Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[LI-Custom-CAF] During the tests will be used this branch #22

Open
wants to merge 80 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
80 commits
Select commit Hold shift + click to select a range
53c7f7f
[TC-18] Add module for keyvault secrets and private endpoint (#17)
lyudmililchev92 Jan 18, 2025
e712b2d
[TC-18] Module update for keyvault private endpoint (#18)
lyudmililchev92 Jan 19, 2025
f1fa9b9
Tc 18 nn (#19)
lyudmililchev92 Jan 19, 2025
3a7830a
Tc 18 nnn (#20)
lyudmililchev92 Jan 19, 2025
d0a5e93
Add support for AKS cluster and node pool (#21)
lyudmililchev92 Jan 19, 2025
ab6d52d
Role assignment module (#23)
lyudmililchev92 Jan 19, 2025
c2f053a
add public network access enabled to false
lyudmililchev92 Jan 20, 2025
f84ed86
fix managed identity module for access policies
lyudmililchev92 Jan 20, 2025
c62c3ca
test keyvault id
lyudmililchev92 Jan 20, 2025
a86109d
test keyvault id
lyudmililchev92 Jan 20, 2025
ce8285c
test each key
lyudmililchev92 Jan 20, 2025
d4f02a2
test keyvault id
lyudmililchev92 Jan 20, 2025
471ff78
Remove variable
lyudmililchev92 Jan 20, 2025
7b83162
AKS Module update (#26)
lyudmililchev92 Jan 20, 2025
3bc290d
Add object ids in role assignments (#27)
lyudmililchev92 Jan 20, 2025
8aa78b7
Add support for access policies with object IDs (#28)
lyudmililchev92 Jan 20, 2025
3d40309
add zones to public ip module
lyudmililchev92 Jan 21, 2025
cbddc8e
add active active to false inside vnet gw
lyudmililchev92 Jan 21, 2025
8a4d171
add ipsec policy configuration for datasize
lyudmililchev92 Jan 22, 2025
96cf21c
refactor aks module
lyudmililchev92 Jan 22, 2025
c21b480
fix managed identity id
lyudmililchev92 Jan 23, 2025
c31f2ed
fix locals about managed identity
lyudmililchev92 Jan 23, 2025
a620160
fix aks module
lyudmililchev92 Jan 23, 2025
e28a76a
fix aks module with added some configuration
lyudmililchev92 Jan 24, 2025
1476158
add networking on the cluster
lyudmililchev92 Jan 24, 2025
47b7a38
remove temporary name
lyudmililchev92 Jan 24, 2025
92e1945
test secret provider
lyudmililchev92 Jan 24, 2025
2760c46
add dynamic block
lyudmililchev92 Jan 24, 2025
5bb12f0
try
lyudmililchev92 Jan 24, 2025
a7c4958
reformat
lyudmililchev92 Jan 24, 2025
3ae9a64
reformat
lyudmililchev92 Jan 24, 2025
4253a9e
reformat
lyudmililchev92 Jan 24, 2025
8a121b3
fix kubelet identity
lyudmililchev92 Jan 24, 2025
ec23503
fix dynamic block
lyudmililchev92 Jan 24, 2025
8d5e561
add more dynamic blocks
lyudmililchev92 Jan 24, 2025
630f7cf
api server fix
lyudmililchev92 Jan 24, 2025
7f4c285
fix value of the block
lyudmililchev92 Jan 24, 2025
8743715
fix network plugin mode
lyudmililchev92 Jan 24, 2025
8e311ac
fix cluster mode
lyudmililchev92 Jan 24, 2025
ea85280
Fix node resource group name
lyudmililchev92 Jan 24, 2025
33428fb
fix pod subnet id
lyudmililchev92 Jan 24, 2025
321b8a8
fix zones on default node pool
lyudmililchev92 Jan 24, 2025
efd2b15
add aks to the role assignments
lyudmililchev92 Jan 27, 2025
30a0f0d
add module update
lyudmililchev92 Jan 27, 2025
2091db8
fix module for aks
lyudmililchev92 Jan 27, 2025
a648195
fix some default values
lyudmililchev92 Jan 27, 2025
a5e3d4a
add dynamic block upgrade settings
lyudmililchev92 Jan 27, 2025
4f9d2a8
fix block of default node poool
lyudmililchev92 Jan 27, 2025
123920f
fix principal id block for role assignments
lyudmililchev92 Jan 27, 2025
b2a2def
remove temp null resource
lyudmililchev92 Jan 27, 2025
fe43305
TC-17 Add skeleton for linux_virtual_machines module (#16)
BorislavRaynov Jan 27, 2025
d8941a1
[AC-22] Add managed disk module (#31)
lyudmililchev92 Jan 27, 2025
f13070f
TC-6 Add module for ACR with private endpoint (#30)
BorislavRaynov Jan 27, 2025
f4ad65b
add zone for managed disks
lyudmililchev92 Jan 28, 2025
2dc3b9a
fix ignore changes
lyudmililchev92 Jan 28, 2025
9eecda2
add performance tier
lyudmililchev92 Jan 28, 2025
ee5007e
Add support for virtual networks
lyudmililchev92 Jan 28, 2025
b31add7
[TC-24] Add module for Log analytics workspace (#32)
BorislavRaynov Jan 29, 2025
0b58de4
[TC-25] Add module for Log analytics Data export rule (#33)
BorislavRaynov Jan 29, 2025
ed92fd1
[TC-23] Add module for Container Group (#34)
BorislavRaynov Jan 30, 2025
3edf774
[TC-27] Add module for Keyvault key (#35)
BorislavRaynov Jan 31, 2025
86b1745
Add change to the outputs in the storage account
lyudmililchev92 Jan 31, 2025
cfc2de0
Add private endpoint for storage account
lyudmililchev92 Jan 31, 2025
204c00c
add setting for storage account - nested items to be public
lyudmililchev92 Jan 31, 2025
fbc3903
Add module's skeleton
BorislavRaynov Feb 3, 2025
398204a
Remove resources for role definitions
BorislavRaynov Feb 3, 2025
71c1103
[TC-23] Add kv-key-reference (#36)
BorislavRaynov Feb 3, 2025
ce354db
[TC-26] Add module for Role definiton (#37)
BorislavRaynov Feb 3, 2025
272b8fc
[TC-43] Add module for Custom role assignment (#38)
BorislavRaynov Feb 4, 2025
733f552
[TC-41] Refactor dev branch (#39)
BorislavRaynov Feb 5, 2025
46c56b0
[TC-29] Add module for NSG (#40)
BorislavRaynov Feb 5, 2025
ed214de
[TC-40] Add module for NAT-GW (#41)
BorislavRaynov Feb 5, 2025
9eed0ef
[TC-37] Add module for Workbooks (#42)
BorislavRaynov Feb 5, 2025
b334775
[TC-30] Add module for private endpoint (#43)
BorislavRaynov Feb 6, 2025
474747c
[TC-44] Add module Private DNS A record (#44)
BorislavRaynov Feb 6, 2025
4db9f44
[TC-38] Add module for NSG Association (#45)
BorislavRaynov Feb 7, 2025
6db1516
[TC-39] Add module for MSSQL-MI (#46)
BorislavRaynov Feb 7, 2025
046658e
[TC-35] Add module for AzureAD App (#47)
BorislavRaynov Feb 11, 2025
6d5545a
[TC-34] Add module for AzureAD SP + password (#48)
BorislavRaynov Feb 11, 2025
be65fe7
[TC-41] Refactor DEV branch (#49)
BorislavRaynov Feb 13, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 6 additions & 0 deletions examples/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
All the examples for CAF modules.
##
Missing examples:
- aks.tfvars
- public_ips.tfvars
- virtual_network_gateway_connections.tfvars
51 changes: 51 additions & 0 deletions examples/application_insights_workbooks.tfvars
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
application_insights_workbooks = {
test_workbook1 = {
resource_group_ref = "rg_test"
display_name = "workbook1"
data_json = {
"version" = "Notebook/1.0",
"items" = [
{
"type" = "1",
"content" = {
"json" = "Test2024"
},
"name" = "text - 0"
}
],
"isLocked" = false,
"fallbackResourceIds" = [
"Azure Monitor"
]
}
}

test_workbook2 = {
resource_group_ref = "rg_test"
display_name = "workbook2"
data_json = {
"version" = "Notebook/1.0",
"items" = [
{
"type" = "2",
"content" = {
"json" = "Test2025"
},
"name" = "text - 0"
}
],
"isLocked" = false,
"fallbackResourceIds" = [
"Azure Monitor"
]
}
}
}

# pre-requisites
resource_groups = {
rg_test = {
name = "rg-test-dv-ne-01"
location = "northeurope"
}
}
120 changes: 120 additions & 0 deletions examples/azuread_applications.tfvars
Original file line number Diff line number Diff line change
@@ -0,0 +1,120 @@
azuread_applications = {
test_app1 = {
display_name = "example-ad-app"
identifier_uris = ["api://example-app"]
sign_in_audience = "AzureADMultipleOrgs"

api = {
mapped_claims_enabled = "true"
requested_access_token_version = "2"
oauth2_permission_scopes = {
perm_scope1 = {
admin_consent_description = "Allow the application to access example on behalf of the signed-in user."
admin_consent_display_name = "Access example"
enabled = "true"
id = "96183846-204b-4b43-82e1-5d2222eb4b9b"
type = "User"
user_consent_description = "Allow the application to access example on your behalf."
user_consent_display_name = "Access example"
value = "user_impersonation"
}
perm_scope2 = {
admin_consent_description = "Administer the example application"
admin_consent_display_name = "Administer"
enabled = "true"
id = "be98fa3e-ab5b-4b11-83d9-04ba2b7946bc"
type = "Admin"
value = "administer"
}
}
}

app_roles = {
app_role1 = {
allowed_member_types = ["User", "Application"]
description = "Admins can manage roles and perform all task actions"
display_name = "Admin"
enabled = "true"
id = "1b19509b-32b1-4e9f-b71d-4992aa991967"
value = "admin"
}
app_role1 = {
allowed_member_types = ["User"]
description = "ReadOnly roles have limited query access"
display_name = "ReadOnly"
enabled = "true"
id = "497406e4-012a-4267-bf18-45a1cb148a01"
value = "User"
}
}

feature_tags = {
enterprise = "true"
gallery = "true"
}

optional_claims = {
access_tokens = {
token1 = {
name = "myclaim"
}

token2 = {
name = "otherclaim"
}
}

id_tokens = {
id_token1 = {
name = "userclaim"
source = "user"
essential = "true"
additional_properties = ["emit_as_roles"]
}
}

saml2_tokens = {
saml2_token1 = {
name = "samlexample"
}
}
}

required_resource_access = {
test_access1 = {
resource_app_id = "00000003-0000-0000-c000-000000000000" # Microsoft Graph
resource_access = {
test_res_access1 = {
id = "df021288-bdef-4463-88db-98f22de89214" # User.Read.All
type = "Role"
}
test_res_access2 = {
id = "b4e74841-8e56-480b-be8b-910348b18b4c" # User.ReadWrite
type = "Scope"
}
}
}

test_access2 = {
resource_app_id = "c5393580-f805-4401-95e8-94b7a6ef2fc2" # Office 365 Management
resource_access = {
test_res_access3 = {
id = "594c1fb6-4f81-4475-ae41-0c394909246c" # ActivityFeed.Read
type = "Role"
}
}
}
}

web = {
homepage_url = "https://app.example.net"
logout_url = "https://app.example.net/logout"
redirect_uris = ["https://app.example.net/account"]

implicit_grant = {
access_token_issuance_enabled = true
id_token_issuance_enabled = true
}
}
}
}
127 changes: 127 additions & 0 deletions examples/azuread_service_principals.tfvars
Original file line number Diff line number Diff line change
@@ -0,0 +1,127 @@
azuread_service_principals = {
sp1-test = {
client_id_ref = "test_app1"
}
}

# pre-requisites if azuread_applications is referenced
azuread_applications = {
test_app1 = {
display_name = "example-ad-app"
identifier_uris = ["api://example-app"]
sign_in_audience = "AzureADMultipleOrgs"

api = {
mapped_claims_enabled = "true"
requested_access_token_version = "2"
oauth2_permission_scopes = {
perm_scope1 = {
admin_consent_description = "Allow the application to access example on behalf of the signed-in user."
admin_consent_display_name = "Access example"
enabled = "true"
id = "96183846-204b-4b43-82e1-5d2222eb4b9b"
type = "User"
user_consent_description = "Allow the application to access example on your behalf."
user_consent_display_name = "Access example"
value = "user_impersonation"
}
perm_scope2 = {
admin_consent_description = "Administer the example application"
admin_consent_display_name = "Administer"
enabled = "true"
id = "be98fa3e-ab5b-4b11-83d9-04ba2b7946bc"
type = "Admin"
value = "administer"
}
}
}

app_roles = {
app_role1 = {
allowed_member_types = ["User", "Application"]
description = "Admins can manage roles and perform all task actions"
display_name = "Admin"
enabled = "true"
id = "1b19509b-32b1-4e9f-b71d-4992aa991967"
value = "admin"
}
app_role1 = {
allowed_member_types = ["User"]
description = "ReadOnly roles have limited query access"
display_name = "ReadOnly"
enabled = "true"
id = "497406e4-012a-4267-bf18-45a1cb148a01"
value = "User"
}
}

feature_tags = {
enterprise = "true"
gallery = "true"
}

optional_claims = {
access_tokens = {
token1 = {
name = "myclaim"
}

token2 = {
name = "otherclaim"
}
}

id_tokens = {
id_token1 = {
name = "userclaim"
source = "user"
essential = "true"
additional_properties = ["emit_as_roles"]
}
}

saml2_tokens = {
saml2_token1 = {
name = "samlexample"
}
}
}

required_resource_access = {
test_access1 = {
resource_app_id = "00000003-0000-0000-c000-000000000000" # Microsoft Graph
resource_access = {
test_res_access1 = {
id = "df021288-bdef-4463-88db-98f22de89214" # User.Read.All
type = "Role"
}
test_res_access2 = {
id = "b4e74841-8e56-480b-be8b-910348b18b4c" # User.ReadWrite
type = "Scope"
}
}
}

test_access2 = {
resource_app_id = "c5393580-f805-4401-95e8-94b7a6ef2fc2" # Office 365 Management
resource_access = {
test_res_access3 = {
id = "594c1fb6-4f81-4475-ae41-0c394909246c" # ActivityFeed.Read
type = "Role"
}
}
}
}

web = {
homepage_url = "https://app.example.net"
logout_url = "https://app.example.net/logout"
redirect_uris = ["https://app.example.net/account"]

implicit_grant = {
access_token_issuance_enabled = true
id_token_issuance_enabled = true
}
}
}
}
Loading
Loading