12 writes to Name
Aspire.Hosting.Azure.Network (1)
AzureVirtualNetworkExtensions.cs (1)
496Name = resolvedName,
Aspire.Hosting.Azure.Tests (11)
AzureNetworkSecurityGroupExtensionsTests.cs (11)
60Name = "allow-https", 69Name = "deny-all-inbound", 93Name = "allow-https", 102Name = "deny-all-inbound", 124Name = "allow-https", 152Name = "allow-https", 194Name = "allow-https", 207Name = "ALLOW-HTTPS", 231Name = "allow-https", 245Name = "allow-https", 291Name = "allow-https",
11 references to Name
Aspire.Hosting.Azure.Network (6)
AzureNetworkSecurityGroupExtensions.cs (6)
92ArgumentException.ThrowIfNullOrEmpty(rule.Name); 94if (builder.Resource.SecurityRules.Any(existing => string.Equals(existing.Name, rule.Name, StringComparison.OrdinalIgnoreCase))) 97$"A security rule named '{rule.Name}' already exists in Network Security Group '{builder.Resource.Name}'.", 126var ruleIdentifier = Infrastructure.NormalizeBicepIdentifier($"{nsg.BicepIdentifier}_{rule.Name}"); 129Name = rule.Name,
Aspire.Hosting.Azure.Tests (5)
AzureVirtualNetworkExtensionsTests.cs (5)
298Assert.Equal("allow-inbound-443-AzureLoadBalancer", rules[0].Name); 299Assert.Equal("deny-inbound-Internet", rules[1].Name); 300Assert.Equal("allow-outbound-443", rules[2].Name); 301Assert.Equal("deny-outbound", rules[3].Name); 314Assert.Equal("my-custom-rule", rules[0].Name);