Skip to content

Commit

Permalink
[Modules] Updated DeploymentExamples title & moved Bicep in front o…
Browse files Browse the repository at this point in the history
…f JSON (#1632)

* Updated Readme Deployment Example Title + Bicep/JSON order

* Minor fix

* Minor fix

* Updated exceptions

* Added ordering to ReadMe generation script

* Small fix

* Updated a subset of readmes

* Updated ordering functino with null handling

* Handle empty parameters

* Generated more readmes

* Resolved conflict

* Added sorting for JSON example

* Updated docs

* Added disclaimer to the deployment examples

* latest draft

* Updated set readme script with comments

* Updated additional readme

* Robustness update

* Updated readmes

* Updated APIs

* Fixed readme

* Fixed readme

* Fixed required end search

* Added special case handling for bicep single line param

* Restructured commenting

* Improved regex

* Further updates

* Updated readmes

* Small fix

* Small fix

* Regenerated docs

* Update utilities/tools/Set-ModuleReadMe.ps1

Co-authored-by: Erika Gressi <56914614+eriqua@users.noreply.github.com>

Co-authored-by: Erika Gressi <56914614+eriqua@users.noreply.github.com>
  • Loading branch information
AlexanderSehr and eriqua authored Jul 15, 2022
1 parent cf4a72b commit fac5bcc
Show file tree
Hide file tree
Showing 111 changed files with 16,409 additions and 15,033 deletions.
3 changes: 3 additions & 0 deletions bicepconfig.json
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,9 @@
"rules": {
"explicit-values-for-loc-params": {
"level": "off" // Reason: Our modules default to e.g. the location of their parent resource group which is sufficient if deploying a self-contained solution
},
"prefer-unquoted-property-names": {
"level": "off" // Reason: This complains primarily about RBAC roles which are all in quotes to be consistent within the list of roles with and without spaces in their name
}
}
}
Expand Down
2 changes: 1 addition & 1 deletion modules/Microsoft.AAD/DomainServices/deploy.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ param additionalRecipients array = []
])
param domainConfigurationType string = 'FullySynced'

@description('Optional. The value is to synchronise scoped users and groups.')
@description('Optional. The value is to synchronize scoped users and groups.')
param filteredSync string = 'Enabled'

@description('Optional. The value is to enable clients making request using TLSv1.')
Expand Down
161 changes: 85 additions & 76 deletions modules/Microsoft.AAD/DomainServices/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ This template deploys Azure Active Directory Domain Services (AADDS).
| `domainConfigurationType` | string | `'FullySynced'` | `[FullySynced, ResourceTrusting]` | The value is to provide domain configuration type. |
| `enableDefaultTelemetry` | bool | `True` | | Enable telemetry via the Customer Usage Attribution ID (GUID). |
| `externalAccess` | string | `'Enabled'` | `[Enabled, Disabled]` | The value is to enable the Secure LDAP for external services of Azure ADDS Services. |
| `filteredSync` | string | `'Enabled'` | | The value is to synchronise scoped users and groups. |
| `filteredSync` | string | `'Enabled'` | | The value is to synchronize scoped users and groups. |
| `kerberosArmoring` | string | `'Enabled'` | `[Enabled, Disabled]` | The value is to enable to provide a protected channel between the Kerberos client and the KDC. |
| `kerberosRc4Encryption` | string | `'Enabled'` | `[Enabled, Disabled]` | The value is to enable Kerberos requests that use RC4 encryption. |
| `ldaps` | string | `'Enabled'` | `[Enabled, Disabled]` | A flag to determine whether or not Secure LDAP is enabled or disabled. |
Expand Down Expand Up @@ -207,72 +207,11 @@ $pfxCertificate = [System.Convert]::ToBase64String($rawCertByteStream)

## Deployment examples

<h3>Example 1</h3>
The following module usage examples are retrieved from the content of the files hosted in the module's `.test` folder.
>**Note**: The name of each example is based on the name of the file from which it is taken.
>**Note**: Each example lists all the required parameters first, followed by the rest - each in alphabetical order.
<details>

<summary>via JSON Parameter file</summary>

```json
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"domainName": {
"value": "<<namePrefix>>.onmicrosoft.com"
},
"sku": {
"value": "Standard"
},
"lock": {
"value": "CanNotDelete"
},
"replicaSets": {
"value": [
{
"location": "WestEurope",
"subnetId": "/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.Network/virtualNetworks/adp-<<namePrefix>>-az-vnet-aadds-001/subnets/AADDSSubnet"
}
]
},
"pfxCertificate": {
"reference": {
"keyVault": {
"id": "/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.KeyVault/vaults/adp-<<namePrefix>>-az-kv-x-001"
},
"secretName": "pfxBase64Certificate"
}
},
"pfxCertificatePassword": {
"reference": {
"keyVault": {
"id": "/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.KeyVault/vaults/adp-<<namePrefix>>-az-kv-x-001"
},
"secretName": "pfxCertificatePassword"
}
},
"additionalRecipients": {
"value": [
"<<namePrefix>>@noreply.github.com"
]
},
"diagnosticWorkspaceId": {
"value": "/subscriptions/<<subscriptionId>>/resourcegroups/validation-rg/providers/microsoft.operationalinsights/workspaces/adp-<<namePrefix>>-az-law-x-001"
},
"diagnosticStorageAccountId": {
"value": "/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.Storage/storageAccounts/adp<<namePrefix>>azsax001"
},
"diagnosticEventHubAuthorizationRuleId": {
"value": "/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.EventHub/namespaces/adp-<<namePrefix>>-az-evhns-x-001/AuthorizationRules/RootManageSharedAccessKey"
},
"diagnosticEventHubName": {
"value": "adp-<<namePrefix>>-az-evh-x-001"
}
}
}
```

</details>
<h3>Example 1: Parameters</h3>

<details>

Expand All @@ -287,24 +226,94 @@ resource kv1 'Microsoft.KeyVault/vaults@2019-09-01' existing = {
module DomainServices './Microsoft.AAD/DomainServices/deploy.bicep' = {
name: '${uniqueString(deployment().name)}-DomainServices'
params: {
// Required parameters
domainName: '<<namePrefix>>.onmicrosoft.com'
sku: 'Standard'
// Non-required parameters
additionalRecipients: [
'<<namePrefix>>@noreply.github.com'
]
diagnosticEventHubAuthorizationRuleId: '/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.EventHub/namespaces/adp-<<namePrefix>>-az-evhns-x-001/AuthorizationRules/RootManageSharedAccessKey'
diagnosticEventHubName: 'adp-<<namePrefix>>-az-evh-x-001'
diagnosticStorageAccountId: '/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.Storage/storageAccounts/adp<<namePrefix>>azsax001'
diagnosticWorkspaceId: '/subscriptions/<<subscriptionId>>/resourcegroups/validation-rg/providers/microsoft.operationalinsights/workspaces/adp-<<namePrefix>>-az-law-x-001'
lock: 'CanNotDelete'
pfxCertificate: kv1.getSecret('pfxBase64Certificate')
pfxCertificatePassword: kv1.getSecret('pfxCertificatePassword')
replicaSets: [
{
location: 'WestEurope'
subnetId: '/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.Network/virtualNetworks/adp-<<namePrefix>>-az-vnet-aadds-001/subnets/AADDSSubnet'
}
]
pfxCertificate: kv1.getSecret('pfxBase64Certificate')
pfxCertificatePassword: kv1.getSecret('pfxCertificatePassword')
additionalRecipients: [
'<<namePrefix>>@noreply.github.com'
]
diagnosticWorkspaceId: '/subscriptions/<<subscriptionId>>/resourcegroups/validation-rg/providers/microsoft.operationalinsights/workspaces/adp-<<namePrefix>>-az-law-x-001'
diagnosticStorageAccountId: '/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.Storage/storageAccounts/adp<<namePrefix>>azsax001'
diagnosticEventHubAuthorizationRuleId: '/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.EventHub/namespaces/adp-<<namePrefix>>-az-evhns-x-001/AuthorizationRules/RootManageSharedAccessKey'
diagnosticEventHubName: 'adp-<<namePrefix>>-az-evh-x-001'
sku: 'Standard'
}
}
```

</details>
<p>

<details>

<summary>via JSON Parameter file</summary>

```json
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
"contentVersion": "1.0.0.0",
"parameters": {
// Required parameters
"domainName": {
"value": "<<namePrefix>>.onmicrosoft.com"
},
// Non-required parameters
"additionalRecipients": {
"value": [
"<<namePrefix>>@noreply.github.com"
]
},
"diagnosticEventHubAuthorizationRuleId": {
"value": "/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.EventHub/namespaces/adp-<<namePrefix>>-az-evhns-x-001/AuthorizationRules/RootManageSharedAccessKey"
},
"diagnosticEventHubName": {
"value": "adp-<<namePrefix>>-az-evh-x-001"
},
"diagnosticStorageAccountId": {
"value": "/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.Storage/storageAccounts/adp<<namePrefix>>azsax001"
},
"diagnosticWorkspaceId": {
"value": "/subscriptions/<<subscriptionId>>/resourcegroups/validation-rg/providers/microsoft.operationalinsights/workspaces/adp-<<namePrefix>>-az-law-x-001"
},
"lock": {
"value": "CanNotDelete"
},
"pfxCertificate": {
"reference": {
"keyVault": {
"id": "/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.KeyVault/vaults/adp-<<namePrefix>>-az-kv-x-001"
},
"secretName": "pfxBase64Certificate"
}
},
"pfxCertificatePassword": {
"reference": {
"keyVault": {
"id": "/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.KeyVault/vaults/adp-<<namePrefix>>-az-kv-x-001"
},
"secretName": "pfxCertificatePassword"
}
},
"replicaSets": {
"value": [
{
"location": "WestEurope",
"subnetId": "/subscriptions/<<subscriptionId>>/resourceGroups/validation-rg/providers/Microsoft.Network/virtualNetworks/adp-<<namePrefix>>-az-vnet-aadds-001/subnets/AADDSSubnet"
}
]
},
"sku": {
"value": "Standard"
}
}
}
```
Expand Down
Loading

0 comments on commit fac5bcc

Please sign in to comment.