|
5 | 5 | "_generator": {
|
6 | 6 | "name": "bicep",
|
7 | 7 | "version": "0.4.1008.15138",
|
8 |
| - "templateHash": "10327328712553938589" |
| 8 | + "templateHash": "1113433167775496239" |
9 | 9 | }
|
10 | 10 | },
|
11 | 11 | "parameters": {
|
|
120 | 120 | "description": "If purge protection is enabled"
|
121 | 121 | }
|
122 | 122 | },
|
123 |
| - "kvIPWhitelist": { |
| 123 | + "kvIPAllowlist": { |
124 | 124 | "type": "array",
|
125 | 125 | "defaultValue": [],
|
126 | 126 | "metadata": {
|
127 |
| - "description": "Add IP to firewall whitelist" |
| 127 | + "description": "Add IP to KV firewall allow-list" |
128 | 128 | }
|
129 | 129 | },
|
130 | 130 | "kvOfficerRolePrincipalId": {
|
|
401 | 401 | },
|
402 | 402 | "functions": [],
|
403 | 403 | "variables": {
|
| 404 | + "copy": [ |
| 405 | + { |
| 406 | + "name": "kvIPRules", |
| 407 | + "count": "[length(parameters('kvIPAllowlist'))]", |
| 408 | + "input": { |
| 409 | + "value": "[parameters('kvIPAllowlist')[copyIndex('kvIPRules')]]" |
| 410 | + } |
| 411 | + } |
| 412 | + ], |
404 | 413 | "aks_byo_identity": "[or(parameters('custom_vnet'), not(empty(parameters('byoAKSSubnetId'))))]",
|
405 | 414 | "existingAksVnetRG": "[if(not(empty(parameters('byoAKSSubnetId'))), if(greater(length(split(parameters('byoAKSSubnetId'), '/')), 4), split(parameters('byoAKSSubnetId'), '/')[4], ''), '')]",
|
406 | 415 | "existingAGWSubnetName": "[if(not(empty(parameters('byoAGWSubnetId'))), if(greater(length(split(parameters('byoAGWSubnetId'), '/')), 10), split(parameters('byoAGWSubnetId'), '/')[10], ''), '')]",
|
|
532 | 541 | "family": "A",
|
533 | 542 | "name": "standard"
|
534 | 543 | },
|
535 |
| - "publicNetworkAccess": "[if(and(parameters('privateLinks'), empty(parameters('kvIPWhitelist'))), 'disabled', 'enabled')]", |
536 |
| - "networkAcls": "[if(and(parameters('privateLinks'), not(empty(parameters('kvIPWhitelist')))), createObject('bypass', 'AzureServices', 'defaultAction', 'Deny', 'ipRules', parameters('kvIPWhitelist'), 'virtualNetworkRules', createArray()), createObject())]", |
| 544 | + "publicNetworkAccess": "[if(and(parameters('privateLinks'), empty(parameters('kvIPAllowlist'))), 'disabled', 'enabled')]", |
| 545 | + "networkAcls": "[if(and(parameters('privateLinks'), not(empty(parameters('kvIPAllowlist')))), createObject('bypass', 'AzureServices', 'defaultAction', 'Deny', 'ipRules', variables('kvIPRules'), 'virtualNetworkRules', createArray()), createObject())]", |
537 | 546 | "enableRbacAuthorization": true,
|
538 | 547 | "enabledForDeployment": false,
|
539 | 548 | "enabledForDiskEncryption": false,
|
|
0 commit comments