-
Notifications
You must be signed in to change notification settings - Fork 454
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
05d6a54
commit 648aa13
Showing
12 changed files
with
845 additions
and
319 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
61 changes: 61 additions & 0 deletions
61
modules/Microsoft.ServiceBus/namespaces/.test/common/dependencies.bicep
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,61 @@ | ||
@description('Optional. The location to deploy resources to.') | ||
param location string = resourceGroup().location | ||
|
||
@description('Required. The name of the Virtual Network to create.') | ||
param virtualNetworkName string | ||
|
||
@description('Required. The name of the Managed Identity to create.') | ||
param managedIdentityName string | ||
|
||
resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-01-01' = { | ||
name: virtualNetworkName | ||
location: location | ||
properties: { | ||
addressSpace: { | ||
addressPrefixes: [ | ||
'10.0.0.0/24' | ||
] | ||
} | ||
subnets: [ | ||
{ | ||
name: 'defaultSubnet' | ||
properties: { | ||
addressPrefix: '10.0.0.0/24' | ||
} | ||
} | ||
] | ||
} | ||
} | ||
|
||
resource privateDNSZone 'Microsoft.Network/privateDnsZones@2020-06-01' = { | ||
name: 'privatelink.servicebus.windows.net' | ||
location: 'global' | ||
|
||
resource virtualNetworkLinks 'virtualNetworkLinks@2020-06-01' = { | ||
name: '${virtualNetwork.name}-vnetlink' | ||
location: 'global' | ||
properties: { | ||
virtualNetwork: { | ||
id: virtualNetwork.id | ||
} | ||
registrationEnabled: false | ||
} | ||
} | ||
} | ||
|
||
resource managedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2018-11-30' = { | ||
name: managedIdentityName | ||
location: location | ||
} | ||
|
||
@description('The resource ID of the created Virtual Network Subnet.') | ||
output subnetResourceId string = virtualNetwork.properties.subnets[0].id | ||
|
||
@description('The principal ID of the created Managed Identity.') | ||
output managedIdentityPrincipalId string = managedIdentity.properties.principalId | ||
|
||
@description('The resource ID of the created Managed Identity.') | ||
output managedIdentityResourceId string = managedIdentity.id | ||
|
||
@description('The resource ID of the created Private DNS Zone.') | ||
output privateDNSZoneResourceId string = privateDNSZone.id |
192 changes: 192 additions & 0 deletions
192
modules/Microsoft.ServiceBus/namespaces/.test/common/deploy.test.bicep
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,192 @@ | ||
targetScope = 'subscription' | ||
|
||
// ========== // | ||
// Parameters // | ||
// ========== // | ||
@description('Optional. The name of the resource group to deploy for testing purposes.') | ||
@maxLength(90) | ||
param resourceGroupName string = 'ms.servicebus.namespaces-${serviceShort}-rg' | ||
|
||
@description('Optional. The location to deploy resources to.') | ||
param location string = deployment().location | ||
|
||
@description('Optional. A short identifier for the kind of deployment. Should be kept short to not run into resource-name length-constraints.') | ||
param serviceShort string = 'sbncom' | ||
|
||
// =========== // | ||
// Deployments // | ||
// =========== // | ||
|
||
// General resources | ||
// ================= | ||
resource resourceGroup 'Microsoft.Resources/resourceGroups@2021-04-01' = { | ||
name: resourceGroupName | ||
location: location | ||
} | ||
|
||
module resourceGroupResources 'dependencies.bicep' = { | ||
scope: resourceGroup | ||
name: '${uniqueString(deployment().name, location)}-paramNested' | ||
params: { | ||
virtualNetworkName: 'dep-<<namePrefix>>-vnet-${serviceShort}' | ||
managedIdentityName: 'dep-<<namePrefix>>-msi-${serviceShort}' | ||
} | ||
} | ||
|
||
// Diagnostics | ||
// =========== | ||
module diagnosticDependencies '../../../../.shared/dependencyConstructs/diagnostic.dependencies.bicep' = { | ||
scope: resourceGroup | ||
name: '${uniqueString(deployment().name, location)}-diagnosticDependencies' | ||
params: { | ||
storageAccountName: 'dep<<namePrefix>>diasa${serviceShort}01' | ||
logAnalyticsWorkspaceName: 'dep-<<namePrefix>>-law-${serviceShort}' | ||
eventHubNamespaceEventHubName: 'dep-<<namePrefix>>-evh-${serviceShort}' | ||
eventHubNamespaceName: 'dep-<<namePrefix>>-evhns-${serviceShort}' | ||
location: location | ||
} | ||
} | ||
|
||
// ============== // | ||
// Test Execution // | ||
// ============== // | ||
|
||
module testDeployment '../../deploy.bicep' = { | ||
scope: resourceGroup | ||
name: '${uniqueString(deployment().name)}-test-${serviceShort}' | ||
params: { | ||
name: '<<namePrefix>>${serviceShort}001' | ||
lock: 'CanNotDelete' | ||
skuName: 'Premium' | ||
tags: { | ||
'test': 'true' | ||
} | ||
roleAssignments: [ | ||
{ | ||
principalIds: [ | ||
resourceGroupResources.outputs.managedIdentityPrincipalId | ||
] | ||
roleDefinitionIdOrName: 'Reader' | ||
} | ||
] | ||
networkRuleSets: { | ||
defaultAction: 'Deny' | ||
trustedServiceAccessEnabled: true | ||
virtualNetworkRules: [ | ||
{ | ||
subnet: { | ||
ignoreMissingVnetServiceEndpoint: true | ||
id: resourceGroupResources.outputs.subnetResourceId | ||
} | ||
} | ||
] | ||
ipRules: [ | ||
{ | ||
ipMask: '10.0.1.0/32' | ||
action: 'Allow' | ||
} | ||
{ | ||
ipMask: '10.0.2.0/32' | ||
action: 'Allow' | ||
} | ||
] | ||
} | ||
authorizationRules: [ | ||
{ | ||
name: 'RootManageSharedAccessKey' | ||
rights: [ | ||
'Listen' | ||
'Manage' | ||
'Send' | ||
] | ||
} | ||
{ | ||
name: 'AnotherKey' | ||
rights: [ | ||
'Listen' | ||
'Send' | ||
] | ||
} | ||
] | ||
queues: [ | ||
{ | ||
name: '<<namePrefix>>${serviceShort}q001' | ||
roleAssignments: [ | ||
{ | ||
principalIds: [ | ||
resourceGroupResources.outputs.managedIdentityPrincipalId | ||
] | ||
roleDefinitionIdOrName: 'Reader' | ||
} | ||
] | ||
authorizationRules: [ | ||
{ | ||
name: 'RootManageSharedAccessKey' | ||
rights: [ | ||
'Listen' | ||
'Manage' | ||
'Send' | ||
] | ||
} | ||
{ | ||
name: 'AnotherKey' | ||
rights: [ | ||
'Listen' | ||
'Send' | ||
] | ||
} | ||
] | ||
} | ||
] | ||
topics: [ | ||
{ | ||
name: '<<namePrefix>>${serviceShort}t001' | ||
roleAssignments: [ | ||
{ | ||
principalIds: [ | ||
resourceGroupResources.outputs.managedIdentityPrincipalId | ||
] | ||
roleDefinitionIdOrName: 'Reader' | ||
} | ||
] | ||
authorizationRules: [ | ||
{ | ||
name: 'RootManageSharedAccessKey' | ||
rights: [ | ||
'Listen' | ||
'Manage' | ||
'Send' | ||
] | ||
} | ||
{ | ||
name: 'AnotherKey' | ||
rights: [ | ||
'Listen' | ||
'Send' | ||
] | ||
} | ||
] | ||
} | ||
] | ||
diagnosticLogsRetentionInDays: 7 | ||
diagnosticStorageAccountId: diagnosticDependencies.outputs.storageAccountResourceId | ||
diagnosticWorkspaceId: diagnosticDependencies.outputs.logAnalyticsWorkspaceResourceId | ||
diagnosticEventHubAuthorizationRuleId: diagnosticDependencies.outputs.eventHubAuthorizationRuleId | ||
diagnosticEventHubName: diagnosticDependencies.outputs.eventHubNamespaceEventHubName | ||
privateEndpoints: [ | ||
{ | ||
service: 'namespace' | ||
subnetResourceId: resourceGroupResources.outputs.subnetResourceId | ||
privateDnsZoneGroup: { | ||
privateDNSResourceIds: [ | ||
resourceGroupResources.outputs.privateDNSZoneResourceId | ||
] | ||
} | ||
} | ||
] | ||
systemAssignedIdentity: true | ||
userAssignedIdentities: { | ||
'${resourceGroupResources.outputs.managedIdentityResourceId}': {} | ||
} | ||
} | ||
} |
88 changes: 88 additions & 0 deletions
88
modules/Microsoft.ServiceBus/namespaces/.test/encr/dependencies.bicep
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,88 @@ | ||
@description('Optional. The location to deploy resources to.') | ||
param location string = resourceGroup().location | ||
|
||
@description('Required. The name of the Key Vault to create.') | ||
param keyVaultName string | ||
|
||
@description('Required. The name of the Virtual Network to create.') | ||
param virtualNetworkName string | ||
|
||
@description('Required. The name of the Managed Identity to create.') | ||
param managedIdentityName string | ||
|
||
resource managedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2018-11-30' = { | ||
name: managedIdentityName | ||
location: location | ||
} | ||
|
||
resource virtualNetwork 'Microsoft.Network/virtualNetworks@2022-01-01' = { | ||
name: virtualNetworkName | ||
location: location | ||
properties: { | ||
addressSpace: { | ||
addressPrefixes: [ | ||
'10.0.0.0/24' | ||
] | ||
} | ||
subnets: [ | ||
{ | ||
name: 'defaultSubnet' | ||
properties: { | ||
addressPrefix: '10.0.0.0/24' | ||
} | ||
} | ||
] | ||
} | ||
} | ||
|
||
resource keyVault 'Microsoft.KeyVault/vaults@2022-07-01' = { | ||
name: keyVaultName | ||
location: location | ||
properties: { | ||
sku: { | ||
family: 'A' | ||
name: 'standard' | ||
} | ||
tenantId: tenant().tenantId | ||
enablePurgeProtection: true // Required by service bus namespace | ||
softDeleteRetentionInDays: 7 | ||
enabledForTemplateDeployment: true | ||
enabledForDiskEncryption: true | ||
enabledForDeployment: true | ||
enableRbacAuthorization: true | ||
accessPolicies: [] | ||
} | ||
|
||
resource key 'keys@2022-07-01' = { | ||
name: 'keyEncryptionKey' | ||
properties: { | ||
kty: 'RSA' | ||
} | ||
} | ||
} | ||
|
||
resource keyPermissions 'Microsoft.Authorization/roleAssignments@2022-04-01' = { | ||
name: guid('msi-${keyVault::key.id}-${location}-${managedIdentity.id}-Key-Reader-RoleAssignment') | ||
scope: keyVault::key | ||
properties: { | ||
principalId: managedIdentity.properties.principalId | ||
// Key Vault Crypto User | ||
roleDefinitionId: subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '12338af0-0e69-4776-bea7-57ae8d297424') | ||
principalType: 'ServicePrincipal' | ||
} | ||
} | ||
|
||
@description('The resource ID of the created Virtual Network Subnet.') | ||
output subnetResourceId string = virtualNetwork.properties.subnets[0].id | ||
|
||
@description('The resource ID of the created Key Vault.') | ||
output keyVaultResourceId string = keyVault.id | ||
|
||
@description('The name of the created encryption key.') | ||
output keyName string = keyVault::key.name | ||
|
||
@description('The principal ID of the created Managed Identity.') | ||
output managedIdentityPrincipalId string = managedIdentity.properties.principalId | ||
|
||
@description('The resource ID of the created Managed Identity.') | ||
output managedIdentityResourceId string = managedIdentity.id |
Oops, something went wrong.