location: 'global' location: 'global'

View File

@ -14,7 +14,6 @@ param privateEndpointName string
param groupId string param groupId string
param location string = resourceGroup().location param location string = resourceGroup().location
resource privateEndpoint 'Microsoft.Network/privateEndpoints@2021-05-01' = { resource privateEndpoint 'Microsoft.Network/privateEndpoints@2021-05-01' = {
name: privateEndpointName name: privateEndpointName
location: location location: location

View File

@ -11,8 +11,12 @@ var storagePrivateDnsZoneNames = [blobStoragePrivateDnsZoneName]
var privateDnsZoneData = loadJsonContent('private-dns-zone-groups.json') var privateDnsZoneData = loadJsonContent('private-dns-zone-groups.json')
var cloudName = toLower(environment().name) var cloudName = toLower(environment().name)
var azureMonitorPrivateDnsZones = privateDnsZoneData[cloudName].azureMonitor var azureMonitorPrivateDnsZones = privateDnsZoneData[cloudName].azureMonitor
var privateDnsZones = union(azureMonitorPrivateDnsZones, storagePrivateDnsZoneNames, [cosmosDbPrivateDnsZoneName], [aiSearchPrivateDnsZoneName]) var privateDnsZones = union(
azureMonitorPrivateDnsZones,
storagePrivateDnsZoneNames,
[cosmosDbPrivateDnsZoneName],
[aiSearchPrivateDnsZoneName]
)
resource privateDnsZoneResources 'Microsoft.Network/privateDnsZones@2020-06-01' = [ resource privateDnsZoneResources 'Microsoft.Network/privateDnsZones@2020-06-01' = [
for name in privateDnsZones: { for name in privateDnsZones: {

View File

@ -4,7 +4,6 @@
param privateDnsZoneName string param privateDnsZoneName string
param vnetIds array param vnetIds array
resource privateDnsZone 'Microsoft.Network/privateDnsZones@2020-06-01' existing = { resource privateDnsZone 'Microsoft.Network/privateDnsZones@2020-06-01' existing = {
name: privateDnsZoneName name: privateDnsZoneName
} }