Skip to content

Commit 7446139

Browse files
committed
Formatted code via 'terraform fmt'
1 parent e4a7a6e commit 7446139

5 files changed

Lines changed: 164 additions & 164 deletions

File tree

Lines changed: 94 additions & 94 deletions
Original file line numberDiff line numberDiff line change
@@ -1,210 +1,210 @@
11
resource "random_pet" "rg-name" {
2-
prefix = var.resource_group_name_prefix
2+
prefix = var.resource_group_name_prefix
33
}
44

55
resource "azurerm_resource_group" "rg" {
6-
name = random_pet.rg-name.id
7-
location = var.resource_group_location
6+
name = random_pet.rg-name.id
7+
location = var.resource_group_location
88
}
99

1010
# Locals block for hardcoded names
1111
locals {
12-
backend_address_pool_name = "${azurerm_virtual_network.test.name}-beap"
13-
frontend_port_name = "${azurerm_virtual_network.test.name}-feport"
14-
frontend_ip_configuration_name = "${azurerm_virtual_network.test.name}-feip"
15-
http_setting_name = "${azurerm_virtual_network.test.name}-be-htst"
16-
listener_name = "${azurerm_virtual_network.test.name}-httplstn"
17-
request_routing_rule_name = "${azurerm_virtual_network.test.name}-rqrt"
18-
app_gateway_subnet_name = "appgwsubnet"
12+
backend_address_pool_name = "${azurerm_virtual_network.test.name}-beap"
13+
frontend_port_name = "${azurerm_virtual_network.test.name}-feport"
14+
frontend_ip_configuration_name = "${azurerm_virtual_network.test.name}-feip"
15+
http_setting_name = "${azurerm_virtual_network.test.name}-be-htst"
16+
listener_name = "${azurerm_virtual_network.test.name}-httplstn"
17+
request_routing_rule_name = "${azurerm_virtual_network.test.name}-rqrt"
18+
app_gateway_subnet_name = "appgwsubnet"
1919
}
2020

2121
# User Assigned Identities
2222
resource "azurerm_user_assigned_identity" "testIdentity" {
23-
resource_group_name = azurerm_resource_group.rg.name
24-
location = azurerm_resource_group.rg.location
23+
resource_group_name = azurerm_resource_group.rg.name
24+
location = azurerm_resource_group.rg.location
2525

26-
name = "identity1"
26+
name = "identity1"
2727

28-
tags = var.tags
28+
tags = var.tags
2929
}
3030

3131
resource "azurerm_virtual_network" "test" {
32-
name = var.virtual_network_name
33-
location = azurerm_resource_group.rg.location
34-
resource_group_name = azurerm_resource_group.rg.name
35-
address_space = [var.virtual_network_address_prefix]
32+
name = var.virtual_network_name
33+
location = azurerm_resource_group.rg.location
34+
resource_group_name = azurerm_resource_group.rg.name
35+
address_space = [var.virtual_network_address_prefix]
3636

37-
subnet {
37+
subnet {
3838
name = var.aks_subnet_name
3939
address_prefix = var.aks_subnet_address_prefix
40-
}
40+
}
4141

42-
subnet {
42+
subnet {
4343
name = "appgwsubnet"
4444
address_prefix = var.app_gateway_subnet_address_prefix
45-
}
45+
}
4646

47-
tags = var.tags
47+
tags = var.tags
4848
}
4949

5050
data "azurerm_subnet" "kubesubnet" {
51-
name = var.aks_subnet_name
52-
virtual_network_name = azurerm_virtual_network.test.name
53-
resource_group_name = azurerm_resource_group.rg.name
54-
depends_on = [azurerm_virtual_network.test]
51+
name = var.aks_subnet_name
52+
virtual_network_name = azurerm_virtual_network.test.name
53+
resource_group_name = azurerm_resource_group.rg.name
54+
depends_on = [azurerm_virtual_network.test]
5555
}
5656

5757
data "azurerm_subnet" "appgwsubnet" {
58-
name = "appgwsubnet"
59-
virtual_network_name = azurerm_virtual_network.test.name
60-
resource_group_name = azurerm_resource_group.rg.name
61-
depends_on = [azurerm_virtual_network.test]
58+
name = "appgwsubnet"
59+
virtual_network_name = azurerm_virtual_network.test.name
60+
resource_group_name = azurerm_resource_group.rg.name
61+
depends_on = [azurerm_virtual_network.test]
6262
}
6363

6464
# Public Ip
6565
resource "azurerm_public_ip" "test" {
66-
name = "publicIp1"
67-
location = azurerm_resource_group.rg.location
68-
resource_group_name = azurerm_resource_group.rg.name
69-
allocation_method = "Static"
70-
sku = "Standard"
66+
name = "publicIp1"
67+
location = azurerm_resource_group.rg.location
68+
resource_group_name = azurerm_resource_group.rg.name
69+
allocation_method = "Static"
70+
sku = "Standard"
7171

72-
tags = var.tags
72+
tags = var.tags
7373
}
7474

7575
resource "azurerm_application_gateway" "network" {
76-
name = var.app_gateway_name
77-
resource_group_name = azurerm_resource_group.rg.name
78-
location = azurerm_resource_group.rg.location
76+
name = var.app_gateway_name
77+
resource_group_name = azurerm_resource_group.rg.name
78+
location = azurerm_resource_group.rg.location
7979

80-
sku {
80+
sku {
8181
name = var.app_gateway_sku
8282
tier = "Standard_v2"
8383
capacity = 2
84-
}
84+
}
8585

86-
gateway_ip_configuration {
86+
gateway_ip_configuration {
8787
name = "appGatewayIpConfig"
8888
subnet_id = data.azurerm_subnet.appgwsubnet.id
89-
}
89+
}
9090

91-
frontend_port {
91+
frontend_port {
9292
name = local.frontend_port_name
9393
port = 80
94-
}
94+
}
9595

96-
frontend_port {
96+
frontend_port {
9797
name = "httpsPort"
9898
port = 443
99-
}
99+
}
100100

101-
frontend_ip_configuration {
101+
frontend_ip_configuration {
102102
name = local.frontend_ip_configuration_name
103103
public_ip_address_id = azurerm_public_ip.test.id
104-
}
104+
}
105105

106-
backend_address_pool {
106+
backend_address_pool {
107107
name = local.backend_address_pool_name
108-
}
108+
}
109109

110-
backend_http_settings {
110+
backend_http_settings {
111111
name = local.http_setting_name
112112
cookie_based_affinity = "Disabled"
113113
port = 80
114114
protocol = "Http"
115115
request_timeout = 1
116-
}
116+
}
117117

118-
http_listener {
118+
http_listener {
119119
name = local.listener_name
120120
frontend_ip_configuration_name = local.frontend_ip_configuration_name
121121
frontend_port_name = local.frontend_port_name
122122
protocol = "Http"
123-
}
123+
}
124124

125-
request_routing_rule {
125+
request_routing_rule {
126126
name = local.request_routing_rule_name
127127
rule_type = "Basic"
128128
http_listener_name = local.listener_name
129129
backend_address_pool_name = local.backend_address_pool_name
130130
backend_http_settings_name = local.http_setting_name
131-
}
131+
}
132132

133-
tags = var.tags
133+
tags = var.tags
134134

135-
depends_on = [azurerm_virtual_network.test, azurerm_public_ip.test]
135+
depends_on = [azurerm_virtual_network.test, azurerm_public_ip.test]
136136
}
137137

138138
resource "azurerm_role_assignment" "ra1" {
139-
scope = data.azurerm_subnet.kubesubnet.id
140-
role_definition_name = "Network Contributor"
141-
principal_id = var.aks_service_principal_object_id
139+
scope = data.azurerm_subnet.kubesubnet.id
140+
role_definition_name = "Network Contributor"
141+
principal_id = var.aks_service_principal_object_id
142142

143-
depends_on = [azurerm_virtual_network.test]
143+
depends_on = [azurerm_virtual_network.test]
144144
}
145145

146146
resource "azurerm_role_assignment" "ra2" {
147-
scope = azurerm_user_assigned_identity.testIdentity.id
148-
role_definition_name = "Managed Identity Operator"
149-
principal_id = var.aks_service_principal_object_id
150-
depends_on = [azurerm_user_assigned_identity.testIdentity]
147+
scope = azurerm_user_assigned_identity.testIdentity.id
148+
role_definition_name = "Managed Identity Operator"
149+
principal_id = var.aks_service_principal_object_id
150+
depends_on = [azurerm_user_assigned_identity.testIdentity]
151151
}
152152

153153
resource "azurerm_role_assignment" "ra3" {
154-
scope = azurerm_application_gateway.network.id
155-
role_definition_name = "Contributor"
156-
principal_id = azurerm_user_assigned_identity.testIdentity.principal_id
157-
depends_on = [azurerm_user_assigned_identity.testIdentity, azurerm_application_gateway.network]
154+
scope = azurerm_application_gateway.network.id
155+
role_definition_name = "Contributor"
156+
principal_id = azurerm_user_assigned_identity.testIdentity.principal_id
157+
depends_on = [azurerm_user_assigned_identity.testIdentity, azurerm_application_gateway.network]
158158
}
159159

160160
resource "azurerm_role_assignment" "ra4" {
161-
scope = azurerm_resource_group.rg.id
162-
role_definition_name = "Reader"
163-
principal_id = azurerm_user_assigned_identity.testIdentity.principal_id
164-
depends_on = [azurerm_user_assigned_identity.testIdentity, azurerm_application_gateway.network]
161+
scope = azurerm_resource_group.rg.id
162+
role_definition_name = "Reader"
163+
principal_id = azurerm_user_assigned_identity.testIdentity.principal_id
164+
depends_on = [azurerm_user_assigned_identity.testIdentity, azurerm_application_gateway.network]
165165
}
166166

167167
resource "azurerm_kubernetes_cluster" "k8s" {
168-
name = var.aks_name
169-
location = azurerm_resource_group.rg.location
170-
dns_prefix = var.aks_dns_prefix
168+
name = var.aks_name
169+
location = azurerm_resource_group.rg.location
170+
dns_prefix = var.aks_dns_prefix
171171

172-
resource_group_name = azurerm_resource_group.rg.name
172+
resource_group_name = azurerm_resource_group.rg.name
173173

174-
http_application_routing_enabled = false
174+
http_application_routing_enabled = false
175175

176-
linux_profile {
176+
linux_profile {
177177
admin_username = var.vm_user_name
178178

179179
ssh_key {
180-
key_data = file(var.public_ssh_key_path)
181-
}
180+
key_data = file(var.public_ssh_key_path)
182181
}
182+
}
183183

184-
default_node_pool {
184+
default_node_pool {
185185
name = "agentpool"
186186
node_count = var.aks_agent_count
187187
vm_size = var.aks_agent_vm_size
188188
os_disk_size_gb = var.aks_agent_os_disk_size
189189
vnet_subnet_id = data.azurerm_subnet.kubesubnet.id
190-
}
190+
}
191191

192-
service_principal {
192+
service_principal {
193193
client_id = var.aks_service_principal_app_id
194194
client_secret = var.aks_service_principal_client_secret
195-
}
195+
}
196196

197-
network_profile {
197+
network_profile {
198198
network_plugin = "azure"
199199
dns_service_ip = var.aks_dns_service_ip
200200
docker_bridge_cidr = var.aks_docker_bridge_cidr
201201
service_cidr = var.aks_service_cidr
202-
}
202+
}
203203

204-
role_based_access_control {
204+
role_based_access_control {
205205
enabled = var.aks_enable_rbac
206-
}
206+
}
207207

208-
depends_on = [azurerm_virtual_network.test, azurerm_application_gateway.network]
209-
tags = var.tags
208+
depends_on = [azurerm_virtual_network.test, azurerm_application_gateway.network]
209+
tags = var.tags
210210
}
Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,44 +1,44 @@
11
output "resource_group_name" {
2-
value = azurerm_resource_group.rg.name
2+
value = azurerm_resource_group.rg.name
33
}
44

55
output "client_key" {
6-
value = azurerm_kubernetes_cluster.k8s.kube_config.0.client_key
6+
value = azurerm_kubernetes_cluster.k8s.kube_config.0.client_key
77
}
88

99
output "client_certificate" {
10-
value = azurerm_kubernetes_cluster.k8s.kube_config.0.client_certificate
10+
value = azurerm_kubernetes_cluster.k8s.kube_config.0.client_certificate
1111
}
1212

1313
output "cluster_ca_certificate" {
14-
value = azurerm_kubernetes_cluster.k8s.kube_config.0.cluster_ca_certificate
14+
value = azurerm_kubernetes_cluster.k8s.kube_config.0.cluster_ca_certificate
1515
}
1616

1717
output "cluster_username" {
18-
value = azurerm_kubernetes_cluster.k8s.kube_config.0.username
18+
value = azurerm_kubernetes_cluster.k8s.kube_config.0.username
1919
}
2020

2121
output "cluster_password" {
22-
value = azurerm_kubernetes_cluster.k8s.kube_config.0.password
22+
value = azurerm_kubernetes_cluster.k8s.kube_config.0.password
2323
}
2424

2525
output "kube_config" {
26-
value = azurerm_kubernetes_cluster.k8s.kube_config_raw
27-
sensitive = true
26+
value = azurerm_kubernetes_cluster.k8s.kube_config_raw
27+
sensitive = true
2828
}
2929

3030
output "host" {
31-
value = azurerm_kubernetes_cluster.k8s.kube_config.0.host
31+
value = azurerm_kubernetes_cluster.k8s.kube_config.0.host
3232
}
3333

3434
output "identity_resource_id" {
35-
value = azurerm_user_assigned_identity.testIdentity.id
35+
value = azurerm_user_assigned_identity.testIdentity.id
3636
}
3737

3838
output "identity_client_id" {
39-
value = azurerm_user_assigned_identity.testIdentity.client_id
39+
value = azurerm_user_assigned_identity.testIdentity.client_id
4040
}
4141

4242
output "application_ip_address" {
43-
value = azurerm_public_ip.test.ip_address
43+
value = azurerm_public_ip.test.ip_address
4444
}

quickstart/201-k8s-cluster-with-aks-applicationgateway-ingress/providers.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,18 +4,18 @@ terraform {
44

55
required_providers {
66
azurerm = {
7-
source = "hashicorp/azurerm"
7+
source = "hashicorp/azurerm"
88
version = "~>2.0"
99
}
1010
}
1111
backend "azurerm" {
12-
resource_group_name = "<storage_account_resource_group>"
12+
resource_group_name = "<storage_account_resource_group>"
1313
storage_account_name = "<storage_account_name>"
14-
container_name = "tfstate"
15-
key = "codelab.microsoft.tfstate"
16-
}
14+
container_name = "tfstate"
15+
key = "codelab.microsoft.tfstate"
1716
}
17+
}
1818

19-
provider "azurerm" {
19+
provider "azurerm" {
2020
features {}
2121
}
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
aks_service_principal_app_id = "<service_principal_app_id>"
2-
2+
33
aks_service_principal_client_secret = "<service_principal_password>"
4-
4+
55
aks_service_principal_object_id = "<service_principal_object_id>"

0 commit comments

Comments
 (0)