Skip to content

Commit 5f40854

Browse files
committed
PR review comments
1 parent c65cc56 commit 5f40854

File tree

13 files changed

+8
-88
lines changed

13 files changed

+8
-88
lines changed

.azuredevops/pipelines/hub-infrastructure-dev.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ pr: none
55

66
pool:
77
name: private-pool-hub-nonlive-uks
8-
# vmImage: ubuntu-latest
98

109
resources:
1110
repositories:

infrastructure/bootstrap/environments/live/hub.bicepparam

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,4 +5,3 @@ param vnetAddressPrefixes = [
55
'10.21.0.0/16'
66
]
77
param devopsSubnetAddressPrefix = '10.21.1.0/24'
8-
//param devopsInfrastructureId = ''

infrastructure/bootstrap/environments/nonlive/hub.bicepparam

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,4 +7,3 @@ param vnetAddressPrefixes = [
77
param devopsSubnetAddressPrefix = '10.11.1.0/24'
88
param privateEndpointSubnetAddressPrefix = '10.11.2.0/24'
99
param enableSoftDelete = true
10-
// param devopsInfrastructureId = ''

infrastructure/terraform/hub/azure_monitor_private_link_scope.tf

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,6 @@ module "private_endpoint_ampls" {
2626
module.private_dns_zones["${each.key}-automation"].id,
2727
module.private_dns_zones["${each.key}-operations_data_store"].id,
2828
module.private_dns_zones["${each.key}-operations_management_suite"].id,
29-
# created in the bootstrap
30-
# module.private_dns_zones["${each.key}-storage_blob"].id
3129
]
3230
}
3331

infrastructure/terraform/hub/data.tf

Lines changed: 0 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,6 @@ data "azurerm_client_config" "current" {}
99
# display_name = var.avd_admins_group_name
1010
# }
1111

12-
# data "azuread_group" "avd_platform_users" {
13-
# display_name = "DToS-platform-team-Dev"
14-
# }
15-
1612
# This client id is the same for all Azure customers - it is not a secret.
1713
# https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/app_service_certificate
1814
# data "azuread_service_principal" "MicrosoftAzureAppService" {
@@ -22,19 +18,3 @@ data "azurerm_client_config" "current" {}
2218
# data "azuread_service_principal" "MicrosoftAzureFrontDoorCdn" {
2319
# client_id = "205478c0-bd83-4e1b-a9d6-db63a3e1e1c8"
2420
# }
25-
26-
# data "azurerm_key_vault_secret" "object-id" {
27-
# for_each = var.regions
28-
# name = "dtos-apim-object-id"
29-
# key_vault_id = module.key_vault[each.key].key_vault_id
30-
31-
# depends_on = [azurerm_key_vault_access_policy.terraform-mi]
32-
# }
33-
34-
# data "azurerm_key_vault_secret" "secret" {
35-
# for_each = var.regions
36-
# name = "dtos-apim-secret"
37-
# key_vault_id = module.key_vault[each.key].key_vault_id
38-
39-
# depends_on = [azurerm_key_vault_access_policy.terraform-mi]
40-
# }

infrastructure/terraform/hub/diagnostic_settings.tf

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,4 @@
11
locals {
2-
# APIM
3-
monitor_diagnostic_setting_apim_enabled_logs = ["GatewayLogs", "WebSocketConnectionLogs", "DeveloperPortalAuditLogs"]
4-
monitor_diagnostic_setting_apim_metrics = ["AllMetrics"]
5-
62
# FRONTDOOR
73
monitor_diagnostic_setting_frontdoor_enabled_logs = ["FrontDoorAccessLog", "FrontDoorHealthProbeLog", "FrontDoorWebApplicationFirewallLog"]
84
monitor_diagnostic_setting_frontdoor_metrics = ["AllMetrics"]

infrastructure/terraform/hub/dns_private.tf

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,6 @@ module "private_dns_resolver" {
4040

4141
locals {
4242
private_dns_zones = {
43-
# national_screening = var.dns_zone_name_private.nationalscreening
44-
# screening = var.dns_zone_name_private.screening
4543
container_registry = "privatelink.azurecr.io"
4644
app_insights = var.private_dns_zones.is_app_insights_private_dns_zone_enabled ? "privatelink.monitor.azure.com" : null
4745
automation = var.private_dns_zones.is_app_insights_private_dns_zone_enabled ? "privatelink.agentsvc.azure-automation.net" : null
@@ -52,8 +50,6 @@ locals {
5250
event_grid = var.private_dns_zones.is_event_grid_enabled_dns_zone_enabled ? "privatelink.eventgrid.azure.net" : null
5351
azure_sql = var.private_dns_zones.is_azure_sql_private_dns_zone_enabled ? "privatelink.database.windows.net" : null
5452
postgres_sql = var.private_dns_zones.is_postgres_sql_private_dns_zone_enabled ? "privatelink.postgres.database.azure.com" : null
55-
# key_vault = var.private_dns_zones.is_key_vault_private_dns_zone_enabled ? "privatelink.vaultcore.azure.net" : null
56-
# storage_blob = var.private_dns_zones.is_storage_private_dns_zone_enabled ? "privatelink.blob.core.windows.net" : null
5753
storage_queue = var.private_dns_zones.is_storage_private_dns_zone_enabled ? "privatelink.queue.core.windows.net" : null
5854
storage_table = var.private_dns_zones.is_storage_private_dns_zone_enabled ? "privatelink.table.core.windows.net" : null
5955
event_hub = var.private_dns_zones.is_event_hub_private_dns_zone_enabled ? "privatelink.servicebus.windows.net" : null

infrastructure/terraform/hub/firewall.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@ module "firewall" {
44
source = "../../../../dtos-devops-templates/infrastructure/modules/firewall"
55

66
firewall_name = module.config[each.key].names.firewall
7-
# resource_group_name = azurerm_resource_group.rg_hub[each.key].name
87
resource_group_name = var.vnet_resource_group
98
location = each.key
109

infrastructure/terraform/hub/networking_hub.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,6 @@ module "subnets_hub" {
4646
network_security_group_name = each.value.nsg_name
4747
network_security_group_nsg_rules = each.value.nsg_rules
4848
create_nsg = coalesce(each.value.create_nsg, true)
49-
# resource_group_name = azurerm_resource_group.rg_hub[each.value.vnet_key].name
5049
resource_group_name = var.vnet_resource_group
5150
vnet_name = var.vnet_name
5251
address_prefixes = [each.value.address_prefixes]

infrastructure/terraform/hub/outputs.tf

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,10 +30,6 @@ output "private_endpoint_rg_name" {
3030
value = { for k, v in azurerm_resource_group.rg_private_endpoints : k => v.name }
3131
}
3232

33-
# output "public_dns_zone_rg_name" {
34-
# value = var.dns_zone_rg_name_public
35-
# }
36-
3733
output "subnets_hub" {
3834
value = module.subnets_hub
3935
}

0 commit comments

Comments
 (0)