зеркало из
1
0
Форкнуть 0
* Fixed MG scope deployment link #3013

* Fix .NET docs build

* Remove separated test

* Fix subscription aliases for tagging
This commit is contained in:
Bernie White 2024-08-15 01:40:39 +10:00 коммит произвёл GitHub
Родитель 39aa1e45e9
Коммит 6d02f7b8c4
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: B5690EEEBB952194
12 изменённых файлов: 223 добавлений и 18 удалений

5
.github/workflows/build.yaml поставляемый
Просмотреть файл

@ -16,7 +16,6 @@ on:
env:
DOTNET_NOLOGO: true
DOTNET_CLI_TELEMETRY_OPTOUT: true
DOTNET_VERSION: 8.x
jobs:
build:
@ -32,8 +31,6 @@ jobs:
- name: Setup .NET
uses: actions/setup-dotnet@v4
with:
dotnet-version: ${{ env.DOTNET_VERSION }}
- name: Install dependencies
shell: pwsh
@ -110,8 +107,6 @@ jobs:
- name: Setup .NET
uses: actions/setup-dotnet@v4
with:
dotnet-version: ${{ env.DOTNET_VERSION }}
- if: ${{ matrix.shell == 'pwsh' }}
name: Install dependencies (PowerShell)

3
.github/workflows/docs.yaml поставляемый
Просмотреть файл

@ -41,6 +41,9 @@ jobs:
python-version: '3.11'
architecture: x64
- name: Setup .NET
uses: actions/setup-dotnet@v4
- name: Install dependencies
run: |
python3 -m pip install --upgrade pip

Просмотреть файл

@ -41,6 +41,11 @@ What's changed since pre-release v1.39.0-B0029:
- Engineering:
- Bump development tools to .NET 8.0 SDK by @BernieWhite.
[#3017](https://github.com/Azure/PSRule.Rules.Azure/issues/3017)
- Bug fixed:
- Fixed expansion with deployments by resource ID at management group by @BernieWhite
[#3013](https://github.com/Azure/PSRule.Rules.Azure/issues/3013)
- Fixed subscription aliases don't support tags by @BernieWhite.
[#3021](https://github.com/Azure/PSRule.Rules.Azure/issues/3021)
## v1.39.0-B0029 (pre-release)

Просмотреть файл

@ -376,6 +376,9 @@ namespace PSRule.Rules.Azure
if (start + 3 < parts.Length && StringComparer.OrdinalIgnoreCase.Equals(parts[start], PROVIDERS))
start++;
if (start == 0 && StringComparer.OrdinalIgnoreCase.Equals(parts[1], PROVIDERS))
start += 2;
provider = parts[start++];
type = parts[start++];
name = parts[start++];

Просмотреть файл

@ -281,14 +281,23 @@ namespace PSRule.Rules.Azure.Data.Template
internal bool TryParentResourceId(JObject resource, out string[] resourceId)
{
resourceId = null;
if (!TryResourceScope(resource, out var id) ||
!ResourceHelper.TryResourceIdComponents(id, out var subscriptionId, out var resourceGroupName, out string[] resourceTypeComponents, out string[] nameComponents))
if (!TryResourceScope(resource, out var id))
return false;
if (id == TENANT_SCOPE)
{
resourceId = new string[] { TENANT_SCOPE };
return true;
}
if (!ResourceHelper.TryResourceIdComponents(id, out var subscriptionId, out var resourceGroupName, out string[] resourceTypeComponents, out string[] nameComponents))
return false;
resourceId = new string[nameComponents.Length];
for (var i = 0; i < nameComponents.Length; i++)
{
resourceId[i] = ResourceHelper.CombineResourceId(subscriptionId, resourceGroupName, resourceTypeComponents, nameComponents, depth: i);
}
return resourceId.Length > 0;
}
@ -1331,7 +1340,10 @@ namespace PSRule.Rules.Azure.Data.Template
else if (deploymentScope == DeploymentScope.Subscription)
resourceId = ResourceHelper.CombineResourceId(subscriptionId, null, type, name);
else if (deploymentScope == DeploymentScope.ManagementGroup || deploymentScope == DeploymentScope.Tenant)
else if (deploymentScope == DeploymentScope.ManagementGroup)
resourceId = ResourceHelper.CombineResourceId(null, null, type, name, scope: scope ?? context.Deployment.Scope);
else if (deploymentScope == DeploymentScope.Tenant)
resourceId = ResourceHelper.CombineResourceId(null, null, type, name);
context.UpdateResourceScope(resource);

Просмотреть файл

@ -46,15 +46,25 @@ spec:
# Exclude resource providers that do not support tags
- type: '.'
notStartsWith:
- Microsoft.ADHybridHealthService/
- Microsoft.Addons/
- Microsoft.Advisor/
- Microsoft.Billing/
- Microsoft.BillingBenefits/
- Microsoft.Blueprint/
- Microsoft.Capacity/
- Microsoft.ChangeAnalysis/
- Microsoft.Classic
- Microsoft.Commerce/
- Microsoft.Consumption/
- Microsoft.CustomerLockbox/
- Microsoft.Features/
- Microsoft.Gallery/
- Microsoft.GuestConfiguration/
- Microsoft.HybridConnectivity/
- Microsoft.IoTSecurity/
- Microsoft.Security/
- Microsoft.Subscription/
- microsoft.support/
- Microsoft.WorkloadMonitor/
- Microsoft.ManagedServices/
@ -134,6 +144,13 @@ spec:
- Microsoft.Insights/workbooks
- Microsoft.Insights/workbookTemplates
- anyOf:
- type: '.'
notStartsWith: Microsoft.Chaos/
- type: '.'
in:
- Microsoft.Chaos/experiments
- anyOf:
- type: '.'
notLike: 'Microsoft.*/*/*'

Просмотреть файл

@ -986,7 +986,7 @@ namespace PSRule.Rules.Azure
public void ManagementGroupScopedResource()
{
var resources = ProcessTemplate(GetSourcePath("Tests.Bicep.31.json"), null, out _);
Assert.Equal(4, resources.Length);
Assert.Equal(9, resources.Length);
var actual = resources[1];
Assert.Equal("Microsoft.Subscription/aliases", actual["type"].Value<string>());

Просмотреть файл

@ -9,11 +9,23 @@ resource subscriptionAlias 'Microsoft.Subscription/aliases@2021-10-01' = {
properties: {
workload: 'DevTest'
displayName: 'sub1'
billingScope: ' /billingAccounts/nn/enrollmentAccounts/nn'
billingScope: '/billingAccounts/nn/enrollmentAccounts/nn'
}
}
module rbac './Tests.Bicep.31.child.bicep' = {
scope: subscription('00000000-0000-0000-0000-000000000000')
name: 'rbac'
name: 'child'
}
module createSubscription './Tests.Bicep.31.child2.bicep' = {
name: 'child2'
scope: managementGroup()
}
module createSubscriptionResources './Tests.Bicep.31.child3.bicep' = {
name: 'child3'
params: {
subscriptionId: createSubscription.outputs.subscriptionId
}
}

Просмотреть файл

@ -0,0 +1,16 @@
// Copyright (c) Microsoft Corporation.
// Licensed under the MIT License.
targetScope = 'managementGroup'
resource subscriptionAlias 'Microsoft.Subscription/aliases@2021-10-01' = {
scope: tenant()
name: 'sub2'
properties: {
workload: 'DevTest'
displayName: 'sub2'
billingScope: '/billingAccounts/nn/enrollmentAccounts/nn'
}
}
output subscriptionId string = subscriptionAlias.properties.subscriptionId

Просмотреть файл

@ -0,0 +1,11 @@
// Copyright (c) Microsoft Corporation.
// Licensed under the MIT License.
targetScope = 'managementGroup'
param subscriptionId string
module deploySub './Tests.Bicep.31.child4.bicep' = {
name: 'child4'
scope: subscription(subscriptionId)
}

Просмотреть файл

@ -0,0 +1,14 @@
// Copyright (c) Microsoft Corporation.
// Licensed under the MIT License.
targetScope = 'subscription'
resource assignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = {
name: '48d15605-70a3-4676-bb6a-792f403786b5'
properties: {
principalId: '48d15605-70a3-4676-bb6a-792f403786b5'
roleDefinitionId: '48d15605-70a3-4676-bb6a-792f403786b5'
principalType: 'ServicePrincipal'
description: 'Test role assignment for checking scope and ID.'
}
}

Просмотреть файл

@ -4,8 +4,8 @@
"metadata": {
"_generator": {
"name": "bicep",
"version": "0.23.1.45101",
"templateHash": "1432163185374769317"
"version": "0.29.47.4906",
"templateHash": "18243599897785785680"
}
},
"resources": [
@ -17,13 +17,13 @@
"properties": {
"workload": "DevTest",
"displayName": "sub1",
"billingScope": " /billingAccounts/nn/enrollmentAccounts/nn"
"billingScope": "/billingAccounts/nn/enrollmentAccounts/nn"
}
},
{
"type": "Microsoft.Resources/deployments",
"apiVersion": "2022-09-01",
"name": "rbac",
"name": "child",
"subscriptionId": "00000000-0000-0000-0000-000000000000",
"location": "[deployment().location]",
"properties": {
@ -37,8 +37,8 @@
"metadata": {
"_generator": {
"name": "bicep",
"version": "0.23.1.45101",
"templateHash": "17477755083280448345"
"version": "0.29.47.4906",
"templateHash": "4248553621957476478"
}
},
"resources": [
@ -56,6 +56,123 @@
]
}
}
},
{
"type": "Microsoft.Resources/deployments",
"apiVersion": "2022-09-01",
"name": "child2",
"location": "[deployment().location]",
"properties": {
"expressionEvaluationOptions": {
"scope": "inner"
},
"mode": "Incremental",
"template": {
"$schema": "https://schema.management.azure.com/schemas/2019-08-01/managementGroupDeploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"metadata": {
"_generator": {
"name": "bicep",
"version": "0.29.47.4906",
"templateHash": "16465737476591302057"
}
},
"resources": [
{
"type": "Microsoft.Subscription/aliases",
"apiVersion": "2021-10-01",
"scope": "/",
"name": "sub2",
"properties": {
"workload": "DevTest",
"displayName": "sub2",
"billingScope": "/billingAccounts/nn/enrollmentAccounts/nn"
}
}
],
"outputs": {
"subscriptionId": {
"type": "string",
"value": "[reference(tenantResourceId('Microsoft.Subscription/aliases', 'sub2'), '2021-10-01').subscriptionId]"
}
}
}
}
},
{
"type": "Microsoft.Resources/deployments",
"apiVersion": "2022-09-01",
"name": "child3",
"location": "[deployment().location]",
"properties": {
"expressionEvaluationOptions": {
"scope": "inner"
},
"mode": "Incremental",
"parameters": {
"subscriptionId": {
"value": "[reference(extensionResourceId(managementGroup().id, 'Microsoft.Resources/deployments', 'child2'), '2022-09-01').outputs.subscriptionId.value]"
}
},
"template": {
"$schema": "https://schema.management.azure.com/schemas/2019-08-01/managementGroupDeploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"metadata": {
"_generator": {
"name": "bicep",
"version": "0.29.47.4906",
"templateHash": "18410252302990608843"
}
},
"parameters": {
"subscriptionId": {
"type": "string"
}
},
"resources": [
{
"type": "Microsoft.Resources/deployments",
"apiVersion": "2022-09-01",
"name": "child4",
"subscriptionId": "[parameters('subscriptionId')]",
"location": "[deployment().location]",
"properties": {
"expressionEvaluationOptions": {
"scope": "inner"
},
"mode": "Incremental",
"template": {
"$schema": "https://schema.management.azure.com/schemas/2018-05-01/subscriptionDeploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"metadata": {
"_generator": {
"name": "bicep",
"version": "0.29.47.4906",
"templateHash": "5988084472097053332"
}
},
"resources": [
{
"type": "Microsoft.Authorization/roleAssignments",
"apiVersion": "2022-04-01",
"name": "48d15605-70a3-4676-bb6a-792f403786b5",
"properties": {
"principalId": "48d15605-70a3-4676-bb6a-792f403786b5",
"roleDefinitionId": "48d15605-70a3-4676-bb6a-792f403786b5",
"principalType": "ServicePrincipal",
"description": "Test role assignment for checking scope and ID."
}
}
]
}
}
}
]
}
},
"dependsOn": [
"[extensionResourceId(managementGroup().id, 'Microsoft.Resources/deployments', 'child2')]"
]
}
]
}