12 writes to Name
Aspire.Hosting.Azure.Network (1)
AzureVirtualNetworkExtensions.cs (1)
496
Name
= resolvedName,
Aspire.Hosting.Azure.Tests (11)
AzureNetworkSecurityGroupExtensionsTests.cs (11)
60
Name
= "allow-https",
69
Name
= "deny-all-inbound",
93
Name
= "allow-https",
102
Name
= "deny-all-inbound",
124
Name
= "allow-https",
152
Name
= "allow-https",
194
Name
= "allow-https",
207
Name
= "ALLOW-HTTPS",
231
Name
= "allow-https",
245
Name
= "allow-https",
291
Name
= "allow-https",
11 references to Name
Aspire.Hosting.Azure.Network (6)
AzureNetworkSecurityGroupExtensions.cs (6)
92
ArgumentException.ThrowIfNullOrEmpty(rule.
Name
);
94
if (builder.Resource.SecurityRules.Any(existing => string.Equals(existing.
Name
, rule.
Name
, StringComparison.OrdinalIgnoreCase)))
97
$"A security rule named '{rule.
Name
}' already exists in Network Security Group '{builder.Resource.Name}'.",
126
var ruleIdentifier = Infrastructure.NormalizeBicepIdentifier($"{nsg.BicepIdentifier}_{rule.
Name
}");
129
Name = rule.
Name
,
Aspire.Hosting.Azure.Tests (5)
AzureVirtualNetworkExtensionsTests.cs (5)
298
Assert.Equal("allow-inbound-443-AzureLoadBalancer", rules[0].
Name
);
299
Assert.Equal("deny-inbound-Internet", rules[1].
Name
);
300
Assert.Equal("allow-outbound-443", rules[2].
Name
);
301
Assert.Equal("deny-outbound", rules[3].
Name
);
314
Assert.Equal("my-custom-rule", rules[0].
Name
);