13 writes to Name
Aspire.Hosting.Azure.Network (1)
AzureVirtualNetworkExtensions.cs (1)
496
Name
= resolvedName,
Aspire.Hosting.Azure.Tests (12)
AzureNetworkSecurityGroupExtensionsTests.cs (11)
60
Name
= "allow-https",
69
Name
= "deny-all-inbound",
93
Name
= "allow-https",
102
Name
= "deny-all-inbound",
124
Name
= "allow-https",
152
Name
= "allow-https",
194
Name
= "allow-https",
207
Name
= "ALLOW-HTTPS",
231
Name
= "allow-https",
245
Name
= "allow-https",
291
Name
= "allow-https",
AzureVirtualNetworkExtensionsTests.cs (1)
437
Name
= "allow-https-from-lb",
18 references to Name
Aspire.Hosting.Azure.Network (7)
AzureNetworkSecurityGroupExtensions.cs (6)
92
ArgumentException.ThrowIfNullOrEmpty(rule.
Name
);
94
if (builder.Resource.SecurityRules.Any(existing => string.Equals(existing.
Name
, rule.
Name
, StringComparison.OrdinalIgnoreCase)))
97
$"A security rule named '{rule.
Name
}' already exists in Network Security Group '{builder.Resource.Name}'.",
126
var ruleIdentifier = Infrastructure.NormalizeBicepIdentifier($"{nsg.BicepIdentifier}_{rule.
Name
}");
129
Name = rule.
Name
,
AzureVirtualNetworkExtensions.cs (1)
526
while (nsgResource.SecurityRules.Any(r => r.
Name
== candidateName))
Aspire.Hosting.Azure.Tests (11)
AzureVirtualNetworkExtensionsTests.cs (11)
298
Assert.Equal("allow-inbound-443-AzureLoadBalancer", rules[0].
Name
);
299
Assert.Equal("deny-inbound-Internet", rules[1].
Name
);
300
Assert.Equal("allow-outbound-443", rules[2].
Name
);
301
Assert.Equal("deny-outbound", rules[3].
Name
);
314
Assert.Equal("my-custom-rule", rules[0].
Name
);
329
Assert.Equal("allow-outbound-443-AzureActiveDirectory", rules[0].
Name
);
330
Assert.Equal("allow-outbound-443-Sql", rules[1].
Name
);
343
Assert.Equal("allow-inbound-443-AzureLoadBalancer-VirtualNetwork", rules[0].
Name
);
359
Assert.Equal("deny-inbound", rules[0].
Name
);
360
Assert.Equal("deny-inbound-2", rules[1].
Name
);
361
Assert.Equal("deny-inbound-3", rules[2].
Name
);