From 18a8b53dbaa21f683be1be1af8ca0ff1907cda0d Mon Sep 17 00:00:00 2001 From: Arnaud Lheureux Date: Wed, 21 Apr 2021 06:57:34 +0000 Subject: [PATCH 1/2] Cleanup legacy standalone example --- .../100-simple-app-gateway/standalone/ci.sh | 27 ---- .../100-simple-app-gateway/standalone/main.tf | 43 ------- .../standalone/module.tf | 16 --- .../standalone/readme.md | 26 ---- .../standalone/variables.tf | 38 ------ .../101-private-public/standalone/ci.sh | 32 ----- .../101-private-public/standalone/main.tf | 43 ------- .../101-private-public/standalone/module.tf | 16 --- .../101-private-public/standalone/readme.md | 30 ----- .../standalone/variables.tf | 36 ------ .../210-agw-with-keyvault/standalone/main.tf | 43 ------- .../standalone/module.tf | 21 ---- .../standalone/readme.md | 17 --- .../standalone/variables.tf | 78 ------------ .../100-all-attributes/standalone/ci.sh | 24 ---- .../100-all-attributes/standalone/main.tf | 43 ------- .../100-all-attributes/standalone/module.tf | 10 -- .../100-all-attributes/standalone/readme.md | 23 ---- .../standalone/variables.tf | 20 --- .../app_insights/100-simple/standalone/ci.sh | 24 ---- .../100-simple/standalone/main.tf | 43 ------- .../100-simple/standalone/module.tf | 10 -- .../100-simple/standalone/readme.md | 23 ---- .../100-simple/standalone/variables.tf | 20 --- .../standalone/ci.sh | 22 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 9 -- .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 20 --- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 15 --- .../standalone/readme.md | 25 ---- .../standalone/variables.tf | 45 ------- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 16 --- .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 48 ------- .../standalone/README.md | 25 ---- .../102-password-rotation/standalone/ci.sh | 34 ----- .../102-password-rotation/standalone/main.tf | 43 ------- .../standalone/module.tf | 15 --- .../standalone/variables.tf | 45 ------- .../201-groups-and-roles/standalone/ci.sh | 25 ---- .../201-groups-and-roles/standalone/main.tf | 43 ------- .../201-groups-and-roles/standalone/module.tf | 17 --- .../201-groups-and-roles/standalone/readme.md | 24 ---- .../standalone/variables.tf | 52 -------- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 18 --- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 36 ------ .../100-simple-acr/standalone/ci.sh | 24 ---- .../100-simple-acr/standalone/main.tf | 43 ------- .../100-simple-acr/standalone/module.tf | 11 -- .../100-simple-acr/standalone/readme.md | 23 ---- .../100-simple-acr/standalone/variables.tf | 20 --- .../200-acr-private-link/standalone/ci.sh | 24 ---- .../200-acr-private-link/standalone/main.tf | 43 ------- .../200-acr-private-link/standalone/module.tf | 17 --- .../200-acr-private-link/standalone/readme.md | 24 ---- .../standalone/variables.tf | 32 ----- .../101-single-cluster/standalone/ci.sh | 28 ----- .../101-single-cluster/standalone/main.tf | 43 ------- .../101-single-cluster/standalone/module.tf | 22 ---- .../101-single-cluster/standalone/output.tf | 14 --- .../101-single-cluster/standalone/readme.md | 29 ----- .../standalone/variables.tf | 36 ------ .../102-multi-nodepools/standalone/ci.sh | 30 ----- .../102-multi-nodepools/standalone/main.tf | 43 ------- .../102-multi-nodepools/standalone/module.tf | 22 ---- .../102-multi-nodepools/standalone/output.tf | 14 --- .../102-multi-nodepools/standalone/readme.md | 27 ---- .../standalone/variables.tf | 44 ------- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 17 --- .../standalone/readme.md | 25 ---- .../standalone/variables.tf | 32 ----- .../101-single-windows-vm/standalone/ci.sh | 24 ---- .../101-single-windows-vm/standalone/main.tf | 43 ------- .../standalone/module.tf | 33 ----- .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 112 ----------------- .../102-single-vm-data-disks/standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 33 ----- .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 112 ----------------- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 37 ------ .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 116 ----------------- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 38 ------ .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 118 ------------------ .../210-vm-bastion-winrm/standalone/ci.sh | 24 ---- .../standalone/variables.tf | 105 ---------------- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 15 --- .../standalone/readme.md | 9 -- .../standalone/variables.tf | 111 ---------------- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 15 --- .../standalone/readme.md | 9 -- .../standalone/variables.tf | 110 ---------------- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 15 --- .../standalone/readme.md | 15 --- .../standalone/variables.tf | 109 ---------------- .../100-simple-cosmos-db-sql/standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 9 -- .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 21 ---- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 15 --- .../standalone/readme.md | 8 -- .../standalone/variables.tf | 109 ---------------- .../100-simple-databricks/standalone/ci.sh | 24 ---- .../100-simple-databricks/standalone/main.tf | 43 ------- .../standalone/module.tf | 16 --- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 37 ------ .../101-datalake-storage/standalone/ci.sh | 24 ---- .../101-datalake-storage/standalone/main.tf | 43 ------- .../101-datalake-storage/standalone/module.tf | 8 -- .../101-datalake-storage/standalone/readme.md | 23 ---- .../standalone/variables.tf | 21 ---- .../standalone/ci.sh | 30 ----- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 15 --- .../standalone/readme.md | 25 ---- .../standalone/variables.tf | 28 ----- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 8 -- .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 20 --- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 11 -- .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 24 ---- .../standalone/ci.sh | 25 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 11 -- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 33 ----- .../standalone/ci.sh | 25 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 12 -- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 36 ------ .../101-keyvault-policies/standalone/ci.sh | 24 ---- .../101-keyvault-policies/standalone/main.tf | 43 ------- .../standalone/module.tf | 12 -- .../standalone/readme.md | 26 ---- .../standalone/variables.tf | 28 ----- .../102-keyvault-cert-issuer/standalone/ci.sh | 24 ---- .../standalone/main.tf | 45 ------- .../standalone/module.tf | 10 -- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 38 ------ .../machine_learning/100-aml/standalone/ci.sh | 24 ---- .../100-aml/standalone/main.tf | 43 ------- .../100-aml/standalone/module.tf | 17 --- .../100-aml/standalone/readme.md | 23 ---- .../100-aml/standalone/variables.tf | 34 ----- .../100-msi-levels/standalone/ci.sh | 24 ---- .../100-msi-levels/standalone/main.tf | 38 ------ .../100-msi-levels/standalone/module.tf | 7 -- .../100-msi-levels/standalone/readme.md | 25 ---- .../100-msi-levels/standalone/variables.tf | 19 --- .../100-simple-mariadb/standalone/ci.sh | 24 ---- .../100-simple-mariadb/standalone/main.tf | 43 ------- .../100-simple-mariadb/standalone/module.tf | 13 -- .../100-simple-mariadb/standalone/readme.md | 23 ---- .../standalone/variables.tf | 29 ----- .../101-vnet-rule-mariadb/standalone/ci.sh | 24 ---- .../101-vnet-rule-mariadb/standalone/main.tf | 43 ------- .../standalone/module.tf | 17 --- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 33 ----- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 17 --- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 33 ----- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 17 --- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 33 ----- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 11 -- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 21 ---- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 23 ---- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 56 --------- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 13 -- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 29 ----- .../100-simple-mysql/standalone/ci.sh | 24 ---- .../100-simple-mysql/standalone/main.tf | 43 ------- .../100-simple-mysql/standalone/module.tf | 17 --- .../100-simple-mysql/standalone/readme.md | 23 ---- .../100-simple-mysql/standalone/variables.tf | 33 ----- .../101-vnet-rule-mysql/standalone/ci.sh | 24 ---- .../101-vnet-rule-mysql/standalone/main.tf | 43 ------- .../101-vnet-rule-mysql/standalone/module.tf | 17 --- .../101-vnet-rule-mysql/standalone/readme.md | 23 ---- .../standalone/variables.tf | 35 ------ .../standalone/ci.sh | 25 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 17 --- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 33 ----- .../standalone/ci.sh | 25 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 17 --- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 34 ----- examples/netapp/101-nfs/standalone/main.tf | 42 ------- examples/netapp/101-nfs/standalone/module.tf | 21 ---- examples/netapp/101-nfs/standalone/output.tf | 3 - examples/netapp/101-nfs/standalone/readme.md | 12 -- .../netapp/101-nfs/standalone/variables.tf | 111 ---------------- .../100-simple-dns_zone/standalone/ci.sh | 29 ----- .../100-simple-dns_zone/standalone/main.tf | 43 ------- .../100-simple-dns_zone/standalone/module.tf | 20 --- .../100-simple-dns_zone/standalone/readme.md | 26 ---- .../standalone/variables.tf | 36 ------ .../express_routes/standalone/ci.sh | 24 ---- .../express_routes/standalone/main.tf | 43 ------- .../express_routes/standalone/module.tf | 20 --- .../express_routes/standalone/output.tf | 11 -- .../express_routes/standalone/readme.md | 16 --- .../express_routes/standalone/variables.tf | 116 ----------------- .../100-simple-front_door/standalone/ci.sh | 40 ------ .../100-simple-front_door/standalone/main.tf | 43 ------- .../standalone/module.tf | 24 ---- .../standalone/readme.md | 32 ----- .../standalone/variables.tf | 68 ---------- .../101-front_door_waf/standalone/ci.sh | 25 ---- .../101-front_door_waf/standalone/main.tf | 43 ------- .../101-front_door_waf/standalone/module.tf | 14 --- .../101-front_door_waf/standalone/readme.md | 24 ---- .../standalone/variables.tf | 28 ----- .../100-simple-ip_group/standalone/ci.sh | 25 ---- .../100-simple-ip_group/standalone/main.tf | 43 ------- .../100-simple-ip_group/standalone/module.tf | 14 --- .../100-simple-ip_group/standalone/readme.md | 22 ---- .../standalone/variables.tf | 32 ----- .../101-firewall-ip_group/standalone/ci.sh | 23 ---- .../101-firewall-ip_group/standalone/main.tf | 43 ------- .../standalone/module.tf | 18 --- .../standalone/readme.md | 22 ---- .../standalone/variables.tf | 44 ------- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 12 -- .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 32 ----- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 14 --- .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 40 ------ .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 14 --- .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 43 ------- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 19 --- .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 51 -------- .../standalone/ci.sh | 24 ---- .../standalone/configuration.auto.tfvars | 83 ------------ .../standalone/main.tf | 43 ------- .../standalone/module.tf | 12 -- .../standalone/readme.md | 37 ------ .../standalone/variables.tf | 30 ----- .../endpoints/centralized/standalone/ci.sh | 37 ------ .../endpoints/centralized/standalone/main.tf | 43 ------- .../centralized/standalone/module.tf | 33 ----- .../standalone/private_endpoints.tfvars | 46 ------- .../centralized/standalone/readme.md | 31 ----- .../centralized/standalone/variables.tf | 115 ----------------- .../standalone/ci.sh | 30 ----- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 14 --- .../standalone/readme.md | 26 ---- .../standalone/variables.tf | 39 ------ .../100-subnet-delegation/standalone/ci.sh | 24 ---- .../100-subnet-delegation/standalone/main.tf | 43 ------- .../standalone/module.tf | 14 --- .../standalone/readme.md | 22 ---- .../standalone/variables.tf | 39 ------ .../101-vnet-peering-nsg/standalone/ci.sh | 24 ---- .../101-vnet-peering-nsg/standalone/main.tf | 43 ------- .../101-vnet-peering-nsg/standalone/module.tf | 15 --- .../101-vnet-peering-nsg/standalone/readme.md | 26 ---- .../standalone/variables.tf | 42 ------- .../200-nsg-flow-logs/standalone/ci.sh | 24 ---- .../200-nsg-flow-logs/standalone/main.tf | 43 ------- .../200-nsg-flow-logs/standalone/module.tf | 15 --- .../200-nsg-flow-logs/standalone/readme.md | 26 ---- .../200-nsg-flow-logs/standalone/variables.tf | 42 ------- .../100-expressroute-gateway/standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 12 -- .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 30 ----- .../101-vpn-site-to-site/standalone/ci.sh | 24 ---- .../101-vpn-site-to-site/standalone/main.tf | 43 ------- .../101-vpn-site-to-site/standalone/module.tf | 12 -- .../101-vpn-site-to-site/standalone/readme.md | 24 ---- .../standalone/variables.tf | 30 ----- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 12 -- .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 30 ----- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 15 --- .../standalone/readme.md | 24 ---- .../standalone/variables.tf | 37 ------ .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 17 --- .../standalone/readme.md | 27 ---- .../standalone/variables.tf | 45 ------- .../standalone/variables.tf | 23 ---- .../100-simple-postgresql/standalone/ci.sh | 24 ---- .../100-simple-postgresql/standalone/main.tf | 43 ------- .../standalone/module.tf | 17 --- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 33 ----- .../101-vnet-rule-postgresql/standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 17 --- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 33 ----- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 17 --- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 33 ----- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 18 --- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 36 ------ .../101-simple-asrv/standalone/ci.sh | 24 ---- .../101-simple-asrv/standalone/main.tf | 43 ------- .../101-simple-asrv/standalone/module.tf | 11 -- .../101-simple-asrv/standalone/readme.md | 23 ---- .../101-simple-asrv/standalone/variables.tf | 23 ---- .../102-asr-protection/standalone/ci.sh | 24 ---- .../102-asr-protection/standalone/main.tf | 43 ------- .../102-asr-protection/standalone/module.tf | 11 -- .../102-asr-protection/standalone/readme.md | 23 ---- .../standalone/variables.tf | 24 ---- .../standalone/ci.sh | 32 ----- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 17 --- .../standalone/readme.md | 27 ---- .../standalone/variables.tf | 33 ----- .../100-redis-standard/standalone/ci.sh | 24 ---- .../100-redis-standard/standalone/main.tf | 43 ------- .../100-redis-standard/standalone/module.tf | 11 -- .../100-redis-standard/standalone/readme.md | 23 ---- .../standalone/variables.tf | 24 ---- .../standalone/ci.sh | 26 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 17 --- .../standalone/readme.md | 25 ---- .../standalone/variables.tf | 25 ---- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 9 -- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 21 ---- .../100-synapse/standalone/ci.sh | 24 ---- .../100-synapse/standalone/main.tf | 43 ------- .../100-synapse/standalone/module.tf | 16 --- .../100-synapse/standalone/readme.md | 23 ---- .../100-synapse/standalone/variables.tf | 32 ----- .../101-synapse-sparkpool/standalone/ci.sh | 24 ---- .../101-synapse-sparkpool/standalone/main.tf | 43 ------- .../standalone/module.tf | 16 --- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 32 ----- .../101-appservice-simple/standalone/ci.sh | 24 ---- .../101-appservice-simple/standalone/main.tf | 43 ------- .../standalone/module.tf | 12 -- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 24 ---- .../102-appservice-slots/standalone/ci.sh | 24 ---- .../102-appservice-slots/standalone/main.tf | 43 ------- .../102-appservice-slots/standalone/module.tf | 12 -- .../102-appservice-slots/standalone/readme.md | 23 ---- .../standalone/variables.tf | 24 ---- .../103-appservice-extend/standalone/ci.sh | 24 ---- .../103-appservice-extend/standalone/main.tf | 43 ------- .../standalone/module.tf | 12 -- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 25 ---- .../standalone/ci.sh | 24 ---- .../standalone/main.tf | 43 ------- .../standalone/module.tf | 13 -- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 29 ----- .../105-appservice-backup/standalone/ci.sh | 24 ---- .../105-appservice-backup/standalone/main.tf | 43 ------- .../standalone/module.tf | 13 -- .../standalone/readme.md | 23 ---- .../standalone/variables.tf | 28 ----- 436 files changed, 13240 deletions(-) delete mode 100755 examples/app_gateway/100-simple-app-gateway/standalone/ci.sh delete mode 100644 examples/app_gateway/100-simple-app-gateway/standalone/main.tf delete mode 100644 examples/app_gateway/100-simple-app-gateway/standalone/module.tf delete mode 100644 examples/app_gateway/100-simple-app-gateway/standalone/readme.md delete mode 100755 examples/app_gateway/100-simple-app-gateway/standalone/variables.tf delete mode 100755 examples/app_gateway/101-private-public/standalone/ci.sh delete mode 100644 examples/app_gateway/101-private-public/standalone/main.tf delete mode 100644 examples/app_gateway/101-private-public/standalone/module.tf delete mode 100644 examples/app_gateway/101-private-public/standalone/readme.md delete mode 100755 examples/app_gateway/101-private-public/standalone/variables.tf delete mode 100644 examples/app_gateway/210-agw-with-keyvault/standalone/main.tf delete mode 100644 examples/app_gateway/210-agw-with-keyvault/standalone/module.tf delete mode 100644 examples/app_gateway/210-agw-with-keyvault/standalone/readme.md delete mode 100755 examples/app_gateway/210-agw-with-keyvault/standalone/variables.tf delete mode 100755 examples/app_insights/100-all-attributes/standalone/ci.sh delete mode 100644 examples/app_insights/100-all-attributes/standalone/main.tf delete mode 100644 examples/app_insights/100-all-attributes/standalone/module.tf delete mode 100644 examples/app_insights/100-all-attributes/standalone/readme.md delete mode 100755 examples/app_insights/100-all-attributes/standalone/variables.tf delete mode 100755 examples/app_insights/100-simple/standalone/ci.sh delete mode 100644 examples/app_insights/100-simple/standalone/main.tf delete mode 100644 examples/app_insights/100-simple/standalone/module.tf delete mode 100644 examples/app_insights/100-simple/standalone/readme.md delete mode 100755 examples/app_insights/100-simple/standalone/variables.tf delete mode 100755 examples/automation/100-simple-automation-account/standalone/ci.sh delete mode 100644 examples/automation/100-simple-automation-account/standalone/main.tf delete mode 100644 examples/automation/100-simple-automation-account/standalone/module.tf delete mode 100644 examples/automation/100-simple-automation-account/standalone/readme.md delete mode 100755 examples/automation/100-simple-automation-account/standalone/variables.tf delete mode 100755 examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/ci.sh delete mode 100644 examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/main.tf delete mode 100644 examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/module.tf delete mode 100644 examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/readme.md delete mode 100755 examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/variables.tf delete mode 100755 examples/azure_ad/101-service-principle-with-custom-roles/standalone/ci.sh delete mode 100644 examples/azure_ad/101-service-principle-with-custom-roles/standalone/main.tf delete mode 100644 examples/azure_ad/101-service-principle-with-custom-roles/standalone/module.tf delete mode 100644 examples/azure_ad/101-service-principle-with-custom-roles/standalone/readme.md delete mode 100755 examples/azure_ad/101-service-principle-with-custom-roles/standalone/variables.tf delete mode 100644 examples/azure_ad/102-password-rotation/standalone/README.md delete mode 100755 examples/azure_ad/102-password-rotation/standalone/ci.sh delete mode 100644 examples/azure_ad/102-password-rotation/standalone/main.tf delete mode 100644 examples/azure_ad/102-password-rotation/standalone/module.tf delete mode 100755 examples/azure_ad/102-password-rotation/standalone/variables.tf delete mode 100644 examples/azure_ad/201-groups-and-roles/standalone/ci.sh delete mode 100644 examples/azure_ad/201-groups-and-roles/standalone/main.tf delete mode 100644 examples/azure_ad/201-groups-and-roles/standalone/module.tf delete mode 100644 examples/azure_ad/201-groups-and-roles/standalone/readme.md delete mode 100755 examples/azure_ad/201-groups-and-roles/standalone/variables.tf delete mode 100755 examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/ci.sh delete mode 100644 examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/main.tf delete mode 100644 examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/module.tf delete mode 100644 examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/readme.md delete mode 100755 examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/variables.tf delete mode 100755 examples/compute/container_registry/100-simple-acr/standalone/ci.sh delete mode 100644 examples/compute/container_registry/100-simple-acr/standalone/main.tf delete mode 100644 examples/compute/container_registry/100-simple-acr/standalone/module.tf delete mode 100644 examples/compute/container_registry/100-simple-acr/standalone/readme.md delete mode 100755 examples/compute/container_registry/100-simple-acr/standalone/variables.tf delete mode 100755 examples/compute/container_registry/200-acr-private-link/standalone/ci.sh delete mode 100644 examples/compute/container_registry/200-acr-private-link/standalone/main.tf delete mode 100644 examples/compute/container_registry/200-acr-private-link/standalone/module.tf delete mode 100644 examples/compute/container_registry/200-acr-private-link/standalone/readme.md delete mode 100755 examples/compute/container_registry/200-acr-private-link/standalone/variables.tf delete mode 100755 examples/compute/kubernetes_services/101-single-cluster/standalone/ci.sh delete mode 100644 examples/compute/kubernetes_services/101-single-cluster/standalone/main.tf delete mode 100644 examples/compute/kubernetes_services/101-single-cluster/standalone/module.tf delete mode 100755 examples/compute/kubernetes_services/101-single-cluster/standalone/output.tf delete mode 100644 examples/compute/kubernetes_services/101-single-cluster/standalone/readme.md delete mode 100755 examples/compute/kubernetes_services/101-single-cluster/standalone/variables.tf delete mode 100755 examples/compute/kubernetes_services/102-multi-nodepools/standalone/ci.sh delete mode 100644 examples/compute/kubernetes_services/102-multi-nodepools/standalone/main.tf delete mode 100644 examples/compute/kubernetes_services/102-multi-nodepools/standalone/module.tf delete mode 100755 examples/compute/kubernetes_services/102-multi-nodepools/standalone/output.tf delete mode 100644 examples/compute/kubernetes_services/102-multi-nodepools/standalone/readme.md delete mode 100755 examples/compute/kubernetes_services/102-multi-nodepools/standalone/variables.tf delete mode 100755 examples/compute/proximity_placement_group/standalone/ci.sh delete mode 100644 examples/compute/proximity_placement_group/standalone/main.tf delete mode 100644 examples/compute/proximity_placement_group/standalone/module.tf delete mode 100644 examples/compute/proximity_placement_group/standalone/readme.md delete mode 100755 examples/compute/proximity_placement_group/standalone/variables.tf delete mode 100755 examples/compute/virtual_machine/101-single-windows-vm/standalone/ci.sh delete mode 100644 examples/compute/virtual_machine/101-single-windows-vm/standalone/main.tf delete mode 100644 examples/compute/virtual_machine/101-single-windows-vm/standalone/module.tf delete mode 100755 examples/compute/virtual_machine/101-single-windows-vm/standalone/readme.md delete mode 100755 examples/compute/virtual_machine/101-single-windows-vm/standalone/variables.tf delete mode 100755 examples/compute/virtual_machine/102-single-vm-data-disks/standalone/ci.sh delete mode 100644 examples/compute/virtual_machine/102-single-vm-data-disks/standalone/main.tf delete mode 100644 examples/compute/virtual_machine/102-single-vm-data-disks/standalone/module.tf delete mode 100755 examples/compute/virtual_machine/102-single-vm-data-disks/standalone/readme.md delete mode 100755 examples/compute/virtual_machine/102-single-vm-data-disks/standalone/variables.tf delete mode 100755 examples/compute/virtual_machine/104-single-windows-backup/standalone/ci.sh delete mode 100644 examples/compute/virtual_machine/104-single-windows-backup/standalone/main.tf delete mode 100644 examples/compute/virtual_machine/104-single-windows-backup/standalone/module.tf delete mode 100755 examples/compute/virtual_machine/104-single-windows-backup/standalone/readme.md delete mode 100755 examples/compute/virtual_machine/104-single-windows-backup/standalone/variables.tf delete mode 100755 examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/ci.sh delete mode 100755 examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/main.tf delete mode 100755 examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/module.tf delete mode 100644 examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/readme.md delete mode 100755 examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/variables.tf delete mode 100755 examples/compute/virtual_machine/210-vm-bastion-winrm/standalone/ci.sh delete mode 100755 examples/compute/virtual_machine/210-vm-bastion-winrm/standalone/variables.tf delete mode 100755 examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/ci.sh delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/main.tf delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/module.tf delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/readme.md delete mode 100755 examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/variables.tf delete mode 100755 examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/ci.sh delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/main.tf delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/module.tf delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/readme.md delete mode 100755 examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/variables.tf delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/main.tf delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/module.tf delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/readme.md delete mode 100755 examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/variables.tf delete mode 100755 examples/cosmos_db/100-simple-cosmos-db-sql/standalone/ci.sh delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-sql/standalone/main.tf delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-sql/standalone/module.tf delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-sql/standalone/readme.md delete mode 100755 examples/cosmos_db/100-simple-cosmos-db-sql/standalone/variables.tf delete mode 100755 examples/cosmos_db/100-simple-cosmos-db-table/standalone/ci.sh delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-table/standalone/main.tf delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-table/standalone/module.tf delete mode 100644 examples/cosmos_db/100-simple-cosmos-db-table/standalone/readme.md delete mode 100755 examples/cosmos_db/100-simple-cosmos-db-table/standalone/variables.tf delete mode 100755 examples/databricks/100-simple-databricks/standalone/ci.sh delete mode 100644 examples/databricks/100-simple-databricks/standalone/main.tf delete mode 100644 examples/databricks/100-simple-databricks/standalone/module.tf delete mode 100644 examples/databricks/100-simple-databricks/standalone/readme.md delete mode 100755 examples/databricks/100-simple-databricks/standalone/variables.tf delete mode 100755 examples/datalake/101-datalake-storage/standalone/ci.sh delete mode 100644 examples/datalake/101-datalake-storage/standalone/main.tf delete mode 100644 examples/datalake/101-datalake-storage/standalone/module.tf delete mode 100644 examples/datalake/101-datalake-storage/standalone/readme.md delete mode 100755 examples/datalake/101-datalake-storage/standalone/variables.tf delete mode 100755 examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/ci.sh delete mode 100755 examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/main.tf delete mode 100755 examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/module.tf delete mode 100755 examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/readme.md delete mode 100755 examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/variables.tf delete mode 100755 examples/eventhub/100-simple-eventhub-namespace/standalone/ci.sh delete mode 100644 examples/eventhub/100-simple-eventhub-namespace/standalone/main.tf delete mode 100644 examples/eventhub/100-simple-eventhub-namespace/standalone/module.tf delete mode 100644 examples/eventhub/100-simple-eventhub-namespace/standalone/readme.md delete mode 100755 examples/eventhub/100-simple-eventhub-namespace/standalone/variables.tf delete mode 100755 examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/ci.sh delete mode 100644 examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/main.tf delete mode 100644 examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/module.tf delete mode 100644 examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/readme.md delete mode 100755 examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/variables.tf delete mode 100755 examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/ci.sh delete mode 100644 examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/main.tf delete mode 100644 examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/module.tf delete mode 100755 examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/readme.md delete mode 100755 examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/variables.tf delete mode 100755 examples/eventhub/103-eventhub-consumer-groups/standalone/ci.sh delete mode 100644 examples/eventhub/103-eventhub-consumer-groups/standalone/main.tf delete mode 100644 examples/eventhub/103-eventhub-consumer-groups/standalone/module.tf delete mode 100755 examples/eventhub/103-eventhub-consumer-groups/standalone/readme.md delete mode 100755 examples/eventhub/103-eventhub-consumer-groups/standalone/variables.tf delete mode 100755 examples/keyvault/101-keyvault-policies/standalone/ci.sh delete mode 100644 examples/keyvault/101-keyvault-policies/standalone/main.tf delete mode 100644 examples/keyvault/101-keyvault-policies/standalone/module.tf delete mode 100644 examples/keyvault/101-keyvault-policies/standalone/readme.md delete mode 100755 examples/keyvault/101-keyvault-policies/standalone/variables.tf delete mode 100755 examples/keyvault/102-keyvault-cert-issuer/standalone/ci.sh delete mode 100644 examples/keyvault/102-keyvault-cert-issuer/standalone/main.tf delete mode 100644 examples/keyvault/102-keyvault-cert-issuer/standalone/module.tf delete mode 100644 examples/keyvault/102-keyvault-cert-issuer/standalone/readme.md delete mode 100755 examples/keyvault/102-keyvault-cert-issuer/standalone/variables.tf delete mode 100755 examples/machine_learning/100-aml/standalone/ci.sh delete mode 100644 examples/machine_learning/100-aml/standalone/main.tf delete mode 100644 examples/machine_learning/100-aml/standalone/module.tf delete mode 100644 examples/machine_learning/100-aml/standalone/readme.md delete mode 100755 examples/machine_learning/100-aml/standalone/variables.tf delete mode 100755 examples/managed_service_identity/100-msi-levels/standalone/ci.sh delete mode 100644 examples/managed_service_identity/100-msi-levels/standalone/main.tf delete mode 100644 examples/managed_service_identity/100-msi-levels/standalone/module.tf delete mode 100644 examples/managed_service_identity/100-msi-levels/standalone/readme.md delete mode 100755 examples/managed_service_identity/100-msi-levels/standalone/variables.tf delete mode 100755 examples/mariadb_server/100-simple-mariadb/standalone/ci.sh delete mode 100644 examples/mariadb_server/100-simple-mariadb/standalone/main.tf delete mode 100644 examples/mariadb_server/100-simple-mariadb/standalone/module.tf delete mode 100644 examples/mariadb_server/100-simple-mariadb/standalone/readme.md delete mode 100755 examples/mariadb_server/100-simple-mariadb/standalone/variables.tf delete mode 100755 examples/mariadb_server/101-vnet-rule-mariadb/standalone/ci.sh delete mode 100644 examples/mariadb_server/101-vnet-rule-mariadb/standalone/main.tf delete mode 100644 examples/mariadb_server/101-vnet-rule-mariadb/standalone/module.tf delete mode 100644 examples/mariadb_server/101-vnet-rule-mariadb/standalone/readme.md delete mode 100755 examples/mariadb_server/101-vnet-rule-mariadb/standalone/variables.tf delete mode 100755 examples/mariadb_server/102-private-endpoint-mariadb/standalone/ci.sh delete mode 100644 examples/mariadb_server/102-private-endpoint-mariadb/standalone/main.tf delete mode 100644 examples/mariadb_server/102-private-endpoint-mariadb/standalone/module.tf delete mode 100644 examples/mariadb_server/102-private-endpoint-mariadb/standalone/readme.md delete mode 100755 examples/mariadb_server/102-private-endpoint-mariadb/standalone/variables.tf delete mode 100755 examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/ci.sh delete mode 100644 examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/main.tf delete mode 100644 examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/module.tf delete mode 100644 examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/readme.md delete mode 100755 examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/variables.tf delete mode 100755 examples/monitoring/100-service-health-alerts/standalone/ci.sh delete mode 100644 examples/monitoring/100-service-health-alerts/standalone/main.tf delete mode 100644 examples/monitoring/100-service-health-alerts/standalone/module.tf delete mode 100644 examples/monitoring/100-service-health-alerts/standalone/readme.md delete mode 100755 examples/monitoring/100-service-health-alerts/standalone/variables.tf delete mode 100755 examples/mssql_server/104-sqlserver-elastic_pools/standalone/ci.sh delete mode 100644 examples/mssql_server/104-sqlserver-elastic_pools/standalone/main.tf delete mode 100644 examples/mssql_server/104-sqlserver-elastic_pools/standalone/module.tf delete mode 100644 examples/mssql_server/104-sqlserver-elastic_pools/standalone/readme.md delete mode 100755 examples/mssql_server/104-sqlserver-elastic_pools/standalone/variables.tf delete mode 100755 examples/mssql_server/105-sqlserver-failover_groups/standalone/ci.sh delete mode 100644 examples/mssql_server/105-sqlserver-failover_groups/standalone/main.tf delete mode 100644 examples/mssql_server/105-sqlserver-failover_groups/standalone/module.tf delete mode 100644 examples/mssql_server/105-sqlserver-failover_groups/standalone/readme.md delete mode 100755 examples/mssql_server/105-sqlserver-failover_groups/standalone/variables.tf delete mode 100755 examples/mysql_server/100-simple-mysql/standalone/ci.sh delete mode 100644 examples/mysql_server/100-simple-mysql/standalone/main.tf delete mode 100644 examples/mysql_server/100-simple-mysql/standalone/module.tf delete mode 100644 examples/mysql_server/100-simple-mysql/standalone/readme.md delete mode 100755 examples/mysql_server/100-simple-mysql/standalone/variables.tf delete mode 100755 examples/mysql_server/101-vnet-rule-mysql/standalone/ci.sh delete mode 100644 examples/mysql_server/101-vnet-rule-mysql/standalone/main.tf delete mode 100644 examples/mysql_server/101-vnet-rule-mysql/standalone/module.tf delete mode 100644 examples/mysql_server/101-vnet-rule-mysql/standalone/readme.md delete mode 100755 examples/mysql_server/101-vnet-rule-mysql/standalone/variables.tf delete mode 100755 examples/mysql_server/102-private-endpoint-mysql/standalone/ci.sh delete mode 100644 examples/mysql_server/102-private-endpoint-mysql/standalone/main.tf delete mode 100644 examples/mysql_server/102-private-endpoint-mysql/standalone/module.tf delete mode 100644 examples/mysql_server/102-private-endpoint-mysql/standalone/readme.md delete mode 100755 examples/mysql_server/102-private-endpoint-mysql/standalone/variables.tf delete mode 100755 examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/ci.sh delete mode 100644 examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/main.tf delete mode 100644 examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/module.tf delete mode 100644 examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/readme.md delete mode 100755 examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/variables.tf delete mode 100644 examples/netapp/101-nfs/standalone/main.tf delete mode 100644 examples/netapp/101-nfs/standalone/module.tf delete mode 100755 examples/netapp/101-nfs/standalone/output.tf delete mode 100644 examples/netapp/101-nfs/standalone/readme.md delete mode 100755 examples/netapp/101-nfs/standalone/variables.tf delete mode 100755 examples/networking/dns_zones/100-simple-dns_zone/standalone/ci.sh delete mode 100644 examples/networking/dns_zones/100-simple-dns_zone/standalone/main.tf delete mode 100755 examples/networking/dns_zones/100-simple-dns_zone/standalone/module.tf delete mode 100644 examples/networking/dns_zones/100-simple-dns_zone/standalone/readme.md delete mode 100755 examples/networking/dns_zones/100-simple-dns_zone/standalone/variables.tf delete mode 100755 examples/networking/express_routes/standalone/ci.sh delete mode 100644 examples/networking/express_routes/standalone/main.tf delete mode 100644 examples/networking/express_routes/standalone/module.tf delete mode 100755 examples/networking/express_routes/standalone/output.tf delete mode 100644 examples/networking/express_routes/standalone/readme.md delete mode 100755 examples/networking/express_routes/standalone/variables.tf delete mode 100755 examples/networking/front_door/100-simple-front_door/standalone/ci.sh delete mode 100644 examples/networking/front_door/100-simple-front_door/standalone/main.tf delete mode 100644 examples/networking/front_door/100-simple-front_door/standalone/module.tf delete mode 100644 examples/networking/front_door/100-simple-front_door/standalone/readme.md delete mode 100755 examples/networking/front_door/100-simple-front_door/standalone/variables.tf delete mode 100755 examples/networking/front_door/101-front_door_waf/standalone/ci.sh delete mode 100644 examples/networking/front_door/101-front_door_waf/standalone/main.tf delete mode 100644 examples/networking/front_door/101-front_door_waf/standalone/module.tf delete mode 100644 examples/networking/front_door/101-front_door_waf/standalone/readme.md delete mode 100755 examples/networking/front_door/101-front_door_waf/standalone/variables.tf delete mode 100755 examples/networking/ip_group/100-simple-ip_group/standalone/ci.sh delete mode 100644 examples/networking/ip_group/100-simple-ip_group/standalone/main.tf delete mode 100644 examples/networking/ip_group/100-simple-ip_group/standalone/module.tf delete mode 100644 examples/networking/ip_group/100-simple-ip_group/standalone/readme.md delete mode 100644 examples/networking/ip_group/100-simple-ip_group/standalone/variables.tf delete mode 100755 examples/networking/ip_group/101-firewall-ip_group/standalone/ci.sh delete mode 100644 examples/networking/ip_group/101-firewall-ip_group/standalone/main.tf delete mode 100644 examples/networking/ip_group/101-firewall-ip_group/standalone/module.tf delete mode 100644 examples/networking/ip_group/101-firewall-ip_group/standalone/readme.md delete mode 100644 examples/networking/ip_group/101-firewall-ip_group/standalone/variables.tf delete mode 100755 examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/ci.sh delete mode 100644 examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/main.tf delete mode 100644 examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/module.tf delete mode 100644 examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/readme.md delete mode 100755 examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/variables.tf delete mode 100755 examples/networking/load_balancers/101-load-balancer-with-rules/standalone/ci.sh delete mode 100644 examples/networking/load_balancers/101-load-balancer-with-rules/standalone/main.tf delete mode 100644 examples/networking/load_balancers/101-load-balancer-with-rules/standalone/module.tf delete mode 100644 examples/networking/load_balancers/101-load-balancer-with-rules/standalone/readme.md delete mode 100755 examples/networking/load_balancers/101-load-balancer-with-rules/standalone/variables.tf delete mode 100755 examples/networking/load_balancers/102-internal-load-balancer/standalone/ci.sh delete mode 100644 examples/networking/load_balancers/102-internal-load-balancer/standalone/main.tf delete mode 100644 examples/networking/load_balancers/102-internal-load-balancer/standalone/module.tf delete mode 100644 examples/networking/load_balancers/102-internal-load-balancer/standalone/readme.md delete mode 100755 examples/networking/load_balancers/102-internal-load-balancer/standalone/variables.tf delete mode 100755 examples/networking/load_balancers/103-load-balancer-nic-association/standalone/ci.sh delete mode 100644 examples/networking/load_balancers/103-load-balancer-nic-association/standalone/main.tf delete mode 100644 examples/networking/load_balancers/103-load-balancer-nic-association/standalone/module.tf delete mode 100644 examples/networking/load_balancers/103-load-balancer-nic-association/standalone/readme.md delete mode 100755 examples/networking/load_balancers/103-load-balancer-nic-association/standalone/variables.tf delete mode 100755 examples/networking/private_dns/100-private-dns-vnet-links/standalone/ci.sh delete mode 100644 examples/networking/private_dns/100-private-dns-vnet-links/standalone/configuration.auto.tfvars delete mode 100644 examples/networking/private_dns/100-private-dns-vnet-links/standalone/main.tf delete mode 100644 examples/networking/private_dns/100-private-dns-vnet-links/standalone/module.tf delete mode 100644 examples/networking/private_dns/100-private-dns-vnet-links/standalone/readme.md delete mode 100755 examples/networking/private_dns/100-private-dns-vnet-links/standalone/variables.tf delete mode 100755 examples/networking/private_links/endpoints/centralized/standalone/ci.sh delete mode 100644 examples/networking/private_links/endpoints/centralized/standalone/main.tf delete mode 100755 examples/networking/private_links/endpoints/centralized/standalone/module.tf delete mode 100644 examples/networking/private_links/endpoints/centralized/standalone/private_endpoints.tfvars delete mode 100644 examples/networking/private_links/endpoints/centralized/standalone/readme.md delete mode 100755 examples/networking/private_links/endpoints/centralized/standalone/variables.tf delete mode 100755 examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/ci.sh delete mode 100644 examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/main.tf delete mode 100644 examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/module.tf delete mode 100644 examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/readme.md delete mode 100755 examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/variables.tf delete mode 100755 examples/networking/virtual_network/100-subnet-delegation/standalone/ci.sh delete mode 100644 examples/networking/virtual_network/100-subnet-delegation/standalone/main.tf delete mode 100644 examples/networking/virtual_network/100-subnet-delegation/standalone/module.tf delete mode 100644 examples/networking/virtual_network/100-subnet-delegation/standalone/readme.md delete mode 100755 examples/networking/virtual_network/100-subnet-delegation/standalone/variables.tf delete mode 100755 examples/networking/virtual_network/101-vnet-peering-nsg/standalone/ci.sh delete mode 100644 examples/networking/virtual_network/101-vnet-peering-nsg/standalone/main.tf delete mode 100644 examples/networking/virtual_network/101-vnet-peering-nsg/standalone/module.tf delete mode 100644 examples/networking/virtual_network/101-vnet-peering-nsg/standalone/readme.md delete mode 100755 examples/networking/virtual_network/101-vnet-peering-nsg/standalone/variables.tf delete mode 100755 examples/networking/virtual_network/200-nsg-flow-logs/standalone/ci.sh delete mode 100644 examples/networking/virtual_network/200-nsg-flow-logs/standalone/main.tf delete mode 100644 examples/networking/virtual_network/200-nsg-flow-logs/standalone/module.tf delete mode 100644 examples/networking/virtual_network/200-nsg-flow-logs/standalone/readme.md delete mode 100755 examples/networking/virtual_network/200-nsg-flow-logs/standalone/variables.tf delete mode 100755 examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/ci.sh delete mode 100644 examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/main.tf delete mode 100644 examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/module.tf delete mode 100644 examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/readme.md delete mode 100755 examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/variables.tf delete mode 100755 examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/ci.sh delete mode 100644 examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/main.tf delete mode 100644 examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/module.tf delete mode 100644 examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/readme.md delete mode 100755 examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/variables.tf delete mode 100755 examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/ci.sh delete mode 100644 examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/main.tf delete mode 100644 examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/module.tf delete mode 100644 examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/readme.md delete mode 100755 examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/variables.tf delete mode 100755 examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/ci.sh delete mode 100644 examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/main.tf delete mode 100644 examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/module.tf delete mode 100644 examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/readme.md delete mode 100755 examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/variables.tf delete mode 100755 examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/ci.sh delete mode 100644 examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/main.tf delete mode 100644 examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/module.tf delete mode 100644 examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/readme.md delete mode 100755 examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/variables.tf delete mode 100755 examples/networking/virtual_wan/100-vwan-multi-hubs/standalone/variables.tf delete mode 100755 examples/postgresql_server/100-simple-postgresql/standalone/ci.sh delete mode 100644 examples/postgresql_server/100-simple-postgresql/standalone/main.tf delete mode 100644 examples/postgresql_server/100-simple-postgresql/standalone/module.tf delete mode 100644 examples/postgresql_server/100-simple-postgresql/standalone/readme.md delete mode 100755 examples/postgresql_server/100-simple-postgresql/standalone/variables.tf delete mode 100755 examples/postgresql_server/101-vnet-rule-postgresql/standalone/ci.sh delete mode 100644 examples/postgresql_server/101-vnet-rule-postgresql/standalone/main.tf delete mode 100644 examples/postgresql_server/101-vnet-rule-postgresql/standalone/module.tf delete mode 100644 examples/postgresql_server/101-vnet-rule-postgresql/standalone/readme.md delete mode 100755 examples/postgresql_server/101-vnet-rule-postgresql/standalone/variables.tf delete mode 100755 examples/postgresql_server/102-private-endpoint-postgresql/standalone/ci.sh delete mode 100644 examples/postgresql_server/102-private-endpoint-postgresql/standalone/main.tf delete mode 100644 examples/postgresql_server/102-private-endpoint-postgresql/standalone/module.tf delete mode 100644 examples/postgresql_server/102-private-endpoint-postgresql/standalone/readme.md delete mode 100755 examples/postgresql_server/102-private-endpoint-postgresql/standalone/variables.tf delete mode 100755 examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/ci.sh delete mode 100644 examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/main.tf delete mode 100644 examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/module.tf delete mode 100644 examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/readme.md delete mode 100755 examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/variables.tf delete mode 100755 examples/recovery_vault/101-simple-asrv/standalone/ci.sh delete mode 100644 examples/recovery_vault/101-simple-asrv/standalone/main.tf delete mode 100644 examples/recovery_vault/101-simple-asrv/standalone/module.tf delete mode 100644 examples/recovery_vault/101-simple-asrv/standalone/readme.md delete mode 100755 examples/recovery_vault/101-simple-asrv/standalone/variables.tf delete mode 100755 examples/recovery_vault/102-asr-protection/standalone/ci.sh delete mode 100644 examples/recovery_vault/102-asr-protection/standalone/main.tf delete mode 100644 examples/recovery_vault/102-asr-protection/standalone/module.tf delete mode 100644 examples/recovery_vault/102-asr-protection/standalone/readme.md delete mode 100755 examples/recovery_vault/102-asr-protection/standalone/variables.tf delete mode 100755 examples/recovery_vault/103-asr-with-private-endpoint/standalone/ci.sh delete mode 100644 examples/recovery_vault/103-asr-with-private-endpoint/standalone/main.tf delete mode 100644 examples/recovery_vault/103-asr-with-private-endpoint/standalone/module.tf delete mode 100644 examples/recovery_vault/103-asr-with-private-endpoint/standalone/readme.md delete mode 100755 examples/recovery_vault/103-asr-with-private-endpoint/standalone/variables.tf delete mode 100755 examples/redis_cache/100-redis-standard/standalone/ci.sh delete mode 100644 examples/redis_cache/100-redis-standard/standalone/main.tf delete mode 100644 examples/redis_cache/100-redis-standard/standalone/module.tf delete mode 100644 examples/redis_cache/100-redis-standard/standalone/readme.md delete mode 100755 examples/redis_cache/100-redis-standard/standalone/variables.tf delete mode 100755 examples/storage_accounts/100-simple-storage-account-blob-container/standalone/ci.sh delete mode 100644 examples/storage_accounts/100-simple-storage-account-blob-container/standalone/main.tf delete mode 100755 examples/storage_accounts/100-simple-storage-account-blob-container/standalone/module.tf delete mode 100644 examples/storage_accounts/100-simple-storage-account-blob-container/standalone/readme.md delete mode 100755 examples/storage_accounts/100-simple-storage-account-blob-container/standalone/variables.tf delete mode 100755 examples/storage_accounts/102-storage-account-advanced-options/standalone/ci.sh delete mode 100644 examples/storage_accounts/102-storage-account-advanced-options/standalone/main.tf delete mode 100755 examples/storage_accounts/102-storage-account-advanced-options/standalone/module.tf delete mode 100644 examples/storage_accounts/102-storage-account-advanced-options/standalone/readme.md delete mode 100755 examples/storage_accounts/102-storage-account-advanced-options/standalone/variables.tf delete mode 100755 examples/synapse_analytics/100-synapse/standalone/ci.sh delete mode 100644 examples/synapse_analytics/100-synapse/standalone/main.tf delete mode 100644 examples/synapse_analytics/100-synapse/standalone/module.tf delete mode 100644 examples/synapse_analytics/100-synapse/standalone/readme.md delete mode 100755 examples/synapse_analytics/100-synapse/standalone/variables.tf delete mode 100755 examples/synapse_analytics/101-synapse-sparkpool/standalone/ci.sh delete mode 100644 examples/synapse_analytics/101-synapse-sparkpool/standalone/main.tf delete mode 100644 examples/synapse_analytics/101-synapse-sparkpool/standalone/module.tf delete mode 100644 examples/synapse_analytics/101-synapse-sparkpool/standalone/readme.md delete mode 100755 examples/synapse_analytics/101-synapse-sparkpool/standalone/variables.tf delete mode 100755 examples/webapps/appservice/101-appservice-simple/standalone/ci.sh delete mode 100644 examples/webapps/appservice/101-appservice-simple/standalone/main.tf delete mode 100644 examples/webapps/appservice/101-appservice-simple/standalone/module.tf delete mode 100644 examples/webapps/appservice/101-appservice-simple/standalone/readme.md delete mode 100755 examples/webapps/appservice/101-appservice-simple/standalone/variables.tf delete mode 100755 examples/webapps/appservice/102-appservice-slots/standalone/ci.sh delete mode 100644 examples/webapps/appservice/102-appservice-slots/standalone/main.tf delete mode 100644 examples/webapps/appservice/102-appservice-slots/standalone/module.tf delete mode 100644 examples/webapps/appservice/102-appservice-slots/standalone/readme.md delete mode 100755 examples/webapps/appservice/102-appservice-slots/standalone/variables.tf delete mode 100755 examples/webapps/appservice/103-appservice-extend/standalone/ci.sh delete mode 100644 examples/webapps/appservice/103-appservice-extend/standalone/main.tf delete mode 100644 examples/webapps/appservice/103-appservice-extend/standalone/module.tf delete mode 100644 examples/webapps/appservice/103-appservice-extend/standalone/readme.md delete mode 100755 examples/webapps/appservice/103-appservice-extend/standalone/variables.tf delete mode 100755 examples/webapps/appservice/104-appservice-appinsight/standalone/ci.sh delete mode 100644 examples/webapps/appservice/104-appservice-appinsight/standalone/main.tf delete mode 100644 examples/webapps/appservice/104-appservice-appinsight/standalone/module.tf delete mode 100644 examples/webapps/appservice/104-appservice-appinsight/standalone/readme.md delete mode 100755 examples/webapps/appservice/104-appservice-appinsight/standalone/variables.tf delete mode 100755 examples/webapps/appservice/105-appservice-backup/standalone/ci.sh delete mode 100644 examples/webapps/appservice/105-appservice-backup/standalone/main.tf delete mode 100644 examples/webapps/appservice/105-appservice-backup/standalone/module.tf delete mode 100644 examples/webapps/appservice/105-appservice-backup/standalone/readme.md delete mode 100755 examples/webapps/appservice/105-appservice-backup/standalone/variables.tf diff --git a/examples/app_gateway/100-simple-app-gateway/standalone/ci.sh b/examples/app_gateway/100-simple-app-gateway/standalone/ci.sh deleted file mode 100755 index fd5e884deb..0000000000 --- a/examples/app_gateway/100-simple-app-gateway/standalone/ci.sh +++ /dev/null @@ -1,27 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var-file ../application.tfvars \ - -var-file ../network_security_group_definition.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var-file ../application.tfvars \ - -var-file ../network_security_group_definition.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/app_gateway/100-simple-app-gateway/standalone/main.tf b/examples/app_gateway/100-simple-app-gateway/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/app_gateway/100-simple-app-gateway/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/app_gateway/100-simple-app-gateway/standalone/module.tf b/examples/app_gateway/100-simple-app-gateway/standalone/module.tf deleted file mode 100644 index 4f3ca3196c..0000000000 --- a/examples/app_gateway/100-simple-app-gateway/standalone/module.tf +++ /dev/null @@ -1,16 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - webapp = { - application_gateways = var.application_gateways - application_gateway_applications = var.application_gateway_applications - } - networking = { - vnets = var.vnets - network_security_group_definition = var.network_security_group_definition - public_ip_addresses = var.public_ip_addresses - } -} - diff --git a/examples/app_gateway/100-simple-app-gateway/standalone/readme.md b/examples/app_gateway/100-simple-app-gateway/standalone/readme.md deleted file mode 100644 index e8910d022f..0000000000 --- a/examples/app_gateway/100-simple-app-gateway/standalone/readme.md +++ /dev/null @@ -1,26 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/app_gateway/100-simple-app-gateway/standalone - -terraform init - -terraform [plan | apply | destroy] \ - -var-file ../application.tfvars \ - -var-file ../configuration.tfvars \ - -var-file ../network_security_group_definition.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/app_gateway/100-simple-app-gateway/standalone \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/app_gateway/100-simple-app-gateway/standalone/variables.tf b/examples/app_gateway/100-simple-app-gateway/standalone/variables.tf deleted file mode 100755 index 7a7c73f96d..0000000000 --- a/examples/app_gateway/100-simple-app-gateway/standalone/variables.tf +++ /dev/null @@ -1,38 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "network_security_group_definition" { - default = {} -} - -variable "application_gateways" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "public_ip_addresses" { - default = {} -} - -variable "application_gateway_applications" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} - - diff --git a/examples/app_gateway/101-private-public/standalone/ci.sh b/examples/app_gateway/101-private-public/standalone/ci.sh deleted file mode 100755 index b2caabd3bc..0000000000 --- a/examples/app_gateway/101-private-public/standalone/ci.sh +++ /dev/null @@ -1,32 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../application.tfvars \ - -var-file ../application_gateways.tfvars \ - -var-file ../configuration.tfvars \ - -var-file ../network_security_group_definition.tfvars \ - -var-file ../virtual_network.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../application.tfvars \ - -var-file ../application_gateways.tfvars \ - -var-file ../configuration.tfvars \ - -var-file ../network_security_group_definition.tfvars \ - -var-file ../virtual_network.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/app_gateway/101-private-public/standalone/main.tf b/examples/app_gateway/101-private-public/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/app_gateway/101-private-public/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/app_gateway/101-private-public/standalone/module.tf b/examples/app_gateway/101-private-public/standalone/module.tf deleted file mode 100644 index 4f3ca3196c..0000000000 --- a/examples/app_gateway/101-private-public/standalone/module.tf +++ /dev/null @@ -1,16 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - webapp = { - application_gateways = var.application_gateways - application_gateway_applications = var.application_gateway_applications - } - networking = { - vnets = var.vnets - network_security_group_definition = var.network_security_group_definition - public_ip_addresses = var.public_ip_addresses - } -} - diff --git a/examples/app_gateway/101-private-public/standalone/readme.md b/examples/app_gateway/101-private-public/standalone/readme.md deleted file mode 100644 index c6990424ec..0000000000 --- a/examples/app_gateway/101-private-public/standalone/readme.md +++ /dev/null @@ -1,30 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/app_gateway/101-private-public/standalone - -terraform init - -terraform [plan | apply | destroy] \ - -var-file ../application.tfvars \ - -var-file ../configuration.tfvars \ - -var-file ../network_security_group_definition.tfvars \ - -var-file ../virtual_network.tfvars \ - -var-file ../application_gateways.tfvars - - - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/app_gateway/100-simple-app-gateway/ \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/app_gateway/101-private-public/standalone/variables.tf b/examples/app_gateway/101-private-public/standalone/variables.tf deleted file mode 100755 index aaacab7898..0000000000 --- a/examples/app_gateway/101-private-public/standalone/variables.tf +++ /dev/null @@ -1,36 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "network_security_group_definition" { - default = {} -} - -variable "application_gateways" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "public_ip_addresses" { - default = {} -} - -variable "application_gateway_applications" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/app_gateway/210-agw-with-keyvault/standalone/main.tf b/examples/app_gateway/210-agw-with-keyvault/standalone/main.tf deleted file mode 100644 index 76a48273bd..0000000000 --- a/examples/app_gateway/210-agw-with-keyvault/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.33.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/app_gateway/210-agw-with-keyvault/standalone/module.tf b/examples/app_gateway/210-agw-with-keyvault/standalone/module.tf deleted file mode 100644 index e00e6261d2..0000000000 --- a/examples/app_gateway/210-agw-with-keyvault/standalone/module.tf +++ /dev/null @@ -1,21 +0,0 @@ -module "caf" { - source = "/tf/caf/aztfmod/es" - - global_settings = var.global_settings - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - keyvault_access_policies = var.keyvault_access_policies - managed_identities = var.managed_identities - role_mapping = var.role_mapping - security = { - keyvault_certificates = var.keyvault_certificates - } - networking = { - vnets = var.vnets - network_security_group_definition = var.network_security_group_definition - public_ip_addresses = var.public_ip_addresses - application_gateways = var.application_gateways - application_gateway_applications = var.application_gateway_applications - } -} diff --git a/examples/app_gateway/210-agw-with-keyvault/standalone/readme.md b/examples/app_gateway/210-agw-with-keyvault/standalone/readme.md deleted file mode 100644 index c47456214a..0000000000 --- a/examples/app_gateway/210-agw-with-keyvault/standalone/readme.md +++ /dev/null @@ -1,17 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -terraform init - -terraform [plan|apply|destroy] \ - -var-file ../application_gateways.tfvars \ - -var-file ../application.tfvars \ - -var-file ../certificates.tfvars \ - -var-file ../configuration.tfvars \ - -var-file ../keyvaults.tfvars \ - -var-file ../nsg_definition.tfvars \ - -var-file ../public_ip_addresses.tfvars \ - -var-file ../virtual_network.tfvars \ - -var-file ../managed_identities.tfvars - -``` \ No newline at end of file diff --git a/examples/app_gateway/210-agw-with-keyvault/standalone/variables.tf b/examples/app_gateway/210-agw-with-keyvault/standalone/variables.tf deleted file mode 100755 index 8b1f76e0a1..0000000000 --- a/examples/app_gateway/210-agw-with-keyvault/standalone/variables.tf +++ /dev/null @@ -1,78 +0,0 @@ - -variable "global_settings" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} -variable "app_service_environments" { - default = {} -} -variable "app_service_plans" { - default = {} -} -variable "app_services" { - default = {} -} -variable "diagnostics_definition" { - default = null -} -variable "resource_groups" { - default = null -} -variable "network_security_group_definition" { - default = {} -} -variable "vnets" { - default = {} -} -variable "storage_accounts" { - default = {} -} -variable "azuread_groups" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "keyvault_certificates" { - default = {} -} -variable "public_ip_addresses" { - default = {} -} -variable "diagnostic_storage_accounts" { - default = {} -} -variable "managed_identities" { - default = {} -} -variable "private_dns" { - default = {} -} -variable "synapse_workspaces" { - default = {} -} -variable "azurerm_application_insights" { - default = {} -} -variable "role_mapping" { - default = {} -} -variable "monitoring" { - default = {} -} -variable "event_hub_namespaces" { - default = {} -} -variable "application_gateways" { - default = {} -} -variable "application_gateway_applications" { - default = {} -} \ No newline at end of file diff --git a/examples/app_insights/100-all-attributes/standalone/ci.sh b/examples/app_insights/100-all-attributes/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/app_insights/100-all-attributes/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/app_insights/100-all-attributes/standalone/main.tf b/examples/app_insights/100-all-attributes/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/app_insights/100-all-attributes/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/app_insights/100-all-attributes/standalone/module.tf b/examples/app_insights/100-all-attributes/standalone/module.tf deleted file mode 100644 index e3807c59a2..0000000000 --- a/examples/app_insights/100-all-attributes/standalone/module.tf +++ /dev/null @@ -1,10 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - webapp = { - azurerm_application_insights = var.azurerm_application_insights - } -} - diff --git a/examples/app_insights/100-all-attributes/standalone/readme.md b/examples/app_insights/100-all-attributes/standalone/readme.md deleted file mode 100644 index ac59790d98..0000000000 --- a/examples/app_insights/100-all-attributes/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/app_insights/100-all-attributes/standalone - -terraform init - -terraform [plan | apply | destroy] \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/app_insights/100-all-attributes/ \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/app_insights/100-all-attributes/standalone/variables.tf b/examples/app_insights/100-all-attributes/standalone/variables.tf deleted file mode 100755 index 9b5b135c15..0000000000 --- a/examples/app_insights/100-all-attributes/standalone/variables.tf +++ /dev/null @@ -1,20 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "azurerm_application_insights" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/app_insights/100-simple/standalone/ci.sh b/examples/app_insights/100-simple/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/app_insights/100-simple/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/app_insights/100-simple/standalone/main.tf b/examples/app_insights/100-simple/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/app_insights/100-simple/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/app_insights/100-simple/standalone/module.tf b/examples/app_insights/100-simple/standalone/module.tf deleted file mode 100644 index e3807c59a2..0000000000 --- a/examples/app_insights/100-simple/standalone/module.tf +++ /dev/null @@ -1,10 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - webapp = { - azurerm_application_insights = var.azurerm_application_insights - } -} - diff --git a/examples/app_insights/100-simple/standalone/readme.md b/examples/app_insights/100-simple/standalone/readme.md deleted file mode 100644 index 0acedd0af4..0000000000 --- a/examples/app_insights/100-simple/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/app_insights/100-simple/standalone - -terraform init - -terraform [plan | apply | destroy] \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/app_insights/100-simple/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/app_insights/100-simple/standalone/variables.tf b/examples/app_insights/100-simple/standalone/variables.tf deleted file mode 100755 index 9b5b135c15..0000000000 --- a/examples/app_insights/100-simple/standalone/variables.tf +++ /dev/null @@ -1,20 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "azurerm_application_insights" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/automation/100-simple-automation-account/standalone/ci.sh b/examples/automation/100-simple-automation-account/standalone/ci.sh deleted file mode 100755 index 5458c3f725..0000000000 --- a/examples/automation/100-simple-automation-account/standalone/ci.sh +++ /dev/null @@ -1,22 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve \ No newline at end of file diff --git a/examples/automation/100-simple-automation-account/standalone/main.tf b/examples/automation/100-simple-automation-account/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/automation/100-simple-automation-account/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/automation/100-simple-automation-account/standalone/module.tf b/examples/automation/100-simple-automation-account/standalone/module.tf deleted file mode 100644 index b31836d75b..0000000000 --- a/examples/automation/100-simple-automation-account/standalone/module.tf +++ /dev/null @@ -1,9 +0,0 @@ -module "caf" { - source = "../../../../" - - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - shared_services = { automations = var.automations } -} - diff --git a/examples/automation/100-simple-automation-account/standalone/readme.md b/examples/automation/100-simple-automation-account/standalone/readme.md deleted file mode 100644 index 52de1d24cb..0000000000 --- a/examples/automation/100-simple-automation-account/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/automation/100-simple-automation-account/standalone - -terraform init - -terraform [plan | apply | destroy]\ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/automation/100-simple-automation-account/standalone \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/automation/100-simple-automation-account/standalone/variables.tf b/examples/automation/100-simple-automation-account/standalone/variables.tf deleted file mode 100755 index 7a41f0f04f..0000000000 --- a/examples/automation/100-simple-automation-account/standalone/variables.tf +++ /dev/null @@ -1,20 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "automations" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/ci.sh b/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/main.tf b/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/module.tf b/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/module.tf deleted file mode 100644 index 761e85a52f..0000000000 --- a/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/module.tf +++ /dev/null @@ -1,15 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - azuread_apps = var.azuread_apps - azuread_users = var.azuread_users - azuread_roles = var.azuread_roles - keyvaults = var.keyvaults - keyvault_access_policies = var.keyvault_access_policies - keyvault_access_policies_azuread_apps = var.keyvault_access_policies_azuread_apps - role_mapping = var.role_mapping - -} - diff --git a/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/readme.md b/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/readme.md deleted file mode 100644 index 3ed3094be4..0000000000 --- a/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/readme.md +++ /dev/null @@ -1,25 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone - -terraform init - -terraform [plan | apply | destroy] \ - -var-file ../configuration.tfvars - - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/azure_ad/100-sevice-principle-with-builtin-roles \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/variables.tf b/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/variables.tf deleted file mode 100755 index c880cb8931..0000000000 --- a/examples/azure_ad/100-sevice-principle-with-builtin-roles/standalone/variables.tf +++ /dev/null @@ -1,45 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "keyvaults" { - default = {} -} - -variable "azuread_apps" { - default = {} -} - -variable "azuread_users" { - default = {} -} - -variable "azuread_roles" { - default = {} -} - -variable "keyvault_access_policies" { - default = {} -} - -variable "keyvault_access_policies_azuread_apps" { - default = {} -} - -variable "role_mapping" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/azure_ad/101-service-principle-with-custom-roles/standalone/ci.sh b/examples/azure_ad/101-service-principle-with-custom-roles/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/azure_ad/101-service-principle-with-custom-roles/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/azure_ad/101-service-principle-with-custom-roles/standalone/main.tf b/examples/azure_ad/101-service-principle-with-custom-roles/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/azure_ad/101-service-principle-with-custom-roles/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/azure_ad/101-service-principle-with-custom-roles/standalone/module.tf b/examples/azure_ad/101-service-principle-with-custom-roles/standalone/module.tf deleted file mode 100644 index 1c82743a54..0000000000 --- a/examples/azure_ad/101-service-principle-with-custom-roles/standalone/module.tf +++ /dev/null @@ -1,16 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - azuread_apps = var.azuread_apps - azuread_users = var.azuread_users - azuread_roles = var.azuread_roles - keyvaults = var.keyvaults - keyvault_access_policies = var.keyvault_access_policies - keyvault_access_policies_azuread_apps = var.keyvault_access_policies_azuread_apps - role_mapping = var.role_mapping - custom_role_definitions = var.custom_role_definitions - -} - diff --git a/examples/azure_ad/101-service-principle-with-custom-roles/standalone/readme.md b/examples/azure_ad/101-service-principle-with-custom-roles/standalone/readme.md deleted file mode 100644 index 9a343b967e..0000000000 --- a/examples/azure_ad/101-service-principle-with-custom-roles/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/azure_ad/101-service-principle-with-custom-roles/standalone - -terraform init - -terraform [plan | apply | destroy] \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/azure_ad/101-service-principle-with-custom-roles/ \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/azure_ad/101-service-principle-with-custom-roles/standalone/variables.tf b/examples/azure_ad/101-service-principle-with-custom-roles/standalone/variables.tf deleted file mode 100755 index 2733051378..0000000000 --- a/examples/azure_ad/101-service-principle-with-custom-roles/standalone/variables.tf +++ /dev/null @@ -1,48 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "keyvaults" { - default = {} -} - -variable "azuread_apps" { - default = {} -} - -variable "azuread_users" { - default = {} -} - -variable "azuread_roles" { - default = {} -} - -variable "keyvault_access_policies" { - default = {} -} - -variable "keyvault_access_policies_azuread_apps" { - default = {} -} - -variable "role_mapping" { - default = {} -} - -variable "custom_role_definitions" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/azure_ad/102-password-rotation/standalone/README.md b/examples/azure_ad/102-password-rotation/standalone/README.md deleted file mode 100644 index 28050e5a4d..0000000000 --- a/examples/azure_ad/102-password-rotation/standalone/README.md +++ /dev/null @@ -1,25 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/azure_ad/102-password-rotation/standalone - -terraform init - -terraform [plan | apply | destroy] \ - -var-file ../configuration.tfvars - - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/azure_ad/100-sevice-principle-with-builtin-roles \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/azure_ad/102-password-rotation/standalone/ci.sh b/examples/azure_ad/102-password-rotation/standalone/ci.sh deleted file mode 100755 index ab2ad0b242..0000000000 --- a/examples/azure_ad/102-password-rotation/standalone/ci.sh +++ /dev/null @@ -1,34 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - -# Wait for the password rotation renewal period to expire -sleep 60 - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/azure_ad/102-password-rotation/standalone/main.tf b/examples/azure_ad/102-password-rotation/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/azure_ad/102-password-rotation/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/azure_ad/102-password-rotation/standalone/module.tf b/examples/azure_ad/102-password-rotation/standalone/module.tf deleted file mode 100644 index 761e85a52f..0000000000 --- a/examples/azure_ad/102-password-rotation/standalone/module.tf +++ /dev/null @@ -1,15 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - azuread_apps = var.azuread_apps - azuread_users = var.azuread_users - azuread_roles = var.azuread_roles - keyvaults = var.keyvaults - keyvault_access_policies = var.keyvault_access_policies - keyvault_access_policies_azuread_apps = var.keyvault_access_policies_azuread_apps - role_mapping = var.role_mapping - -} - diff --git a/examples/azure_ad/102-password-rotation/standalone/variables.tf b/examples/azure_ad/102-password-rotation/standalone/variables.tf deleted file mode 100755 index c880cb8931..0000000000 --- a/examples/azure_ad/102-password-rotation/standalone/variables.tf +++ /dev/null @@ -1,45 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "keyvaults" { - default = {} -} - -variable "azuread_apps" { - default = {} -} - -variable "azuread_users" { - default = {} -} - -variable "azuread_roles" { - default = {} -} - -variable "keyvault_access_policies" { - default = {} -} - -variable "keyvault_access_policies_azuread_apps" { - default = {} -} - -variable "role_mapping" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/azure_ad/201-groups-and-roles/standalone/ci.sh b/examples/azure_ad/201-groups-and-roles/standalone/ci.sh deleted file mode 100644 index f848bb5301..0000000000 --- a/examples/azure_ad/201-groups-and-roles/standalone/ci.sh +++ /dev/null @@ -1,25 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/azure_ad/201-groups-and-roles/standalone/main.tf b/examples/azure_ad/201-groups-and-roles/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/azure_ad/201-groups-and-roles/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/azure_ad/201-groups-and-roles/standalone/module.tf b/examples/azure_ad/201-groups-and-roles/standalone/module.tf deleted file mode 100644 index 1d639b5d8b..0000000000 --- a/examples/azure_ad/201-groups-and-roles/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - azuread_apps = var.azuread_apps - azuread_users = var.azuread_users - azuread_roles = var.azuread_roles - azuread_groups = var.azuread_groups - keyvaults = var.keyvaults - keyvault_access_policies = var.keyvault_access_policies - keyvault_access_policies_azuread_apps = var.keyvault_access_policies_azuread_apps - role_mapping = var.role_mapping - custom_role_definitions = var.custom_role_definitions - -} - diff --git a/examples/azure_ad/201-groups-and-roles/standalone/readme.md b/examples/azure_ad/201-groups-and-roles/standalone/readme.md deleted file mode 100644 index a85e14bf65..0000000000 --- a/examples/azure_ad/201-groups-and-roles/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/azure_ad/201-groups-and-roles/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/azure_ad/201-groups-and-roles/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/azure_ad/201-groups-and-roles/standalone/variables.tf b/examples/azure_ad/201-groups-and-roles/standalone/variables.tf deleted file mode 100755 index d8e58e484d..0000000000 --- a/examples/azure_ad/201-groups-and-roles/standalone/variables.tf +++ /dev/null @@ -1,52 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "keyvaults" { - default = {} -} - -variable "azuread_apps" { - default = {} -} - -variable "azuread_users" { - default = {} -} - -variable "azuread_roles" { - default = {} -} - -variable "azuread_groups" { - default = {} -} - -variable "keyvault_access_policies" { - default = {} -} - -variable "keyvault_access_policies_azuread_apps" { - default = {} -} - -variable "role_mapping" { - default = {} -} - -variable "custom_role_definitions" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/ci.sh b/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/main.tf b/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/module.tf b/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/module.tf deleted file mode 100644 index c3d9e7b245..0000000000 --- a/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/module.tf +++ /dev/null @@ -1,18 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - keyvaults = var.keyvaults - - networking = { - vnets = var.vnets - } - - compute = { - availability_sets = var.availability_sets - virtual_machines = var.virtual_machines - proximity_placement_groups = var.proximity_placement_groups - } - -} \ No newline at end of file diff --git a/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/readme.md b/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/readme.md deleted file mode 100644 index 53a2727505..0000000000 --- a/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -``` -cd /tf/caf/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone - -terraform init - -terraform [plan | apply | destroy] \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/ \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/variables.tf b/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/variables.tf deleted file mode 100755 index 3f4073fe7b..0000000000 --- a/examples/compute/availability_set/101-availabilityset-with-proximity-placement-group/standalone/variables.tf +++ /dev/null @@ -1,36 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "availability_sets" { - default = {} -} - -variable "virtual_machines" { - default = {} -} - -variable "proximity_placement_groups" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/compute/container_registry/100-simple-acr/standalone/ci.sh b/examples/compute/container_registry/100-simple-acr/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/compute/container_registry/100-simple-acr/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/compute/container_registry/100-simple-acr/standalone/main.tf b/examples/compute/container_registry/100-simple-acr/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/compute/container_registry/100-simple-acr/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/compute/container_registry/100-simple-acr/standalone/module.tf b/examples/compute/container_registry/100-simple-acr/standalone/module.tf deleted file mode 100644 index b7f3ea3e95..0000000000 --- a/examples/compute/container_registry/100-simple-acr/standalone/module.tf +++ /dev/null @@ -1,11 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - - compute = { - azure_container_registries = var.azure_container_registries - } - -} \ No newline at end of file diff --git a/examples/compute/container_registry/100-simple-acr/standalone/readme.md b/examples/compute/container_registry/100-simple-acr/standalone/readme.md deleted file mode 100644 index b844652782..0000000000 --- a/examples/compute/container_registry/100-simple-acr/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -``` -cd /tf/caf/examples/compute/container_registry/100-simple-acr/standalone - -terraform init - -terraform [plan | apply | destroy] \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/compute/container_registry/100-simple-acr/ \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/compute/container_registry/100-simple-acr/standalone/variables.tf b/examples/compute/container_registry/100-simple-acr/standalone/variables.tf deleted file mode 100755 index d39e53bdca..0000000000 --- a/examples/compute/container_registry/100-simple-acr/standalone/variables.tf +++ /dev/null @@ -1,20 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "azure_container_registries" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/compute/container_registry/200-acr-private-link/standalone/ci.sh b/examples/compute/container_registry/200-acr-private-link/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/compute/container_registry/200-acr-private-link/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/compute/container_registry/200-acr-private-link/standalone/main.tf b/examples/compute/container_registry/200-acr-private-link/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/compute/container_registry/200-acr-private-link/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/compute/container_registry/200-acr-private-link/standalone/module.tf b/examples/compute/container_registry/200-acr-private-link/standalone/module.tf deleted file mode 100644 index 0ce0f84717..0000000000 --- a/examples/compute/container_registry/200-acr-private-link/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - - compute = { - azure_container_registries = var.azure_container_registries - } - - diagnostics = { - diagnostics_destinations = var.diagnostics_destinations - diagnostics_definition = var.diagnostics_definition - log_analytics = var.log_analytics - } - -} \ No newline at end of file diff --git a/examples/compute/container_registry/200-acr-private-link/standalone/readme.md b/examples/compute/container_registry/200-acr-private-link/standalone/readme.md deleted file mode 100644 index 13764893da..0000000000 --- a/examples/compute/container_registry/200-acr-private-link/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -``` -cd /tf/caf/examples/compute/container_registry/200-acr-private-link/standalone - -terraform init - -terraform [plan | apply | destroy] \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/compute/container_registry/200-acr-private-link/ \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/compute/container_registry/200-acr-private-link/standalone/variables.tf b/examples/compute/container_registry/200-acr-private-link/standalone/variables.tf deleted file mode 100755 index f4546657b7..0000000000 --- a/examples/compute/container_registry/200-acr-private-link/standalone/variables.tf +++ /dev/null @@ -1,32 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "azure_container_registries" { - default = {} -} - -variable "log_analytics" { - default = {} -} - -variable "diagnostics_destinations" { - default = {} -} - -variable "diagnostics_definition" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/compute/kubernetes_services/101-single-cluster/standalone/ci.sh b/examples/compute/kubernetes_services/101-single-cluster/standalone/ci.sh deleted file mode 100755 index 8eb14a403e..0000000000 --- a/examples/compute/kubernetes_services/101-single-cluster/standalone/ci.sh +++ /dev/null @@ -1,28 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../aks.tfvars \ - -var-file ../networking.tfvars \ - -var-file ../diagnostics.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../aks.tfvars \ - -var-file ../networking.tfvars \ - -var-file ../diagnostics.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/compute/kubernetes_services/101-single-cluster/standalone/main.tf b/examples/compute/kubernetes_services/101-single-cluster/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/compute/kubernetes_services/101-single-cluster/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/compute/kubernetes_services/101-single-cluster/standalone/module.tf b/examples/compute/kubernetes_services/101-single-cluster/standalone/module.tf deleted file mode 100644 index 8c2ba41898..0000000000 --- a/examples/compute/kubernetes_services/101-single-cluster/standalone/module.tf +++ /dev/null @@ -1,22 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - - networking = { - vnets = var.vnets - network_security_group_definition = var.network_security_group_definition - } - - diagnostics = { - # Get the diagnostics settings of services to create - diagnostic_log_analytics = var.diagnostic_log_analytics - } - - compute = { - aks_clusters = var.aks_clusters - virtual_machines = var.virtual_machines - } - -} \ No newline at end of file diff --git a/examples/compute/kubernetes_services/101-single-cluster/standalone/output.tf b/examples/compute/kubernetes_services/101-single-cluster/standalone/output.tf deleted file mode 100755 index 99cf7b5c6f..0000000000 --- a/examples/compute/kubernetes_services/101-single-cluster/standalone/output.tf +++ /dev/null @@ -1,14 +0,0 @@ -output "aks_clusters_kubeconfig" { - value = { - for key, aks_cluster in module.caf.aks_clusters : key => { - aks_kubeconfig_cmd = aks_cluster.aks_kubeconfig_cmd - aks_kubeconfig_admin_cmd = aks_cluster.aks_kubeconfig_admin_cmd - } - } - sensitive = false -} - -output "aks_clusters" { - value = module.caf.aks_clusters - sensitive = false -} diff --git a/examples/compute/kubernetes_services/101-single-cluster/standalone/readme.md b/examples/compute/kubernetes_services/101-single-cluster/standalone/readme.md deleted file mode 100644 index ba68dc0a22..0000000000 --- a/examples/compute/kubernetes_services/101-single-cluster/standalone/readme.md +++ /dev/null @@ -1,29 +0,0 @@ -You can test this module outside of a landingzone using - -``` -cd /tf/caf/examples/compute/kubernetes_services/101-single-cluster/standalone - -terraform init - -terraform [plan | apply | destroy] \ - -var-file ../aks.tfvars \ - -var-file ../networking.tfvars - - -terraform apply \ - -var-file ../aks.tfvars \ - -var-file ../networking.tfvars \ - -var-file ../diagnostics.tfvars -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/compute/kubernetes_services/101-single-cluster/ \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/compute/kubernetes_services/101-single-cluster/standalone/variables.tf b/examples/compute/kubernetes_services/101-single-cluster/standalone/variables.tf deleted file mode 100755 index 4c353fb79d..0000000000 --- a/examples/compute/kubernetes_services/101-single-cluster/standalone/variables.tf +++ /dev/null @@ -1,36 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "aks_clusters" { - default = {} -} - -variable "diagnostic_log_analytics" { - default = {} -} - -variable "virtual_machines" { - default = {} -} - -variable "network_security_group_definition" { - default = {} -} - -variable "var_folder_path" { - default = {} -} diff --git a/examples/compute/kubernetes_services/102-multi-nodepools/standalone/ci.sh b/examples/compute/kubernetes_services/102-multi-nodepools/standalone/ci.sh deleted file mode 100755 index 7341384b24..0000000000 --- a/examples/compute/kubernetes_services/102-multi-nodepools/standalone/ci.sh +++ /dev/null @@ -1,30 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../aks.tfvars \ - -var-file ../configuration.tfvars \ - -var-file ../networking.tfvars \ - -var-file ../diagnostics.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../aks.tfvars \ - -var-file ../configuration.tfvars \ - -var-file ../networking.tfvars \ - -var-file ../diagnostics.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/compute/kubernetes_services/102-multi-nodepools/standalone/main.tf b/examples/compute/kubernetes_services/102-multi-nodepools/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/compute/kubernetes_services/102-multi-nodepools/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/compute/kubernetes_services/102-multi-nodepools/standalone/module.tf b/examples/compute/kubernetes_services/102-multi-nodepools/standalone/module.tf deleted file mode 100644 index 8c2ba41898..0000000000 --- a/examples/compute/kubernetes_services/102-multi-nodepools/standalone/module.tf +++ /dev/null @@ -1,22 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - - networking = { - vnets = var.vnets - network_security_group_definition = var.network_security_group_definition - } - - diagnostics = { - # Get the diagnostics settings of services to create - diagnostic_log_analytics = var.diagnostic_log_analytics - } - - compute = { - aks_clusters = var.aks_clusters - virtual_machines = var.virtual_machines - } - -} \ No newline at end of file diff --git a/examples/compute/kubernetes_services/102-multi-nodepools/standalone/output.tf b/examples/compute/kubernetes_services/102-multi-nodepools/standalone/output.tf deleted file mode 100755 index 99cf7b5c6f..0000000000 --- a/examples/compute/kubernetes_services/102-multi-nodepools/standalone/output.tf +++ /dev/null @@ -1,14 +0,0 @@ -output "aks_clusters_kubeconfig" { - value = { - for key, aks_cluster in module.caf.aks_clusters : key => { - aks_kubeconfig_cmd = aks_cluster.aks_kubeconfig_cmd - aks_kubeconfig_admin_cmd = aks_cluster.aks_kubeconfig_admin_cmd - } - } - sensitive = false -} - -output "aks_clusters" { - value = module.caf.aks_clusters - sensitive = false -} diff --git a/examples/compute/kubernetes_services/102-multi-nodepools/standalone/readme.md b/examples/compute/kubernetes_services/102-multi-nodepools/standalone/readme.md deleted file mode 100644 index 59c4481034..0000000000 --- a/examples/compute/kubernetes_services/102-multi-nodepools/standalone/readme.md +++ /dev/null @@ -1,27 +0,0 @@ -You can test this module outside of a landingzone using - -``` -cd /tf/caf/examples/compute/kubernetes_services/102-multi-nodepools/standalone - -terraform init - -terraform [plan | apply | destroy] \ - -var-file ../aks.tfvars \ - -var-file ../configuration.tfvars \ - -var-file ../networking.tfvars \ - -var-file ../diagnostics.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/compute/kubernetes_services/102-multi-nodepools/ \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/compute/kubernetes_services/102-multi-nodepools/standalone/variables.tf b/examples/compute/kubernetes_services/102-multi-nodepools/standalone/variables.tf deleted file mode 100755 index 74a85e1cee..0000000000 --- a/examples/compute/kubernetes_services/102-multi-nodepools/standalone/variables.tf +++ /dev/null @@ -1,44 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "role_mapping" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "aks_clusters" { - default = {} -} - -variable "azure_container_registries" { - default = {} -} - -variable "diagnostic_log_analytics" { - default = {} -} - -variable "virtual_machines" { - default = {} -} - -variable "network_security_group_definition" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "var_folder_path" { - default = {} -} diff --git a/examples/compute/proximity_placement_group/standalone/ci.sh b/examples/compute/proximity_placement_group/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/compute/proximity_placement_group/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/compute/proximity_placement_group/standalone/main.tf b/examples/compute/proximity_placement_group/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/compute/proximity_placement_group/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/compute/proximity_placement_group/standalone/module.tf b/examples/compute/proximity_placement_group/standalone/module.tf deleted file mode 100644 index 14fb2f9fbb..0000000000 --- a/examples/compute/proximity_placement_group/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - keyvaults = var.keyvaults - - networking = { - vnets = var.vnets - } - - compute = { - proximity_placement_groups = var.proximity_placement_groups - virtual_machines = var.virtual_machines - } - -} \ No newline at end of file diff --git a/examples/compute/proximity_placement_group/standalone/readme.md b/examples/compute/proximity_placement_group/standalone/readme.md deleted file mode 100644 index 596a8ae15c..0000000000 --- a/examples/compute/proximity_placement_group/standalone/readme.md +++ /dev/null @@ -1,25 +0,0 @@ -You can test this module outside of a landingzone using - -``` -cd /tf/caf/examples/compute/proximity_placement_group/standalone - -terraform init - -terraform [plan | apply | destroy] \ - -var-file ../configuration.tfvars - -Note : Change the custom_data path in the configuration file, relative to the path currently you are in. It wil error out otherwise. - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/compute/proximity_placement_group/ \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/compute/proximity_placement_group/standalone/variables.tf b/examples/compute/proximity_placement_group/standalone/variables.tf deleted file mode 100755 index 7b52652d8e..0000000000 --- a/examples/compute/proximity_placement_group/standalone/variables.tf +++ /dev/null @@ -1,32 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "proximity_placement_groups" { - default = {} -} - -variable "virtual_machines" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/compute/virtual_machine/101-single-windows-vm/standalone/ci.sh b/examples/compute/virtual_machine/101-single-windows-vm/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/compute/virtual_machine/101-single-windows-vm/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/compute/virtual_machine/101-single-windows-vm/standalone/main.tf b/examples/compute/virtual_machine/101-single-windows-vm/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/compute/virtual_machine/101-single-windows-vm/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/compute/virtual_machine/101-single-windows-vm/standalone/module.tf b/examples/compute/virtual_machine/101-single-windows-vm/standalone/module.tf deleted file mode 100644 index e7826abd61..0000000000 --- a/examples/compute/virtual_machine/101-single-windows-vm/standalone/module.tf +++ /dev/null @@ -1,33 +0,0 @@ -module "caf" { - source = "../../../../../" - - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - diagnostics = { - # Get the diagnostics settings of services to create - diagnostic_log_analytics = var.diagnostic_log_analytics - diagnostic_storage_accounts = var.diagnostic_storage_accounts - } - - compute = { - virtual_machines = var.virtual_machines - } - - networking = { - vnets = var.vnets - network_security_group_definition = var.network_security_group_definition - public_ip_addresses = var.public_ip_addresses - } - - security = { - dynamic_keyvault_secrets = var.dynamic_keyvault_secrets - } -} - -output "diagnostics" { - value = module.caf.diagnostics -} diff --git a/examples/compute/virtual_machine/101-single-windows-vm/standalone/readme.md b/examples/compute/virtual_machine/101-single-windows-vm/standalone/readme.md deleted file mode 100755 index 544ecdea63..0000000000 --- a/examples/compute/virtual_machine/101-single-windows-vm/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using: - -```bash -cd /tf/caf/examples/compute/virtual_machine/101-single-windows-vm/standalone - -terraform init - -terraform [plan | apply | destroy ] \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/compute/virtual_machine/101-single-windows-vm/ \ - -level level1 \ - -a [plan | apply | destroy ] - -``` \ No newline at end of file diff --git a/examples/compute/virtual_machine/101-single-windows-vm/standalone/variables.tf b/examples/compute/virtual_machine/101-single-windows-vm/standalone/variables.tf deleted file mode 100755 index 178318378b..0000000000 --- a/examples/compute/virtual_machine/101-single-windows-vm/standalone/variables.tf +++ /dev/null @@ -1,112 +0,0 @@ -variable "global_settings" { - default = {} -} -variable "var_folder_path" { - default = {} -} -variable "tags" { - default = null - type = map(any) -} -variable "diagnostic_log_analytics" { - default = {} -} -variable "app_service_environments" { - default = {} -} -variable "app_service_plans" { - default = {} -} -variable "app_services" { - default = {} -} -variable "diagnostics_definition" { - default = null -} -variable "resource_groups" { - default = null -} -variable "network_security_group_definition" { - default = {} -} -variable "vnets" { - default = {} -} -variable "azurerm_redis_caches" { - default = {} -} -variable "mssql_servers" { - default = {} -} -variable "mssql_databases" { - default = {} -} -variable "mssql_elastic_pools" { - default = {} -} -variable "storage_accounts" { - default = {} -} -variable "azuread_groups" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "virtual_machines" { - default = {} -} -variable "bastion_hosts" { - default = {} -} -variable "public_ip_addresses" { - default = {} -} -variable "diagnostic_storage_accounts" { - default = {} -} -variable "managed_identities" { - default = {} -} -variable "private_dns" { - default = {} -} -variable "synapse_workspaces" { - default = {} -} -variable "azurerm_application_insights" { - default = {} -} -variable "role_mapping" { - default = {} -} -variable "aks_clusters" { - default = {} -} -variable "databricks_workspaces" { - default = {} -} -variable "machine_learning_workspaces" { - default = {} -} -variable "monitoring" { - default = {} -} -variable "virtual_wans" { - default = {} -} -variable "event_hub_namespaces" { - default = {} -} -variable "application_gateways" { - default = {} -} -variable "application_gateway_applications" { - default = {} -} -variable "dynamic_keyvault_secrets" { - default = {} -} \ No newline at end of file diff --git a/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/ci.sh b/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/main.tf b/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/module.tf b/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/module.tf deleted file mode 100644 index e7826abd61..0000000000 --- a/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/module.tf +++ /dev/null @@ -1,33 +0,0 @@ -module "caf" { - source = "../../../../../" - - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - diagnostics = { - # Get the diagnostics settings of services to create - diagnostic_log_analytics = var.diagnostic_log_analytics - diagnostic_storage_accounts = var.diagnostic_storage_accounts - } - - compute = { - virtual_machines = var.virtual_machines - } - - networking = { - vnets = var.vnets - network_security_group_definition = var.network_security_group_definition - public_ip_addresses = var.public_ip_addresses - } - - security = { - dynamic_keyvault_secrets = var.dynamic_keyvault_secrets - } -} - -output "diagnostics" { - value = module.caf.diagnostics -} diff --git a/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/readme.md b/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/readme.md deleted file mode 100755 index 5da85d781e..0000000000 --- a/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/compute/virtual_machine/102-single-vm-data-disks/standalone - -terraform init - -terraform [plan | apply | destroy ] \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/compute/virtual_machine/102-single-vm-data-disks/ \ - -level level1 \ - -a [plan | apply | destroy ] - -``` \ No newline at end of file diff --git a/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/variables.tf b/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/variables.tf deleted file mode 100755 index 178318378b..0000000000 --- a/examples/compute/virtual_machine/102-single-vm-data-disks/standalone/variables.tf +++ /dev/null @@ -1,112 +0,0 @@ -variable "global_settings" { - default = {} -} -variable "var_folder_path" { - default = {} -} -variable "tags" { - default = null - type = map(any) -} -variable "diagnostic_log_analytics" { - default = {} -} -variable "app_service_environments" { - default = {} -} -variable "app_service_plans" { - default = {} -} -variable "app_services" { - default = {} -} -variable "diagnostics_definition" { - default = null -} -variable "resource_groups" { - default = null -} -variable "network_security_group_definition" { - default = {} -} -variable "vnets" { - default = {} -} -variable "azurerm_redis_caches" { - default = {} -} -variable "mssql_servers" { - default = {} -} -variable "mssql_databases" { - default = {} -} -variable "mssql_elastic_pools" { - default = {} -} -variable "storage_accounts" { - default = {} -} -variable "azuread_groups" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "virtual_machines" { - default = {} -} -variable "bastion_hosts" { - default = {} -} -variable "public_ip_addresses" { - default = {} -} -variable "diagnostic_storage_accounts" { - default = {} -} -variable "managed_identities" { - default = {} -} -variable "private_dns" { - default = {} -} -variable "synapse_workspaces" { - default = {} -} -variable "azurerm_application_insights" { - default = {} -} -variable "role_mapping" { - default = {} -} -variable "aks_clusters" { - default = {} -} -variable "databricks_workspaces" { - default = {} -} -variable "machine_learning_workspaces" { - default = {} -} -variable "monitoring" { - default = {} -} -variable "virtual_wans" { - default = {} -} -variable "event_hub_namespaces" { - default = {} -} -variable "application_gateways" { - default = {} -} -variable "application_gateway_applications" { - default = {} -} -variable "dynamic_keyvault_secrets" { - default = {} -} \ No newline at end of file diff --git a/examples/compute/virtual_machine/104-single-windows-backup/standalone/ci.sh b/examples/compute/virtual_machine/104-single-windows-backup/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/compute/virtual_machine/104-single-windows-backup/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/compute/virtual_machine/104-single-windows-backup/standalone/main.tf b/examples/compute/virtual_machine/104-single-windows-backup/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/compute/virtual_machine/104-single-windows-backup/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/compute/virtual_machine/104-single-windows-backup/standalone/module.tf b/examples/compute/virtual_machine/104-single-windows-backup/standalone/module.tf deleted file mode 100644 index 25574d1378..0000000000 --- a/examples/compute/virtual_machine/104-single-windows-backup/standalone/module.tf +++ /dev/null @@ -1,37 +0,0 @@ -module "caf" { - source = "../../../../../" - - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - diagnostics = { - # Get the diagnostics settings of services to create - diagnostic_log_analytics = var.diagnostic_log_analytics - diagnostic_storage_accounts = var.diagnostic_storage_accounts - } - - compute = { - virtual_machines = var.virtual_machines - } - - networking = { - vnets = var.vnets - network_security_group_definition = var.network_security_group_definition - public_ip_addresses = var.public_ip_addresses - } - - security = { - dynamic_keyvault_secrets = var.dynamic_keyvault_secrets - } - - shared_services = { - recovery_vaults = var.recovery_vaults - } -} - -output "diagnostics" { - value = module.caf.diagnostics -} diff --git a/examples/compute/virtual_machine/104-single-windows-backup/standalone/readme.md b/examples/compute/virtual_machine/104-single-windows-backup/standalone/readme.md deleted file mode 100755 index 54689922f0..0000000000 --- a/examples/compute/virtual_machine/104-single-windows-backup/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/compute/virtual_machine/104-single-windows-backup/standalone - -terraform init - -terraform [plan | apply | destroy ] \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/compute/virtual_machine/104-single-windows-backup/ \ - -level level1 \ - -a [plan | apply | destroy ] - -``` \ No newline at end of file diff --git a/examples/compute/virtual_machine/104-single-windows-backup/standalone/variables.tf b/examples/compute/virtual_machine/104-single-windows-backup/standalone/variables.tf deleted file mode 100755 index fe00f46ff3..0000000000 --- a/examples/compute/virtual_machine/104-single-windows-backup/standalone/variables.tf +++ /dev/null @@ -1,116 +0,0 @@ -variable "global_settings" { - default = {} -} -variable "var_folder_path" { - default = {} -} -variable "tags" { - default = null - type = map(any) -} -variable "diagnostic_log_analytics" { - default = {} -} -variable "app_service_environments" { - default = {} -} -variable "app_service_plans" { - default = {} -} -variable "app_services" { - default = {} -} -variable "diagnostics_definition" { - default = null -} -variable "resource_groups" { - default = null -} -variable "network_security_group_definition" { - default = {} -} -variable "vnets" { - default = {} -} -variable "azurerm_redis_caches" { - default = {} -} -variable "mssql_servers" { - default = {} -} -variable "mssql_databases" { - default = {} -} -variable "mssql_elastic_pools" { - default = {} -} -variable "storage_accounts" { - default = {} -} -variable "azuread_groups" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "virtual_machines" { - default = {} -} -variable "bastion_hosts" { - default = {} -} -variable "public_ip_addresses" { - default = {} -} -variable "diagnostic_storage_accounts" { - default = {} -} -variable "managed_identities" { - default = {} -} -variable "private_dns" { - default = {} -} -variable "synapse_workspaces" { - default = {} -} -variable "azurerm_application_insights" { - default = {} -} -variable "role_mapping" { - default = {} -} -variable "aks_clusters" { - default = {} -} -variable "databricks_workspaces" { - default = {} -} -variable "machine_learning_workspaces" { - default = {} -} -variable "monitoring" { - default = {} -} -variable "virtual_wans" { - default = {} -} -variable "event_hub_namespaces" { - default = {} -} -variable "application_gateways" { - default = {} -} -variable "application_gateway_applications" { - default = {} -} -variable "dynamic_keyvault_secrets" { - default = {} -} - -variable "recovery_vaults" { - default = {} -} \ No newline at end of file diff --git a/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/ci.sh b/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/main.tf b/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/main.tf deleted file mode 100755 index 5a360f2b8b..0000000000 --- a/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = false - } - } -} - diff --git a/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/module.tf b/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/module.tf deleted file mode 100755 index 240f9a1a68..0000000000 --- a/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/module.tf +++ /dev/null @@ -1,38 +0,0 @@ -module "caf" { - source = "../../../../../" - - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - managed_identities = var.managed_identities - role_mapping = var.role_mapping - keyvault_access_policies = var.keyvault_access_policies - - diagnostics = { - # Get the diagnostics settings of services to create - diagnostic_log_analytics = var.diagnostic_log_analytics - diagnostic_storage_accounts = var.diagnostic_storage_accounts - } - - compute = { - virtual_machines = var.virtual_machines - } - - networking = { - vnets = var.vnets - network_security_group_definition = var.network_security_group_definition - public_ip_addresses = var.public_ip_addresses - } - - security = { - dynamic_keyvault_secrets = var.dynamic_keyvault_secrets - keyvault_keys = var.keyvault_keys - disk_encryption_sets = var.disk_encryption_sets - } -} - -output "diagnostics" { - value = module.caf.diagnostics -} diff --git a/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/readme.md b/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/readme.md deleted file mode 100644 index dcd713ae2b..0000000000 --- a/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/aztfmod/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/aztfmod/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/variables.tf b/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/variables.tf deleted file mode 100755 index 4d6d68ee41..0000000000 --- a/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/standalone/variables.tf +++ /dev/null @@ -1,118 +0,0 @@ -variable "global_settings" { - default = {} -} -variable "var_folder_path" { - default = {} -} -variable "tags" { - default = null - type = map(any) -} -variable "diagnostic_log_analytics" { - default = {} -} -variable "app_service_environments" { - default = {} -} -variable "app_service_plans" { - default = {} -} -variable "app_services" { - default = {} -} -variable "diagnostics_definition" { - default = null -} -variable "resource_groups" { - default = null -} -variable "network_security_group_definition" { - default = {} -} -variable "vnets" { - default = {} -} -variable "azurerm_redis_caches" { - default = {} -} -variable "mssql_servers" { - default = {} -} -variable "mssql_databases" { - default = {} -} -variable "mssql_elastic_pools" { - default = {} -} -variable "storage_accounts" { - default = {} -} -variable "azuread_groups" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "virtual_machines" { - default = {} -} -variable "bastion_hosts" { - default = {} -} -variable "public_ip_addresses" { - default = {} -} -variable "diagnostic_storage_accounts" { - default = {} -} -variable "managed_identities" { - default = {} -} -variable "private_dns" { - default = {} -} -variable "synapse_workspaces" { - default = {} -} -variable "azurerm_application_insights" { - default = {} -} -variable "role_mapping" { - default = {} -} -variable "aks_clusters" { - default = {} -} -variable "databricks_workspaces" { - default = {} -} -variable "machine_learning_workspaces" { - default = {} -} -variable "monitoring" { - default = {} -} -variable "virtual_wans" { - default = {} -} -variable "event_hub_namespaces" { - default = {} -} -variable "application_gateways" { - default = {} -} -variable "application_gateway_applications" { - default = {} -} -variable "dynamic_keyvault_secrets" { - default = {} -} -variable "disk_encryption_sets" { - default = {} -} -variable "keyvault_keys" { - default = {} -} \ No newline at end of file diff --git a/examples/compute/virtual_machine/210-vm-bastion-winrm/standalone/ci.sh b/examples/compute/virtual_machine/210-vm-bastion-winrm/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/compute/virtual_machine/210-vm-bastion-winrm/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/compute/virtual_machine/210-vm-bastion-winrm/standalone/variables.tf b/examples/compute/virtual_machine/210-vm-bastion-winrm/standalone/variables.tf deleted file mode 100755 index 1000ffedbf..0000000000 --- a/examples/compute/virtual_machine/210-vm-bastion-winrm/standalone/variables.tf +++ /dev/null @@ -1,105 +0,0 @@ - -variable "global_settings" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} -variable "app_service_environments" { - default = {} -} -variable "app_service_plans" { - default = {} -} -variable "app_services" { - default = {} -} -variable "diagnostics_definition" { - default = null -} -variable "resource_groups" { - default = null -} -variable "network_security_group_definition" { - default = {} -} -variable "vnets" { - default = {} -} -variable "azurerm_redis_caches" { - default = {} -} -variable "mssql_servers" { - default = {} -} -variable "mssql_databases" { - default = {} -} -variable "mssql_elastic_pools" { - default = {} -} -variable "storage_accounts" { - default = {} -} -variable "azuread_groups" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "virtual_machines" { - default = {} -} -variable "bastion_hosts" { - default = {} -} -variable "public_ip_addresses" { - default = {} -} -variable "diagnostic_storage_accounts" { - default = {} -} -variable "managed_identities" { - default = {} -} -variable "private_dns" { - default = {} -} -variable "synapse_workspaces" { - default = {} -} -variable "azurerm_application_insights" { - default = {} -} -variable "role_mapping" { - default = {} -} -variable "aks_clusters" { - default = {} -} -variable "databricks_workspaces" { - default = {} -} -variable "machine_learning_workspaces" { - default = {} -} -variable "monitoring" { - default = {} -} -variable "virtual_wans" { - default = {} -} -variable "event_hub_namespaces" { - default = {} -} -variable "application_gateways" { - default = {} -} -variable "application_gateway_applications" { - default = {} -} \ No newline at end of file diff --git a/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/ci.sh b/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/ci.sh deleted file mode 100755 index 9a3d5c47d9..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../cassandra.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../cassandra.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/main.tf b/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/module.tf b/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/module.tf deleted file mode 100644 index 04307998e8..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/module.tf +++ /dev/null @@ -1,15 +0,0 @@ -module "caf" { - source = "../../../../" - - global_settings = var.global_settings - diagnostic_storage_accounts = var.diagnostic_storage_accounts - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - managed_identities = var.managed_identities - role_mapping = var.role_mapping - - database = { - cosmos_dbs = var.cosmos_dbs - } -} diff --git a/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/readme.md b/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/readme.md deleted file mode 100644 index 5d12b1330f..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/readme.md +++ /dev/null @@ -1,9 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -terraform init - -terraform [plan|apply|destroy] \ - -var-file ../cassandra.tfvars - -``` \ No newline at end of file diff --git a/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/variables.tf b/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/variables.tf deleted file mode 100755 index 93afba20f7..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-cassandra/standalone/variables.tf +++ /dev/null @@ -1,111 +0,0 @@ - -variable "global_settings" { - default = {} -} -variable "var_folder_path" { - default = {} -} -variable "tags" { - default = null - type = map(any) -} -variable "app_service_environments" { - default = {} -} -variable "app_service_plans" { - default = {} -} -variable "app_services" { - default = {} -} -variable "diagnostics_definition" { - default = null -} -variable "resource_groups" { - default = null -} -variable "network_security_group_definition" { - default = {} -} -variable "vnets" { - default = {} -} -variable "azurerm_redis_caches" { - default = {} -} -variable "mssql_servers" { - default = {} -} -variable "mssql_databases" { - default = {} -} -variable "mssql_elastic_pools" { - default = {} -} -variable "storage_accounts" { - default = {} -} -variable "azuread_groups" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "virtual_machines" { - default = {} -} -variable "bastion_hosts" { - default = {} -} -variable "public_ip_addresses" { - default = {} -} -variable "diagnostic_storage_accounts" { - default = {} -} -variable "managed_identities" { - default = {} -} -variable "private_dns" { - default = {} -} -variable "synapse_workspaces" { - default = {} -} -variable "azurerm_application_insights" { - default = {} -} -variable "role_mapping" { - default = {} -} -variable "aks_clusters" { - default = {} -} -variable "databricks_workspaces" { - default = {} -} -variable "machine_learning_workspaces" { - default = {} -} -variable "monitoring" { - default = {} -} -variable "virtual_wans" { - default = {} -} -variable "event_hub_namespaces" { - default = {} -} -variable "application_gateways" { - default = {} -} -variable "application_gateway_applications" { - default = {} -} - -variable "cosmos_dbs" { - default = {} -} \ No newline at end of file diff --git a/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/ci.sh b/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/ci.sh deleted file mode 100755 index 5e40d12c03..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../gremlin_databases.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../gremlin_databases.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/main.tf b/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/module.tf b/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/module.tf deleted file mode 100644 index 04307998e8..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/module.tf +++ /dev/null @@ -1,15 +0,0 @@ -module "caf" { - source = "../../../../" - - global_settings = var.global_settings - diagnostic_storage_accounts = var.diagnostic_storage_accounts - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - managed_identities = var.managed_identities - role_mapping = var.role_mapping - - database = { - cosmos_dbs = var.cosmos_dbs - } -} diff --git a/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/readme.md b/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/readme.md deleted file mode 100644 index 4e840a44e7..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/readme.md +++ /dev/null @@ -1,9 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -terraform init - -terraform [plan|apply|destroy] \ - -var-file ../gremlin_databases.tfvars - -``` \ No newline at end of file diff --git a/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/variables.tf b/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/variables.tf deleted file mode 100755 index e0bc3af007..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-gremlin/standalone/variables.tf +++ /dev/null @@ -1,110 +0,0 @@ - -variable "global_settings" { - default = {} -} -variable "var_folder_path" { - default = {} -} -variable "tags" { - default = null - type = map(any) -} -variable "app_service_environments" { - default = {} -} -variable "app_service_plans" { - default = {} -} -variable "app_services" { - default = {} -} -variable "diagnostics_definition" { - default = null -} -variable "resource_groups" { - default = null -} -variable "network_security_group_definition" { - default = {} -} -variable "vnets" { - default = {} -} -variable "azurerm_redis_caches" { - default = {} -} -variable "mssql_servers" { - default = {} -} -variable "mssql_databases" { - default = {} -} -variable "mssql_elastic_pools" { - default = {} -} -variable "storage_accounts" { - default = {} -} -variable "azuread_groups" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "virtual_machines" { - default = {} -} -variable "bastion_hosts" { - default = {} -} -variable "public_ip_addresses" { - default = {} -} -variable "diagnostic_storage_accounts" { - default = {} -} -variable "managed_identities" { - default = {} -} -variable "private_dns" { - default = {} -} -variable "synapse_workspaces" { - default = {} -} -variable "azurerm_application_insights" { - default = {} -} -variable "role_mapping" { - default = {} -} -variable "aks_clusters" { - default = {} -} -variable "databricks_workspaces" { - default = {} -} -variable "machine_learning_workspaces" { - default = {} -} -variable "monitoring" { - default = {} -} -variable "virtual_wans" { - default = {} -} -variable "event_hub_namespaces" { - default = {} -} -variable "application_gateways" { - default = {} -} -variable "application_gateway_applications" { - default = {} -} -variable "cosmos_dbs" { - default = {} -} \ No newline at end of file diff --git a/examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/main.tf b/examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/module.tf b/examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/module.tf deleted file mode 100644 index 04307998e8..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/module.tf +++ /dev/null @@ -1,15 +0,0 @@ -module "caf" { - source = "../../../../" - - global_settings = var.global_settings - diagnostic_storage_accounts = var.diagnostic_storage_accounts - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - managed_identities = var.managed_identities - role_mapping = var.role_mapping - - database = { - cosmos_dbs = var.cosmos_dbs - } -} diff --git a/examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/readme.md b/examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/readme.md deleted file mode 100644 index 88d8f18a98..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/readme.md +++ /dev/null @@ -1,15 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -terraform init - -terraform [plan|apply|destroy] \ - -var-file ../configuration.tfvars \ - -var-file ../keyvaults.tfvars \ - -var-file ../nsg_definitions.tfvars \ - -var-file ../virtual_networks.tfvars \ - -var-file ../public_ip_addresses.tfvars \ - -var-file ../virtual_machines.tfvars - - -``` \ No newline at end of file diff --git a/examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/variables.tf b/examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/variables.tf deleted file mode 100755 index 3839d375e1..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-mongo/standalone/variables.tf +++ /dev/null @@ -1,109 +0,0 @@ - -variable "global_settings" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} -variable "app_service_environments" { - default = {} -} -variable "app_service_plans" { - default = {} -} -variable "app_services" { - default = {} -} -variable "diagnostics_definition" { - default = null -} -variable "resource_groups" { - default = null -} -variable "network_security_group_definition" { - default = {} -} -variable "vnets" { - default = {} -} -variable "azurerm_redis_caches" { - default = {} -} -variable "mssql_servers" { - default = {} -} -variable "mssql_databases" { - default = {} -} -variable "mssql_elastic_pools" { - default = {} -} -variable "storage_accounts" { - default = {} -} -variable "azuread_groups" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "virtual_machines" { - default = {} -} -variable "bastion_hosts" { - default = {} -} -variable "public_ip_addresses" { - default = {} -} -variable "diagnostic_storage_accounts" { - default = {} -} -variable "managed_identities" { - default = {} -} -variable "private_dns" { - default = {} -} -variable "synapse_workspaces" { - default = {} -} -variable "azurerm_application_insights" { - default = {} -} -variable "role_mapping" { - default = {} -} -variable "aks_clusters" { - default = {} -} -variable "databricks_workspaces" { - default = {} -} -variable "machine_learning_workspaces" { - default = {} -} -variable "monitoring" { - default = {} -} -variable "virtual_wans" { - default = {} -} -variable "event_hub_namespaces" { - default = {} -} -variable "application_gateways" { - default = {} -} -variable "application_gateway_applications" { - default = {} -} - -variable "cosmos_dbs" { - default = {} -} \ No newline at end of file diff --git a/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/ci.sh b/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/ci.sh deleted file mode 100755 index 38e071ddfb..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../sql_databases.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../sql_databases.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/main.tf b/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/module.tf b/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/module.tf deleted file mode 100644 index 072f4f8382..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/module.tf +++ /dev/null @@ -1,9 +0,0 @@ -module "caf" { - source = "../../../../" - - global_settings = var.global_settings - resource_groups = var.resource_groups - database = { - cosmos_db = var.cosmos_dbs - } -} diff --git a/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/readme.md b/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/readme.md deleted file mode 100644 index 5c39baf936..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/cosmos_db/100-simple-cosmos-db-sql/standalone - -terraform init - -terraform [plan | apply | destroy]\ - -var-file ../sql_databases.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/cosmos_db/100-simple-cosmos-db-sql/ \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/variables.tf b/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/variables.tf deleted file mode 100755 index 7bd3039c9b..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-sql/standalone/variables.tf +++ /dev/null @@ -1,21 +0,0 @@ - -variable "global_settings" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "resource_groups" { - default = null -} - -variable "cosmos_dbs" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/cosmos_db/100-simple-cosmos-db-table/standalone/ci.sh b/examples/cosmos_db/100-simple-cosmos-db-table/standalone/ci.sh deleted file mode 100755 index df2b1b2cb7..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-table/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../tables.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../tables.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/cosmos_db/100-simple-cosmos-db-table/standalone/main.tf b/examples/cosmos_db/100-simple-cosmos-db-table/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-table/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/cosmos_db/100-simple-cosmos-db-table/standalone/module.tf b/examples/cosmos_db/100-simple-cosmos-db-table/standalone/module.tf deleted file mode 100644 index 04307998e8..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-table/standalone/module.tf +++ /dev/null @@ -1,15 +0,0 @@ -module "caf" { - source = "../../../../" - - global_settings = var.global_settings - diagnostic_storage_accounts = var.diagnostic_storage_accounts - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - managed_identities = var.managed_identities - role_mapping = var.role_mapping - - database = { - cosmos_dbs = var.cosmos_dbs - } -} diff --git a/examples/cosmos_db/100-simple-cosmos-db-table/standalone/readme.md b/examples/cosmos_db/100-simple-cosmos-db-table/standalone/readme.md deleted file mode 100644 index 1dbb0aab41..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-table/standalone/readme.md +++ /dev/null @@ -1,8 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -terraform init - -terraform [plan|apply|destroy] \ - -var-file ../tables.tfvars -``` diff --git a/examples/cosmos_db/100-simple-cosmos-db-table/standalone/variables.tf b/examples/cosmos_db/100-simple-cosmos-db-table/standalone/variables.tf deleted file mode 100755 index 7f001da844..0000000000 --- a/examples/cosmos_db/100-simple-cosmos-db-table/standalone/variables.tf +++ /dev/null @@ -1,109 +0,0 @@ -variable "global_settings" { - default = {} -} -variable "var_folder_path" { - default = {} -} -variable "tags" { - default = null - type = map(any) -} -variable "app_service_environments" { - default = {} -} -variable "app_service_plans" { - default = {} -} -variable "app_services" { - default = {} -} -variable "diagnostics_definition" { - default = null -} -variable "resource_groups" { - default = null -} -variable "network_security_group_definition" { - default = {} -} -variable "vnets" { - default = {} -} -variable "azurerm_redis_caches" { - default = {} -} -variable "mssql_servers" { - default = {} -} -variable "mssql_databases" { - default = {} -} -variable "mssql_elastic_pools" { - default = {} -} -variable "storage_accounts" { - default = {} -} -variable "azuread_groups" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "virtual_machines" { - default = {} -} -variable "bastion_hosts" { - default = {} -} -variable "public_ip_addresses" { - default = {} -} -variable "diagnostic_storage_accounts" { - default = {} -} -variable "managed_identities" { - default = {} -} -variable "private_dns" { - default = {} -} -variable "synapse_workspaces" { - default = {} -} -variable "azurerm_application_insights" { - default = {} -} -variable "role_mapping" { - default = {} -} -variable "aks_clusters" { - default = {} -} -variable "databricks_workspaces" { - default = {} -} -variable "machine_learning_workspaces" { - default = {} -} -variable "monitoring" { - default = {} -} -variable "virtual_wans" { - default = {} -} -variable "event_hub_namespaces" { - default = {} -} -variable "application_gateways" { - default = {} -} -variable "application_gateway_applications" { - default = {} -} -variable "cosmos_dbs" { - default = {} -} \ No newline at end of file diff --git a/examples/databricks/100-simple-databricks/standalone/ci.sh b/examples/databricks/100-simple-databricks/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/databricks/100-simple-databricks/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/databricks/100-simple-databricks/standalone/main.tf b/examples/databricks/100-simple-databricks/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/databricks/100-simple-databricks/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/databricks/100-simple-databricks/standalone/module.tf b/examples/databricks/100-simple-databricks/standalone/module.tf deleted file mode 100644 index ab2e96f975..0000000000 --- a/examples/databricks/100-simple-databricks/standalone/module.tf +++ /dev/null @@ -1,16 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - keyvaults = var.keyvaults - database = { - databricks_workspaces = var.databricks_workspaces - } - networking = { - vnets = var.vnets - network_security_group_definition = var.network_security_group_definition - public_ip_addresses = var.public_ip_addresses - } -} - diff --git a/examples/databricks/100-simple-databricks/standalone/readme.md b/examples/databricks/100-simple-databricks/standalone/readme.md deleted file mode 100644 index 329fff22e2..0000000000 --- a/examples/databricks/100-simple-databricks/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/databricks/100-simple-databricks/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/databricks/100-simple-databricks/\ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/databricks/100-simple-databricks/standalone/variables.tf b/examples/databricks/100-simple-databricks/standalone/variables.tf deleted file mode 100755 index e8b3a8f2d1..0000000000 --- a/examples/databricks/100-simple-databricks/standalone/variables.tf +++ /dev/null @@ -1,37 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "network_security_group_definition" { - default = {} -} - -variable "databricks_workspaces" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "public_ip_addresses" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "keyvaults" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/datalake/101-datalake-storage/standalone/ci.sh b/examples/datalake/101-datalake-storage/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/datalake/101-datalake-storage/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/datalake/101-datalake-storage/standalone/main.tf b/examples/datalake/101-datalake-storage/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/datalake/101-datalake-storage/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/datalake/101-datalake-storage/standalone/module.tf b/examples/datalake/101-datalake-storage/standalone/module.tf deleted file mode 100644 index c6bd402620..0000000000 --- a/examples/datalake/101-datalake-storage/standalone/module.tf +++ /dev/null @@ -1,8 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts -} - diff --git a/examples/datalake/101-datalake-storage/standalone/readme.md b/examples/datalake/101-datalake-storage/standalone/readme.md deleted file mode 100644 index 68d4a11652..0000000000 --- a/examples/datalake/101-datalake-storage/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/datalake/101-datalake-storage/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/datalake/101-datalake-storage/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/datalake/101-datalake-storage/standalone/variables.tf b/examples/datalake/101-datalake-storage/standalone/variables.tf deleted file mode 100755 index 9719914378..0000000000 --- a/examples/datalake/101-datalake-storage/standalone/variables.tf +++ /dev/null @@ -1,21 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/ci.sh b/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/ci.sh deleted file mode 100755 index bbb599ce37..0000000000 --- a/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/ci.sh +++ /dev/null @@ -1,30 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var-file ../diagnostic_event_hub_namespaces.tfvars \ - -var-file ../diagnostics_definition.tfvars \ - -var-file ../diagnostics_destinations.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var-file ../diagnostic_event_hub_namespaces.tfvars \ - -var-file ../diagnostics_definition.tfvars \ - -var-file ../diagnostics_destinations.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/main.tf b/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/main.tf deleted file mode 100755 index c083a08157..0000000000 --- a/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.50.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/module.tf b/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/module.tf deleted file mode 100755 index fe61390028..0000000000 --- a/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/module.tf +++ /dev/null @@ -1,15 +0,0 @@ -module "caf" { - source = "../../../../" - resource_groups = var.resource_groups - tags = var.tags - diagnostics = { - diagnostics_definition = var.diagnostics_definition - diagnostics_destinations = var.diagnostics_destinations - diagnostic_event_hub_namespaces = var.diagnostic_event_hub_namespaces - } - -} - -output "objects" { - value = module.caf -} \ No newline at end of file diff --git a/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/readme.md b/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/readme.md deleted file mode 100755 index be6b062b24..0000000000 --- a/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/readme.md +++ /dev/null @@ -1,25 +0,0 @@ -You can test this module outside of a landingzone using - -``` -configuration_folder=/workspaces/terraform-azurerm-caf/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces -parameter_files=$(find ${configuration_folder} | grep .tfvars | sed 's/.*/-var-file &/' | xargs) - -cd ${configuration_folder}/standalone - -terraform init - -terraform plan ${parameter_files} - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/aztfmod/examples \ - -var-folder /tf/caf/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/ \ - -level level1 \ - -a [plan | apply | destroy] - -``` \ No newline at end of file diff --git a/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/variables.tf b/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/variables.tf deleted file mode 100755 index 5f72a0c9c5..0000000000 --- a/examples/diagnostics_profiles/200-diagnostics-eventhub-namespaces/standalone/variables.tf +++ /dev/null @@ -1,28 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "diagnostic_event_hub_namespaces" { - default = {} -} - -variable "diagnostics_definition" { - default = {} -} - -variable "diagnostics_destinations" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/eventhub/100-simple-eventhub-namespace/standalone/ci.sh b/examples/eventhub/100-simple-eventhub-namespace/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/eventhub/100-simple-eventhub-namespace/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/eventhub/100-simple-eventhub-namespace/standalone/main.tf b/examples/eventhub/100-simple-eventhub-namespace/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/eventhub/100-simple-eventhub-namespace/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/eventhub/100-simple-eventhub-namespace/standalone/module.tf b/examples/eventhub/100-simple-eventhub-namespace/standalone/module.tf deleted file mode 100644 index de69dd0bc0..0000000000 --- a/examples/eventhub/100-simple-eventhub-namespace/standalone/module.tf +++ /dev/null @@ -1,8 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - event_hub_namespaces = var.event_hub_namespaces -} - diff --git a/examples/eventhub/100-simple-eventhub-namespace/standalone/readme.md b/examples/eventhub/100-simple-eventhub-namespace/standalone/readme.md deleted file mode 100644 index d1534f8399..0000000000 --- a/examples/eventhub/100-simple-eventhub-namespace/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/eventhub/100-simple-eventhub-namespace/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/eventhub/100-simple-eventhub-namespace/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/eventhub/100-simple-eventhub-namespace/standalone/variables.tf b/examples/eventhub/100-simple-eventhub-namespace/standalone/variables.tf deleted file mode 100755 index c76108a382..0000000000 --- a/examples/eventhub/100-simple-eventhub-namespace/standalone/variables.tf +++ /dev/null @@ -1,20 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "event_hub_namespaces" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/ci.sh b/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/main.tf b/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/module.tf b/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/module.tf deleted file mode 100644 index 8a8822df87..0000000000 --- a/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/module.tf +++ /dev/null @@ -1,11 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - event_hub_namespaces = var.event_hub_namespaces - networking = { - vnets = var.vnets - } -} - diff --git a/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/readme.md b/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/readme.md deleted file mode 100644 index c861062b72..0000000000 --- a/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/eventhub_namespace/101-evh-with-private-endpoint/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/eventhub_namespace/101-evh-with-private-endpoint/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/variables.tf b/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/variables.tf deleted file mode 100755 index 9bc3447f4f..0000000000 --- a/examples/eventhub/101-evh-namespace-with-private-endpoint/standalone/variables.tf +++ /dev/null @@ -1,24 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "event_hub_namespaces" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/ci.sh b/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/ci.sh deleted file mode 100755 index f848bb5301..0000000000 --- a/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/ci.sh +++ /dev/null @@ -1,25 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/main.tf b/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/module.tf b/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/module.tf deleted file mode 100644 index 9868087ff4..0000000000 --- a/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/module.tf +++ /dev/null @@ -1,11 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - event_hubs = var.event_hubs - event_hub_auth_rules = var.event_hub_auth_rules - event_hub_namespaces = var.event_hub_namespaces -} - diff --git a/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/readme.md b/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/readme.md deleted file mode 100755 index c0a10e81e8..0000000000 --- a/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/eventhub/102-namespace-and-evh-with-auth-rules/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/variables.tf b/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/variables.tf deleted file mode 100755 index ddc04dc60f..0000000000 --- a/examples/eventhub/102-namespace-and-evh-with-auth-rules/standalone/variables.tf +++ /dev/null @@ -1,33 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "event_hub_namespaces" { - default = {} -} - -variable "event_hub_auth_rules" { - default = {} -} - -variable "event_hubs" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/eventhub/103-eventhub-consumer-groups/standalone/ci.sh b/examples/eventhub/103-eventhub-consumer-groups/standalone/ci.sh deleted file mode 100755 index f848bb5301..0000000000 --- a/examples/eventhub/103-eventhub-consumer-groups/standalone/ci.sh +++ /dev/null @@ -1,25 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/eventhub/103-eventhub-consumer-groups/standalone/main.tf b/examples/eventhub/103-eventhub-consumer-groups/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/eventhub/103-eventhub-consumer-groups/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/eventhub/103-eventhub-consumer-groups/standalone/module.tf b/examples/eventhub/103-eventhub-consumer-groups/standalone/module.tf deleted file mode 100644 index b8c2a06e0d..0000000000 --- a/examples/eventhub/103-eventhub-consumer-groups/standalone/module.tf +++ /dev/null @@ -1,12 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - event_hubs = var.event_hubs - event_hub_auth_rules = var.event_hub_auth_rules - event_hub_namespaces = var.event_hub_namespaces - event_hub_consumer_groups = var.event_hub_consumer_groups -} - diff --git a/examples/eventhub/103-eventhub-consumer-groups/standalone/readme.md b/examples/eventhub/103-eventhub-consumer-groups/standalone/readme.md deleted file mode 100755 index d05b8821ad..0000000000 --- a/examples/eventhub/103-eventhub-consumer-groups/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/eventhub/103-eventhub-consumer-groups/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/eventhub/103-eventhub-consumer-groups/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/eventhub/103-eventhub-consumer-groups/standalone/variables.tf b/examples/eventhub/103-eventhub-consumer-groups/standalone/variables.tf deleted file mode 100755 index 399ef3c4ba..0000000000 --- a/examples/eventhub/103-eventhub-consumer-groups/standalone/variables.tf +++ /dev/null @@ -1,36 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "event_hub_namespaces" { - default = {} -} - -variable "event_hub_auth_rules" { - default = {} -} - -variable "event_hubs" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - -variable "event_hub_consumer_groups" { - default = {} -} \ No newline at end of file diff --git a/examples/keyvault/101-keyvault-policies/standalone/ci.sh b/examples/keyvault/101-keyvault-policies/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/keyvault/101-keyvault-policies/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/keyvault/101-keyvault-policies/standalone/main.tf b/examples/keyvault/101-keyvault-policies/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/keyvault/101-keyvault-policies/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/keyvault/101-keyvault-policies/standalone/module.tf b/examples/keyvault/101-keyvault-policies/standalone/module.tf deleted file mode 100644 index 86573fe34e..0000000000 --- a/examples/keyvault/101-keyvault-policies/standalone/module.tf +++ /dev/null @@ -1,12 +0,0 @@ -module "caf" { - source = "../../../../" - - global_settings = var.global_settings - resource_groups = var.resource_groups - keyvaults = var.keyvaults - keyvault_access_policies = var.keyvault_access_policies - - networking = { - vnets = var.vnets - } -} diff --git a/examples/keyvault/101-keyvault-policies/standalone/readme.md b/examples/keyvault/101-keyvault-policies/standalone/readme.md deleted file mode 100644 index 37a41dc30b..0000000000 --- a/examples/keyvault/101-keyvault-policies/standalone/readme.md +++ /dev/null @@ -1,26 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/aztfmod/examples/keyvault/101-keyvault-policies/standalone - -terraform init - -terraform [plan|apply|delete] \ - -var-file ../configuration.tfvars \ - -var-file ../keyvaults.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -tfstate example-101-keyvault-policies.tfstate \ - -var-folder /tf/caf/aztfmod/examples/keyvault/101-keyvault-policies \ - -level level1 \ - -a [plan|apply|delete] - -``` \ No newline at end of file diff --git a/examples/keyvault/101-keyvault-policies/standalone/variables.tf b/examples/keyvault/101-keyvault-policies/standalone/variables.tf deleted file mode 100755 index 4bc7ef463c..0000000000 --- a/examples/keyvault/101-keyvault-policies/standalone/variables.tf +++ /dev/null @@ -1,28 +0,0 @@ - -variable "global_settings" { - default = {} -} -variable "resource_groups" { - default = null -} -variable "vnets" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "private_dns" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} \ No newline at end of file diff --git a/examples/keyvault/102-keyvault-cert-issuer/standalone/ci.sh b/examples/keyvault/102-keyvault-cert-issuer/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/keyvault/102-keyvault-cert-issuer/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/keyvault/102-keyvault-cert-issuer/standalone/main.tf b/examples/keyvault/102-keyvault-cert-issuer/standalone/main.tf deleted file mode 100644 index 4ca102e64e..0000000000 --- a/examples/keyvault/102-keyvault-cert-issuer/standalone/main.tf +++ /dev/null @@ -1,45 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - - - diff --git a/examples/keyvault/102-keyvault-cert-issuer/standalone/module.tf b/examples/keyvault/102-keyvault-cert-issuer/standalone/module.tf deleted file mode 100644 index 55ddbcc3ca..0000000000 --- a/examples/keyvault/102-keyvault-cert-issuer/standalone/module.tf +++ /dev/null @@ -1,10 +0,0 @@ -module "caf" { - source = "../../../../" - - global_settings = var.global_settings - resource_groups = var.resource_groups - keyvaults = var.keyvaults - keyvault_access_policies = var.keyvault_access_policies - dynamic_keyvault_secrets = var.dynamic_keyvault_secrets - keyvault_certificate_issuers = var.keyvault_certificate_issuers -} diff --git a/examples/keyvault/102-keyvault-cert-issuer/standalone/readme.md b/examples/keyvault/102-keyvault-cert-issuer/standalone/readme.md deleted file mode 100644 index a5895e8a7b..0000000000 --- a/examples/keyvault/102-keyvault-cert-issuer/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/keyvault/102-keyvault-cert-issuer/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/keyvault/102-keyvault-cert-issuer/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/keyvault/102-keyvault-cert-issuer/standalone/variables.tf b/examples/keyvault/102-keyvault-cert-issuer/standalone/variables.tf deleted file mode 100755 index f63d1e82bb..0000000000 --- a/examples/keyvault/102-keyvault-cert-issuer/standalone/variables.tf +++ /dev/null @@ -1,38 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "keyvaults" { - default = {} -} - -variable "keyvault_access_policies" { - default = {} -} - -variable "dynamic_keyvault_secrets" { - default = {} -} - -variable "keyvault_certificate_issuers" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - - - - - - diff --git a/examples/machine_learning/100-aml/standalone/ci.sh b/examples/machine_learning/100-aml/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/machine_learning/100-aml/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/machine_learning/100-aml/standalone/main.tf b/examples/machine_learning/100-aml/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/machine_learning/100-aml/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/machine_learning/100-aml/standalone/module.tf b/examples/machine_learning/100-aml/standalone/module.tf deleted file mode 100644 index c33558f121..0000000000 --- a/examples/machine_learning/100-aml/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - webapp = { - azurerm_application_insights = var.azurerm_application_insights - } - - database = { - machine_learning_workspaces = var.machine_learning_workspaces - } -} - diff --git a/examples/machine_learning/100-aml/standalone/readme.md b/examples/machine_learning/100-aml/standalone/readme.md deleted file mode 100644 index 2cf33e7741..0000000000 --- a/examples/machine_learning/100-aml/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/machine_learning/100-aml/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/machine_learning/100-aml/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/machine_learning/100-aml/standalone/variables.tf b/examples/machine_learning/100-aml/standalone/variables.tf deleted file mode 100755 index 6636952660..0000000000 --- a/examples/machine_learning/100-aml/standalone/variables.tf +++ /dev/null @@ -1,34 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "azurerm_application_insights" { - default = {} -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "machine_learning_workspaces" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - - diff --git a/examples/managed_service_identity/100-msi-levels/standalone/ci.sh b/examples/managed_service_identity/100-msi-levels/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/managed_service_identity/100-msi-levels/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/managed_service_identity/100-msi-levels/standalone/main.tf b/examples/managed_service_identity/100-msi-levels/standalone/main.tf deleted file mode 100644 index 89f1f81bf3..0000000000 --- a/examples/managed_service_identity/100-msi-levels/standalone/main.tf +++ /dev/null @@ -1,38 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.4.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.14" -} - -provider "azurerm" { - features {} -} - diff --git a/examples/managed_service_identity/100-msi-levels/standalone/module.tf b/examples/managed_service_identity/100-msi-levels/standalone/module.tf deleted file mode 100644 index 9099aae49c..0000000000 --- a/examples/managed_service_identity/100-msi-levels/standalone/module.tf +++ /dev/null @@ -1,7 +0,0 @@ -module "caf" { - source = "../../../../" - - global_settings = var.global_settings - resource_groups = var.resource_groups - managed_identities = var.managed_identities -} diff --git a/examples/managed_service_identity/100-msi-levels/standalone/readme.md b/examples/managed_service_identity/100-msi-levels/standalone/readme.md deleted file mode 100644 index 782ea100e7..0000000000 --- a/examples/managed_service_identity/100-msi-levels/standalone/readme.md +++ /dev/null @@ -1,25 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/aztfmod/examples/managed_service_identity/101-msi-levels/standalone - -terraform init - -terraform [plan|apply|delete] \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -tfstate example-101-msi-levels.tfstate \ - -var-folder /tf/caf/aztfmod/examples/managed_service_identity/101-msi-levels \ - -level level1 \ - -a [plan|apply|delete] - -``` \ No newline at end of file diff --git a/examples/managed_service_identity/100-msi-levels/standalone/variables.tf b/examples/managed_service_identity/100-msi-levels/standalone/variables.tf deleted file mode 100755 index f86d5225ec..0000000000 --- a/examples/managed_service_identity/100-msi-levels/standalone/variables.tf +++ /dev/null @@ -1,19 +0,0 @@ - -variable "global_settings" { - default = {} -} -variable "resource_groups" { - default = null -} -variable "managed_identities" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} diff --git a/examples/mariadb_server/100-simple-mariadb/standalone/ci.sh b/examples/mariadb_server/100-simple-mariadb/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/mariadb_server/100-simple-mariadb/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/mariadb_server/100-simple-mariadb/standalone/main.tf b/examples/mariadb_server/100-simple-mariadb/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/mariadb_server/100-simple-mariadb/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/mariadb_server/100-simple-mariadb/standalone/module.tf b/examples/mariadb_server/100-simple-mariadb/standalone/module.tf deleted file mode 100644 index 10344d38ea..0000000000 --- a/examples/mariadb_server/100-simple-mariadb/standalone/module.tf +++ /dev/null @@ -1,13 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - database = { - mariadb_servers = var.mariadb_servers - } -} - diff --git a/examples/mariadb_server/100-simple-mariadb/standalone/readme.md b/examples/mariadb_server/100-simple-mariadb/standalone/readme.md deleted file mode 100644 index 07b42a3285..0000000000 --- a/examples/mariadb_server/100-simple-mariadb/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/mariadb_server/100-simple-mariadb/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/mariadb_server/100-simple-mariadb/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/mariadb_server/100-simple-mariadb/standalone/variables.tf b/examples/mariadb_server/100-simple-mariadb/standalone/variables.tf deleted file mode 100755 index d15ddb65f9..0000000000 --- a/examples/mariadb_server/100-simple-mariadb/standalone/variables.tf +++ /dev/null @@ -1,29 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "mariadb_servers" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/mariadb_server/101-vnet-rule-mariadb/standalone/ci.sh b/examples/mariadb_server/101-vnet-rule-mariadb/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/mariadb_server/101-vnet-rule-mariadb/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/mariadb_server/101-vnet-rule-mariadb/standalone/main.tf b/examples/mariadb_server/101-vnet-rule-mariadb/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/mariadb_server/101-vnet-rule-mariadb/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/mariadb_server/101-vnet-rule-mariadb/standalone/module.tf b/examples/mariadb_server/101-vnet-rule-mariadb/standalone/module.tf deleted file mode 100644 index 4b3b2c6b3c..0000000000 --- a/examples/mariadb_server/101-vnet-rule-mariadb/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - database = { - mariadb_servers = var.mariadb_servers - } - - networking = { - vnets = var.vnets - } -} - diff --git a/examples/mariadb_server/101-vnet-rule-mariadb/standalone/readme.md b/examples/mariadb_server/101-vnet-rule-mariadb/standalone/readme.md deleted file mode 100644 index a150ca8223..0000000000 --- a/examples/mariadb_server/101-vnet-rule-mariadb/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/mariadb_server/101-vnet-rule-mariadb/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/mariadb_server/101-vnet-rule-mariadb/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/mariadb_server/101-vnet-rule-mariadb/standalone/variables.tf b/examples/mariadb_server/101-vnet-rule-mariadb/standalone/variables.tf deleted file mode 100755 index e4e194384d..0000000000 --- a/examples/mariadb_server/101-vnet-rule-mariadb/standalone/variables.tf +++ /dev/null @@ -1,33 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "mariadb_servers" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/mariadb_server/102-private-endpoint-mariadb/standalone/ci.sh b/examples/mariadb_server/102-private-endpoint-mariadb/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/mariadb_server/102-private-endpoint-mariadb/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/mariadb_server/102-private-endpoint-mariadb/standalone/main.tf b/examples/mariadb_server/102-private-endpoint-mariadb/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/mariadb_server/102-private-endpoint-mariadb/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/mariadb_server/102-private-endpoint-mariadb/standalone/module.tf b/examples/mariadb_server/102-private-endpoint-mariadb/standalone/module.tf deleted file mode 100644 index 4b3b2c6b3c..0000000000 --- a/examples/mariadb_server/102-private-endpoint-mariadb/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - database = { - mariadb_servers = var.mariadb_servers - } - - networking = { - vnets = var.vnets - } -} - diff --git a/examples/mariadb_server/102-private-endpoint-mariadb/standalone/readme.md b/examples/mariadb_server/102-private-endpoint-mariadb/standalone/readme.md deleted file mode 100644 index 7e0468d0cd..0000000000 --- a/examples/mariadb_server/102-private-endpoint-mariadb/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/mariadb_server/102-private-endpoint-mariadb/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/mariadb_server/102-private-endpoint-mariadb/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/mariadb_server/102-private-endpoint-mariadb/standalone/variables.tf b/examples/mariadb_server/102-private-endpoint-mariadb/standalone/variables.tf deleted file mode 100755 index e4e194384d..0000000000 --- a/examples/mariadb_server/102-private-endpoint-mariadb/standalone/variables.tf +++ /dev/null @@ -1,33 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "mariadb_servers" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/ci.sh b/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/main.tf b/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/module.tf b/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/module.tf deleted file mode 100644 index 4b3b2c6b3c..0000000000 --- a/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - database = { - mariadb_servers = var.mariadb_servers - } - - networking = { - vnets = var.vnets - } -} - diff --git a/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/readme.md b/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/readme.md deleted file mode 100644 index fd2f510b78..0000000000 --- a/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/variables.tf b/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/variables.tf deleted file mode 100755 index e4e194384d..0000000000 --- a/examples/mariadb_server/103-private-endpoint-with-fw-rule-mariadb/standalone/variables.tf +++ /dev/null @@ -1,33 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "mariadb_servers" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/monitoring/100-service-health-alerts/standalone/ci.sh b/examples/monitoring/100-service-health-alerts/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/monitoring/100-service-health-alerts/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/monitoring/100-service-health-alerts/standalone/main.tf b/examples/monitoring/100-service-health-alerts/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/monitoring/100-service-health-alerts/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/monitoring/100-service-health-alerts/standalone/module.tf b/examples/monitoring/100-service-health-alerts/standalone/module.tf deleted file mode 100644 index d08bcbfefd..0000000000 --- a/examples/monitoring/100-service-health-alerts/standalone/module.tf +++ /dev/null @@ -1,11 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - shared_services = { - monitoring = var.monitoring - } - -} - diff --git a/examples/monitoring/100-service-health-alerts/standalone/readme.md b/examples/monitoring/100-service-health-alerts/standalone/readme.md deleted file mode 100644 index 6d59465131..0000000000 --- a/examples/monitoring/100-service-health-alerts/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/monitoring/100-service-health-alerts/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/monitoring/100-service-health-alerts/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/monitoring/100-service-health-alerts/standalone/variables.tf b/examples/monitoring/100-service-health-alerts/standalone/variables.tf deleted file mode 100755 index f8008a8bd0..0000000000 --- a/examples/monitoring/100-service-health-alerts/standalone/variables.tf +++ /dev/null @@ -1,21 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "monitoring" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/mssql_server/104-sqlserver-elastic_pools/standalone/ci.sh b/examples/mssql_server/104-sqlserver-elastic_pools/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/mssql_server/104-sqlserver-elastic_pools/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/mssql_server/104-sqlserver-elastic_pools/standalone/main.tf b/examples/mssql_server/104-sqlserver-elastic_pools/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/mssql_server/104-sqlserver-elastic_pools/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/mssql_server/104-sqlserver-elastic_pools/standalone/module.tf b/examples/mssql_server/104-sqlserver-elastic_pools/standalone/module.tf deleted file mode 100644 index bd199271d0..0000000000 --- a/examples/mssql_server/104-sqlserver-elastic_pools/standalone/module.tf +++ /dev/null @@ -1,23 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - azuread_roles = var.azuread_roles - azuread_groups = var.azuread_groups - - networking = { - vnets = var.vnets - route_tables = var.route_tables - network_security_group_definition = var.network_security_group_definition - } - - database = { - mssql_databases = var.mssql_databases - mssql_elastic_pools = var.mssql_elastic_pools - mssql_servers = var.mssql_servers - } -} - diff --git a/examples/mssql_server/104-sqlserver-elastic_pools/standalone/readme.md b/examples/mssql_server/104-sqlserver-elastic_pools/standalone/readme.md deleted file mode 100644 index ea289752dd..0000000000 --- a/examples/mssql_server/104-sqlserver-elastic_pools/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/mssql_server/104-sqlserver-elastic_pools/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/mssql_server/104-sqlserver-elastic_pools/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/mssql_server/104-sqlserver-elastic_pools/standalone/variables.tf b/examples/mssql_server/104-sqlserver-elastic_pools/standalone/variables.tf deleted file mode 100755 index 710b572845..0000000000 --- a/examples/mssql_server/104-sqlserver-elastic_pools/standalone/variables.tf +++ /dev/null @@ -1,56 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "route_tables" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "mssql_databases" { - default = {} -} - -variable "mssql_elastic_pools" { - default = {} -} - -variable "mssql_servers" { - default = {} -} - -variable "network_security_group_definition" { - default = {} -} - -variable "azuread_roles" { - default = {} -} - -variable "azuread_groups" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "storage_accounts" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/mssql_server/105-sqlserver-failover_groups/standalone/ci.sh b/examples/mssql_server/105-sqlserver-failover_groups/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/mssql_server/105-sqlserver-failover_groups/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/mssql_server/105-sqlserver-failover_groups/standalone/main.tf b/examples/mssql_server/105-sqlserver-failover_groups/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/mssql_server/105-sqlserver-failover_groups/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/mssql_server/105-sqlserver-failover_groups/standalone/module.tf b/examples/mssql_server/105-sqlserver-failover_groups/standalone/module.tf deleted file mode 100644 index 8f18d0003b..0000000000 --- a/examples/mssql_server/105-sqlserver-failover_groups/standalone/module.tf +++ /dev/null @@ -1,13 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - - database = { - mssql_databases = var.mssql_databases - mssql_failover_groups = var.mssql_failover_groups - mssql_servers = var.mssql_servers - } -} - diff --git a/examples/mssql_server/105-sqlserver-failover_groups/standalone/readme.md b/examples/mssql_server/105-sqlserver-failover_groups/standalone/readme.md deleted file mode 100644 index 936c63e2d6..0000000000 --- a/examples/mssql_server/105-sqlserver-failover_groups/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/mssql_server/105-sqlserver-failover_groups/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/mssql_server/105-sqlserver-failover_groups/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/mssql_server/105-sqlserver-failover_groups/standalone/variables.tf b/examples/mssql_server/105-sqlserver-failover_groups/standalone/variables.tf deleted file mode 100755 index 42e08cc15f..0000000000 --- a/examples/mssql_server/105-sqlserver-failover_groups/standalone/variables.tf +++ /dev/null @@ -1,29 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - - -variable "tags" { - default = null - type = map(any) -} - -variable "mssql_databases" { - default = {} -} - -variable "mssql_failover_groups" { - default = {} -} - -variable "mssql_servers" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/mysql_server/100-simple-mysql/standalone/ci.sh b/examples/mysql_server/100-simple-mysql/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/mysql_server/100-simple-mysql/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/mysql_server/100-simple-mysql/standalone/main.tf b/examples/mysql_server/100-simple-mysql/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/mysql_server/100-simple-mysql/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/mysql_server/100-simple-mysql/standalone/module.tf b/examples/mysql_server/100-simple-mysql/standalone/module.tf deleted file mode 100644 index a88ddf68f9..0000000000 --- a/examples/mysql_server/100-simple-mysql/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - database = { - mysql_servers = var.mysql_servers - } - - networking = { - vnets = var.vnets - } -} - diff --git a/examples/mysql_server/100-simple-mysql/standalone/readme.md b/examples/mysql_server/100-simple-mysql/standalone/readme.md deleted file mode 100644 index 59aede03e0..0000000000 --- a/examples/mysql_server/100-simple-mysql/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/mysql_server/100-simple-mysql/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/mysql_server/100-simple-mysql/standalone/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/mysql_server/100-simple-mysql/standalone/variables.tf b/examples/mysql_server/100-simple-mysql/standalone/variables.tf deleted file mode 100755 index 6033929431..0000000000 --- a/examples/mysql_server/100-simple-mysql/standalone/variables.tf +++ /dev/null @@ -1,33 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "mysql_servers" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/mysql_server/101-vnet-rule-mysql/standalone/ci.sh b/examples/mysql_server/101-vnet-rule-mysql/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/mysql_server/101-vnet-rule-mysql/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/mysql_server/101-vnet-rule-mysql/standalone/main.tf b/examples/mysql_server/101-vnet-rule-mysql/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/mysql_server/101-vnet-rule-mysql/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/mysql_server/101-vnet-rule-mysql/standalone/module.tf b/examples/mysql_server/101-vnet-rule-mysql/standalone/module.tf deleted file mode 100644 index a88ddf68f9..0000000000 --- a/examples/mysql_server/101-vnet-rule-mysql/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - database = { - mysql_servers = var.mysql_servers - } - - networking = { - vnets = var.vnets - } -} - diff --git a/examples/mysql_server/101-vnet-rule-mysql/standalone/readme.md b/examples/mysql_server/101-vnet-rule-mysql/standalone/readme.md deleted file mode 100644 index f4e49d1aad..0000000000 --- a/examples/mysql_server/101-vnet-rule-mysql/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/mysql_server/101-vnet-rule-mysql/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/mysql_server/101-vnet-rule-mysql/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/mysql_server/101-vnet-rule-mysql/standalone/variables.tf b/examples/mysql_server/101-vnet-rule-mysql/standalone/variables.tf deleted file mode 100755 index 64f8a601fa..0000000000 --- a/examples/mysql_server/101-vnet-rule-mysql/standalone/variables.tf +++ /dev/null @@ -1,35 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "mysql_servers" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} - - - diff --git a/examples/mysql_server/102-private-endpoint-mysql/standalone/ci.sh b/examples/mysql_server/102-private-endpoint-mysql/standalone/ci.sh deleted file mode 100755 index f848bb5301..0000000000 --- a/examples/mysql_server/102-private-endpoint-mysql/standalone/ci.sh +++ /dev/null @@ -1,25 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/mysql_server/102-private-endpoint-mysql/standalone/main.tf b/examples/mysql_server/102-private-endpoint-mysql/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/mysql_server/102-private-endpoint-mysql/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/mysql_server/102-private-endpoint-mysql/standalone/module.tf b/examples/mysql_server/102-private-endpoint-mysql/standalone/module.tf deleted file mode 100644 index a88ddf68f9..0000000000 --- a/examples/mysql_server/102-private-endpoint-mysql/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - database = { - mysql_servers = var.mysql_servers - } - - networking = { - vnets = var.vnets - } -} - diff --git a/examples/mysql_server/102-private-endpoint-mysql/standalone/readme.md b/examples/mysql_server/102-private-endpoint-mysql/standalone/readme.md deleted file mode 100644 index f2b7a46ab8..0000000000 --- a/examples/mysql_server/102-private-endpoint-mysql/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/mysql_server/102-private-endpoint-mysql/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/mysql_server/102-private-endpoint-mysql/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/mysql_server/102-private-endpoint-mysql/standalone/variables.tf b/examples/mysql_server/102-private-endpoint-mysql/standalone/variables.tf deleted file mode 100755 index 6033929431..0000000000 --- a/examples/mysql_server/102-private-endpoint-mysql/standalone/variables.tf +++ /dev/null @@ -1,33 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "mysql_servers" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/ci.sh b/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/ci.sh deleted file mode 100755 index f848bb5301..0000000000 --- a/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/ci.sh +++ /dev/null @@ -1,25 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/main.tf b/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/module.tf b/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/module.tf deleted file mode 100644 index a88ddf68f9..0000000000 --- a/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - database = { - mysql_servers = var.mysql_servers - } - - networking = { - vnets = var.vnets - } -} - diff --git a/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/readme.md b/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/readme.md deleted file mode 100644 index 9d41b0bc8b..0000000000 --- a/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/\ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/variables.tf b/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/variables.tf deleted file mode 100755 index 751cb77eca..0000000000 --- a/examples/mysql_server/103-private-endpoint-with-fw-rule-mysql/standalone/variables.tf +++ /dev/null @@ -1,34 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "mysql_servers" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} - - diff --git a/examples/netapp/101-nfs/standalone/main.tf b/examples/netapp/101-nfs/standalone/main.tf deleted file mode 100644 index 8bc448e96b..0000000000 --- a/examples/netapp/101-nfs/standalone/main.tf +++ /dev/null @@ -1,42 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} diff --git a/examples/netapp/101-nfs/standalone/module.tf b/examples/netapp/101-nfs/standalone/module.tf deleted file mode 100644 index bc7caf62eb..0000000000 --- a/examples/netapp/101-nfs/standalone/module.tf +++ /dev/null @@ -1,21 +0,0 @@ -module "caf" { - source = "../../../../" - - global_settings = var.global_settings - diagnostic_storage_accounts = var.diagnostic_storage_accounts - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - managed_identities = var.managed_identities - role_mapping = var.role_mapping - - storage = { - netapp_accounts = var.netapp_accounts - } - - networking = { - vnets = var.vnets - network_security_group_definition = var.network_security_group_definition - public_ip_addresses = var.public_ip_addresses - } -} diff --git a/examples/netapp/101-nfs/standalone/output.tf b/examples/netapp/101-nfs/standalone/output.tf deleted file mode 100755 index 5fecd6a687..0000000000 --- a/examples/netapp/101-nfs/standalone/output.tf +++ /dev/null @@ -1,3 +0,0 @@ -output "netapp_accounts" { - value = module.caf.netapp_accounts -} diff --git a/examples/netapp/101-nfs/standalone/readme.md b/examples/netapp/101-nfs/standalone/readme.md deleted file mode 100644 index 2553646ec6..0000000000 --- a/examples/netapp/101-nfs/standalone/readme.md +++ /dev/null @@ -1,12 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -terraform init -terraform [plan|apply|destroy] \ - -var-file ../configuration.tfvars - # -var-file ../keyvaults.tfvars \ - # -var-file ../nsg_definitions.tfvars \ - # -var-file ../virtual_networks.tfvars \ - # -var-file ../public_ip_addresses.tfvars \ - # -var-file ../virtual_machines.tfvars -``` diff --git a/examples/netapp/101-nfs/standalone/variables.tf b/examples/netapp/101-nfs/standalone/variables.tf deleted file mode 100755 index 3d8d82e47a..0000000000 --- a/examples/netapp/101-nfs/standalone/variables.tf +++ /dev/null @@ -1,111 +0,0 @@ - -variable "global_settings" { - default = {} -} -variable "client_config" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} -variable "app_service_environments" { - default = {} -} -variable "app_service_plans" { - default = {} -} -variable "app_services" { - default = {} -} -variable "diagnostics_definition" { - default = null -} -variable "resource_groups" { - default = null -} -variable "network_security_group_definition" { - default = {} -} -variable "vnets" { - default = {} -} -variable "azurerm_redis_caches" { - default = {} -} -variable "mssql_servers" { - default = {} -} -variable "mssql_databases" { - default = {} -} -variable "mssql_elastic_pools" { - default = {} -} -variable "storage_accounts" { - default = {} -} -variable "azuread_groups" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "virtual_machines" { - default = {} -} -variable "bastion_hosts" { - default = {} -} -variable "public_ip_addresses" { - default = {} -} -variable "diagnostic_storage_accounts" { - default = {} -} -variable "managed_identities" { - default = {} -} -variable "private_dns" { - default = {} -} -variable "synapse_workspaces" { - default = {} -} -variable "azurerm_application_insights" { - default = {} -} -variable "role_mapping" { - default = {} -} -variable "aks_clusters" { - default = {} -} -variable "databricks_workspaces" { - default = {} -} -variable "machine_learning_workspaces" { - default = {} -} -variable "monitoring" { - default = {} -} -variable "virtual_wans" { - default = {} -} -variable "event_hub_namespaces" { - default = {} -} -variable "application_gateways" { - default = {} -} -variable "application_gateway_applications" { - default = {} -} -variable "netapp_accounts" { - default = {} -} diff --git a/examples/networking/dns_zones/100-simple-dns_zone/standalone/ci.sh b/examples/networking/dns_zones/100-simple-dns_zone/standalone/ci.sh deleted file mode 100755 index 73934f1d9f..0000000000 --- a/examples/networking/dns_zones/100-simple-dns_zone/standalone/ci.sh +++ /dev/null @@ -1,29 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var-file ../dns_zone_records.tfvars \ - -var-file ../dns_zones.tfvars \ - -var-file ../public_ip_addresses.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var-file ../dns_zone_records.tfvars \ - -var-file ../dns_zones.tfvars \ - -var-file ../public_ip_addresses.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve diff --git a/examples/networking/dns_zones/100-simple-dns_zone/standalone/main.tf b/examples/networking/dns_zones/100-simple-dns_zone/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/dns_zones/100-simple-dns_zone/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/dns_zones/100-simple-dns_zone/standalone/module.tf b/examples/networking/dns_zones/100-simple-dns_zone/standalone/module.tf deleted file mode 100755 index b0d471cc43..0000000000 --- a/examples/networking/dns_zones/100-simple-dns_zone/standalone/module.tf +++ /dev/null @@ -1,20 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - - managed_identities = var.managed_identities - role_mapping = var.role_mapping - - networking = { - vnets = var.vnets - dns_zones = var.dns_zones - dns_zone_records = var.dns_zone_records - public_ip_addresses = var.public_ip_addresses - } -} - -output "dns_zones" { - value = module.caf.dns_zones -} diff --git a/examples/networking/dns_zones/100-simple-dns_zone/standalone/readme.md b/examples/networking/dns_zones/100-simple-dns_zone/standalone/readme.md deleted file mode 100644 index 96aa9ebcd4..0000000000 --- a/examples/networking/dns_zones/100-simple-dns_zone/standalone/readme.md +++ /dev/null @@ -1,26 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/dns_zones/100-simple-dns_zone/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars \ - -var-file ../dns_zones.tfvars \ - -var-file ../dns_zone_records.tfvars \ - -var-file ../public_ip_addresses.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/dns_zones/100-simple-dns_zone/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/dns_zones/100-simple-dns_zone/standalone/variables.tf b/examples/networking/dns_zones/100-simple-dns_zone/standalone/variables.tf deleted file mode 100755 index e5df1e637a..0000000000 --- a/examples/networking/dns_zones/100-simple-dns_zone/standalone/variables.tf +++ /dev/null @@ -1,36 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "dns_zones" { - default = {} -} -variable "dns_zone_records" { - default = {} -} -variable "var_folder_path" { - default = {} -} - -variable "public_ip_addresses" { - default = {} -} -variable "managed_identities" { - default = {} -} -variable "role_mapping" { - default = {} -} \ No newline at end of file diff --git a/examples/networking/express_routes/standalone/ci.sh b/examples/networking/express_routes/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/networking/express_routes/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/express_routes/standalone/main.tf b/examples/networking/express_routes/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/express_routes/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/express_routes/standalone/module.tf b/examples/networking/express_routes/standalone/module.tf deleted file mode 100644 index ed90f2386b..0000000000 --- a/examples/networking/express_routes/standalone/module.tf +++ /dev/null @@ -1,20 +0,0 @@ -module "caf" { - source = "../../../../" - - global_settings = var.global_settings - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - managed_identities = var.managed_identities - role_mapping = var.role_mapping - compute = { - virtual_machines = var.virtual_machines - } - networking = { - vnets = var.vnets - network_security_group_definition = var.network_security_group_definition - public_ip_addresses = var.public_ip_addresses - express_route_circuit_authorizations = var.express_route_circuit_authorizations - express_route_circuits = var.express_route_circuits - } -} diff --git a/examples/networking/express_routes/standalone/output.tf b/examples/networking/express_routes/standalone/output.tf deleted file mode 100755 index 881689e38d..0000000000 --- a/examples/networking/express_routes/standalone/output.tf +++ /dev/null @@ -1,11 +0,0 @@ -output "express_route_circuits" { - value = module.caf.express_route_circuits - - description = "Express Route Circuit output" -} - -output "express_route_circuit_authorizations" { - value = module.caf.express_route_circuit_authorizations - - description = "Express Route Circuit Authorizations Keys output" -} diff --git a/examples/networking/express_routes/standalone/readme.md b/examples/networking/express_routes/standalone/readme.md deleted file mode 100644 index f0c8aa250f..0000000000 --- a/examples/networking/express_routes/standalone/readme.md +++ /dev/null @@ -1,16 +0,0 @@ -You can test this module outside of a landingzone using - -```bash - -terraform init - -terraform [plan|apply|destroy] \ - -var-file ../configuration.tfvars \ - -var-file ../keyvaults.tfvars \ - -var-file ../nsg_definitions.tfvars \ - -var-file ../virtual_networks.tfvars \ - -var-file ../public_ip_addresses.tfvars \ - -var-file ../virtual_machines.tfvars - - -``` \ No newline at end of file diff --git a/examples/networking/express_routes/standalone/variables.tf b/examples/networking/express_routes/standalone/variables.tf deleted file mode 100755 index 6cf2f697f7..0000000000 --- a/examples/networking/express_routes/standalone/variables.tf +++ /dev/null @@ -1,116 +0,0 @@ - -variable "global_settings" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} -variable "app_service_environments" { - default = {} -} -variable "app_service_plans" { - default = {} -} -variable "app_services" { - default = {} -} -variable "diagnostics_definition" { - default = null -} -variable "resource_groups" { - default = null -} -variable "network_security_group_definition" { - default = {} -} -variable "vnets" { - default = {} -} -variable "azurerm_redis_caches" { - default = {} -} -variable "mssql_servers" { - default = {} -} -variable "mssql_databases" { - default = {} -} -variable "mssql_elastic_pools" { - default = {} -} -variable "storage_accounts" { - default = {} -} -variable "azuread_groups" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "virtual_machines" { - default = {} -} -variable "bastion_hosts" { - default = {} -} -variable "public_ip_addresses" { - default = {} -} -variable "diagnostic_storage_accounts" { - default = {} -} -variable "managed_identities" { - default = {} -} -variable "private_dns" { - default = {} -} -variable "synapse_workspaces" { - default = {} -} -variable "azurerm_application_insights" { - default = {} -} -variable "role_mapping" { - default = {} -} -variable "aks_clusters" { - default = {} -} -variable "databricks_workspaces" { - default = {} -} -variable "machine_learning_workspaces" { - default = {} -} -variable "monitoring" { - default = {} -} -variable "virtual_wans" { - default = {} -} -variable "event_hub_namespaces" { - default = {} -} -variable "application_gateways" { - default = {} -} -variable "application_gateway_applications" { - default = {} -} -variable "express_route_circuit_authorizations" { - default = {} -} - -variable "express_route_circuits" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/networking/front_door/100-simple-front_door/standalone/ci.sh b/examples/networking/front_door/100-simple-front_door/standalone/ci.sh deleted file mode 100755 index 4ff5256dd0..0000000000 --- a/examples/networking/front_door/100-simple-front_door/standalone/ci.sh +++ /dev/null @@ -1,40 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var-file ../diagnostic_storage_accounts.tfvars \ - -var-file ../diagnostics_definition.tfvars \ - -var-file ../diagnostics_destinations.tfvars\ - -var-file ../dns_zone.tfvars \ - -var-file ../front_door_waf_policies.tfvars \ - -var-file ../front_doors.tfvars \ - -var-file ../keyvault_certificate_requests.tfvars \ - -var-file ../keyvault.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var-file ../diagnostic_storage_accounts.tfvars \ - -var-file ../diagnostics_definition.tfvars \ - -var-file ../diagnostics_destinations.tfvars\ - -var-file ../dns_zone.tfvars \ - -var-file ../front_door_waf_policies.tfvars \ - -var-file ../front_doors.tfvars \ - -var-file ../keyvault_certificate_requests.tfvars \ - -var-file ../keyvault.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/front_door/100-simple-front_door/standalone/main.tf b/examples/networking/front_door/100-simple-front_door/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/front_door/100-simple-front_door/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/front_door/100-simple-front_door/standalone/module.tf b/examples/networking/front_door/100-simple-front_door/standalone/module.tf deleted file mode 100644 index bb9c7c88ea..0000000000 --- a/examples/networking/front_door/100-simple-front_door/standalone/module.tf +++ /dev/null @@ -1,24 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - diagnostic_storage_accounts = var.diagnostic_storage_accounts - diagnostics_definition = var.diagnostics_definition - diagnostics_destinations = var.diagnostics_destinations - keyvaults = var.keyvaults - networking = { - vnets = var.vnets - network_security_group_definition = var.network_security_group_definition - public_ip_addresses = var.public_ip_addresses - dns_zones = var.dns_zones - front_door_waf_policies = var.front_door_waf_policies - front_doors = var.front_doors - } - security = { - dynamic_keyvault_secrets = var.dynamic_keyvault_secrets - keyvault_certificate_issuers = var.keyvault_certificate_issuers - keyvault_certificate_requests = var.keyvault_certificate_requests - } -} - diff --git a/examples/networking/front_door/100-simple-front_door/standalone/readme.md b/examples/networking/front_door/100-simple-front_door/standalone/readme.md deleted file mode 100644 index a9f04beb99..0000000000 --- a/examples/networking/front_door/100-simple-front_door/standalone/readme.md +++ /dev/null @@ -1,32 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/front_door/100-simple-front_door/standalone/ - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars\ - -var-file ../diagnostic_storage_accounts.tfvars \ - -var-file ../diagnostics_definition.tfvars \ - -var-file ../diagnostics_destinations.tfvars\ - -var-file ../dns_zone.tfvars \ - -var-file ../front_door_waf_policies.tfvars \ - -var-file ../front_doors.tfvars \ - -var-file ../keyvault_certificate_requests.tfvars \ - -var-file ../keyvault.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/front_door/100-simple-front_door/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/front_door/100-simple-front_door/standalone/variables.tf b/examples/networking/front_door/100-simple-front_door/standalone/variables.tf deleted file mode 100755 index cc06b923f4..0000000000 --- a/examples/networking/front_door/100-simple-front_door/standalone/variables.tf +++ /dev/null @@ -1,68 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "keyvault_certificate_requests" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "dynamic_keyvault_secrets" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "network_security_group_definition" { - default = {} -} - -variable "public_ip_addresses" { - default = {} -} - -variable "dns_zones" { - default = {} -} - -variable "front_door_waf_policies" { - default = {} -} - -variable "front_doors" { - default = {} -} - -variable "diagnostic_storage_accounts" { - default = {} -} - -variable "diagnostics_definition" { - default = {} -} - -variable "diagnostics_destinations" { - default = {} -} - -variable "keyvault_certificate_issuers" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/networking/front_door/101-front_door_waf/standalone/ci.sh b/examples/networking/front_door/101-front_door_waf/standalone/ci.sh deleted file mode 100755 index f848bb5301..0000000000 --- a/examples/networking/front_door/101-front_door_waf/standalone/ci.sh +++ /dev/null @@ -1,25 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/front_door/101-front_door_waf/standalone/main.tf b/examples/networking/front_door/101-front_door_waf/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/front_door/101-front_door_waf/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/front_door/101-front_door_waf/standalone/module.tf b/examples/networking/front_door/101-front_door_waf/standalone/module.tf deleted file mode 100644 index 07d3a44575..0000000000 --- a/examples/networking/front_door/101-front_door_waf/standalone/module.tf +++ /dev/null @@ -1,14 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - keyvaults = var.keyvaults - - networking = { - front_door_waf_policies = var.front_door_waf_policies - front_doors = var.front_doors - } - -} - diff --git a/examples/networking/front_door/101-front_door_waf/standalone/readme.md b/examples/networking/front_door/101-front_door_waf/standalone/readme.md deleted file mode 100644 index 6f9e420245..0000000000 --- a/examples/networking/front_door/101-front_door_waf/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/front_door/101-front_door_waf/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/front_door/101-front_door_waf/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/front_door/101-front_door_waf/standalone/variables.tf b/examples/networking/front_door/101-front_door_waf/standalone/variables.tf deleted file mode 100755 index 3dcb7b45fd..0000000000 --- a/examples/networking/front_door/101-front_door_waf/standalone/variables.tf +++ /dev/null @@ -1,28 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "front_door_waf_policies" { - default = {} -} - -variable "front_doors" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/networking/ip_group/100-simple-ip_group/standalone/ci.sh b/examples/networking/ip_group/100-simple-ip_group/standalone/ci.sh deleted file mode 100755 index 08ac22cae9..0000000000 --- a/examples/networking/ip_group/100-simple-ip_group/standalone/ci.sh +++ /dev/null @@ -1,25 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -parameter_files=$(find .. | grep .tfvars | sed 's/.*/-var-file &/' | xargs) -echo $parameter_files - -terraform init - -eval terraform apply ${parameter_files} \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -eval terraform destroy ${parameter_files} \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/ip_group/100-simple-ip_group/standalone/main.tf b/examples/networking/ip_group/100-simple-ip_group/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/ip_group/100-simple-ip_group/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/ip_group/100-simple-ip_group/standalone/module.tf b/examples/networking/ip_group/100-simple-ip_group/standalone/module.tf deleted file mode 100644 index 124e08d99e..0000000000 --- a/examples/networking/ip_group/100-simple-ip_group/standalone/module.tf +++ /dev/null @@ -1,14 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - networking = { - vnets = var.vnets - public_ip_addresses = var.public_ip_addresses - azurerm_firewalls = var.azurerm_firewalls - vnets = var.vnets - ip_groups = var.ip_groups - } -} - diff --git a/examples/networking/ip_group/100-simple-ip_group/standalone/readme.md b/examples/networking/ip_group/100-simple-ip_group/standalone/readme.md deleted file mode 100644 index b2c11a0aba..0000000000 --- a/examples/networking/ip_group/100-simple-ip_group/standalone/readme.md +++ /dev/null @@ -1,22 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/ip_group/100-simple-ip_group/standalone/ -parameter_files=$(find .. | grep .tfvars | sed 's/.*/-var-file &/' | xargs) -terraform init - -eval terraform plan ${parameter_files} - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/ip_group/100-simple-ip_group/standalone/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/ip_group/100-simple-ip_group/standalone/variables.tf b/examples/networking/ip_group/100-simple-ip_group/standalone/variables.tf deleted file mode 100644 index ce469ab349..0000000000 --- a/examples/networking/ip_group/100-simple-ip_group/standalone/variables.tf +++ /dev/null @@ -1,32 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "azurerm_firewalls" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - -variable "ip_groups" { - default = {} -} diff --git a/examples/networking/ip_group/101-firewall-ip_group/standalone/ci.sh b/examples/networking/ip_group/101-firewall-ip_group/standalone/ci.sh deleted file mode 100755 index e2197f8f52..0000000000 --- a/examples/networking/ip_group/101-firewall-ip_group/standalone/ci.sh +++ /dev/null @@ -1,23 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -parameter_files=$(find .. | grep .tfvars | sed 's/.*/-var-file &/' | xargs) -echo $parameter_files - -eval terraform apply ${parameter_files} \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - -eval terraform destroy ${parameter_files} \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve diff --git a/examples/networking/ip_group/101-firewall-ip_group/standalone/main.tf b/examples/networking/ip_group/101-firewall-ip_group/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/ip_group/101-firewall-ip_group/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/ip_group/101-firewall-ip_group/standalone/module.tf b/examples/networking/ip_group/101-firewall-ip_group/standalone/module.tf deleted file mode 100644 index 9f07484dfa..0000000000 --- a/examples/networking/ip_group/101-firewall-ip_group/standalone/module.tf +++ /dev/null @@ -1,18 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - networking = { - vnets = var.vnets - public_ip_addresses = var.public_ip_addresses - azurerm_firewalls = var.azurerm_firewalls - vnets = var.vnets - ip_groups = var.ip_groups - azurerm_firewalls = var.azurerm_firewalls - azurerm_firewall_application_rule_collection_definition = var.azurerm_firewall_application_rule_collection_definition - azurerm_firewall_network_rule_collection_definition = var.azurerm_firewall_network_rule_collection_definition - azurerm_firewall_nat_rule_collection_definition = var.azurerm_firewall_nat_rule_collection_definition - } -} - diff --git a/examples/networking/ip_group/101-firewall-ip_group/standalone/readme.md b/examples/networking/ip_group/101-firewall-ip_group/standalone/readme.md deleted file mode 100644 index 9a1c59df48..0000000000 --- a/examples/networking/ip_group/101-firewall-ip_group/standalone/readme.md +++ /dev/null @@ -1,22 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/ip_group/101-firewall-ip_group/standalone/ -parameter_files=$(find .. | grep .tfvars | sed 's/.*/-var-file &/' | xargs) -terraform init - -eval terraform plan ${parameter_files} - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/ip_group/101-firewall-ip_group/standalone/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/ip_group/101-firewall-ip_group/standalone/variables.tf b/examples/networking/ip_group/101-firewall-ip_group/standalone/variables.tf deleted file mode 100644 index 1df8aed8fa..0000000000 --- a/examples/networking/ip_group/101-firewall-ip_group/standalone/variables.tf +++ /dev/null @@ -1,44 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "azurerm_firewalls" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - -variable "ip_groups" { - default = {} -} - -variable "azurerm_firewall_application_rule_collection_definition" { - default = {} -} - -variable "azurerm_firewall_network_rule_collection_definition" { - default = {} -} - -variable "azurerm_firewall_nat_rule_collection_definition" { - default = {} -} diff --git a/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/ci.sh b/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/ci.sh deleted file mode 100755 index 7bfaeb3c4f..0000000000 --- a/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/main.tf b/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/module.tf b/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/module.tf deleted file mode 100644 index 2548c6d8e8..0000000000 --- a/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/module.tf +++ /dev/null @@ -1,12 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - networking = { - vnets = var.vnets - public_ip_addresses = var.public_ip_addresses - load_balancers = var.load_balancers - } -} - diff --git a/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/readme.md b/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/readme.md deleted file mode 100644 index 16327d6ed6..0000000000 --- a/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/variables.tf b/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/variables.tf deleted file mode 100755 index 5696c3a835..0000000000 --- a/examples/networking/load_balancers/100-simple-load-balancer-basic-sku/standalone/variables.tf +++ /dev/null @@ -1,32 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "virtual_network_gateways" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - -variable "load_balancers" { - default = {} -} diff --git a/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/ci.sh b/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/ci.sh deleted file mode 100755 index 7bfaeb3c4f..0000000000 --- a/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/main.tf b/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/module.tf b/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/module.tf deleted file mode 100644 index b102b7b530..0000000000 --- a/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/module.tf +++ /dev/null @@ -1,14 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - networking = { - vnets = var.vnets - public_ip_addresses = var.public_ip_addresses - load_balancers = var.load_balancers - load_balancer_rules = var.load_balancer_rules - load_balancer_probe = var.load_balancer_probe - } -} - diff --git a/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/readme.md b/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/readme.md deleted file mode 100644 index 257c5a809b..0000000000 --- a/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/load_balancers/101-load-balancer-with-rules/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/load_balancers/101-load-balancer-with-rules/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/variables.tf b/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/variables.tf deleted file mode 100755 index 73997d34df..0000000000 --- a/examples/networking/load_balancers/101-load-balancer-with-rules/standalone/variables.tf +++ /dev/null @@ -1,40 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "virtual_network_gateways" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - -variable "load_balancers" { - default = {} -} - -variable "load_balancer_rules" { - default = {} -} - -variable "load_balancer_probe" { - default = {} -} \ No newline at end of file diff --git a/examples/networking/load_balancers/102-internal-load-balancer/standalone/ci.sh b/examples/networking/load_balancers/102-internal-load-balancer/standalone/ci.sh deleted file mode 100755 index 7bfaeb3c4f..0000000000 --- a/examples/networking/load_balancers/102-internal-load-balancer/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/load_balancers/102-internal-load-balancer/standalone/main.tf b/examples/networking/load_balancers/102-internal-load-balancer/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/load_balancers/102-internal-load-balancer/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/load_balancers/102-internal-load-balancer/standalone/module.tf b/examples/networking/load_balancers/102-internal-load-balancer/standalone/module.tf deleted file mode 100644 index b102b7b530..0000000000 --- a/examples/networking/load_balancers/102-internal-load-balancer/standalone/module.tf +++ /dev/null @@ -1,14 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - networking = { - vnets = var.vnets - public_ip_addresses = var.public_ip_addresses - load_balancers = var.load_balancers - load_balancer_rules = var.load_balancer_rules - load_balancer_probe = var.load_balancer_probe - } -} - diff --git a/examples/networking/load_balancers/102-internal-load-balancer/standalone/readme.md b/examples/networking/load_balancers/102-internal-load-balancer/standalone/readme.md deleted file mode 100644 index 92507b4dc6..0000000000 --- a/examples/networking/load_balancers/102-internal-load-balancer/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/load_balancers/102-internal-load-balancer/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/load_balancers/102-internal-load-balancer/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/load_balancers/102-internal-load-balancer/standalone/variables.tf b/examples/networking/load_balancers/102-internal-load-balancer/standalone/variables.tf deleted file mode 100755 index e2c7921e52..0000000000 --- a/examples/networking/load_balancers/102-internal-load-balancer/standalone/variables.tf +++ /dev/null @@ -1,43 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "virtual_network_gateways" { - default = {} -} - -# variable var_folder_path { -# default = {} -# } - -variable "load_balancers" { - default = {} -} - -variable "load_balancer_rules" { - default = {} -} - -variable "load_balancer_probe" { - default = {} -} -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/ci.sh b/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/ci.sh deleted file mode 100755 index 7bfaeb3c4f..0000000000 --- a/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/main.tf b/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/module.tf b/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/module.tf deleted file mode 100644 index c7f8cbe5fa..0000000000 --- a/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/module.tf +++ /dev/null @@ -1,19 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - keyvaults = var.keyvaults - keyvault_access_policies = var.keyvault_access_policies - networking = { - vnets = var.vnets - public_ip_addresses = var.public_ip_addresses - load_balancers = var.load_balancers - load_balancer_rules = var.load_balancer_rules - load_balancer_probe = var.load_balancer_probe - } - compute = { - virtual_machines = var.virtual_machines - } -} - diff --git a/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/readme.md b/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/readme.md deleted file mode 100644 index 2b3f3ce2ef..0000000000 --- a/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/load_balancers/103-load-balancer-nic-association/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/load_balancers/103-load-balancer-nic-association/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/variables.tf b/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/variables.tf deleted file mode 100755 index 959757a949..0000000000 --- a/examples/networking/load_balancers/103-load-balancer-nic-association/standalone/variables.tf +++ /dev/null @@ -1,51 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "virtual_network_gateways" { - default = {} -} - -# variable var_folder_path { -# default = {} -# } - -variable "load_balancers" { - default = {} -} - -variable "load_balancer_rules" { - default = {} -} - -variable "load_balancer_probe" { - default = {} -} -variable "var_folder_path" { - default = {} -} - -variable "virtual_machines" { - default = {} -} - -variable "keyvault_access_policies" {} - -variable "keyvaults" {} \ No newline at end of file diff --git a/examples/networking/private_dns/100-private-dns-vnet-links/standalone/ci.sh b/examples/networking/private_dns/100-private-dns-vnet-links/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/networking/private_dns/100-private-dns-vnet-links/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/private_dns/100-private-dns-vnet-links/standalone/configuration.auto.tfvars b/examples/networking/private_dns/100-private-dns-vnet-links/standalone/configuration.auto.tfvars deleted file mode 100644 index 97ee4dd6fd..0000000000 --- a/examples/networking/private_dns/100-private-dns-vnet-links/standalone/configuration.auto.tfvars +++ /dev/null @@ -1,83 +0,0 @@ -global_settings = { - default_region = "region1" - regions = { - region1 = "southeastasia" - } -} - - -resource_groups = { - private_dns_region1 = { - name = "private-dns-rg" - region = "region1" - } -} - -vnets = { - vnet_test = { - resource_group_key = "private_dns_region1" - vnet = { - name = "test-vnet" - address_space = ["10.10.100.0/24"] - } - specialsubnets = { - - } - subnets = { - - } - } -} - -private_dns = { - dns1 = { - name = "test-dns.mysite.com" - resource_group_key = "private_dns_region1" - - records = { - a_records = { - testa1 = { - name = "*" - ttl = 3600 - records = ["1.1.1.1", "2.2.2.2"] - } - testa2 = { - name = "@" - ttl = 3600 - records = ["1.1.1.1", "2.2.2.2"] - } - } - - txt_records = { - testtxt1 = { - name = "testtxt1" - ttl = 3600 - records = { - r1 = { - value = "testing txt 1" - } - r2 = { - value = "testing txt 2" - } - } - } - } - } - - vnet_links = { - link_test = { - name = "test-vnet-link" - vnet_key = "vnet_test" - } - # link_hub = { - # name = "hub-vnet-link" - # remote_tfstate = { - # tfstate_key = "networking_hub" - # lz_key = "networking_hub" - # output_key = "vnets" - # vnet_key = "hub_rg1" - # } - # } - } - } -} \ No newline at end of file diff --git a/examples/networking/private_dns/100-private-dns-vnet-links/standalone/main.tf b/examples/networking/private_dns/100-private-dns-vnet-links/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/private_dns/100-private-dns-vnet-links/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/private_dns/100-private-dns-vnet-links/standalone/module.tf b/examples/networking/private_dns/100-private-dns-vnet-links/standalone/module.tf deleted file mode 100644 index c6b998105f..0000000000 --- a/examples/networking/private_dns/100-private-dns-vnet-links/standalone/module.tf +++ /dev/null @@ -1,12 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - logged_aad_app_objectId = var.logged_aad_app_objectId - networking = { - vnets = var.vnets - private_dns = var.private_dns - } -} - diff --git a/examples/networking/private_dns/100-private-dns-vnet-links/standalone/readme.md b/examples/networking/private_dns/100-private-dns-vnet-links/standalone/readme.md deleted file mode 100644 index 3d355e77fa..0000000000 --- a/examples/networking/private_dns/100-private-dns-vnet-links/standalone/readme.md +++ /dev/null @@ -1,37 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/private_dns/100-private-dns-vnet-links/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/private_dns/100-private-dns-vnet-links/ \ - -level level1 \ - -a plan - -``` - -To run this example from TFC -- Change the TFC Terraform Working Directory to examples/networking/private_dns/100-private-dns-vnet-links/standalone/ -- Set the execution mode to Agent -- Set the workspace's workflow type to API-driven workflow -- Add the variable logged_aad_app_objectId and set the clientId of the system MSI of the agent -- Set ARM_USE_MSI to true -- Set ARM_SUBSCRIPTION_ID and ARM_TENANT_ID - -From the rover go to folder -cd /tf/caf/aztfmod/examples/networking/private_dns/100-private-dns-vnet-links/standalone -terraform login -terraform init -backend-config=backend.hcl -terraform plan / apply diff --git a/examples/networking/private_dns/100-private-dns-vnet-links/standalone/variables.tf b/examples/networking/private_dns/100-private-dns-vnet-links/standalone/variables.tf deleted file mode 100755 index ae4d4179b6..0000000000 --- a/examples/networking/private_dns/100-private-dns-vnet-links/standalone/variables.tf +++ /dev/null @@ -1,30 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - - -variable "vnets" { - default = {} -} - -variable "private_dns" { - default = {} -} - - -variable "tags" { - default = null - type = map(any) -} - -variable "logged_aad_app_objectId" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/networking/private_links/endpoints/centralized/standalone/ci.sh b/examples/networking/private_links/endpoints/centralized/standalone/ci.sh deleted file mode 100755 index ab76893a96..0000000000 --- a/examples/networking/private_links/endpoints/centralized/standalone/ci.sh +++ /dev/null @@ -1,37 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var-file ./private_endpoints.tfvars \ - -var-file ../diagnostic_storage_accounts.tfvars \ - -var-file ../diagnostic_event_hub_namespaces.tfvars \ - -var-file ../keyvaults.tfvars \ - -var-file ../eventhub_namespaces.tfvars \ - -var-file ../virtual_networks.tfvars \ - -var-file ../private_dns.tfvars \ - -var-file ../storage_accounts.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var-file ./private_endpoints.tfvars \ - -var-file ../diagnostic_storage_accounts.tfvars \ - -var-file ../diagnostic_event_hub_namespaces.tfvars \ - -var-file ../keyvaults.tfvars \ - -var-file ../eventhub_namespaces.tfvars \ - -var-file ../virtual_networks.tfvars \ - -var-file ../private_dns.tfvars \ - -var-file ../storage_accounts.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -input=false \ - -auto-approve diff --git a/examples/networking/private_links/endpoints/centralized/standalone/main.tf b/examples/networking/private_links/endpoints/centralized/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/private_links/endpoints/centralized/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/private_links/endpoints/centralized/standalone/module.tf b/examples/networking/private_links/endpoints/centralized/standalone/module.tf deleted file mode 100755 index 3860dd6ee4..0000000000 --- a/examples/networking/private_links/endpoints/centralized/standalone/module.tf +++ /dev/null @@ -1,33 +0,0 @@ -module "caf" { - source = "../../../../../../" - - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - managed_identities = var.managed_identities - role_mapping = var.role_mapping - event_hub_namespaces = var.event_hub_namespaces - - diagnostics = { - # Get the diagnostics settings of services to create - diagnostic_log_analytics = var.diagnostic_log_analytics - diagnostic_storage_accounts = var.diagnostic_storage_accounts - } - - compute = { - virtual_machines = var.virtual_machines - } - - networking = { - vnets = var.vnets - network_security_group_definition = var.network_security_group_definition - public_ip_addresses = var.public_ip_addresses - private_endpoints = var.private_endpoints - } -} - -output "diagnostics" { - value = module.caf.diagnostics -} diff --git a/examples/networking/private_links/endpoints/centralized/standalone/private_endpoints.tfvars b/examples/networking/private_links/endpoints/centralized/standalone/private_endpoints.tfvars deleted file mode 100644 index 08a4887027..0000000000 --- a/examples/networking/private_links/endpoints/centralized/standalone/private_endpoints.tfvars +++ /dev/null @@ -1,46 +0,0 @@ -private_endpoints = { - ppl1 = { - - storage_accounts = { - level0 = { - # name = "" # Name of the private endpoint - # lz_key = "" # Key of the landingzone where the storage account has been deployed. - # resource_group_key = "" # Key of the resource group where the private endpoint will be created. Default to the vnet's resource group - # tags - private_service_connection = { - name = "psc-stg-level0" - subresource_names = ["blob", "table"] - # request_message = "" - # is_manual_connection = [true|false] - } - } - } - - # Diagnostics objects are global and inherit from base core landing zones - diagnostic_storage_accounts = { - # locally created - diaglogs = { - private_service_connection = { - name = "psc-stg-diag-diaglogs" - subresource_names = ["blob", "queue"] - } - } - } - - keyvaults = { - kv_rg1 = { - private_service_connection = { - name = "psc-kv_rg1" - } - } - } - - event_hub_namespaces = { - evh1 = { - private_service_connection = { - name = "psc-evh1" - } - } - } - } -} \ No newline at end of file diff --git a/examples/networking/private_links/endpoints/centralized/standalone/readme.md b/examples/networking/private_links/endpoints/centralized/standalone/readme.md deleted file mode 100644 index e9f0102516..0000000000 --- a/examples/networking/private_links/endpoints/centralized/standalone/readme.md +++ /dev/null @@ -1,31 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/private_links/endpoints/centralized/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars \ - -var-file ./private_endpoints.tfvars \ - -var-file ../diagnostic_storage_accounts.tfvars \ - -var-file ../diagnostic_event_hub_namespaces.tfvars \ - -var-file ../keyvaults.tfvars \ - -var-file ../eventhub_namespaces.tfvars \ - -var-file ../virtual_networks.tfvars \ - -var-file ../private_dns.tfvars \ - -var-file ../storage_accounts.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/examples \ - -var-folder /tf/caf/examples/networking/private_links/endpoints/centralized \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/private_links/endpoints/centralized/standalone/variables.tf b/examples/networking/private_links/endpoints/centralized/standalone/variables.tf deleted file mode 100755 index 9e071c69c2..0000000000 --- a/examples/networking/private_links/endpoints/centralized/standalone/variables.tf +++ /dev/null @@ -1,115 +0,0 @@ -variable "global_settings" { - default = {} -} -variable "var_folder_path" { - default = {} -} -variable "tags" { - default = null - type = map(any) -} -variable "diagnostic_log_analytics" { - default = {} -} -variable "app_service_environments" { - default = {} -} -variable "app_service_plans" { - default = {} -} -variable "app_services" { - default = {} -} -variable "diagnostics_definition" { - default = null -} -variable "resource_groups" { - default = null -} -variable "network_security_group_definition" { - default = {} -} -variable "vnets" { - default = {} -} -variable "azurerm_redis_caches" { - default = {} -} -variable "mssql_servers" { - default = {} -} -variable "mssql_databases" { - default = {} -} -variable "mssql_elastic_pools" { - default = {} -} -variable "storage_accounts" { - default = {} -} -variable "azuread_groups" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "virtual_machines" { - default = {} -} -variable "bastion_hosts" { - default = {} -} -variable "public_ip_addresses" { - default = {} -} -variable "diagnostic_storage_accounts" { - default = {} -} -variable "diagnostic_event_hub_namespaces" { - default = {} -} -variable "managed_identities" { - default = {} -} -variable "private_dns" { - default = {} -} -variable "synapse_workspaces" { - default = {} -} -variable "azurerm_application_insights" { - default = {} -} -variable "role_mapping" { - default = {} -} -variable "aks_clusters" { - default = {} -} -variable "databricks_workspaces" { - default = {} -} -variable "machine_learning_workspaces" { - default = {} -} -variable "monitoring" { - default = {} -} -variable "virtual_wans" { - default = {} -} -variable "event_hub_namespaces" { - default = {} -} -variable "application_gateways" { - default = {} -} -variable "application_gateway_applications" { - default = {} -} -variable "private_endpoints" { - default = {} -} \ No newline at end of file diff --git a/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/ci.sh b/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/ci.sh deleted file mode 100755 index bb0c9a077c..0000000000 --- a/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/ci.sh +++ /dev/null @@ -1,30 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var-file ../nsg.tfvars\ - -var-file ../public-ip-addresses.tfvars \ - -var-file ../routes.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var-file ../nsg.tfvars\ - -var-file ../public-ip-addresses.tfvars \ - -var-file ../routes.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/main.tf b/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/module.tf b/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/module.tf deleted file mode 100644 index 52d6b83372..0000000000 --- a/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/module.tf +++ /dev/null @@ -1,14 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - networking = { - vnets = var.vnets - public_ip_addresses = var.public_ip_addresses - route_tables = var.route_tables - azurerm_routes = var.azurerm_routes - network_security_group_definition = var.network_security_group_definition - } -} - diff --git a/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/readme.md b/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/readme.md deleted file mode 100644 index 39daf1edea..0000000000 --- a/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/readme.md +++ /dev/null @@ -1,26 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars \ - -var-file ../nsg.tfvars \ - -var-file ../public-ip-addresses.tfvars \ - -var-file ../routes.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/variables.tf b/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/variables.tf deleted file mode 100755 index 0071cf92b5..0000000000 --- a/examples/networking/virtual_network/100-simple-vnet-subnets-nsgs/standalone/variables.tf +++ /dev/null @@ -1,39 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "azurerm_routes" { - default = {} -} - -variable "route_tables" { - default = {} -} - -variable "network_security_group_definition" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - - - diff --git a/examples/networking/virtual_network/100-subnet-delegation/standalone/ci.sh b/examples/networking/virtual_network/100-subnet-delegation/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/networking/virtual_network/100-subnet-delegation/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/virtual_network/100-subnet-delegation/standalone/main.tf b/examples/networking/virtual_network/100-subnet-delegation/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/virtual_network/100-subnet-delegation/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/virtual_network/100-subnet-delegation/standalone/module.tf b/examples/networking/virtual_network/100-subnet-delegation/standalone/module.tf deleted file mode 100644 index 52d6b83372..0000000000 --- a/examples/networking/virtual_network/100-subnet-delegation/standalone/module.tf +++ /dev/null @@ -1,14 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - networking = { - vnets = var.vnets - public_ip_addresses = var.public_ip_addresses - route_tables = var.route_tables - azurerm_routes = var.azurerm_routes - network_security_group_definition = var.network_security_group_definition - } -} - diff --git a/examples/networking/virtual_network/100-subnet-delegation/standalone/readme.md b/examples/networking/virtual_network/100-subnet-delegation/standalone/readme.md deleted file mode 100644 index 0557d17d42..0000000000 --- a/examples/networking/virtual_network/100-subnet-delegation/standalone/readme.md +++ /dev/null @@ -1,22 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/virtual_network/100-subnet-delegation/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/virtual_network/100-subnet-delegation/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/virtual_network/100-subnet-delegation/standalone/variables.tf b/examples/networking/virtual_network/100-subnet-delegation/standalone/variables.tf deleted file mode 100755 index 38781d8cdb..0000000000 --- a/examples/networking/virtual_network/100-subnet-delegation/standalone/variables.tf +++ /dev/null @@ -1,39 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "azurerm_routes" { - default = {} -} - -variable "route_tables" { - default = {} -} - -variable "network_security_group_definition" { - default = {} -} - - -variable "var_folder_path" { - default = {} -} - - diff --git a/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/ci.sh b/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/main.tf b/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/module.tf b/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/module.tf deleted file mode 100644 index c8289b81c2..0000000000 --- a/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/module.tf +++ /dev/null @@ -1,15 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - networking = { - vnets = var.vnets - vnet_peerings = var.vnet_peerings - public_ip_addresses = var.public_ip_addresses - route_tables = var.route_tables - azurerm_routes = var.azurerm_routes - network_security_group_definition = var.network_security_group_definition - } -} - diff --git a/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/readme.md b/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/readme.md deleted file mode 100644 index ca599126a0..0000000000 --- a/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/readme.md +++ /dev/null @@ -1,26 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/virtual_network/101-vnet-peering-nsg/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars \ - -var-file ../peering.tfvars \ - -var-file ../network_security_group_definition.tfvars \ - -var-file ../virtual_networks.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/variables.tf b/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/variables.tf deleted file mode 100755 index e9514209c7..0000000000 --- a/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/variables.tf +++ /dev/null @@ -1,42 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "azurerm_routes" { - default = {} -} - -variable "route_tables" { - default = {} -} - -variable "network_security_group_definition" { - default = {} -} - -variable "vnet_peerings" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - - diff --git a/examples/networking/virtual_network/200-nsg-flow-logs/standalone/ci.sh b/examples/networking/virtual_network/200-nsg-flow-logs/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/networking/virtual_network/200-nsg-flow-logs/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/virtual_network/200-nsg-flow-logs/standalone/main.tf b/examples/networking/virtual_network/200-nsg-flow-logs/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/virtual_network/200-nsg-flow-logs/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/virtual_network/200-nsg-flow-logs/standalone/module.tf b/examples/networking/virtual_network/200-nsg-flow-logs/standalone/module.tf deleted file mode 100644 index 8ad61c9bbb..0000000000 --- a/examples/networking/virtual_network/200-nsg-flow-logs/standalone/module.tf +++ /dev/null @@ -1,15 +0,0 @@ -module "caf" { - source = "../../../../../../caf" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - networking = { - vnets = var.vnets - vnet_peerings = var.vnet_peerings - public_ip_addresses = var.public_ip_addresses - route_tables = var.route_tables - azurerm_routes = var.azurerm_routes - network_security_group_definition = var.network_security_group_definition - } -} - diff --git a/examples/networking/virtual_network/200-nsg-flow-logs/standalone/readme.md b/examples/networking/virtual_network/200-nsg-flow-logs/standalone/readme.md deleted file mode 100644 index ca599126a0..0000000000 --- a/examples/networking/virtual_network/200-nsg-flow-logs/standalone/readme.md +++ /dev/null @@ -1,26 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/virtual_network/101-vnet-peering-nsg/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars \ - -var-file ../peering.tfvars \ - -var-file ../network_security_group_definition.tfvars \ - -var-file ../virtual_networks.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/virtual_network/101-vnet-peering-nsg/standalone/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/virtual_network/200-nsg-flow-logs/standalone/variables.tf b/examples/networking/virtual_network/200-nsg-flow-logs/standalone/variables.tf deleted file mode 100755 index e9514209c7..0000000000 --- a/examples/networking/virtual_network/200-nsg-flow-logs/standalone/variables.tf +++ /dev/null @@ -1,42 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "azurerm_routes" { - default = {} -} - -variable "route_tables" { - default = {} -} - -variable "network_security_group_definition" { - default = {} -} - -variable "vnet_peerings" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - - diff --git a/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/ci.sh b/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/main.tf b/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/module.tf b/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/module.tf deleted file mode 100644 index b01d8d9939..0000000000 --- a/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/module.tf +++ /dev/null @@ -1,12 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - networking = { - vnets = var.vnets - public_ip_addresses = var.public_ip_addresses - virtual_network_gateways = var.virtual_network_gateways - } -} - diff --git a/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/readme.md b/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/readme.md deleted file mode 100644 index e6dc25ba5a..0000000000 --- a/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/virtual_network_gateway/100-expressroute-gateway/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/variables.tf b/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/variables.tf deleted file mode 100755 index 684d1a60d3..0000000000 --- a/examples/networking/virtual_network_gateway/100-expressroute-gateway/standalone/variables.tf +++ /dev/null @@ -1,30 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "virtual_network_gateways" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - - diff --git a/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/ci.sh b/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/main.tf b/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/module.tf b/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/module.tf deleted file mode 100644 index b01d8d9939..0000000000 --- a/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/module.tf +++ /dev/null @@ -1,12 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - networking = { - vnets = var.vnets - public_ip_addresses = var.public_ip_addresses - virtual_network_gateways = var.virtual_network_gateways - } -} - diff --git a/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/readme.md b/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/readme.md deleted file mode 100644 index 9725b1c9eb..0000000000 --- a/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/virtual_network_gateway/101-vpn-site-to-site/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/variables.tf b/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/variables.tf deleted file mode 100755 index 684d1a60d3..0000000000 --- a/examples/networking/virtual_network_gateway/101-vpn-site-to-site/standalone/variables.tf +++ /dev/null @@ -1,30 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "virtual_network_gateways" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - - diff --git a/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/ci.sh b/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/main.tf b/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/module.tf b/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/module.tf deleted file mode 100644 index b01d8d9939..0000000000 --- a/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/module.tf +++ /dev/null @@ -1,12 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - networking = { - vnets = var.vnets - public_ip_addresses = var.public_ip_addresses - virtual_network_gateways = var.virtual_network_gateways - } -} - diff --git a/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/readme.md b/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/readme.md deleted file mode 100644 index eafbd8d9bd..0000000000 --- a/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/variables.tf b/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/variables.tf deleted file mode 100755 index 684d1a60d3..0000000000 --- a/examples/networking/virtual_network_gateway/102-vpn-site-to-site-active-active/standalone/variables.tf +++ /dev/null @@ -1,30 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "virtual_network_gateways" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - - diff --git a/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/ci.sh b/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/main.tf b/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/module.tf b/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/module.tf deleted file mode 100644 index 1360166880..0000000000 --- a/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/module.tf +++ /dev/null @@ -1,15 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - networking = { - vnets = var.vnets - public_ip_addresses = var.public_ip_addresses - virtual_network_gateways = var.virtual_network_gateways - local_network_gateways = var.local_network_gateways - virtual_network_gateway_connections = var.virtual_network_gateway_connections - - } -} - diff --git a/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/readme.md b/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/readme.md deleted file mode 100644 index 6c0e16e93b..0000000000 --- a/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/readme.md +++ /dev/null @@ -1,24 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/variables.tf b/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/variables.tf deleted file mode 100755 index f8bf29572c..0000000000 --- a/examples/networking/virtual_network_gateway/103-vpn-site-to-site-connection/standalone/variables.tf +++ /dev/null @@ -1,37 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "virtual_network_gateways" { - default = {} -} - -variable "local_network_gateways" { - default = {} -} - -variable "virtual_network_gateway_connections" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/ci.sh b/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/main.tf b/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/module.tf b/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/module.tf deleted file mode 100644 index 2a1e26194e..0000000000 --- a/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - resource_groups = var.resource_groups - tags = var.tags - networking = { - vnets = var.vnets - public_ip_addresses = var.public_ip_addresses - virtual_network_gateways = var.virtual_network_gateways - local_network_gateways = var.local_network_gateways - virtual_network_gateway_connections = var.virtual_network_gateway_connections - express_route_circuits = var.express_route_circuits - express_route_circuit_authorizations = var.express_route_circuit_authorizations - - } -} - diff --git a/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/readme.md b/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/readme.md deleted file mode 100644 index f5a10ce97d..0000000000 --- a/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/readme.md +++ /dev/null @@ -1,27 +0,0 @@ - -Note : The Virtual Network Gateway Connection requires an ExpressRoute Circuit. - -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/variables.tf b/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/variables.tf deleted file mode 100755 index a19777b613..0000000000 --- a/examples/networking/virtual_network_gateway_connections/100-expressroute-gateway-connection/standalone/variables.tf +++ /dev/null @@ -1,45 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "public_ip_addresses" { - default = {} -} - -variable "virtual_network_gateways" { - default = {} -} - -variable "local_network_gateways" { - default = {} -} - -variable "virtual_network_gateway_connections" { - default = {} -} - -variable "express_route_circuits" { - default = {} -} - -variable "express_route_circuit_authorizations" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/networking/virtual_wan/100-vwan-multi-hubs/standalone/variables.tf b/examples/networking/virtual_wan/100-vwan-multi-hubs/standalone/variables.tf deleted file mode 100755 index 7d8e4dc92f..0000000000 --- a/examples/networking/virtual_wan/100-vwan-multi-hubs/standalone/variables.tf +++ /dev/null @@ -1,23 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "vnets" { - default = {} -} - -variable "virtual_wans" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/postgresql_server/100-simple-postgresql/standalone/ci.sh b/examples/postgresql_server/100-simple-postgresql/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/postgresql_server/100-simple-postgresql/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/postgresql_server/100-simple-postgresql/standalone/main.tf b/examples/postgresql_server/100-simple-postgresql/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/postgresql_server/100-simple-postgresql/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/postgresql_server/100-simple-postgresql/standalone/module.tf b/examples/postgresql_server/100-simple-postgresql/standalone/module.tf deleted file mode 100644 index a503c325a4..0000000000 --- a/examples/postgresql_server/100-simple-postgresql/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - database = { - postgresql_servers = var.postgresql_servers - } - - networking = { - vnets = var.vnets - } -} - diff --git a/examples/postgresql_server/100-simple-postgresql/standalone/readme.md b/examples/postgresql_server/100-simple-postgresql/standalone/readme.md deleted file mode 100644 index 1073ea71b8..0000000000 --- a/examples/postgresql_server/100-simple-postgresql/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/postgresql_server/100-simple-postgresql/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/postgresql_server/100-simple-postgresql/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/postgresql_server/100-simple-postgresql/standalone/variables.tf b/examples/postgresql_server/100-simple-postgresql/standalone/variables.tf deleted file mode 100755 index efe5d38187..0000000000 --- a/examples/postgresql_server/100-simple-postgresql/standalone/variables.tf +++ /dev/null @@ -1,33 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "postgresql_servers" { - default = {} -} - -variable "vnets" { - default = {} -} -variable "tags" { - default = null - type = map(any) -} - - - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/postgresql_server/101-vnet-rule-postgresql/standalone/ci.sh b/examples/postgresql_server/101-vnet-rule-postgresql/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/postgresql_server/101-vnet-rule-postgresql/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/postgresql_server/101-vnet-rule-postgresql/standalone/main.tf b/examples/postgresql_server/101-vnet-rule-postgresql/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/postgresql_server/101-vnet-rule-postgresql/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/postgresql_server/101-vnet-rule-postgresql/standalone/module.tf b/examples/postgresql_server/101-vnet-rule-postgresql/standalone/module.tf deleted file mode 100644 index a503c325a4..0000000000 --- a/examples/postgresql_server/101-vnet-rule-postgresql/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - database = { - postgresql_servers = var.postgresql_servers - } - - networking = { - vnets = var.vnets - } -} - diff --git a/examples/postgresql_server/101-vnet-rule-postgresql/standalone/readme.md b/examples/postgresql_server/101-vnet-rule-postgresql/standalone/readme.md deleted file mode 100644 index a3f0544ff9..0000000000 --- a/examples/postgresql_server/101-vnet-rule-postgresql/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/postgresql_server/101-vnet-rule-postgresql/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/postgresql_server/101-vnet-rule-postgresql/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/postgresql_server/101-vnet-rule-postgresql/standalone/variables.tf b/examples/postgresql_server/101-vnet-rule-postgresql/standalone/variables.tf deleted file mode 100755 index 78ead1769c..0000000000 --- a/examples/postgresql_server/101-vnet-rule-postgresql/standalone/variables.tf +++ /dev/null @@ -1,33 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "postgresql_servers" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/postgresql_server/102-private-endpoint-postgresql/standalone/ci.sh b/examples/postgresql_server/102-private-endpoint-postgresql/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/postgresql_server/102-private-endpoint-postgresql/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/postgresql_server/102-private-endpoint-postgresql/standalone/main.tf b/examples/postgresql_server/102-private-endpoint-postgresql/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/postgresql_server/102-private-endpoint-postgresql/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/postgresql_server/102-private-endpoint-postgresql/standalone/module.tf b/examples/postgresql_server/102-private-endpoint-postgresql/standalone/module.tf deleted file mode 100644 index a503c325a4..0000000000 --- a/examples/postgresql_server/102-private-endpoint-postgresql/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - - database = { - postgresql_servers = var.postgresql_servers - } - - networking = { - vnets = var.vnets - } -} - diff --git a/examples/postgresql_server/102-private-endpoint-postgresql/standalone/readme.md b/examples/postgresql_server/102-private-endpoint-postgresql/standalone/readme.md deleted file mode 100644 index da3f014a38..0000000000 --- a/examples/postgresql_server/102-private-endpoint-postgresql/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/postgresql_server/102-private-endpoint-postgresql/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/postgresql_server/102-private-endpoint-postgresql/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/postgresql_server/102-private-endpoint-postgresql/standalone/variables.tf b/examples/postgresql_server/102-private-endpoint-postgresql/standalone/variables.tf deleted file mode 100755 index 9fb9c737c7..0000000000 --- a/examples/postgresql_server/102-private-endpoint-postgresql/standalone/variables.tf +++ /dev/null @@ -1,33 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "postgresql_servers" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - - -variable "var_folder_path" { - default = {} -} diff --git a/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/ci.sh b/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/main.tf b/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/module.tf b/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/module.tf deleted file mode 100644 index 6a4349a4df..0000000000 --- a/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/module.tf +++ /dev/null @@ -1,18 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - azuread_groups = var.azuread_groups - - database = { - postgresql_servers = var.postgresql_servers - } - - networking = { - vnets = var.vnets - } -} - diff --git a/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/readme.md b/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/readme.md deleted file mode 100644 index c1c6256864..0000000000 --- a/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/postgresql_server/103-private-endpoint-with-fw-rule/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/variables.tf b/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/variables.tf deleted file mode 100755 index cc19852d04..0000000000 --- a/examples/postgresql_server/103-private-endpoint-with-fw-rule/standalone/variables.tf +++ /dev/null @@ -1,36 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "postgresql_servers" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "azuread_groups" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/recovery_vault/101-simple-asrv/standalone/ci.sh b/examples/recovery_vault/101-simple-asrv/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/recovery_vault/101-simple-asrv/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/recovery_vault/101-simple-asrv/standalone/main.tf b/examples/recovery_vault/101-simple-asrv/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/recovery_vault/101-simple-asrv/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/recovery_vault/101-simple-asrv/standalone/module.tf b/examples/recovery_vault/101-simple-asrv/standalone/module.tf deleted file mode 100644 index 5cd868b495..0000000000 --- a/examples/recovery_vault/101-simple-asrv/standalone/module.tf +++ /dev/null @@ -1,11 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - - shared_services = { - recovery_vaults = var.recovery_vaults - } -} - diff --git a/examples/recovery_vault/101-simple-asrv/standalone/readme.md b/examples/recovery_vault/101-simple-asrv/standalone/readme.md deleted file mode 100644 index fd62f112dd..0000000000 --- a/examples/recovery_vault/101-simple-asrv/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/recovery_vault/101-simple-asrv/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/recovery_vault/101-simple-asrv/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/recovery_vault/101-simple-asrv/standalone/variables.tf b/examples/recovery_vault/101-simple-asrv/standalone/variables.tf deleted file mode 100755 index a07cc9880d..0000000000 --- a/examples/recovery_vault/101-simple-asrv/standalone/variables.tf +++ /dev/null @@ -1,23 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - - -variable "recovery_vaults" { - default = {} -} - - - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} diff --git a/examples/recovery_vault/102-asr-protection/standalone/ci.sh b/examples/recovery_vault/102-asr-protection/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/recovery_vault/102-asr-protection/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/recovery_vault/102-asr-protection/standalone/main.tf b/examples/recovery_vault/102-asr-protection/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/recovery_vault/102-asr-protection/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/recovery_vault/102-asr-protection/standalone/module.tf b/examples/recovery_vault/102-asr-protection/standalone/module.tf deleted file mode 100644 index 5cd868b495..0000000000 --- a/examples/recovery_vault/102-asr-protection/standalone/module.tf +++ /dev/null @@ -1,11 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - - shared_services = { - recovery_vaults = var.recovery_vaults - } -} - diff --git a/examples/recovery_vault/102-asr-protection/standalone/readme.md b/examples/recovery_vault/102-asr-protection/standalone/readme.md deleted file mode 100644 index b6c79b4b8d..0000000000 --- a/examples/recovery_vault/102-asr-protection/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/recovery_vault/102-asr-protection/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/recovery_vault/102-asr-protection/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/recovery_vault/102-asr-protection/standalone/variables.tf b/examples/recovery_vault/102-asr-protection/standalone/variables.tf deleted file mode 100755 index f53adbd2ae..0000000000 --- a/examples/recovery_vault/102-asr-protection/standalone/variables.tf +++ /dev/null @@ -1,24 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - - -variable "recovery_vaults" { - default = {} -} - - - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/recovery_vault/103-asr-with-private-endpoint/standalone/ci.sh b/examples/recovery_vault/103-asr-with-private-endpoint/standalone/ci.sh deleted file mode 100755 index c9f8c2236b..0000000000 --- a/examples/recovery_vault/103-asr-with-private-endpoint/standalone/ci.sh +++ /dev/null @@ -1,32 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var-file ../private_dns.tfvars \ - -var-file ../private_endpoints.tfvars\ - -var-file ../recovery_vaults.tfvars \ - -var-file ../virtual_networks.tfvars\ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var-file ../private_dns.tfvars \ - -var-file ../private_endpoints.tfvars\ - -var-file ../recovery_vaults.tfvars \ - -var-file ../virtual_networks.tfvars\ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/recovery_vault/103-asr-with-private-endpoint/standalone/main.tf b/examples/recovery_vault/103-asr-with-private-endpoint/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/recovery_vault/103-asr-with-private-endpoint/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/recovery_vault/103-asr-with-private-endpoint/standalone/module.tf b/examples/recovery_vault/103-asr-with-private-endpoint/standalone/module.tf deleted file mode 100644 index 62e09b358b..0000000000 --- a/examples/recovery_vault/103-asr-with-private-endpoint/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - - shared_services = { - recovery_vaults = var.recovery_vaults - } - - networking = { - private_dns = var.private_dns - private_endpoints = var.private_endpoints - vnets = var.vnets - } -} - diff --git a/examples/recovery_vault/103-asr-with-private-endpoint/standalone/readme.md b/examples/recovery_vault/103-asr-with-private-endpoint/standalone/readme.md deleted file mode 100644 index ee53bff2ac..0000000000 --- a/examples/recovery_vault/103-asr-with-private-endpoint/standalone/readme.md +++ /dev/null @@ -1,27 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/recovery_vault/103-asr-with-private-endpoint/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars \ - -var-file ../private_dns.tfvars \ - -var-file ../private_endpoints.tfvars\ - -var-file ../recovery_vaults.tfvars\ - -var-file ../virtual_networks.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/recovery_vault/103-asr-with-private-endpoint/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/recovery_vault/103-asr-with-private-endpoint/standalone/variables.tf b/examples/recovery_vault/103-asr-with-private-endpoint/standalone/variables.tf deleted file mode 100755 index ec3f4e6056..0000000000 --- a/examples/recovery_vault/103-asr-with-private-endpoint/standalone/variables.tf +++ /dev/null @@ -1,33 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - - -variable "recovery_vaults" { - default = {} -} - -variable "private_dns" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "private_endpoints" { - default = {} -} - -variable "vnets" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/redis_cache/100-redis-standard/standalone/ci.sh b/examples/redis_cache/100-redis-standard/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/redis_cache/100-redis-standard/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/redis_cache/100-redis-standard/standalone/main.tf b/examples/redis_cache/100-redis-standard/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/redis_cache/100-redis-standard/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/redis_cache/100-redis-standard/standalone/module.tf b/examples/redis_cache/100-redis-standard/standalone/module.tf deleted file mode 100644 index c7f476b5b4..0000000000 --- a/examples/redis_cache/100-redis-standard/standalone/module.tf +++ /dev/null @@ -1,11 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - - database = { - azurerm_redis_caches = var.azurerm_redis_caches - } -} - diff --git a/examples/redis_cache/100-redis-standard/standalone/readme.md b/examples/redis_cache/100-redis-standard/standalone/readme.md deleted file mode 100644 index 17b5b0937b..0000000000 --- a/examples/redis_cache/100-redis-standard/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/redis_cache/100-redis-standard/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/redis_cache/100-redis-standard/standalone \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/redis_cache/100-redis-standard/standalone/variables.tf b/examples/redis_cache/100-redis-standard/standalone/variables.tf deleted file mode 100755 index 07111a7308..0000000000 --- a/examples/redis_cache/100-redis-standard/standalone/variables.tf +++ /dev/null @@ -1,24 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - - -variable "azurerm_redis_caches" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - - - diff --git a/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/ci.sh b/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/ci.sh deleted file mode 100755 index f1c566d369..0000000000 --- a/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/ci.sh +++ /dev/null @@ -1,26 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var-file ../keyvaults.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var-file ../keyvaults.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/main.tf b/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/main.tf deleted file mode 100644 index 5a360f2b8b..0000000000 --- a/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = false - } - } -} - diff --git a/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/module.tf b/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/module.tf deleted file mode 100755 index 888aa02e62..0000000000 --- a/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/module.tf +++ /dev/null @@ -1,17 +0,0 @@ -module "caf" { - source = "../../../../" - - global_settings = var.global_settings - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - keyvault_access_policies = var.keyvault_access_policies - - security = { - keyvault_keys = var.keyvault_keys - } -} - -output "storage_accounts" { - value = module.caf.storage_accounts -} diff --git a/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/readme.md b/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/readme.md deleted file mode 100644 index 9a3e706cc1..0000000000 --- a/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/readme.md +++ /dev/null @@ -1,25 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/aztfmod/examples/storage_accounts/100-simple-storage-account-blob-container/standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var-file ../keyvaults.tfvars - - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/storage_accounts/100-simple-storage-account-blob-container/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/variables.tf b/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/variables.tf deleted file mode 100755 index 48cf165071..0000000000 --- a/examples/storage_accounts/100-simple-storage-account-blob-container/standalone/variables.tf +++ /dev/null @@ -1,25 +0,0 @@ -variable "global_settings" { - default = {} -} -variable "storage_accounts" { - default = {} -} -variable "resource_groups" { - default = {} -} -variable "keyvaults" { - default = {} -} -variable "keyvault_keys" { - default = {} -} -variable "keyvault_access_policies" { - default = {} -} -variable "var_folder_path" { - default = {} -} -variable "tags" { - default = null - type = map(any) -} diff --git a/examples/storage_accounts/102-storage-account-advanced-options/standalone/ci.sh b/examples/storage_accounts/102-storage-account-advanced-options/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/storage_accounts/102-storage-account-advanced-options/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/storage_accounts/102-storage-account-advanced-options/standalone/main.tf b/examples/storage_accounts/102-storage-account-advanced-options/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/storage_accounts/102-storage-account-advanced-options/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/storage_accounts/102-storage-account-advanced-options/standalone/module.tf b/examples/storage_accounts/102-storage-account-advanced-options/standalone/module.tf deleted file mode 100755 index 5b3884e9cb..0000000000 --- a/examples/storage_accounts/102-storage-account-advanced-options/standalone/module.tf +++ /dev/null @@ -1,9 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - -} - diff --git a/examples/storage_accounts/102-storage-account-advanced-options/standalone/readme.md b/examples/storage_accounts/102-storage-account-advanced-options/standalone/readme.md deleted file mode 100644 index 1af6ff3b08..0000000000 --- a/examples/storage_accounts/102-storage-account-advanced-options/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/storage_accounts/102-storage-account-advanced-options/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/storage_accounts/102-storage-account-advanced-options/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/storage_accounts/102-storage-account-advanced-options/standalone/variables.tf b/examples/storage_accounts/102-storage-account-advanced-options/standalone/variables.tf deleted file mode 100755 index 9719914378..0000000000 --- a/examples/storage_accounts/102-storage-account-advanced-options/standalone/variables.tf +++ /dev/null @@ -1,21 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "storage_accounts" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/synapse_analytics/100-synapse/standalone/ci.sh b/examples/synapse_analytics/100-synapse/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/synapse_analytics/100-synapse/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/synapse_analytics/100-synapse/standalone/main.tf b/examples/synapse_analytics/100-synapse/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/synapse_analytics/100-synapse/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/synapse_analytics/100-synapse/standalone/module.tf b/examples/synapse_analytics/100-synapse/standalone/module.tf deleted file mode 100644 index 7ebac200c9..0000000000 --- a/examples/synapse_analytics/100-synapse/standalone/module.tf +++ /dev/null @@ -1,16 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - role_mapping = var.role_mapping - - database = { - synapse_workspaces = var.synapse_workspaces - } - - -} - diff --git a/examples/synapse_analytics/100-synapse/standalone/readme.md b/examples/synapse_analytics/100-synapse/standalone/readme.md deleted file mode 100644 index 0149fe32dd..0000000000 --- a/examples/synapse_analytics/100-synapse/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/synapse_analytics/100-synapse/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/synapse_analytics/100-synapse/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/synapse_analytics/100-synapse/standalone/variables.tf b/examples/synapse_analytics/100-synapse/standalone/variables.tf deleted file mode 100755 index 0884b4cba6..0000000000 --- a/examples/synapse_analytics/100-synapse/standalone/variables.tf +++ /dev/null @@ -1,32 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "synapse_workspaces" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "role_mapping" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/synapse_analytics/101-synapse-sparkpool/standalone/ci.sh b/examples/synapse_analytics/101-synapse-sparkpool/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/synapse_analytics/101-synapse-sparkpool/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/synapse_analytics/101-synapse-sparkpool/standalone/main.tf b/examples/synapse_analytics/101-synapse-sparkpool/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/synapse_analytics/101-synapse-sparkpool/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/synapse_analytics/101-synapse-sparkpool/standalone/module.tf b/examples/synapse_analytics/101-synapse-sparkpool/standalone/module.tf deleted file mode 100644 index 7ebac200c9..0000000000 --- a/examples/synapse_analytics/101-synapse-sparkpool/standalone/module.tf +++ /dev/null @@ -1,16 +0,0 @@ -module "caf" { - source = "../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - keyvaults = var.keyvaults - role_mapping = var.role_mapping - - database = { - synapse_workspaces = var.synapse_workspaces - } - - -} - diff --git a/examples/synapse_analytics/101-synapse-sparkpool/standalone/readme.md b/examples/synapse_analytics/101-synapse-sparkpool/standalone/readme.md deleted file mode 100644 index 47eb30cafd..0000000000 --- a/examples/synapse_analytics/101-synapse-sparkpool/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/synapse_analytics/101-synapse-sparkpool/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/synapse_analytics/101-synapse-sparkpool/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/synapse_analytics/101-synapse-sparkpool/standalone/variables.tf b/examples/synapse_analytics/101-synapse-sparkpool/standalone/variables.tf deleted file mode 100755 index 0884b4cba6..0000000000 --- a/examples/synapse_analytics/101-synapse-sparkpool/standalone/variables.tf +++ /dev/null @@ -1,32 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "synapse_workspaces" { - default = {} -} - -variable "tags" { - default = null - type = map(any) -} - -variable "storage_accounts" { - default = {} -} - -variable "keyvaults" { - default = {} -} - -variable "role_mapping" { - default = {} -} - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/webapps/appservice/101-appservice-simple/standalone/ci.sh b/examples/webapps/appservice/101-appservice-simple/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/webapps/appservice/101-appservice-simple/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/webapps/appservice/101-appservice-simple/standalone/main.tf b/examples/webapps/appservice/101-appservice-simple/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/webapps/appservice/101-appservice-simple/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/webapps/appservice/101-appservice-simple/standalone/module.tf b/examples/webapps/appservice/101-appservice-simple/standalone/module.tf deleted file mode 100644 index 2a3a4d39d7..0000000000 --- a/examples/webapps/appservice/101-appservice-simple/standalone/module.tf +++ /dev/null @@ -1,12 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - webapp = { - app_service_plans = var.app_service_plans - app_services = var.app_services - } - -} - diff --git a/examples/webapps/appservice/101-appservice-simple/standalone/readme.md b/examples/webapps/appservice/101-appservice-simple/standalone/readme.md deleted file mode 100644 index 1a4cb41ee6..0000000000 --- a/examples/webapps/appservice/101-appservice-simple/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/webapps/appservice/101-appservice-simple/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/webapps/appservice/101-appservice-simple/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/webapps/appservice/101-appservice-simple/standalone/variables.tf b/examples/webapps/appservice/101-appservice-simple/standalone/variables.tf deleted file mode 100755 index f64340f100..0000000000 --- a/examples/webapps/appservice/101-appservice-simple/standalone/variables.tf +++ /dev/null @@ -1,24 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "app_service_plans" { - default = {} -} - -variable "app_services" { - default = {} -} - -variable "var_folder_path" { - default = {} -} diff --git a/examples/webapps/appservice/102-appservice-slots/standalone/ci.sh b/examples/webapps/appservice/102-appservice-slots/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/webapps/appservice/102-appservice-slots/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/webapps/appservice/102-appservice-slots/standalone/main.tf b/examples/webapps/appservice/102-appservice-slots/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/webapps/appservice/102-appservice-slots/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/webapps/appservice/102-appservice-slots/standalone/module.tf b/examples/webapps/appservice/102-appservice-slots/standalone/module.tf deleted file mode 100644 index 2a3a4d39d7..0000000000 --- a/examples/webapps/appservice/102-appservice-slots/standalone/module.tf +++ /dev/null @@ -1,12 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - webapp = { - app_service_plans = var.app_service_plans - app_services = var.app_services - } - -} - diff --git a/examples/webapps/appservice/102-appservice-slots/standalone/readme.md b/examples/webapps/appservice/102-appservice-slots/standalone/readme.md deleted file mode 100644 index abf995b783..0000000000 --- a/examples/webapps/appservice/102-appservice-slots/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/webapps/appservice/102-appservice-slots/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/webapps/appservice/102-appservice-slots/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/webapps/appservice/102-appservice-slots/standalone/variables.tf b/examples/webapps/appservice/102-appservice-slots/standalone/variables.tf deleted file mode 100755 index f64340f100..0000000000 --- a/examples/webapps/appservice/102-appservice-slots/standalone/variables.tf +++ /dev/null @@ -1,24 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "app_service_plans" { - default = {} -} - -variable "app_services" { - default = {} -} - -variable "var_folder_path" { - default = {} -} diff --git a/examples/webapps/appservice/103-appservice-extend/standalone/ci.sh b/examples/webapps/appservice/103-appservice-extend/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/webapps/appservice/103-appservice-extend/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/webapps/appservice/103-appservice-extend/standalone/main.tf b/examples/webapps/appservice/103-appservice-extend/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/webapps/appservice/103-appservice-extend/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/webapps/appservice/103-appservice-extend/standalone/module.tf b/examples/webapps/appservice/103-appservice-extend/standalone/module.tf deleted file mode 100644 index 2a3a4d39d7..0000000000 --- a/examples/webapps/appservice/103-appservice-extend/standalone/module.tf +++ /dev/null @@ -1,12 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - webapp = { - app_service_plans = var.app_service_plans - app_services = var.app_services - } - -} - diff --git a/examples/webapps/appservice/103-appservice-extend/standalone/readme.md b/examples/webapps/appservice/103-appservice-extend/standalone/readme.md deleted file mode 100644 index 99c3592f85..0000000000 --- a/examples/webapps/appservice/103-appservice-extend/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/webapps/appservice/103-appservice-extend/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/webapps/appservice/103-appservice-extend/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/webapps/appservice/103-appservice-extend/standalone/variables.tf b/examples/webapps/appservice/103-appservice-extend/standalone/variables.tf deleted file mode 100755 index b113923042..0000000000 --- a/examples/webapps/appservice/103-appservice-extend/standalone/variables.tf +++ /dev/null @@ -1,25 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "app_service_plans" { - default = {} -} - -variable "app_services" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - diff --git a/examples/webapps/appservice/104-appservice-appinsight/standalone/ci.sh b/examples/webapps/appservice/104-appservice-appinsight/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/webapps/appservice/104-appservice-appinsight/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/webapps/appservice/104-appservice-appinsight/standalone/main.tf b/examples/webapps/appservice/104-appservice-appinsight/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/webapps/appservice/104-appservice-appinsight/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/webapps/appservice/104-appservice-appinsight/standalone/module.tf b/examples/webapps/appservice/104-appservice-appinsight/standalone/module.tf deleted file mode 100644 index ae4d50a068..0000000000 --- a/examples/webapps/appservice/104-appservice-appinsight/standalone/module.tf +++ /dev/null @@ -1,13 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - webapp = { - app_service_plans = var.app_service_plans - app_services = var.app_services - azurerm_application_insights = var.azurerm_application_insights - } - -} - diff --git a/examples/webapps/appservice/104-appservice-appinsight/standalone/readme.md b/examples/webapps/appservice/104-appservice-appinsight/standalone/readme.md deleted file mode 100644 index 913d728017..0000000000 --- a/examples/webapps/appservice/104-appservice-appinsight/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/webapps/appservice/104-appservice-appinsight/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/webapps/appservice/104-appservice-appinsight/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/webapps/appservice/104-appservice-appinsight/standalone/variables.tf b/examples/webapps/appservice/104-appservice-appinsight/standalone/variables.tf deleted file mode 100755 index ca4a50e4e4..0000000000 --- a/examples/webapps/appservice/104-appservice-appinsight/standalone/variables.tf +++ /dev/null @@ -1,29 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "app_service_plans" { - default = {} -} - -variable "app_services" { - default = {} -} - -variable "azurerm_application_insights" { - default = {} -} - - -variable "var_folder_path" { - default = {} -} \ No newline at end of file diff --git a/examples/webapps/appservice/105-appservice-backup/standalone/ci.sh b/examples/webapps/appservice/105-appservice-backup/standalone/ci.sh deleted file mode 100755 index a4e3baea4c..0000000000 --- a/examples/webapps/appservice/105-appservice-backup/standalone/ci.sh +++ /dev/null @@ -1,24 +0,0 @@ -#!/bin/bash - -set -e - -current_folder=$(pwd) -cd standalone - -terraform init - -terraform apply \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - - -terraform destroy \ - -var-file ../configuration.tfvars \ - -var tags='{testing_job_id='"${1}"'}' \ - -var var_folder_path=${current_folder} \ - -input=false \ - -auto-approve - diff --git a/examples/webapps/appservice/105-appservice-backup/standalone/main.tf b/examples/webapps/appservice/105-appservice-backup/standalone/main.tf deleted file mode 100644 index fbcbcb259d..0000000000 --- a/examples/webapps/appservice/105-appservice-backup/standalone/main.tf +++ /dev/null @@ -1,43 +0,0 @@ -terraform { - required_providers { - azurerm = { - source = "hashicorp/azurerm" - version = "~> 2.52.0" - } - azuread = { - source = "hashicorp/azuread" - version = "~> 1.0.0" - } - random = { - source = "hashicorp/random" - version = "~> 2.2.1" - } - null = { - source = "hashicorp/null" - version = "~> 2.1.0" - } - external = { - source = "hashicorp/external" - version = "~> 1.2.0" - } - tls = { - source = "hashicorp/tls" - version = "~> 2.2.0" - } - azurecaf = { - source = "aztfmod/azurecaf" - version = "~> 1.2.0" - } - } - required_version = ">= 0.13" -} - - -provider "azurerm" { - features { - key_vault { - purge_soft_delete_on_destroy = true - } - } -} - diff --git a/examples/webapps/appservice/105-appservice-backup/standalone/module.tf b/examples/webapps/appservice/105-appservice-backup/standalone/module.tf deleted file mode 100644 index a0480e2fb3..0000000000 --- a/examples/webapps/appservice/105-appservice-backup/standalone/module.tf +++ /dev/null @@ -1,13 +0,0 @@ -module "caf" { - source = "../../../../../" - global_settings = var.global_settings - tags = var.tags - resource_groups = var.resource_groups - storage_accounts = var.storage_accounts - webapp = { - app_service_plans = var.app_service_plans - app_services = var.app_services - } - -} - diff --git a/examples/webapps/appservice/105-appservice-backup/standalone/readme.md b/examples/webapps/appservice/105-appservice-backup/standalone/readme.md deleted file mode 100644 index 1a4cb41ee6..0000000000 --- a/examples/webapps/appservice/105-appservice-backup/standalone/readme.md +++ /dev/null @@ -1,23 +0,0 @@ -You can test this module outside of a landingzone using - -```bash -cd /tf/caf/examples/webapps/appservice/101-appservice-simple/standalone - -terraform init - -terraform plan \ - -var-file ../configuration.tfvars - -``` - -To test this deployment in the example landingzone. Make sure the launchpad has been deployed first - -```bash - -rover \ - -lz /tf/caf/landingzones/caf_example \ - -var-folder /tf/caf/examples/webapps/appservice/101-appservice-simple/ \ - -level level1 \ - -a plan - -``` \ No newline at end of file diff --git a/examples/webapps/appservice/105-appservice-backup/standalone/variables.tf b/examples/webapps/appservice/105-appservice-backup/standalone/variables.tf deleted file mode 100755 index 3a889f71f7..0000000000 --- a/examples/webapps/appservice/105-appservice-backup/standalone/variables.tf +++ /dev/null @@ -1,28 +0,0 @@ -variable "global_settings" { - default = {} -} - -variable "resource_groups" { - default = null -} - -variable "tags" { - default = null - type = map(any) -} - -variable "app_service_plans" { - default = {} -} - -variable "app_services" { - default = {} -} - -variable "var_folder_path" { - default = {} -} - -variable "storage_accounts" { - default = {} -} \ No newline at end of file From 5759764a4456d1f93929045cd2c97db38d5b626a Mon Sep 17 00:00:00 2001 From: Arnaud Lheureux Date: Wed, 21 Apr 2021 06:58:38 +0000 Subject: [PATCH 2/2] FMT --- application_gateway_waf_policies.tf | 4 +-- dynamic_secrets.tf | 2 +- .../102-waf-policy/application.tfvars | 2 +- .../app_gateway/102-waf-policy/waf.tfvars | 6 ++-- .../101-single-cluster/aks.tfvars | 2 +- .../102-multi-nodepools/aks.tfvars | 16 +++++----- .../104-private-cluster/aks.tfvars | 16 +++++----- .../configuration.tfvars | 10 +++---- .../102-sqlserver-extend/configuration.tfvars | 6 ++-- .../configuration.tfvars | 6 ++-- .../configuration.tfvars | 6 ++-- .../configuration.tfvars | 12 ++++---- .../keyvaults.tfvars | 4 +-- keyvault_keys.tf | 4 +-- locals.combined_objects.tf | 2 +- locals.tf | 30 +++++++++---------- .../compute/container_registry/registry.tf | 2 +- modules/compute/virtual_machine/vm_linux.tf | 2 +- modules/compute/virtual_machine/vm_windows.tf | 2 +- .../waf_policy.tf | 20 ++++++------- .../virtual_hub_route_tables/route_table.tf | 4 +-- modules/security/keyvault_key/main.tf | 2 +- mssql_databases.tf | 4 +-- 23 files changed, 82 insertions(+), 82 deletions(-) diff --git a/application_gateway_waf_policies.tf b/application_gateway_waf_policies.tf index bc38a1c4c7..081cb1c4ef 100644 --- a/application_gateway_waf_policies.tf +++ b/application_gateway_waf_policies.tf @@ -1,6 +1,6 @@ module "application_gateway_waf_policies" { - source = "./modules/networking/application_gateway_waf_policies" - for_each = local.networking.application_gateway_waf_policies + source = "./modules/networking/application_gateway_waf_policies" + for_each = local.networking.application_gateway_waf_policies global_settings = local.global_settings settings = each.value diff --git a/dynamic_secrets.tf b/dynamic_secrets.tf index 01b31f9832..2c48bb2ca7 100755 --- a/dynamic_secrets.tf +++ b/dynamic_secrets.tf @@ -6,7 +6,7 @@ module "dynamic_keyvault_secrets" { source = "./modules/security/dynamic_keyvault_secrets" depends_on = [module.keyvaults] - for_each = { + for_each = { for keyvault_key, secrets in try(var.security.dynamic_keyvault_secrets, {}) : keyvault_key => { for key, value in secrets : key => value if try(value.value, null) != null diff --git a/examples/app_gateway/102-waf-policy/application.tfvars b/examples/app_gateway/102-waf-policy/application.tfvars index 5e9dd815cc..1af729073e 100644 --- a/examples/app_gateway/102-waf-policy/application.tfvars +++ b/examples/app_gateway/102-waf-policy/application.tfvars @@ -11,7 +11,7 @@ application_gateway_applications = { front_end_port_key = "80" host_name = "cafdemo.internal" request_routing_rule_key = "default" - waf_policy = { + waf_policy = { key = "wp1" } } diff --git a/examples/app_gateway/102-waf-policy/waf.tfvars b/examples/app_gateway/102-waf-policy/waf.tfvars index c980d860e0..701c96e005 100644 --- a/examples/app_gateway/102-waf-policy/waf.tfvars +++ b/examples/app_gateway/102-waf-policy/waf.tfvars @@ -1,7 +1,7 @@ application_gateway_waf_policies = { wp1 = { - name = "examplewafpolicy" - resource_group_key = "agw_waf" + name = "examplewafpolicy" + resource_group_key = "agw_waf" custom_rules = { rule1 = { @@ -60,7 +60,7 @@ application_gateway_waf_policies = { file_upload_limit_in_mb = 100 max_request_body_size_in_kb = 128 } - + managed_rules = { exclusion = { ex1 = { diff --git a/examples/compute/kubernetes_services/101-single-cluster/aks.tfvars b/examples/compute/kubernetes_services/101-single-cluster/aks.tfvars index 14b8774042..f15391be3d 100644 --- a/examples/compute/kubernetes_services/101-single-cluster/aks.tfvars +++ b/examples/compute/kubernetes_services/101-single-cluster/aks.tfvars @@ -22,7 +22,7 @@ aks_clusters = { type = "SystemAssigned" } - vnet_key = "spoke_aks_re1" + vnet_key = "spoke_aks_re1" network_profile = { network_plugin = "azure" diff --git a/examples/compute/kubernetes_services/102-multi-nodepools/aks.tfvars b/examples/compute/kubernetes_services/102-multi-nodepools/aks.tfvars index 64cab977f6..a450a8d8ec 100644 --- a/examples/compute/kubernetes_services/102-multi-nodepools/aks.tfvars +++ b/examples/compute/kubernetes_services/102-multi-nodepools/aks.tfvars @@ -47,14 +47,14 @@ aks_clusters = { node_pools = { pool1 = { - name = "nodepool1" - mode = "User" - subnet_key = "aks_nodepool_user1" - max_pods = 30 - vm_size = "Standard_DS2_v2" - node_count = 1 - enable_auto_scaling = false - os_disk_size_gb = 512 + name = "nodepool1" + mode = "User" + subnet_key = "aks_nodepool_user1" + max_pods = 30 + vm_size = "Standard_DS2_v2" + node_count = 1 + enable_auto_scaling = false + os_disk_size_gb = 512 tags = { "project" = "user services" } diff --git a/examples/compute/kubernetes_services/104-private-cluster/aks.tfvars b/examples/compute/kubernetes_services/104-private-cluster/aks.tfvars index b98df13b63..fd1d6b79ec 100644 --- a/examples/compute/kubernetes_services/104-private-cluster/aks.tfvars +++ b/examples/compute/kubernetes_services/104-private-cluster/aks.tfvars @@ -56,14 +56,14 @@ aks_clusters = { node_pools = { pool1 = { - name = "nodepool1" - mode = "User" - subnet_key = "aks_nodepool_user1" - max_pods = 30 - vm_size = "Standard_DS2_v2" - node_count = 2 - enable_auto_scaling = false - os_disk_size_gb = 512 + name = "nodepool1" + mode = "User" + subnet_key = "aks_nodepool_user1" + max_pods = 30 + vm_size = "Standard_DS2_v2" + node_count = 2 + enable_auto_scaling = false + os_disk_size_gb = 512 tags = { "project" = "user services" } diff --git a/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/configuration.tfvars b/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/configuration.tfvars index 2b73ff8717..2ccc616d24 100755 --- a/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/configuration.tfvars +++ b/examples/compute/virtual_machine/105-single-windows-vm-kv-admin-secrets/configuration.tfvars @@ -119,11 +119,11 @@ dynamic_keyvault_secrets = { keyvaults = { example_vm_rg1 = { - name = "vmsecretskv" - resource_group_key = "vm_region1" - sku_name = "standard" - soft_delete_enabled = true - purge_protection_enabled = true + name = "vmsecretskv" + resource_group_key = "vm_region1" + sku_name = "standard" + soft_delete_enabled = true + purge_protection_enabled = true tags = { env = "Standalone" } diff --git a/examples/mssql_server/102-sqlserver-extend/configuration.tfvars b/examples/mssql_server/102-sqlserver-extend/configuration.tfvars index e3732dc138..2975e1776e 100644 --- a/examples/mssql_server/102-sqlserver-extend/configuration.tfvars +++ b/examples/mssql_server/102-sqlserver-extend/configuration.tfvars @@ -78,9 +78,9 @@ mssql_servers = { connection_policy = "Default" public_network_access_enabled = false - - identity = { - type = "SystemAssigned" + + identity = { + type = "SystemAssigned" } extended_auditing_policy = { diff --git a/examples/mssql_server/103-sqlserver-two-regions/configuration.tfvars b/examples/mssql_server/103-sqlserver-two-regions/configuration.tfvars index ef2b2ec26a..127a6bdc7e 100644 --- a/examples/mssql_server/103-sqlserver-two-regions/configuration.tfvars +++ b/examples/mssql_server/103-sqlserver-two-regions/configuration.tfvars @@ -190,9 +190,9 @@ mssql_servers = { keyvault_key = "sql-rg1" connection_policy = "Default" - - identity = { - type = "SystemAssigned" + + identity = { + type = "SystemAssigned" } extended_auditing_policy = { diff --git a/examples/mssql_server/104-sqlserver-elastic_pools/configuration.tfvars b/examples/mssql_server/104-sqlserver-elastic_pools/configuration.tfvars index 2d99e3998e..2e02b4ab19 100644 --- a/examples/mssql_server/104-sqlserver-elastic_pools/configuration.tfvars +++ b/examples/mssql_server/104-sqlserver-elastic_pools/configuration.tfvars @@ -90,9 +90,9 @@ mssql_servers = { connection_policy = "Default" public_network_access_enabled = false - - identity = { - type = "SystemAssigned" + + identity = { + type = "SystemAssigned" } extended_auditing_policy = { diff --git a/examples/mssql_server/105-sqlserver-failover_groups/configuration.tfvars b/examples/mssql_server/105-sqlserver-failover_groups/configuration.tfvars index a578651d4c..289051a367 100644 --- a/examples/mssql_server/105-sqlserver-failover_groups/configuration.tfvars +++ b/examples/mssql_server/105-sqlserver-failover_groups/configuration.tfvars @@ -38,14 +38,14 @@ mssql_servers = { mssql_databases = { db1-rg1 = { - mssql_server_key = "sql-server-rg1" - resource_group_key = "sql_region1" - name = "db1rg1" + mssql_server_key = "sql-server-rg1" + resource_group_key = "sql_region1" + name = "db1rg1" } db2-rg1 = { - mssql_server_key = "sql-server-rg1" - resource_group_key = "sql_region1" - name = "db2rg1" + mssql_server_key = "sql-server-rg1" + resource_group_key = "sql_region1" + name = "db2rg1" } } diff --git a/examples/storage_accounts/100-simple-storage-account-blob-container/keyvaults.tfvars b/examples/storage_accounts/100-simple-storage-account-blob-container/keyvaults.tfvars index 44e2a6c41e..1eae003942 100644 --- a/examples/storage_accounts/100-simple-storage-account-blob-container/keyvaults.tfvars +++ b/examples/storage_accounts/100-simple-storage-account-blob-container/keyvaults.tfvars @@ -18,8 +18,8 @@ keyvault_access_policies = { } diastg = { diagnostic_storage_account_key = "dsa1" - key_permissions = ["get", "create", "list", "restore", "recover", "unwrapkey", "wrapkey", "purge", "encrypt", "decrypt", "sign", "verify"] - secret_permissions = ["Set", "Get", "List", "Delete", "Purge", "Recover"] + key_permissions = ["get", "create", "list", "restore", "recover", "unwrapkey", "wrapkey", "purge", "encrypt", "decrypt", "sign", "verify"] + secret_permissions = ["Set", "Get", "List", "Delete", "Purge", "Recover"] } logged_in_user = { key_permissions = ["get", "create", "delete", "list", "restore", "recover", "unwrapkey", "wrapkey", "purge", "encrypt", "decrypt", "sign", "verify"] diff --git a/keyvault_keys.tf b/keyvault_keys.tf index 540f7842bf..60a5487d71 100755 --- a/keyvault_keys.tf +++ b/keyvault_keys.tf @@ -6,8 +6,8 @@ module "keyvault_keys" { for_each = local.security.keyvault_keys global_settings = local.global_settings - settings = each.value - keyvault = try(local.combined_objects_keyvaults[local.client_config.landingzone_key][each.value.keyvault_key], local.combined_objects_keyvaults[each.value.lz_key][each.value.keyvault_key]) + settings = each.value + keyvault = try(local.combined_objects_keyvaults[local.client_config.landingzone_key][each.value.keyvault_key], local.combined_objects_keyvaults[each.value.lz_key][each.value.keyvault_key]) } diff --git a/locals.combined_objects.tf b/locals.combined_objects.tf index 5f2746c9dc..8e52ea606d 100755 --- a/locals.combined_objects.tf +++ b/locals.combined_objects.tf @@ -24,7 +24,7 @@ locals { combined_objects_keyvault_keys = merge(tomap({ (local.client_config.landingzone_key) = module.keyvault_keys }), try(var.remote_objects.keyvault_keys, {})) combined_objects_keyvaults = merge(tomap({ (local.client_config.landingzone_key) = module.keyvaults }), try(var.remote_objects.keyvaults, {})) combined_objects_logic_app_integration_account = merge(tomap({ (local.client_config.landingzone_key) = module.logic_app_integration_account }), try(var.remote_objects.logic_app_integration_account, {})) - combined_objects_logic_app_workflow = merge(tomap({ (local.client_config.landingzone_key) = module.logic_app_workflow}), try(var.remote_objects.logic_app_workflow, {})) + combined_objects_logic_app_workflow = merge(tomap({ (local.client_config.landingzone_key) = module.logic_app_workflow }), try(var.remote_objects.logic_app_workflow, {})) combined_objects_machine_learning = merge(tomap({ (local.client_config.landingzone_key) = module.machine_learning_workspaces }), try(var.remote_objects.machine_learning_workspaces, {})) combined_objects_managed_identities = merge(tomap({ (local.client_config.landingzone_key) = module.managed_identities }), try(var.remote_objects.managed_identities, {})) combined_objects_mssql_databases = merge(tomap({ (local.client_config.landingzone_key) = module.mssql_databases }), try(var.remote_objects.mssql_databases, {})) diff --git a/locals.tf b/locals.tf index 7b1d31d509..bf23671a61 100755 --- a/locals.tf +++ b/locals.tf @@ -96,21 +96,21 @@ locals { storage_accounts = local.combined_objects_storage_accounts } - global_settings = merge( { - default_region = try(var.global_settings.default_region, "region1") - environment = try(var.global_settings.environment, var.environment) - inherit_tags = try(var.global_settings.inherit_tags, false) - passthrough = try(var.global_settings.passthrough, false) - prefix = try(var.global_settings.prefix, null) - # prefix_with_hyphen = try(var.global_settings.prefix_with_hyphen, format("%s-", try(var.global_settings.prefixes[0], random_string.prefix.0.result))) - # prefixes = var.global_settings.prefix == "" ? null : try(var.global_settings.prefixes, [random_string.prefix.0.result]) - prefix_with_hyphen = try(var.global_settings.prefix_with_hyphen, format("%s-", try(var.global_settings.prefix, try(var.global_settings.prefixes[0], random_string.prefix.0.result)))) - prefixes = try(var.global_settings.prefix, null) == "" ? null : try([var.global_settings.prefix], try(var.global_settings.prefixes, [random_string.prefix.0.result])) - random_length = try(var.global_settings.random_length, 0) - regions = var.global_settings.regions - tags = try(var.global_settings.tags, null) - use_slug = try(var.global_settings.use_slug, true) - }, var.global_settings) + global_settings = merge({ + default_region = try(var.global_settings.default_region, "region1") + environment = try(var.global_settings.environment, var.environment) + inherit_tags = try(var.global_settings.inherit_tags, false) + passthrough = try(var.global_settings.passthrough, false) + prefix = try(var.global_settings.prefix, null) + # prefix_with_hyphen = try(var.global_settings.prefix_with_hyphen, format("%s-", try(var.global_settings.prefixes[0], random_string.prefix.0.result))) + # prefixes = var.global_settings.prefix == "" ? null : try(var.global_settings.prefixes, [random_string.prefix.0.result]) + prefix_with_hyphen = try(var.global_settings.prefix_with_hyphen, format("%s-", try(var.global_settings.prefix, try(var.global_settings.prefixes[0], random_string.prefix.0.result)))) + prefixes = try(var.global_settings.prefix, null) == "" ? null : try([var.global_settings.prefix], try(var.global_settings.prefixes, [random_string.prefix.0.result])) + random_length = try(var.global_settings.random_length, 0) + regions = var.global_settings.regions + tags = try(var.global_settings.tags, null) + use_slug = try(var.global_settings.use_slug, true) + }, var.global_settings) logic_app = { integration_service_environment = try(var.logic_app.integration_service_environment, {}) diff --git a/modules/compute/container_registry/registry.tf b/modules/compute/container_registry/registry.tf index 1c1b20dc15..6f1156add0 100755 --- a/modules/compute/container_registry/registry.tf +++ b/modules/compute/container_registry/registry.tf @@ -36,7 +36,7 @@ resource "azurerm_container_registry" "acr" { content { action = "Allow" - subnet_id = try(var.vnets[try(virtual_network.value.lz_key,var.client_config.landingzone_key)][virtual_network.value.vnet_key].subnets[virtual_network.value.subnet_key].id, {}) + subnet_id = try(var.vnets[try(virtual_network.value.lz_key, var.client_config.landingzone_key)][virtual_network.value.vnet_key].subnets[virtual_network.value.subnet_key].id, {}) } } } diff --git a/modules/compute/virtual_machine/vm_linux.tf b/modules/compute/virtual_machine/vm_linux.tf index 062d2f5362..6ef17887c9 100755 --- a/modules/compute/virtual_machine/vm_linux.tf +++ b/modules/compute/virtual_machine/vm_linux.tf @@ -22,7 +22,7 @@ resource "azurecaf_name" "linux" { # Name of the Linux computer name resource "azurecaf_name" "linux_computer_name" { depends_on = [azurerm_network_interface.nic, azurerm_network_interface_security_group_association.nic_nsg] - for_each = local.os_type == "linux" ? var.settings.virtual_machine_settings : {} + for_each = local.os_type == "linux" ? var.settings.virtual_machine_settings : {} name = try(each.value.computer_name, each.value.name) resource_type = "azurerm_linux_virtual_machine" diff --git a/modules/compute/virtual_machine/vm_windows.tf b/modules/compute/virtual_machine/vm_windows.tf index 89e5398210..55b842f346 100755 --- a/modules/compute/virtual_machine/vm_windows.tf +++ b/modules/compute/virtual_machine/vm_windows.tf @@ -39,7 +39,7 @@ resource "azurecaf_name" "os_disk_windows" { resource "azurerm_windows_virtual_machine" "vm" { depends_on = [azurerm_network_interface.nic, azurerm_network_interface_security_group_association.nic_nsg] - for_each = local.os_type == "windows" ? var.settings.virtual_machine_settings : {} + for_each = local.os_type == "windows" ? var.settings.virtual_machine_settings : {} name = azurecaf_name.windows[each.key].result location = var.location diff --git a/modules/networking/application_gateway_waf_policies/waf_policy.tf b/modules/networking/application_gateway_waf_policies/waf_policy.tf index 448f2274f3..0a400623c6 100644 --- a/modules/networking/application_gateway_waf_policies/waf_policy.tf +++ b/modules/networking/application_gateway_waf_policies/waf_policy.tf @@ -1,17 +1,17 @@ resource "azurerm_web_application_firewall_policy" "wafpolicy" { - name = var.settings.name - resource_group_name = var.resource_group_name - location = var.location - tags = local.tags + name = var.settings.name + resource_group_name = var.resource_group_name + location = var.location + tags = local.tags dynamic "custom_rules" { for_each = try(var.settings.custom_rules, {}) content { - name = custom_rules.value.name - priority = custom_rules.value.priority - rule_type = custom_rules.value.rule_type - action = custom_rules.value.action + name = custom_rules.value.name + priority = custom_rules.value.priority + rule_type = custom_rules.value.rule_type + action = custom_rules.value.action dynamic "match_conditions" { for_each = custom_rules.value.match_conditions @@ -58,8 +58,8 @@ resource "azurerm_web_application_firewall_policy" "wafpolicy" { dynamic "managed_rule_set" { for_each = var.settings.managed_rules.managed_rule_set content { - type = try(managed_rule_set.value.type, null) - version = managed_rule_set.value.version + type = try(managed_rule_set.value.type, null) + version = managed_rule_set.value.version dynamic "rule_group_override" { for_each = try(managed_rule_set.value.rule_group_override, {}) diff --git a/modules/networking/virtual_hub_route_tables/route_table.tf b/modules/networking/virtual_hub_route_tables/route_table.tf index fff5a84f32..1825d952a8 100644 --- a/modules/networking/virtual_hub_route_tables/route_table.tf +++ b/modules/networking/virtual_hub_route_tables/route_table.tf @@ -53,8 +53,8 @@ resource "null_resource" "virtual_hub_route_table" { on_failure = fail environment = { - METHOD = "PUT" - URL = self.triggers.URL + METHOD = "PUT" + URL = self.triggers.URL PROPERTIES = jsonencode( { properties = {} diff --git a/modules/security/keyvault_key/main.tf b/modules/security/keyvault_key/main.tf index 8b88947f02..696ed87d0d 100755 --- a/modules/security/keyvault_key/main.tf +++ b/modules/security/keyvault_key/main.tf @@ -11,5 +11,5 @@ locals { "module" = basename(abspath(path.module)) } base_tags = try(var.global_settings.inherit_tags, false) ? try(var.keyvault.base_tags, {}) : {} - tags = merge(local.base_tags, local.module_tag, try(var.settings.tags, {})) + tags = merge(local.base_tags, local.module_tag, try(var.settings.tags, {})) } \ No newline at end of file diff --git a/mssql_databases.tf b/mssql_databases.tf index e8d5902a26..ca046d6306 100755 --- a/mssql_databases.tf +++ b/mssql_databases.tf @@ -24,7 +24,7 @@ data "azurerm_storage_account" "mssqldb_auditing" { for_each = { for key, value in local.database.mssql_databases : key => value if try(value.extended_auditing_policy, null) != null - } + } name = module.storage_accounts[each.value.extended_auditing_policy.storage_account.key].name resource_group_name = module.storage_accounts[each.value.extended_auditing_policy.storage_account.key].resource_group_name @@ -36,7 +36,7 @@ resource "azurerm_mssql_server_extended_auditing_policy" "mssqldb" { for key, value in local.database.mssql_databases : key => value if try(value.extended_auditing_policy, null) != null } - + log_monitoring_enabled = try(each.value.extended_auditing_policy.log_monitoring_enabled, false) server_id = module.mssql_servers[each.key].id