Azdevify eshopOnWeb
This commit is contained in:
2
.gitignore
vendored
2
.gitignore
vendored
@@ -257,3 +257,5 @@ pub/
|
|||||||
|
|
||||||
#Ignore marker-file used to know which docker files we have.
|
#Ignore marker-file used to know which docker files we have.
|
||||||
.eshopdocker_*
|
.eshopdocker_*
|
||||||
|
|
||||||
|
.azure
|
||||||
|
|||||||
14
azure.yaml
Normal file
14
azure.yaml
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
# yaml-language-server: $schema=https://raw.githubusercontent.com/Azure/azure-dev/main/schemas/v1.0/azure.yaml.json
|
||||||
|
|
||||||
|
name: eShopOnWeb
|
||||||
|
services:
|
||||||
|
web:
|
||||||
|
project: ./src/Web
|
||||||
|
language: csharp
|
||||||
|
host: appservice
|
||||||
|
infra:
|
||||||
|
provider: ""
|
||||||
|
path: ""
|
||||||
|
module: ""
|
||||||
|
pipeline:
|
||||||
|
provider: ""
|
||||||
135
infra/abbreviations.json
Normal file
135
infra/abbreviations.json
Normal file
@@ -0,0 +1,135 @@
|
|||||||
|
{
|
||||||
|
"analysisServicesServers": "as",
|
||||||
|
"apiManagementService": "apim-",
|
||||||
|
"appConfigurationConfigurationStores": "appcs-",
|
||||||
|
"appManagedEnvironments": "cae-",
|
||||||
|
"appContainerApps": "ca-",
|
||||||
|
"authorizationPolicyDefinitions": "policy-",
|
||||||
|
"automationAutomationAccounts": "aa-",
|
||||||
|
"blueprintBlueprints": "bp-",
|
||||||
|
"blueprintBlueprintsArtifacts": "bpa-",
|
||||||
|
"cacheRedis": "redis-",
|
||||||
|
"cdnProfiles": "cdnp-",
|
||||||
|
"cdnProfilesEndpoints": "cdne-",
|
||||||
|
"cognitiveServicesAccounts": "cog-",
|
||||||
|
"cognitiveServicesFormRecognizer": "cog-fr-",
|
||||||
|
"cognitiveServicesTextAnalytics": "cog-ta-",
|
||||||
|
"computeAvailabilitySets": "avail-",
|
||||||
|
"computeCloudServices": "cld-",
|
||||||
|
"computeDiskEncryptionSets": "des",
|
||||||
|
"computeDisks": "disk",
|
||||||
|
"computeDisksOs": "osdisk",
|
||||||
|
"computeGalleries": "gal",
|
||||||
|
"computeSnapshots": "snap-",
|
||||||
|
"computeVirtualMachines": "vm",
|
||||||
|
"computeVirtualMachineScaleSets": "vmss-",
|
||||||
|
"containerInstanceContainerGroups": "ci",
|
||||||
|
"containerRegistryRegistries": "cr",
|
||||||
|
"containerServiceManagedClusters": "aks-",
|
||||||
|
"databricksWorkspaces": "dbw-",
|
||||||
|
"dataFactoryFactories": "adf-",
|
||||||
|
"dataLakeAnalyticsAccounts": "dla",
|
||||||
|
"dataLakeStoreAccounts": "dls",
|
||||||
|
"dataMigrationServices": "dms-",
|
||||||
|
"dBforMySQLServers": "mysql-",
|
||||||
|
"dBforPostgreSQLServers": "psql-",
|
||||||
|
"devicesIotHubs": "iot-",
|
||||||
|
"devicesProvisioningServices": "provs-",
|
||||||
|
"devicesProvisioningServicesCertificates": "pcert-",
|
||||||
|
"documentDBDatabaseAccounts": "cosmos-",
|
||||||
|
"eventGridDomains": "evgd-",
|
||||||
|
"eventGridDomainsTopics": "evgt-",
|
||||||
|
"eventGridEventSubscriptions": "evgs-",
|
||||||
|
"eventHubNamespaces": "evhns-",
|
||||||
|
"eventHubNamespacesEventHubs": "evh-",
|
||||||
|
"hdInsightClustersHadoop": "hadoop-",
|
||||||
|
"hdInsightClustersHbase": "hbase-",
|
||||||
|
"hdInsightClustersKafka": "kafka-",
|
||||||
|
"hdInsightClustersMl": "mls-",
|
||||||
|
"hdInsightClustersSpark": "spark-",
|
||||||
|
"hdInsightClustersStorm": "storm-",
|
||||||
|
"hybridComputeMachines": "arcs-",
|
||||||
|
"insightsActionGroups": "ag-",
|
||||||
|
"insightsComponents": "appi-",
|
||||||
|
"keyVaultVaults": "kv-",
|
||||||
|
"kubernetesConnectedClusters": "arck",
|
||||||
|
"kustoClusters": "dec",
|
||||||
|
"kustoClustersDatabases": "dedb",
|
||||||
|
"logicIntegrationAccounts": "ia-",
|
||||||
|
"logicWorkflows": "logic-",
|
||||||
|
"machineLearningServicesWorkspaces": "mlw-",
|
||||||
|
"managedIdentityUserAssignedIdentities": "id-",
|
||||||
|
"managementManagementGroups": "mg-",
|
||||||
|
"migrateAssessmentProjects": "migr-",
|
||||||
|
"networkApplicationGateways": "agw-",
|
||||||
|
"networkApplicationSecurityGroups": "asg-",
|
||||||
|
"networkAzureFirewalls": "afw-",
|
||||||
|
"networkBastionHosts": "bas-",
|
||||||
|
"networkConnections": "con-",
|
||||||
|
"networkDnsZones": "dnsz-",
|
||||||
|
"networkExpressRouteCircuits": "erc-",
|
||||||
|
"networkFirewallPolicies": "afwp-",
|
||||||
|
"networkFirewallPoliciesWebApplication": "waf",
|
||||||
|
"networkFirewallPoliciesRuleGroups": "wafrg",
|
||||||
|
"networkFrontDoors": "fd-",
|
||||||
|
"networkFrontdoorWebApplicationFirewallPolicies": "fdfp-",
|
||||||
|
"networkLoadBalancersExternal": "lbe-",
|
||||||
|
"networkLoadBalancersInternal": "lbi-",
|
||||||
|
"networkLoadBalancersInboundNatRules": "rule-",
|
||||||
|
"networkLocalNetworkGateways": "lgw-",
|
||||||
|
"networkNatGateways": "ng-",
|
||||||
|
"networkNetworkInterfaces": "nic-",
|
||||||
|
"networkNetworkSecurityGroups": "nsg-",
|
||||||
|
"networkNetworkSecurityGroupsSecurityRules": "nsgsr-",
|
||||||
|
"networkNetworkWatchers": "nw-",
|
||||||
|
"networkPrivateDnsZones": "pdnsz-",
|
||||||
|
"networkPrivateLinkServices": "pl-",
|
||||||
|
"networkPublicIPAddresses": "pip-",
|
||||||
|
"networkPublicIPPrefixes": "ippre-",
|
||||||
|
"networkRouteFilters": "rf-",
|
||||||
|
"networkRouteTables": "rt-",
|
||||||
|
"networkRouteTablesRoutes": "udr-",
|
||||||
|
"networkTrafficManagerProfiles": "traf-",
|
||||||
|
"networkVirtualNetworkGateways": "vgw-",
|
||||||
|
"networkVirtualNetworks": "vnet-",
|
||||||
|
"networkVirtualNetworksSubnets": "snet-",
|
||||||
|
"networkVirtualNetworksVirtualNetworkPeerings": "peer-",
|
||||||
|
"networkVirtualWans": "vwan-",
|
||||||
|
"networkVpnGateways": "vpng-",
|
||||||
|
"networkVpnGatewaysVpnConnections": "vcn-",
|
||||||
|
"networkVpnGatewaysVpnSites": "vst-",
|
||||||
|
"notificationHubsNamespaces": "ntfns-",
|
||||||
|
"notificationHubsNamespacesNotificationHubs": "ntf-",
|
||||||
|
"operationalInsightsWorkspaces": "log-",
|
||||||
|
"portalDashboards": "dash-",
|
||||||
|
"powerBIDedicatedCapacities": "pbi-",
|
||||||
|
"purviewAccounts": "pview-",
|
||||||
|
"recoveryServicesVaults": "rsv-",
|
||||||
|
"resourcesResourceGroups": "rg-",
|
||||||
|
"searchSearchServices": "srch-",
|
||||||
|
"serviceBusNamespaces": "sb-",
|
||||||
|
"serviceBusNamespacesQueues": "sbq-",
|
||||||
|
"serviceBusNamespacesTopics": "sbt-",
|
||||||
|
"serviceEndPointPolicies": "se-",
|
||||||
|
"serviceFabricClusters": "sf-",
|
||||||
|
"signalRServiceSignalR": "sigr",
|
||||||
|
"sqlManagedInstances": "sqlmi-",
|
||||||
|
"sqlServers": "sql-",
|
||||||
|
"sqlServersDataWarehouse": "sqldw-",
|
||||||
|
"sqlServersDatabases": "sqldb-",
|
||||||
|
"sqlServersDatabasesStretch": "sqlstrdb-",
|
||||||
|
"storageStorageAccounts": "st",
|
||||||
|
"storageStorageAccountsVm": "stvm",
|
||||||
|
"storSimpleManagers": "ssimp",
|
||||||
|
"streamAnalyticsCluster": "asa-",
|
||||||
|
"synapseWorkspaces": "syn",
|
||||||
|
"synapseWorkspacesAnalyticsWorkspaces": "synw",
|
||||||
|
"synapseWorkspacesSqlPoolsDedicated": "syndp",
|
||||||
|
"synapseWorkspacesSqlPoolsSpark": "synsp",
|
||||||
|
"timeSeriesInsightsEnvironments": "tsi-",
|
||||||
|
"webServerFarms": "plan-",
|
||||||
|
"webSitesAppService": "app-",
|
||||||
|
"webSitesAppServiceEnvironment": "ase-",
|
||||||
|
"webSitesFunctions": "func-",
|
||||||
|
"webStaticSites": "stapp-"
|
||||||
|
}
|
||||||
25
infra/app/dbCatalog.bicep
Normal file
25
infra/app/dbCatalog.bicep
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param databaseName string = 'CatalogDB'
|
||||||
|
param keyVaultName string
|
||||||
|
|
||||||
|
@secure()
|
||||||
|
param sqlAdminPassword string
|
||||||
|
@secure()
|
||||||
|
param appUserPassword string
|
||||||
|
|
||||||
|
module sqlServer1 '../core/database/sqlserver1.bicep' = {
|
||||||
|
name: 'sqlServer1'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
dbName: databaseName
|
||||||
|
keyVaultName: keyVaultName
|
||||||
|
sqlAdminPassword: sqlAdminPassword
|
||||||
|
appUserPassword: appUserPassword
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output sqlConnectionStringKey string = sqlServer1.outputs.sqlConnectionStringKey
|
||||||
|
output sqlDatabase1Name string = databaseName
|
||||||
25
infra/app/dbIdentity.bicep
Normal file
25
infra/app/dbIdentity.bicep
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param databaseName string = 'IdentityDB'
|
||||||
|
param keyVaultName string
|
||||||
|
|
||||||
|
@secure()
|
||||||
|
param sqlAdminPassword string
|
||||||
|
@secure()
|
||||||
|
param appUserPassword string
|
||||||
|
|
||||||
|
module sqlServer2 '../core/database/sqlserver2.bicep' = {
|
||||||
|
name: 'sqlServer2'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
dbName: databaseName
|
||||||
|
keyVaultName: keyVaultName
|
||||||
|
sqlAdminPassword: sqlAdminPassword
|
||||||
|
appUserPassword: appUserPassword
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output sqlConnectionStringKey string = sqlServer2.outputs.sqlConnectionStringKey
|
||||||
|
output sqlDatabase2Name string = databaseName
|
||||||
18
infra/app/web.bicep
Normal file
18
infra/app/web.bicep
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
param appServicePlanId string
|
||||||
|
|
||||||
|
param serviceName string = 'web'
|
||||||
|
|
||||||
|
module web '../core/host/appservice-dotnet.bicep' = {
|
||||||
|
name: '${serviceName}-appservice-dotnet-module'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
appServicePlanId: appServicePlanId
|
||||||
|
serviceName: serviceName
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output WEB_NAME string = web.outputs.name
|
||||||
|
output WEB_URI string = web.outputs.uri
|
||||||
131
infra/core/database/sqlserver1.bicep
Normal file
131
infra/core/database/sqlserver1.bicep
Normal file
@@ -0,0 +1,131 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param appUser string = 'appUser'
|
||||||
|
param dbName string
|
||||||
|
param keyVaultName string
|
||||||
|
param sqlAdmin string = 'sqlAdmin'
|
||||||
|
param sqlConnectionStringKey string = 'AZURE-SQL-CATALOG-CONNECTION-STRING'
|
||||||
|
|
||||||
|
@secure()
|
||||||
|
param sqlAdminPassword string
|
||||||
|
@secure()
|
||||||
|
param appUserPassword string
|
||||||
|
|
||||||
|
var abbrs = loadJsonContent('../../abbreviations.json')
|
||||||
|
var resourceToken = toLower(uniqueString(subscription().id, environmentName, location))
|
||||||
|
var tags = { 'azd-env-name': environmentName }
|
||||||
|
|
||||||
|
resource sqlServer 'Microsoft.Sql/servers@2022-02-01-preview' = {
|
||||||
|
name: '${abbrs.sqlServers}${resourceToken}-Catalog'
|
||||||
|
location: location
|
||||||
|
tags: tags
|
||||||
|
properties: {
|
||||||
|
version: '12.0'
|
||||||
|
minimalTlsVersion: '1.2'
|
||||||
|
publicNetworkAccess: 'Enabled'
|
||||||
|
administratorLogin: sqlAdmin
|
||||||
|
administratorLoginPassword: sqlAdminPassword
|
||||||
|
}
|
||||||
|
|
||||||
|
resource database 'databases' = {
|
||||||
|
name: dbName
|
||||||
|
location: location
|
||||||
|
}
|
||||||
|
|
||||||
|
resource firewall 'firewallRules' = {
|
||||||
|
name: 'Azure Services'
|
||||||
|
properties: {
|
||||||
|
// Allow all clients
|
||||||
|
// Note: range [0.0.0.0-0.0.0.0] means "allow all Azure-hosted clients only".
|
||||||
|
// This is not sufficient, because we also want to allow direct access from developer machine, for debugging purposes.
|
||||||
|
startIpAddress: '0.0.0.1'
|
||||||
|
endIpAddress: '255.255.255.254'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource sqlDeploymentScript 'Microsoft.Resources/deploymentScripts@2020-10-01' = {
|
||||||
|
name: 'script-${resourceToken}-Catalog'
|
||||||
|
location: location
|
||||||
|
kind: 'AzureCLI'
|
||||||
|
properties: {
|
||||||
|
azCliVersion: '2.37.0'
|
||||||
|
retentionInterval: 'PT1H' // Retain the script resource for 1 hour after it ends running
|
||||||
|
timeout: 'PT5M' // Five minutes
|
||||||
|
cleanupPreference: 'OnSuccess'
|
||||||
|
environmentVariables: [
|
||||||
|
{
|
||||||
|
name: 'APPUSERNAME'
|
||||||
|
value: appUser
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name: 'APPUSERPASSWORD'
|
||||||
|
secureValue: appUserPassword
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name: 'DBNAME'
|
||||||
|
value: dbName
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name: 'DBSERVER'
|
||||||
|
value: sqlServer.properties.fullyQualifiedDomainName
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name: 'SQLCMDPASSWORD'
|
||||||
|
secureValue: sqlAdminPassword
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name: 'SQLADMIN'
|
||||||
|
value: sqlAdmin
|
||||||
|
}
|
||||||
|
]
|
||||||
|
|
||||||
|
scriptContent: '''
|
||||||
|
wget https://github.com/microsoft/go-sqlcmd/releases/download/v0.8.1/sqlcmd-v0.8.1-linux-x64.tar.bz2
|
||||||
|
tar x -f sqlcmd-v0.8.1-linux-x64.tar.bz2 -C .
|
||||||
|
|
||||||
|
cat <<SCRIPT_END > ./initDb.sql
|
||||||
|
drop user ${APPUSERNAME}
|
||||||
|
go
|
||||||
|
create user ${APPUSERNAME} with password = '${APPUSERPASSWORD}'
|
||||||
|
go
|
||||||
|
alter role db_owner add member ${APPUSERNAME}
|
||||||
|
go
|
||||||
|
SCRIPT_END
|
||||||
|
|
||||||
|
./sqlcmd -S ${DBSERVER} -d ${DBNAME} -U ${SQLADMIN} -i ./initDb.sql
|
||||||
|
'''
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource sqlAdminPasswordSecret 'Microsoft.KeyVault/vaults/secrets@2022-07-01' = {
|
||||||
|
parent: keyVault
|
||||||
|
name: 'sqlAdminPassword'
|
||||||
|
properties: {
|
||||||
|
value: sqlAdminPassword
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource appUserPasswordSecret 'Microsoft.KeyVault/vaults/secrets@2022-07-01' = {
|
||||||
|
parent: keyVault
|
||||||
|
name: 'appUserPassword'
|
||||||
|
properties: {
|
||||||
|
value: appUserPassword
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource sqlAzureConnectionStringSercret 'Microsoft.KeyVault/vaults/secrets@2022-07-01' = {
|
||||||
|
parent: keyVault
|
||||||
|
name: sqlConnectionStringKey
|
||||||
|
properties: {
|
||||||
|
value: '${azureSqlConnectionString}; Password=${appUserPassword}'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource keyVault 'Microsoft.KeyVault/vaults@2022-07-01' existing = {
|
||||||
|
name: keyVaultName
|
||||||
|
}
|
||||||
|
|
||||||
|
var azureSqlConnectionString = 'Server=${sqlServer.properties.fullyQualifiedDomainName}; Database=${sqlServer::database.name}; User=${appUser}'
|
||||||
|
output sqlConnectionStringKey string = sqlConnectionStringKey
|
||||||
131
infra/core/database/sqlserver2.bicep
Normal file
131
infra/core/database/sqlserver2.bicep
Normal file
@@ -0,0 +1,131 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param appUser string = 'appUser'
|
||||||
|
param dbName string
|
||||||
|
param keyVaultName string
|
||||||
|
param sqlAdmin string = 'sqlAdmin'
|
||||||
|
param sqlConnectionStringKey string = 'AZURE-SQL-IDENTITY-CONNECTION-STRING'
|
||||||
|
|
||||||
|
@secure()
|
||||||
|
param sqlAdminPassword string
|
||||||
|
@secure()
|
||||||
|
param appUserPassword string
|
||||||
|
|
||||||
|
var abbrs = loadJsonContent('../../abbreviations.json')
|
||||||
|
var resourceToken = toLower(uniqueString(subscription().id, environmentName, location))
|
||||||
|
var tags = { 'azd-env-name': environmentName }
|
||||||
|
|
||||||
|
resource sqlServer 'Microsoft.Sql/servers@2022-02-01-preview' = {
|
||||||
|
name: '${abbrs.sqlServers}${resourceToken}-Identity'
|
||||||
|
location: location
|
||||||
|
tags: tags
|
||||||
|
properties: {
|
||||||
|
version: '12.0'
|
||||||
|
minimalTlsVersion: '1.2'
|
||||||
|
publicNetworkAccess: 'Enabled'
|
||||||
|
administratorLogin: sqlAdmin
|
||||||
|
administratorLoginPassword: sqlAdminPassword
|
||||||
|
}
|
||||||
|
|
||||||
|
resource database 'databases' = {
|
||||||
|
name: dbName
|
||||||
|
location: location
|
||||||
|
}
|
||||||
|
|
||||||
|
resource firewall 'firewallRules' = {
|
||||||
|
name: 'Azure Services'
|
||||||
|
properties: {
|
||||||
|
// Allow all clients
|
||||||
|
// Note: range [0.0.0.0-0.0.0.0] means "allow all Azure-hosted clients only".
|
||||||
|
// This is not sufficient, because we also want to allow direct access from developer machine, for debugging purposes.
|
||||||
|
startIpAddress: '0.0.0.1'
|
||||||
|
endIpAddress: '255.255.255.254'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource sqlDeploymentScript 'Microsoft.Resources/deploymentScripts@2020-10-01' = {
|
||||||
|
name: 'script-${resourceToken}-Identity'
|
||||||
|
location: location
|
||||||
|
kind: 'AzureCLI'
|
||||||
|
properties: {
|
||||||
|
azCliVersion: '2.37.0'
|
||||||
|
retentionInterval: 'PT1H' // Retain the script resource for 1 hour after it ends running
|
||||||
|
timeout: 'PT5M' // Five minutes
|
||||||
|
cleanupPreference: 'OnSuccess'
|
||||||
|
environmentVariables: [
|
||||||
|
{
|
||||||
|
name: 'APPUSERNAME'
|
||||||
|
value: appUser
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name: 'APPUSERPASSWORD'
|
||||||
|
secureValue: appUserPassword
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name: 'DBNAME'
|
||||||
|
value: dbName
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name: 'DBSERVER'
|
||||||
|
value: sqlServer.properties.fullyQualifiedDomainName
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name: 'SQLCMDPASSWORD'
|
||||||
|
secureValue: sqlAdminPassword
|
||||||
|
}
|
||||||
|
{
|
||||||
|
name: 'SQLADMIN'
|
||||||
|
value: sqlAdmin
|
||||||
|
}
|
||||||
|
]
|
||||||
|
|
||||||
|
scriptContent: '''
|
||||||
|
wget https://github.com/microsoft/go-sqlcmd/releases/download/v0.8.1/sqlcmd-v0.8.1-linux-x64.tar.bz2
|
||||||
|
tar x -f sqlcmd-v0.8.1-linux-x64.tar.bz2 -C .
|
||||||
|
|
||||||
|
cat <<SCRIPT_END > ./initDb.sql
|
||||||
|
drop user ${APPUSERNAME}
|
||||||
|
go
|
||||||
|
create user ${APPUSERNAME} with password = '${APPUSERPASSWORD}'
|
||||||
|
go
|
||||||
|
alter role db_owner add member ${APPUSERNAME}
|
||||||
|
go
|
||||||
|
SCRIPT_END
|
||||||
|
|
||||||
|
./sqlcmd -S ${DBSERVER} -d ${DBNAME} -U ${SQLADMIN} -i ./initDb.sql
|
||||||
|
'''
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource sqlAdminPasswordSecret 'Microsoft.KeyVault/vaults/secrets@2022-07-01' = {
|
||||||
|
parent: keyVault
|
||||||
|
name: 'sqlAdminPassword'
|
||||||
|
properties: {
|
||||||
|
value: sqlAdminPassword
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource appUserPasswordSecret 'Microsoft.KeyVault/vaults/secrets@2022-07-01' = {
|
||||||
|
parent: keyVault
|
||||||
|
name: 'appUserPassword'
|
||||||
|
properties: {
|
||||||
|
value: appUserPassword
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource sqlAzureConnectionStringSercret 'Microsoft.KeyVault/vaults/secrets@2022-07-01' = {
|
||||||
|
parent: keyVault
|
||||||
|
name: sqlConnectionStringKey
|
||||||
|
properties: {
|
||||||
|
value: '${azureSqlConnectionString}; Password=${appUserPassword}'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource keyVault 'Microsoft.KeyVault/vaults@2022-07-01' existing = {
|
||||||
|
name: keyVaultName
|
||||||
|
}
|
||||||
|
|
||||||
|
var azureSqlConnectionString = 'Server=${sqlServer.properties.fullyQualifiedDomainName}; Database=${sqlServer::database.name}; User=${appUser}'
|
||||||
|
output sqlConnectionStringKey string = sqlConnectionStringKey
|
||||||
18
infra/core/host/appservice-config-cosmos.bicep
Normal file
18
infra/core/host/appservice-config-cosmos.bicep
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
param appServiceName string
|
||||||
|
param cosmosConnectionStringKey string = ''
|
||||||
|
param cosmosDatabaseName string = ''
|
||||||
|
param cosmosEndpoint string = ''
|
||||||
|
|
||||||
|
module appServiceConfigCosmosSettings 'appservice-config-union.bicep' = {
|
||||||
|
name: '${appServiceName}-appservice-config-cosmos-settings'
|
||||||
|
params: {
|
||||||
|
appServiceName: appServiceName
|
||||||
|
configName: 'appsettings'
|
||||||
|
currentConfigProperties: list(resourceId('Microsoft.Web/sites/config', appServiceName, 'appsettings'), '2022-03-01').properties
|
||||||
|
additionalConfigProperties: {
|
||||||
|
AZURE_COSMOS_CONNECTION_STRING_KEY: cosmosConnectionStringKey
|
||||||
|
AZURE_COSMOS_DATABASE_NAME: cosmosDatabaseName
|
||||||
|
AZURE_COSMOS_ENDPOINT: cosmosEndpoint
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
11
infra/core/host/appservice-config-logs.bicep
Normal file
11
infra/core/host/appservice-config-logs.bicep
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
param appServiceName string
|
||||||
|
|
||||||
|
resource siteConfigLogs 'Microsoft.Web/sites/config@2022-03-01' = {
|
||||||
|
name: '${appServiceName}/logs'
|
||||||
|
properties: {
|
||||||
|
applicationLogs: { fileSystem: { level: 'Verbose' } }
|
||||||
|
detailedErrorMessages: { enabled: true }
|
||||||
|
failedRequestsTracing: { enabled: true }
|
||||||
|
httpLogs: { fileSystem: { enabled: true, retentionInDays: 1, retentionInMb: 35 } }
|
||||||
|
}
|
||||||
|
}
|
||||||
14
infra/core/host/appservice-config-sqlserver.bicep
Normal file
14
infra/core/host/appservice-config-sqlserver.bicep
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
param appServiceName string
|
||||||
|
param sqlConnectionStringKey string
|
||||||
|
|
||||||
|
module appServiceConfigSqlServerSettings 'appservice-config-union.bicep' = {
|
||||||
|
name: '${appServiceName}-appservice-config-sqlserver-settings'
|
||||||
|
params: {
|
||||||
|
appServiceName: appServiceName
|
||||||
|
configName: 'appsettings'
|
||||||
|
currentConfigProperties: list(resourceId('Microsoft.Web/sites/config', appServiceName, 'appsettings'), '2022-03-01').properties
|
||||||
|
additionalConfigProperties: {
|
||||||
|
AZURE_SQL_CONNECTION_STRING_KEY: sqlConnectionStringKey
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
9
infra/core/host/appservice-config-union.bicep
Normal file
9
infra/core/host/appservice-config-union.bicep
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
param additionalConfigProperties object
|
||||||
|
param appServiceName string
|
||||||
|
param configName string
|
||||||
|
param currentConfigProperties object
|
||||||
|
|
||||||
|
resource siteConfigUnion 'Microsoft.Web/sites/config@2022-03-01' = {
|
||||||
|
name: '${appServiceName}/${configName}'
|
||||||
|
properties: union(currentConfigProperties, additionalConfigProperties)
|
||||||
|
}
|
||||||
35
infra/core/host/appservice-dotnet.bicep
Normal file
35
infra/core/host/appservice-dotnet.bicep
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param allowedOrigins array = []
|
||||||
|
param appCommandLine string = ''
|
||||||
|
param applicationInsightsName string = ''
|
||||||
|
param appServicePlanId string
|
||||||
|
param appSettings object = {}
|
||||||
|
param keyVaultName string = ''
|
||||||
|
param linuxFxVersion string = 'DOTNETCORE|6.0'
|
||||||
|
param managedIdentity bool = !(empty(keyVaultName))
|
||||||
|
param scmDoBuildDuringDeployment bool = false
|
||||||
|
param serviceName string
|
||||||
|
|
||||||
|
module appService 'appservice.bicep' = {
|
||||||
|
name: '${serviceName}-appservice-dotnet'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
allowedOrigins: allowedOrigins
|
||||||
|
appCommandLine: appCommandLine
|
||||||
|
applicationInsightsName: applicationInsightsName
|
||||||
|
appServicePlanId: appServicePlanId
|
||||||
|
appSettings: appSettings
|
||||||
|
keyVaultName: keyVaultName
|
||||||
|
linuxFxVersion: linuxFxVersion
|
||||||
|
managedIdentity: managedIdentity
|
||||||
|
scmDoBuildDuringDeployment: scmDoBuildDuringDeployment
|
||||||
|
serviceName: serviceName
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output identityPrincipalId string = appService.outputs.identityPrincipalId
|
||||||
|
output name string = appService.outputs.name
|
||||||
|
output uri string = appService.outputs.uri
|
||||||
35
infra/core/host/appservice-node.bicep
Normal file
35
infra/core/host/appservice-node.bicep
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param allowedOrigins array = []
|
||||||
|
param appCommandLine string = ''
|
||||||
|
param applicationInsightsName string = ''
|
||||||
|
param appServicePlanId string
|
||||||
|
param appSettings object = {}
|
||||||
|
param keyVaultName string = ''
|
||||||
|
param linuxFxVersion string = 'NODE|16-lts'
|
||||||
|
param managedIdentity bool = !(empty(keyVaultName))
|
||||||
|
param scmDoBuildDuringDeployment bool = false
|
||||||
|
param serviceName string
|
||||||
|
|
||||||
|
module appService 'appservice.bicep' = {
|
||||||
|
name: '${serviceName}-appservice-node'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
allowedOrigins: allowedOrigins
|
||||||
|
appCommandLine: appCommandLine
|
||||||
|
applicationInsightsName: applicationInsightsName
|
||||||
|
appServicePlanId: appServicePlanId
|
||||||
|
appSettings: appSettings
|
||||||
|
keyVaultName: keyVaultName
|
||||||
|
linuxFxVersion: linuxFxVersion
|
||||||
|
managedIdentity: managedIdentity
|
||||||
|
scmDoBuildDuringDeployment: scmDoBuildDuringDeployment
|
||||||
|
serviceName: serviceName
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output identityPrincipalId string = appService.outputs.identityPrincipalId
|
||||||
|
output name string = appService.outputs.name
|
||||||
|
output uri string = appService.outputs.uri
|
||||||
35
infra/core/host/appservice-python.bicep
Normal file
35
infra/core/host/appservice-python.bicep
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param allowedOrigins array = []
|
||||||
|
param appCommandLine string = ''
|
||||||
|
param applicationInsightsName string = ''
|
||||||
|
param appServicePlanId string
|
||||||
|
param appSettings object = {}
|
||||||
|
param keyVaultName string = ''
|
||||||
|
param linuxFxVersion string = 'PYTHON|3.8'
|
||||||
|
param managedIdentity bool = !(empty(keyVaultName))
|
||||||
|
param scmDoBuildDuringDeployment bool = true
|
||||||
|
param serviceName string
|
||||||
|
|
||||||
|
module appService 'appservice.bicep' = {
|
||||||
|
name: '${serviceName}-appservice-python'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
allowedOrigins: allowedOrigins
|
||||||
|
appCommandLine: appCommandLine
|
||||||
|
applicationInsightsName: applicationInsightsName
|
||||||
|
appServicePlanId: appServicePlanId
|
||||||
|
appSettings: appSettings
|
||||||
|
keyVaultName: keyVaultName
|
||||||
|
linuxFxVersion: linuxFxVersion
|
||||||
|
managedIdentity: managedIdentity
|
||||||
|
scmDoBuildDuringDeployment: scmDoBuildDuringDeployment
|
||||||
|
serviceName: serviceName
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output identityPrincipalId string = appService.outputs.identityPrincipalId
|
||||||
|
output name string = appService.outputs.name
|
||||||
|
output uri string = appService.outputs.uri
|
||||||
100
infra/core/host/appservice.bicep
Normal file
100
infra/core/host/appservice.bicep
Normal file
@@ -0,0 +1,100 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param allowedOrigins array = []
|
||||||
|
param alwaysOn bool = true
|
||||||
|
param appCommandLine string = ''
|
||||||
|
param applicationInsightsName string = ''
|
||||||
|
param appServicePlanId string
|
||||||
|
param appSettings object = {}
|
||||||
|
param clientAffinityEnabled bool = false
|
||||||
|
param functionAppScaleLimit int = -1
|
||||||
|
param keyVaultName string = ''
|
||||||
|
param kind string = 'app,linux'
|
||||||
|
param linuxFxVersion string = ''
|
||||||
|
param managedIdentity bool = !(empty(keyVaultName))
|
||||||
|
param minimumElasticInstanceCount int = -1
|
||||||
|
param numberOfWorkers int = -1
|
||||||
|
param scmDoBuildDuringDeployment bool = false
|
||||||
|
param serviceName string
|
||||||
|
param use32BitWorkerProcess bool = false
|
||||||
|
|
||||||
|
var abbrs = loadJsonContent('../../abbreviations.json')
|
||||||
|
var tags = { 'azd-env-name': environmentName }
|
||||||
|
var resourceToken = toLower(uniqueString(subscription().id, environmentName, location))
|
||||||
|
|
||||||
|
var prefix = contains(kind, 'function') ? abbrs.webSitesFunctions : abbrs.webSitesAppService
|
||||||
|
|
||||||
|
resource appService 'Microsoft.Web/sites@2022-03-01' = {
|
||||||
|
name: '${prefix}${serviceName}-${resourceToken}'
|
||||||
|
location: location
|
||||||
|
tags: union(tags, { 'azd-service-name': serviceName })
|
||||||
|
kind: kind
|
||||||
|
properties: {
|
||||||
|
serverFarmId: appServicePlanId
|
||||||
|
siteConfig: {
|
||||||
|
linuxFxVersion: linuxFxVersion
|
||||||
|
alwaysOn: alwaysOn
|
||||||
|
ftpsState: 'FtpsOnly'
|
||||||
|
appCommandLine: appCommandLine
|
||||||
|
numberOfWorkers: numberOfWorkers != -1 ? numberOfWorkers : null
|
||||||
|
minimumElasticInstanceCount: minimumElasticInstanceCount != -1 ? minimumElasticInstanceCount : null
|
||||||
|
use32BitWorkerProcess: use32BitWorkerProcess
|
||||||
|
functionAppScaleLimit: functionAppScaleLimit != -1 ? functionAppScaleLimit : null
|
||||||
|
cors: {
|
||||||
|
allowedOrigins: union([ 'https://portal.azure.com', 'https://ms.portal.azure.com' ], allowedOrigins)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
clientAffinityEnabled: clientAffinityEnabled
|
||||||
|
httpsOnly: true
|
||||||
|
}
|
||||||
|
|
||||||
|
identity: managedIdentity ? { type: 'SystemAssigned' } : null
|
||||||
|
|
||||||
|
resource appSettings 'config' = {
|
||||||
|
name: 'appsettings'
|
||||||
|
properties: union({
|
||||||
|
SCM_DO_BUILD_DURING_DEPLOYMENT: string(scmDoBuildDuringDeployment)
|
||||||
|
},
|
||||||
|
!(empty(applicationInsightsName)) ? { APPLICATIONINSIGHTS_CONNECTION_STRING: applicationInsights.properties.ConnectionString } : {},
|
||||||
|
!(empty(keyVaultName)) ? { AZURE_KEY_VAULT_ENDPOINT: keyVault.properties.vaultUri } : {})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module appSettingsUnion 'appservice-config-union.bicep' = if (!empty(appSettings)) {
|
||||||
|
name: '${serviceName}-app-settings-union'
|
||||||
|
params: {
|
||||||
|
appServiceName: appService.name
|
||||||
|
configName: 'appsettings'
|
||||||
|
currentConfigProperties: appService::appSettings.list().properties
|
||||||
|
additionalConfigProperties: appSettings
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module siteConfigLogs 'appservice-config-logs.bicep' = {
|
||||||
|
name: '${serviceName}-appservice-config-logs'
|
||||||
|
params: {
|
||||||
|
appServiceName: appService.name
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module keyVaultAccess '../security/keyvault-access.bicep' = if (!(empty(keyVaultName))) {
|
||||||
|
name: '${serviceName}-appservice-keyvault-access'
|
||||||
|
params: {
|
||||||
|
principalId: appService.identity.principalId
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource keyVault 'Microsoft.KeyVault/vaults@2022-07-01' existing = if (!(empty(keyVaultName))) {
|
||||||
|
name: keyVaultName
|
||||||
|
}
|
||||||
|
|
||||||
|
resource applicationInsights 'Microsoft.Insights/components@2020-02-02' existing = if (!(empty(applicationInsightsName))) {
|
||||||
|
name: applicationInsightsName
|
||||||
|
}
|
||||||
|
|
||||||
|
output identityPrincipalId string = managedIdentity ? appService.identity.principalId : ''
|
||||||
|
output name string = appService.name
|
||||||
|
output uri string = 'https://${appService.properties.defaultHostName}'
|
||||||
21
infra/core/host/appserviceplan-functions.bicep
Normal file
21
infra/core/host/appserviceplan-functions.bicep
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param sku object = {
|
||||||
|
name: 'Y1'
|
||||||
|
tier: 'Dynamic'
|
||||||
|
size: 'Y1'
|
||||||
|
family: 'Y'
|
||||||
|
}
|
||||||
|
|
||||||
|
module appServicePlanFunctions 'appserviceplan.bicep' = {
|
||||||
|
name: 'appserviceplan-functions'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
sku: sku
|
||||||
|
kind: 'functionapp'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output appServicePlanId string = appServicePlanFunctions.outputs.appServicePlanId
|
||||||
15
infra/core/host/appserviceplan-sites.bicep
Normal file
15
infra/core/host/appserviceplan-sites.bicep
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param sku object = { name: 'B1' }
|
||||||
|
|
||||||
|
module appServicePlanSites 'appserviceplan.bicep' = {
|
||||||
|
name: 'appserviceplan-sites'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
sku: sku
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output appServicePlanId string = appServicePlanSites.outputs.appServicePlanId
|
||||||
23
infra/core/host/appserviceplan.bicep
Normal file
23
infra/core/host/appserviceplan.bicep
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param kind string = ''
|
||||||
|
param reserved bool = true
|
||||||
|
param sku object
|
||||||
|
|
||||||
|
var abbrs = loadJsonContent('../../abbreviations.json')
|
||||||
|
var resourceToken = toLower(uniqueString(subscription().id, environmentName, location))
|
||||||
|
var tags = { 'azd-env-name': environmentName }
|
||||||
|
|
||||||
|
resource appServicePlan 'Microsoft.Web/serverfarms@2022-03-01' = {
|
||||||
|
name: '${abbrs.webServerFarms}${resourceToken}'
|
||||||
|
location: location
|
||||||
|
tags: tags
|
||||||
|
sku: sku
|
||||||
|
kind: kind
|
||||||
|
properties: {
|
||||||
|
reserved: reserved
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output appServicePlanId string = appServicePlan.id
|
||||||
79
infra/core/host/container-app.bicep
Normal file
79
infra/core/host/container-app.bicep
Normal file
@@ -0,0 +1,79 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param containerAppsEnvironmentName string = ''
|
||||||
|
param containerRegistryName string = ''
|
||||||
|
param env array = []
|
||||||
|
param external bool = true
|
||||||
|
param imageName string
|
||||||
|
param keyVaultName string = ''
|
||||||
|
param managedIdentity bool = !(empty(keyVaultName))
|
||||||
|
param targetPort int = 80
|
||||||
|
param serviceName string
|
||||||
|
|
||||||
|
var abbrs = loadJsonContent('../../abbreviations.json')
|
||||||
|
var resourceToken = toLower(uniqueString(subscription().id, environmentName, location))
|
||||||
|
var tags = { 'azd-env-name': environmentName }
|
||||||
|
|
||||||
|
resource app 'Microsoft.App/containerApps@2022-03-01' = {
|
||||||
|
name: '${abbrs.appContainerApps}${serviceName}-${resourceToken}'
|
||||||
|
location: location
|
||||||
|
tags: union(tags, { 'azd-service-name': serviceName })
|
||||||
|
identity: managedIdentity ? { type: 'SystemAssigned' } : null
|
||||||
|
properties: {
|
||||||
|
managedEnvironmentId: containerAppsEnvironment.id
|
||||||
|
configuration: {
|
||||||
|
activeRevisionsMode: 'single'
|
||||||
|
ingress: {
|
||||||
|
external: external
|
||||||
|
targetPort: targetPort
|
||||||
|
transport: 'auto'
|
||||||
|
}
|
||||||
|
secrets: [
|
||||||
|
{
|
||||||
|
name: 'registry-password'
|
||||||
|
value: containerRegistry.listCredentials().passwords[0].value
|
||||||
|
}
|
||||||
|
]
|
||||||
|
registries: [
|
||||||
|
{
|
||||||
|
server: '${containerRegistry.name}.azurecr.io'
|
||||||
|
username: containerRegistry.name
|
||||||
|
passwordSecretRef: 'registry-password'
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
template: {
|
||||||
|
containers: [
|
||||||
|
{
|
||||||
|
image: imageName
|
||||||
|
name: 'main'
|
||||||
|
env: env
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module keyVaultAccess '../security/keyvault-access.bicep' = if (!(empty(keyVaultName))) {
|
||||||
|
name: '${serviceName}-appservice-keyvault-access'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
keyVaultName: keyVaultName
|
||||||
|
principalId: app.identity.principalId
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource containerAppsEnvironment 'Microsoft.App/managedEnvironments@2022-03-01' existing = {
|
||||||
|
name: !empty(containerAppsEnvironmentName) ? containerAppsEnvironmentName : '${abbrs.appManagedEnvironments}${resourceToken}'
|
||||||
|
}
|
||||||
|
|
||||||
|
// 2022-02-01-preview needed for anonymousPullEnabled
|
||||||
|
resource containerRegistry 'Microsoft.ContainerRegistry/registries@2022-02-01-preview' existing = {
|
||||||
|
name: !empty(containerRegistryName) ? containerRegistryName : '${abbrs.containerRegistryRegistries}${resourceToken}'
|
||||||
|
}
|
||||||
|
|
||||||
|
output identityPrincipalId string = managedIdentity ? app.identity.principalId : ''
|
||||||
|
output name string = app.name
|
||||||
|
output uri string = 'https://${app.properties.configuration.ingress.fqdn}'
|
||||||
30
infra/core/host/container-apps-environment.bicep
Normal file
30
infra/core/host/container-apps-environment.bicep
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param containerAppsEnvironmentName string = ''
|
||||||
|
param logAnalyticsWorkspaceName string
|
||||||
|
|
||||||
|
var abbrs = loadJsonContent('../../abbreviations.json')
|
||||||
|
var resourceToken = toLower(uniqueString(subscription().id, environmentName, location))
|
||||||
|
var tags = { 'azd-env-name': environmentName }
|
||||||
|
|
||||||
|
resource containerAppsEnvironment 'Microsoft.App/managedEnvironments@2022-03-01' = {
|
||||||
|
name: !empty(containerAppsEnvironmentName) ? containerAppsEnvironmentName : '${abbrs.appManagedEnvironments}${resourceToken}'
|
||||||
|
location: location
|
||||||
|
tags: tags
|
||||||
|
properties: {
|
||||||
|
appLogsConfiguration: {
|
||||||
|
destination: 'log-analytics'
|
||||||
|
logAnalyticsConfiguration: {
|
||||||
|
customerId: logAnalyticsWorkspace.properties.customerId
|
||||||
|
sharedKey: logAnalyticsWorkspace.listKeys().primarySharedKey
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource logAnalyticsWorkspace 'Microsoft.OperationalInsights/workspaces@2021-12-01-preview' existing = {
|
||||||
|
name: logAnalyticsWorkspaceName
|
||||||
|
}
|
||||||
|
|
||||||
|
output containerAppsEnvironmentName string = containerAppsEnvironment.name
|
||||||
30
infra/core/host/container-apps.bicep
Normal file
30
infra/core/host/container-apps.bicep
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param containerAppsEnvironmentName string = ''
|
||||||
|
param containerAppsGroupName string = 'app'
|
||||||
|
param containerRegistryName string = ''
|
||||||
|
param logAnalyticsWorkspaceName string = ''
|
||||||
|
|
||||||
|
module containerAppsEnvironment 'container-apps-environment.bicep' = {
|
||||||
|
name: '${containerAppsGroupName}-container-apps-environment'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
containerAppsEnvironmentName: containerAppsEnvironmentName
|
||||||
|
logAnalyticsWorkspaceName: logAnalyticsWorkspaceName
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module containerRegistry 'container-registry.bicep' = {
|
||||||
|
name: '${containerAppsGroupName}-container-registry'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
containerRegistryName: containerRegistryName
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output containerAppsEnvironmentName string = containerAppsEnvironment.outputs.containerAppsEnvironmentName
|
||||||
|
output containerRegistryEndpoint string = containerRegistry.outputs.containerRegistryEndpoint
|
||||||
|
output containerRegistryName string = containerRegistry.outputs.containerRegistryName
|
||||||
40
infra/core/host/container-registry.bicep
Normal file
40
infra/core/host/container-registry.bicep
Normal file
@@ -0,0 +1,40 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param adminUserEnabled bool = true
|
||||||
|
param anonymousPullEnabled bool = false
|
||||||
|
param containerRegistryName string = ''
|
||||||
|
param dataEndpointEnabled bool = false
|
||||||
|
param encryption object = {
|
||||||
|
status: 'disabled'
|
||||||
|
}
|
||||||
|
param networkRuleBypassOptions string = 'AzureServices'
|
||||||
|
param publicNetworkAccess string = 'Enabled'
|
||||||
|
param sku object = {
|
||||||
|
name: 'Standard'
|
||||||
|
}
|
||||||
|
param zoneRedundancy string = 'Disabled'
|
||||||
|
|
||||||
|
var abbrs = loadJsonContent('../../abbreviations.json')
|
||||||
|
var resourceToken = toLower(uniqueString(subscription().id, environmentName, location))
|
||||||
|
var tags = { 'azd-env-name': environmentName }
|
||||||
|
|
||||||
|
// 2022-02-01-preview needed for anonymousPullEnabled
|
||||||
|
resource containerRegistry 'Microsoft.ContainerRegistry/registries@2022-02-01-preview' = {
|
||||||
|
name: !empty(containerRegistryName) ? containerRegistryName : '${abbrs.containerRegistryRegistries}${resourceToken}'
|
||||||
|
location: location
|
||||||
|
tags: tags
|
||||||
|
sku: sku
|
||||||
|
properties: {
|
||||||
|
adminUserEnabled: adminUserEnabled
|
||||||
|
anonymousPullEnabled: anonymousPullEnabled
|
||||||
|
dataEndpointEnabled: dataEndpointEnabled
|
||||||
|
encryption: encryption
|
||||||
|
networkRuleBypassOptions: networkRuleBypassOptions
|
||||||
|
publicNetworkAccess: publicNetworkAccess
|
||||||
|
zoneRedundancy: zoneRedundancy
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output containerRegistryEndpoint string = containerRegistry.properties.loginServer
|
||||||
|
output containerRegistryName string = containerRegistry.name
|
||||||
34
infra/core/host/functions-node.bicep
Normal file
34
infra/core/host/functions-node.bicep
Normal file
@@ -0,0 +1,34 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param allowedOrigins array = []
|
||||||
|
param applicationInsightsName string = ''
|
||||||
|
param appServicePlanId string
|
||||||
|
param appSettings object = {}
|
||||||
|
param keyVaultName string = ''
|
||||||
|
param linuxFxVersion string = 'NODE|16'
|
||||||
|
param managedIdentity bool = !(empty(keyVaultName))
|
||||||
|
param serviceName string
|
||||||
|
param storageAccountName string
|
||||||
|
|
||||||
|
module functions 'functions.bicep' = {
|
||||||
|
name: '${serviceName}-functions-node'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
allowedOrigins: allowedOrigins
|
||||||
|
applicationInsightsName: applicationInsightsName
|
||||||
|
appServicePlanId: appServicePlanId
|
||||||
|
appSettings: appSettings
|
||||||
|
functionsWorkerRuntime: 'node'
|
||||||
|
keyVaultName: keyVaultName
|
||||||
|
linuxFxVersion: linuxFxVersion
|
||||||
|
managedIdentity: managedIdentity
|
||||||
|
serviceName: serviceName
|
||||||
|
storageAccountName: storageAccountName
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output identityPrincipalId string = functions.outputs.identityPrincipalId
|
||||||
|
output name string = functions.outputs.name
|
||||||
|
output uri string = functions.outputs.uri
|
||||||
34
infra/core/host/functions-python.bicep
Normal file
34
infra/core/host/functions-python.bicep
Normal file
@@ -0,0 +1,34 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param allowedOrigins array = []
|
||||||
|
param applicationInsightsName string = ''
|
||||||
|
param appServicePlanId string
|
||||||
|
param appSettings object = {}
|
||||||
|
param keyVaultName string = ''
|
||||||
|
param linuxFxVersion string = 'PYTHON|3.8'
|
||||||
|
param managedIdentity bool = !(empty(keyVaultName))
|
||||||
|
param serviceName string
|
||||||
|
param storageAccountName string
|
||||||
|
|
||||||
|
module functions 'functions.bicep' = {
|
||||||
|
name: '${serviceName}-functions-python'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
allowedOrigins: allowedOrigins
|
||||||
|
applicationInsightsName: applicationInsightsName
|
||||||
|
appServicePlanId: appServicePlanId
|
||||||
|
appSettings: appSettings
|
||||||
|
functionsWorkerRuntime: 'python'
|
||||||
|
keyVaultName: keyVaultName
|
||||||
|
linuxFxVersion: linuxFxVersion
|
||||||
|
managedIdentity: managedIdentity
|
||||||
|
serviceName: serviceName
|
||||||
|
storageAccountName: storageAccountName
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output identityPrincipalId string = functions.outputs.identityPrincipalId
|
||||||
|
output name string = functions.outputs.name
|
||||||
|
output uri string = functions.outputs.uri
|
||||||
58
infra/core/host/functions.bicep
Normal file
58
infra/core/host/functions.bicep
Normal file
@@ -0,0 +1,58 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param allowedOrigins array = []
|
||||||
|
param alwaysOn bool = false
|
||||||
|
param applicationInsightsName string = ''
|
||||||
|
param appServicePlanId string
|
||||||
|
param appSettings object = {}
|
||||||
|
param clientAffinityEnabled bool = false
|
||||||
|
param functionAppScaleLimit int = 200
|
||||||
|
param functionsExtensionVersion string = '~4'
|
||||||
|
param functionsWorkerRuntime string
|
||||||
|
param kind string = 'functionapp,linux'
|
||||||
|
param linuxFxVersion string = ''
|
||||||
|
param keyVaultName string = ''
|
||||||
|
param managedIdentity bool = !(empty(keyVaultName))
|
||||||
|
param minimumElasticInstanceCount int = 0
|
||||||
|
param numberOfWorkers int = 1
|
||||||
|
param scmDoBuildDuringDeployment bool = true
|
||||||
|
param serviceName string
|
||||||
|
param storageAccountName string
|
||||||
|
param use32BitWorkerProcess bool = false
|
||||||
|
|
||||||
|
module functions 'appservice.bicep' = {
|
||||||
|
name: '${serviceName}-functions'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
allowedOrigins: allowedOrigins
|
||||||
|
alwaysOn: alwaysOn
|
||||||
|
applicationInsightsName: applicationInsightsName
|
||||||
|
appServicePlanId: appServicePlanId
|
||||||
|
appSettings: union(appSettings, {
|
||||||
|
AzureWebJobsStorage: 'DefaultEndpointsProtocol=https;AccountName=${storage.name};AccountKey=${storage.listKeys().keys[0].value};EndpointSuffix=${environment().suffixes.storage}'
|
||||||
|
FUNCTIONS_EXTENSION_VERSION: functionsExtensionVersion
|
||||||
|
FUNCTIONS_WORKER_RUNTIME: functionsWorkerRuntime
|
||||||
|
})
|
||||||
|
clientAffinityEnabled: clientAffinityEnabled
|
||||||
|
functionAppScaleLimit: functionAppScaleLimit
|
||||||
|
keyVaultName: keyVaultName
|
||||||
|
kind: kind
|
||||||
|
linuxFxVersion: linuxFxVersion
|
||||||
|
managedIdentity: managedIdentity
|
||||||
|
minimumElasticInstanceCount: minimumElasticInstanceCount
|
||||||
|
numberOfWorkers: numberOfWorkers
|
||||||
|
scmDoBuildDuringDeployment: scmDoBuildDuringDeployment
|
||||||
|
serviceName: serviceName
|
||||||
|
use32BitWorkerProcess: use32BitWorkerProcess
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource storage 'Microsoft.Storage/storageAccounts@2021-09-01' existing = {
|
||||||
|
name: storageAccountName
|
||||||
|
}
|
||||||
|
|
||||||
|
output identityPrincipalId string = managedIdentity ? functions.outputs.identityPrincipalId : ''
|
||||||
|
output name string = functions.outputs.name
|
||||||
|
output uri string = functions.outputs.uri
|
||||||
25
infra/core/host/staticwebapp.bicep
Normal file
25
infra/core/host/staticwebapp.bicep
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param serviceName string
|
||||||
|
param sku object = {
|
||||||
|
name: 'Free'
|
||||||
|
tier: 'Free'
|
||||||
|
}
|
||||||
|
|
||||||
|
var abbrs = loadJsonContent('../../abbreviations.json')
|
||||||
|
var resourceToken = toLower(uniqueString(subscription().id, environmentName, location))
|
||||||
|
var tags = { 'azd-env-name': environmentName }
|
||||||
|
|
||||||
|
resource web 'Microsoft.Web/staticSites@2022-03-01' = {
|
||||||
|
name: '${abbrs.webStaticSites}${serviceName}-${resourceToken}'
|
||||||
|
location: location
|
||||||
|
tags: union(tags, { 'azd-service-name': serviceName })
|
||||||
|
sku: sku
|
||||||
|
properties: {
|
||||||
|
provider: 'Custom'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output name string = web.name
|
||||||
|
output uri string = 'https://${web.properties.defaultHostname}'
|
||||||
1238
infra/core/monitor/applicationinsights-dashboard.bicep
Normal file
1238
infra/core/monitor/applicationinsights-dashboard.bicep
Normal file
File diff suppressed because it is too large
Load Diff
30
infra/core/monitor/applicationinsights.bicep
Normal file
30
infra/core/monitor/applicationinsights.bicep
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
param logAnalyticsWorkspaceId string
|
||||||
|
|
||||||
|
var abbrs = loadJsonContent('../../abbreviations.json')
|
||||||
|
var resourceToken = toLower(uniqueString(subscription().id, environmentName, location))
|
||||||
|
var tags = { 'azd-env-name': environmentName }
|
||||||
|
|
||||||
|
resource applicationInsights 'Microsoft.Insights/components@2020-02-02' = {
|
||||||
|
name: '${abbrs.insightsComponents}${resourceToken}'
|
||||||
|
location: location
|
||||||
|
tags: tags
|
||||||
|
kind: 'web'
|
||||||
|
properties: {
|
||||||
|
Application_Type: 'web'
|
||||||
|
WorkspaceResourceId: logAnalyticsWorkspaceId
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module applicationInsightsDashboard 'applicationinsights-dashboard.bicep' = {
|
||||||
|
name: 'application-insights-dashboard'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
applicationInsightsName: applicationInsights.name
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output applicationInsightsConnectionString string = applicationInsights.properties.ConnectionString
|
||||||
|
output applicationInsightsName string = applicationInsights.name
|
||||||
24
infra/core/monitor/loganalytics.bicep
Normal file
24
infra/core/monitor/loganalytics.bicep
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
var abbrs = loadJsonContent('../../abbreviations.json')
|
||||||
|
var resourceToken = toLower(uniqueString(subscription().id, environmentName, location))
|
||||||
|
var tags = { 'azd-env-name': environmentName }
|
||||||
|
|
||||||
|
resource logAnalytics 'Microsoft.OperationalInsights/workspaces@2021-12-01-preview' = {
|
||||||
|
name: '${abbrs.operationalInsightsWorkspaces}${resourceToken}'
|
||||||
|
location: location
|
||||||
|
tags: tags
|
||||||
|
properties: any({
|
||||||
|
retentionInDays: 30
|
||||||
|
features: {
|
||||||
|
searchVersion: 1
|
||||||
|
}
|
||||||
|
sku: {
|
||||||
|
name: 'PerGB2018'
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
output logAnalyticsWorkspaceId string = logAnalytics.id
|
||||||
|
output logAnalyticsWorkspaceName string = logAnalytics.name
|
||||||
24
infra/core/monitor/monitoring.bicep
Normal file
24
infra/core/monitor/monitoring.bicep
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
module logAnalytics 'loganalytics.bicep' = {
|
||||||
|
name: 'loganalytics'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
module applicationInsights 'applicationinsights.bicep' = {
|
||||||
|
name: 'applicationinsights'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
logAnalyticsWorkspaceId: logAnalytics.outputs.logAnalyticsWorkspaceId
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output applicationInsightsConnectionString string = applicationInsights.outputs.applicationInsightsConnectionString
|
||||||
|
output applicationInsightsName string = applicationInsights.outputs.applicationInsightsName
|
||||||
|
output logAnalyticsWorkspaceId string = logAnalytics.outputs.logAnalyticsWorkspaceId
|
||||||
|
output logAnalyticsWorkspaceName string = logAnalytics.outputs.logAnalyticsWorkspaceName
|
||||||
25
infra/core/security/keyvault-access.bicep
Normal file
25
infra/core/security/keyvault-access.bicep
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param keyVaultName string = ''
|
||||||
|
param permissions object = { secrets: [ 'get', 'list' ] }
|
||||||
|
param principalId string
|
||||||
|
|
||||||
|
var abbrs = loadJsonContent('../../abbreviations.json')
|
||||||
|
var resourceToken = toLower(uniqueString(subscription().id, environmentName, location))
|
||||||
|
|
||||||
|
resource keyVaultAccessPolicies 'Microsoft.KeyVault/vaults/accessPolicies@2022-07-01' = {
|
||||||
|
parent: keyVault
|
||||||
|
name: 'add'
|
||||||
|
properties: {
|
||||||
|
accessPolicies: [ {
|
||||||
|
objectId: principalId
|
||||||
|
tenantId: subscription().tenantId
|
||||||
|
permissions: permissions
|
||||||
|
} ]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resource keyVault 'Microsoft.KeyVault/vaults@2022-07-01' existing = {
|
||||||
|
name: !empty(keyVaultName) ? keyVaultName : '${abbrs.keyVaultVaults}${resourceToken}'
|
||||||
|
}
|
||||||
29
infra/core/security/keyvault.bicep
Normal file
29
infra/core/security/keyvault.bicep
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param keyVaultName string = ''
|
||||||
|
param principalId string = ''
|
||||||
|
|
||||||
|
var abbrs = loadJsonContent('../../abbreviations.json')
|
||||||
|
var resourceToken = toLower(uniqueString(subscription().id, environmentName, location))
|
||||||
|
var tags = { 'azd-env-name': environmentName }
|
||||||
|
|
||||||
|
resource keyVault 'Microsoft.KeyVault/vaults@2022-07-01' = {
|
||||||
|
name: !empty(keyVaultName) ? keyVaultName : '${abbrs.keyVaultVaults}${resourceToken}'
|
||||||
|
location: location
|
||||||
|
tags: tags
|
||||||
|
properties: {
|
||||||
|
tenantId: subscription().tenantId
|
||||||
|
sku: { family: 'A', name: 'standard' }
|
||||||
|
accessPolicies: !empty(principalId) ? [
|
||||||
|
{
|
||||||
|
objectId: principalId
|
||||||
|
permissions: { secrets: [ 'get', 'list' ] }
|
||||||
|
tenantId: subscription().tenantId
|
||||||
|
}
|
||||||
|
] : []
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output keyVaultEndpoint string = keyVault.properties.vaultUri
|
||||||
|
output keyVaultName string = keyVault.name
|
||||||
29
infra/core/storage/storage-account.bicep
Normal file
29
infra/core/storage/storage-account.bicep
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
|
||||||
|
param allowBlobPublicAccess bool = false
|
||||||
|
param kind string = 'StorageV2'
|
||||||
|
param minimumTlsVersion string = 'TLS1_2'
|
||||||
|
param sku object = { name: 'Standard_LRS' }
|
||||||
|
|
||||||
|
var abbrs = loadJsonContent('../../abbreviations.json')
|
||||||
|
var resourceToken = toLower(uniqueString(subscription().id, environmentName, location))
|
||||||
|
var tags = { 'azd-env-name': environmentName }
|
||||||
|
|
||||||
|
resource storage 'Microsoft.Storage/storageAccounts@2021-09-01' = {
|
||||||
|
name: '${abbrs.storageStorageAccounts}${resourceToken}'
|
||||||
|
location: location
|
||||||
|
tags: tags
|
||||||
|
kind: kind
|
||||||
|
sku: sku
|
||||||
|
properties: {
|
||||||
|
minimumTlsVersion: minimumTlsVersion
|
||||||
|
allowBlobPublicAccess: allowBlobPublicAccess
|
||||||
|
networkAcls: {
|
||||||
|
bypass: 'AzureServices'
|
||||||
|
defaultAction: 'Allow'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output name string = storage.name
|
||||||
46
infra/main.bicep
Normal file
46
infra/main.bicep
Normal file
@@ -0,0 +1,46 @@
|
|||||||
|
targetScope = 'subscription'
|
||||||
|
|
||||||
|
@minLength(1)
|
||||||
|
@maxLength(64)
|
||||||
|
@description('Name of the the environment which is used to generate a short unique hash used in all resources.')
|
||||||
|
param environmentName string
|
||||||
|
|
||||||
|
@minLength(1)
|
||||||
|
@description('Primary location for all resources')
|
||||||
|
param location string
|
||||||
|
|
||||||
|
@description('Id of the user or app to assign application roles')
|
||||||
|
param principalId string = ''
|
||||||
|
|
||||||
|
@secure()
|
||||||
|
@description('SQL Server administrator password')
|
||||||
|
param sqlAdminPassword string
|
||||||
|
|
||||||
|
@secure()
|
||||||
|
@description('Application user password')
|
||||||
|
param appUserPassword string
|
||||||
|
|
||||||
|
var abbrs = loadJsonContent('./abbreviations.json')
|
||||||
|
var tags = { 'azd-env-name': environmentName }
|
||||||
|
|
||||||
|
resource rg 'Microsoft.Resources/resourceGroups@2021-04-01' = {
|
||||||
|
name: '${abbrs.resourcesResourceGroups}${environmentName}'
|
||||||
|
location: location
|
||||||
|
tags: tags
|
||||||
|
}
|
||||||
|
|
||||||
|
module resources 'resources.bicep' = {
|
||||||
|
name: 'resources'
|
||||||
|
scope: rg
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
principalId: principalId
|
||||||
|
sqlAdminPassword: sqlAdminPassword
|
||||||
|
appUserPassword: appUserPassword
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output AZURE_LOCATION string = location
|
||||||
|
output AZURE_TENANT_ID string = tenant().tenantId
|
||||||
|
output REACT_APP_WEB_BASE_URL string = resources.outputs.WEB_URI
|
||||||
21
infra/main.parameters.json
Normal file
21
infra/main.parameters.json
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
|
||||||
|
"contentVersion": "1.0.0.0",
|
||||||
|
"parameters": {
|
||||||
|
"environmentName": {
|
||||||
|
"value": "${AZURE_ENV_NAME}"
|
||||||
|
},
|
||||||
|
"location": {
|
||||||
|
"value": "${AZURE_LOCATION}"
|
||||||
|
},
|
||||||
|
"principalId": {
|
||||||
|
"value": "${AZURE_PRINCIPAL_ID}"
|
||||||
|
},
|
||||||
|
"sqlAdminPassword": {
|
||||||
|
"value": "$(secretOrRandomPassword ${AZURE_KEY_VAULT_NAME} sqlAdminPassword)"
|
||||||
|
},
|
||||||
|
"appUserPassword": {
|
||||||
|
"value": "$(secretOrRandomPassword ${AZURE_KEY_VAULT_NAME} appUserPassword)"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
82
infra/resources.bicep
Normal file
82
infra/resources.bicep
Normal file
@@ -0,0 +1,82 @@
|
|||||||
|
param environmentName string
|
||||||
|
param location string = resourceGroup().location
|
||||||
|
param principalId string = ''
|
||||||
|
|
||||||
|
@secure()
|
||||||
|
param sqlAdminPassword string
|
||||||
|
|
||||||
|
@secure()
|
||||||
|
param appUserPassword string
|
||||||
|
|
||||||
|
// The application frontend
|
||||||
|
module web './app/web.bicep' = {
|
||||||
|
name: 'web'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
appServicePlanId: appServicePlan.outputs.appServicePlanId
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// The application database: Catalog
|
||||||
|
module sqlServer1 './app/dbCatalog.bicep' = {
|
||||||
|
name: 'sqlCatalog'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
sqlAdminPassword: sqlAdminPassword
|
||||||
|
appUserPassword: appUserPassword
|
||||||
|
keyVaultName: keyVault.outputs.keyVaultName
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// The application database: Identity
|
||||||
|
module sqlServer2 './app/dbIdentity.bicep' = {
|
||||||
|
name: 'sqlIdentity'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
sqlAdminPassword: sqlAdminPassword
|
||||||
|
appUserPassword: appUserPassword
|
||||||
|
keyVaultName: keyVault.outputs.keyVaultName
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Configure web to use sqlCatalog
|
||||||
|
module apiSqlServerConfig1 './core/host/appservice-config-sqlserver.bicep' = {
|
||||||
|
name: 'web-sqlserver-config-1'
|
||||||
|
params: {
|
||||||
|
appServiceName: web.outputs.WEB_NAME
|
||||||
|
sqlConnectionStringKey: sqlServer1.outputs.sqlConnectionStringKey
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Configure web to use sqlIdentity
|
||||||
|
module apiSqlServerConfig2 './core/host/appservice-config-sqlserver.bicep' = {
|
||||||
|
name: 'web-sqlserver-config-2'
|
||||||
|
params: {
|
||||||
|
appServiceName: web.outputs.WEB_NAME
|
||||||
|
sqlConnectionStringKey: sqlServer2.outputs.sqlConnectionStringKey
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Store secrets in a keyvault
|
||||||
|
module keyVault './core/security/keyvault.bicep' = {
|
||||||
|
name: 'keyvault'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
principalId: principalId
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create an App Service Plan to group applications under the same payment plan and SKU
|
||||||
|
module appServicePlan './core/host/appserviceplan-sites.bicep' = {
|
||||||
|
name: 'appserviceplan'
|
||||||
|
params: {
|
||||||
|
environmentName: environmentName
|
||||||
|
location: location
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output WEB_URI string = web.outputs.WEB_URI
|
||||||
Reference in New Issue
Block a user