From 5f201df37c9295e7a9d2582d8cb30bfd27114b29 Mon Sep 17 00:00:00 2001 From: Tom Archer Date: Wed, 25 Sep 2024 15:14:07 -0700 Subject: [PATCH] Initial put --- .../README.md | 49 ++ .../main.tf | 464 ++++++++++++++++++ .../outputs.tf | 67 +++ .../providers.tf | 18 + .../variables.tf | 95 ++++ 5 files changed, 693 insertions(+) create mode 100644 quickstart/101-front-door-cmk-byoc-custom-domain/README.md create mode 100644 quickstart/101-front-door-cmk-byoc-custom-domain/main.tf create mode 100644 quickstart/101-front-door-cmk-byoc-custom-domain/outputs.tf create mode 100644 quickstart/101-front-door-cmk-byoc-custom-domain/providers.tf create mode 100644 quickstart/101-front-door-cmk-byoc-custom-domain/variables.tf diff --git a/quickstart/101-front-door-cmk-byoc-custom-domain/README.md b/quickstart/101-front-door-cmk-byoc-custom-domain/README.md new file mode 100644 index 000000000..9e1ec241f --- /dev/null +++ b/quickstart/101-front-door-cmk-byoc-custom-domain/README.md @@ -0,0 +1,49 @@ +# Azure CDN Frontdoor +This template deploys an Azure CDN Frontdoor with a CMK/BYOC TLS/SSL Custom Domain. + +## Terraform resource types + +- [random_pet](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/pet) +- [azurerm_resource_group](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/resource_group) +- [azurerm_client_config](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/data-sources/client_config) +- [random_string](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/string) +- [azurerm_key_vault](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/key_vault) +- [azurerm_key_vault_certificate](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/key_vault_certificate) +- [azurerm_dns_zone](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/dns_zone) +- [azurerm_cdn_frontdoor_profile](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_profile) +- [azurerm_cdn_frontdoor_firewall_policy](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_firewall_policy) +- [azurerm_cdn_frontdoor_endpoint](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_endpoint) +- [azurerm_cdn_frontdoor_origin_group](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_origin_group) +- [azurerm_cdn_frontdoor_origin](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_origin) +- [azurerm_cdn_frontdoor_rule_set](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_rule_set) +- [azurerm_cdn_frontdoor_rule](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_rule) +- [azurerm_cdn_frontdoor_secret](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_secret) +- [azurerm_cdn_frontdoor_security_policy](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_security_policy) +- [azurerm_cdn_frontdoor_route](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_route) +- [azurerm_cdn_frontdoor_custom_domain](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_custom_domain) +- [azurerm_cdn_frontdoor_custom_domain_association](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/cdn_frontdoor_custom_domain_association) +- [azurerm_dns_txt_record](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/dns_txt_record) +- [azurerm_dns_cname_record](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/dns_cname_record) + +## Variables + +| Name | Description | Default value | +|-|-|-| +| `resource_group_name_prefix` | Prefix of the resource group name that's combined with a random ID so name is unique in your Azure subscription. | rg | +| `resource_group_location` | Location of the resource group. | eastus | +| `key_vault_name` | The name of the Key Vault resource. The value will be randomly generated if blank. | "" | +| `key_vault_certificate_name` | The name of the Key Vault certificate resource. The value will be randomly generated if blank. | "" | +| `dns_zone_name` | The name of the DNS Zone resource. The value will be randomly generated if blank. | "" | +| `cdn_frontdoor_profile_name` | The name of the CDN Frontdoor profile resource. The value will be randomly generated if blank. | "" | +| `cdn_frontdoor_firewall_policy_name` | The name of the CDN Frontdoor firewall policy resource. The value will be randomly generated if blank. | "" | +| `cdn_frontdoor_endpoint_name` | The name of the CDN Frontdoor endpoint resource. The value will be randomly generated if blank. | "" | +| `cdn_frontdoor_origin_group_name` | The name of the CDN Frontdoor origin group resource. The value will be randomly generated if blank. | "" | +| `cdn_frontdoor_origin_name` | The name of the CDN Frontdoor origin resource. The value will be randomly generated if blank. | "" | +| `cdn_frontdoor_rule_set_name` | The name of the CDN Frontdoor rule set resource. The value will be randomly generated if blank. | "" | +| `cdn_frontdoor_rule_name` | The name of the CDN Frontdoor rule resource. The value will be randomly generated if blank. | "" | +| `cdn_frontdoor_secret_name` | The name of the CDN Frontdoor secret resource. The value will be randomly generated if blank. | "" | +| `cdn_frontdoor_security_policy_name` | The name of the CDN Frontdoor security policy resource. The value will be randomly generated if blank. | "" | +| `cdn_frontdoor_route_name` | The name of the CDN Frontdoor route resource. The value will be randomly generated if blank. | "" | +| `cdn_frontdoor_custom_domain_name` | The name of the CDN Frontdoor custom domain resource. The value will be randomly generated if blank. | "" | + +## Example \ No newline at end of file diff --git a/quickstart/101-front-door-cmk-byoc-custom-domain/main.tf b/quickstart/101-front-door-cmk-byoc-custom-domain/main.tf new file mode 100644 index 000000000..0b4c32cbb --- /dev/null +++ b/quickstart/101-front-door-cmk-byoc-custom-domain/main.tf @@ -0,0 +1,464 @@ +resource "random_pet" "rg_name" { + prefix = var.resource_group_name_prefix +} + +resource "azurerm_resource_group" "rg" { + location = var.resource_group_location + name = random_pet.rg_name.id +} + +data "azurerm_client_config" "current" {} + +resource "random_string" "azurerm_key_vault_name" { + length = 13 + lower = true + numeric = false + special = false + upper = false +} + +resource "azurerm_key_vault" "example" { + name = coalesce(var.key_vault_name, "kv-${random_string.azurerm_key_vault_name.result}") + location = azurerm_resource_group.rg.location + resource_group_name = azurerm_resource_group.rg.name + tenant_id = data.azurerm_client_config.current.tenant_id + sku_name = "premium" + soft_delete_retention_days = 7 + + network_acls { + default_action = "Deny" + bypass = "AzureServices" + ip_rules = ["10.0.1.0/24"] # <- this should be the CIDR for your clients IP to allow it through the Key Vault Firewall Policy + } + + # Grant access to the Frontdoor Enterprise Application(e.g. Microsoft.Azure.Cdn) to the Key Vaults Certificates + access_policy { + tenant_id = data.azurerm_client_config.current.tenant_id + object_id = "00000000-0000-0000-0000-000000000000" # <- Object Id for the Microsoft.Azure.Cdn Enterprise Application. + + secret_permissions = [ + "Get", + ] + } + + # Grant your Personal account access to view the Key Vaults Certificates in the portal UI... + # *** This access_policy maybe remove if you do not want to view the Frontdoor Secret(s) in the Portal *** + access_policy { + tenant_id = data.azurerm_client_config.current.tenant_id + object_id = "00000000-0000-0000-0000-000000000000" # <- Object Id for your personal AAD account + + certificate_permissions = [ + "Get", + "List", + "Purge", + "Recover" + ] + + secret_permissions = [ + "Get", + "List" + ] + } + + # Grant the Terraform Service Principal access to the Key Vaults Certificates + access_policy { + tenant_id = data.azurerm_client_config.current.tenant_id + object_id = "00000000-0000-0000-0000-000000000000" # <- Object Id of the Service Principal that Terraform is running as + + certificate_permissions = [ + "Get", + "Import", + "Delete", + "Purge" + ] + + secret_permissions = [ + "Get", + ] + } +} + +resource "random_string" "azurerm_key_vault_certificate_name" { + length = 13 + lower = true + numeric = false + special = false + upper = false +} + +resource "azurerm_key_vault_certificate" "example" { + name = coalesce(var.key_vault_certificate_name, "cert-${random_string.azurerm_key_vault_certificate_name.result}") + key_vault_id = azurerm_key_vault.example.id + + certificate { + contents = filebase64("my-custom-certificate.pfx") # <- this should be the pfx file for your SSL/TSL certificate + } +} + +resource "random_string" "azurerm_dns_zone_name" { + length = 13 + lower = true + numeric = false + special = false + upper = false +} + +resource "azurerm_dns_zone" "example" { + name = coalesce(var.dns_zone_name, "dns-${random_string.azurerm_dns_zone_name.result}") + resource_group_name = azurerm_resource_group.rg.name +} + +resource "random_string" "azurerm_cdn_frontdoor_profile_name" { + length = 13 + lower = true + numeric = false + special = false + upper = false +} + +resource "azurerm_cdn_frontdoor_profile" "example" { + name = coalesce(var.cdn_frontdoor_profile_name, "profile-${random_string.azurerm_cdn_frontdoor_profile_name.result}") + resource_group_name = azurerm_resource_group.rg.name + sku_name = "Premium_AzureFrontDoor" + + response_timeout_seconds = 120 + + tags = { + environment = "example" + } +} + +resource "random_string" "azurerm_cdn_frontdoor_firewall_policy_name" { + length = 13 + lower = true + numeric = false + special = false + upper = false +} + +resource "azurerm_cdn_frontdoor_firewall_policy" "example" { + name = coalesce(var.cdn_frontdoor_firewall_policy_name, "waf-${random_string.azurerm_cdn_frontdoor_firewall_policy_name.result}") + resource_group_name = azurerm_resource_group.rg.name + sku_name = azurerm_cdn_frontdoor_profile.example.sku_name + enabled = true + mode = "Prevention" + redirect_url = "https://www.example.com" + custom_block_response_status_code = 403 + custom_block_response_body = "PGh0bWw+CjxoZWFkZXI+PHRpdGxlPkhlbGxvPC90aXRsZT48L2hlYWRlcj4KPGJvZHk+CkhlbGxvIHdvcmxkCjwvYm9keT4KPC9odG1sPg==" + + custom_rule { + name = "Rule1" + enabled = true + priority = 1 + rate_limit_duration_in_minutes = 1 + rate_limit_threshold = 10 + type = "MatchRule" + action = "Block" + + # NOTE: Managed rules are only supported with the Premium_AzureFrontDoor SKU + match_condition { + match_variable = "RemoteAddr" + operator = "IPMatch" + negation_condition = false + match_values = ["10.0.2.0/24", "10.0.1.0/24"] + } + } + + managed_rule { + type = "DefaultRuleSet" + version = "preview-0.1" + action = "Block" + + override { + rule_group_name = "PHP" + + rule { + rule_id = "933111" + enabled = false + action = "Block" + } + } + } + + managed_rule { + type = "BotProtection" + version = "preview-0.1" + action = "Block" + } +} + +resource "random_string" "azurerm_cdn_frontdoor_endpoint_name" { + length = 13 + lower = true + numeric = false + special = false + upper = false +} + +resource "azurerm_cdn_frontdoor_endpoint" "example" { + name = coalesce(var.cdn_frontdoor_endpoint_name, "endpoint-${random_string.azurerm_cdn_frontdoor_endpoint_name.result}") + cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.example.id + enabled = true +} + +resource "random_string" "azurerm_cdn_frontdoor_origin_group_name" { + length = 13 + lower = true + numeric = false + special = false + upper = false +} + +resource "azurerm_cdn_frontdoor_origin_group" "example" { + name = coalesce(var.cdn_frontdoor_origin_group_name, "origin-group-${random_string.azurerm_cdn_frontdoor_origin_group_name.result}") + cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.example.id + session_affinity_enabled = true + + restore_traffic_time_to_healed_or_new_endpoint_in_minutes = 10 + + health_probe { + interval_in_seconds = 100 + path = "/" + protocol = "Http" + request_type = "HEAD" + } + + load_balancing { + additional_latency_in_milliseconds = 0 + sample_size = 16 + successful_samples_required = 3 + } +} + +resource "random_string" "azurerm_cdn_frontdoor_origin_name" { + length = 13 + lower = true + numeric = false + special = false + upper = false +} + +resource "azurerm_cdn_frontdoor_origin" "example" { + name = coalesce(var.cdn_frontdoor_origin_name, "origin-${random_string.azurerm_cdn_frontdoor_origin_name.result}") + cdn_frontdoor_origin_group_id = azurerm_cdn_frontdoor_origin_group.example.id + enabled = true + + certificate_name_check_enabled = false + host_name = join(".", ["contoso", azurerm_dns_zone.example.name]) + priority = 1 + weight = 1 +} + +resource "random_string" "azurerm_cdn_frontdoor_rule_set_name" { + length = 13 + lower = true + numeric = false + special = false + upper = false +} + +resource "azurerm_cdn_frontdoor_rule_set" "example" { + name = coalesce(var.cdn_frontdoor_rule_set_name, "ruleset-${random_string.azurerm_cdn_frontdoor_rule_set_name.result}") + cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.example.id +} + +resource "random_string" "azurerm_cdn_frontdoor_rule_name" { + length = 13 + lower = true + numeric = false + special = false + upper = false +} + +resource "azurerm_cdn_frontdoor_rule" "example" { + depends_on = [azurerm_cdn_frontdoor_origin_group.example, azurerm_cdn_frontdoor_origin.example] + + name = coalesce(var.cdn_frontdoor_rule_name, "rule-${random_string.azurerm_cdn_frontdoor_rule_name.result}") + cdn_frontdoor_rule_set_id = azurerm_cdn_frontdoor_rule_set.example.id + order = 1 + behavior_on_match = "Continue" + + actions { + route_configuration_override_action { + cdn_frontdoor_origin_group_id = azurerm_cdn_frontdoor_origin_group.example.id + forwarding_protocol = "HttpsOnly" + query_string_caching_behavior = "IncludeSpecifiedQueryStrings" + query_string_parameters = ["foo", "clientIp={client_ip}"] + compression_enabled = true + cache_behavior = "OverrideIfOriginMissing" + cache_duration = "365.23:59:59" + } + + url_redirect_action { + redirect_type = "PermanentRedirect" + redirect_protocol = "MatchRequest" + query_string = "clientIp={client_ip}" + destination_path = "/exampleredirection" + destination_hostname = "contoso.example.com" + destination_fragment = "UrlRedirect" + } + } + + conditions { + host_name_condition { + operator = "Equal" + negate_condition = false + match_values = ["www.example.com", "images.example.com", "video.example.com"] + transforms = ["Lowercase", "Trim"] + } + + is_device_condition { + operator = "Equal" + negate_condition = false + match_values = ["Mobile"] + } + + post_args_condition { + post_args_name = "customerName" + operator = "BeginsWith" + match_values = ["J", "K"] + transforms = ["Uppercase"] + } + + request_method_condition { + operator = "Equal" + negate_condition = false + match_values = ["DELETE"] + } + + url_filename_condition { + operator = "Equal" + negate_condition = false + match_values = ["media.mp4"] + transforms = ["Lowercase", "RemoveNulls", "Trim"] + } + } +} + +resource "random_string" "azurerm_cdn_frontdoor_secret_name" { + length = 13 + lower = true + numeric = false + special = false + upper = false +} + +resource "azurerm_cdn_frontdoor_secret" "example" { + depends_on = [azurerm_key_vault.example] + + name = coalesce(var.cdn_frontdoor_secret_name, "secret-${random_string.azurerm_cdn_frontdoor_secret_name.result}") + cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.example.id + + secret { + customer_certificate { + key_vault_certificate_id = azurerm_key_vault_certificate.example.versionless_id # <- using the versionless_id will always use the latest certificate + } + } +} + +resource "random_string" "azurerm_cdn_frontdoor_security_policy_name" { + length = 13 + lower = true + numeric = false + special = false + upper = false +} + +resource "azurerm_cdn_frontdoor_security_policy" "example" { + name = coalesce(var.cdn_frontdoor_security_policy_name, "security-policy-${random_string.azurerm_cdn_frontdoor_security_policy_name.result}") + cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.example.id + + security_policies { + firewall { + cdn_frontdoor_firewall_policy_id = azurerm_cdn_frontdoor_firewall_policy.example.id + + association { + domain { + # This value can be either a cdn_frontdoor_custom_domain or a cdn_frontdoor_endpoint ID + cdn_frontdoor_domain_id = azurerm_cdn_frontdoor_custom_domain.contoso.id + } + + patterns_to_match = ["/*"] + } + } + } +} + +resource "random_string" "azurerm_cdn_frontdoor_route_name" { + length = 13 + lower = true + numeric = false + special = false + upper = false +} + +resource "azurerm_cdn_frontdoor_route" "example" { + name = coalesce(var.cdn_frontdoor_route_name, "route-${random_string.azurerm_cdn_frontdoor_route_name.result}") + cdn_frontdoor_endpoint_id = azurerm_cdn_frontdoor_endpoint.example.id + cdn_frontdoor_origin_group_id = azurerm_cdn_frontdoor_origin_group.example.id + cdn_frontdoor_origin_ids = [azurerm_cdn_frontdoor_origin.example.id] + enabled = true + + https_redirect_enabled = true + forwarding_protocol = "HttpsOnly" + patterns_to_match = ["/*"] + supported_protocols = ["Http", "Https"] + cdn_frontdoor_rule_set_ids = [azurerm_cdn_frontdoor_rule_set.example.id] + + cdn_frontdoor_custom_domain_ids = [azurerm_cdn_frontdoor_custom_domain.contoso.id] + link_to_default_domain = false + + cache { + compression_enabled = true + content_types_to_compress = ["text/html", "text/javascript", "text/xml"] + query_strings = ["account", "settings", "foo", "bar"] + query_string_caching_behavior = "IgnoreSpecifiedQueryStrings" + } +} + +resource "random_string" "azurerm_cdn_frontdoor_custom_domain_name" { + length = 13 + lower = true + numeric = false + special = false + upper = false +} + +resource "azurerm_cdn_frontdoor_custom_domain" "contoso" { + name = coalesce(var.cdn_frontdoor_custom_domain_name, "custom-domain-${random_string.azurerm_cdn_frontdoor_custom_domain_name.result}") + cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.example.id + dns_zone_id = azurerm_dns_zone.example.id + host_name = join(".", ["contoso", azurerm_dns_zone.example.name]) + + tls { + certificate_type = "CustomerCertificate" + minimum_tls_version = "TLS12" + cdn_frontdoor_secret_id = azurerm_cdn_frontdoor_secret.example.id + } +} + +resource "azurerm_cdn_frontdoor_custom_domain_association" "contoso" { + cdn_frontdoor_custom_domain_id = azurerm_cdn_frontdoor_custom_domain.contoso.id + cdn_frontdoor_route_ids = [azurerm_cdn_frontdoor_route.example.id] +} + +resource "azurerm_dns_txt_record" "contoso" { + name = join(".", ["_dnsauth", "contoso"]) + zone_name = azurerm_dns_zone.example.name + resource_group_name = azurerm_resource_group.rg.name + ttl = 3600 + + record { + value = azurerm_cdn_frontdoor_custom_domain.contoso.validation_token + } +} + +resource "azurerm_dns_cname_record" "contoso" { + depends_on = [azurerm_cdn_frontdoor_route.example, azurerm_cdn_frontdoor_security_policy.example] + + name = "contoso" + zone_name = azurerm_dns_zone.example.name + resource_group_name = azurerm_resource_group.rg.name + ttl = 3600 + record = azurerm_cdn_frontdoor_endpoint.example.host_name +} \ No newline at end of file diff --git a/quickstart/101-front-door-cmk-byoc-custom-domain/outputs.tf b/quickstart/101-front-door-cmk-byoc-custom-domain/outputs.tf new file mode 100644 index 000000000..ce9bb9e19 --- /dev/null +++ b/quickstart/101-front-door-cmk-byoc-custom-domain/outputs.tf @@ -0,0 +1,67 @@ +output "resource_group_name" { + value = azurerm_resource_group.rg.name +} + +output "key_vault_name" { + value = azurerm_key_vault.example.name +} + +output "key_vault_certificate_name" { + value = azurerm_key_vault_certificate.example.name +} + +output "dns_zone_name" { + value = azurerm_dns_zone.example.name +} + +output "cdn_frontdoor_profile_name" { + value = azurerm_cdn_frontdoor_profile.example.name +} + +output "cdn_frontdoor_firewall_policy_name" { + value = azurerm_cdn_frontdoor_firewall_policy.example.name +} + +output "cdn_frontdoor_endpoint_name" { + value = azurerm_cdn_frontdoor_endpoint.example.name +} + +output "cdn_frontdoor_origin_group_name" { + value = azurerm_cdn_frontdoor_origin_group.example.name +} + +output "cdn_frontdoor_origin_name" { + value = azurerm_cdn_frontdoor_origin.example.name +} + +output "cdn_frontdoor_rule_set_name" { + value = azurerm_cdn_frontdoor_rule_set.example.name +} + +output "cdn_frontdoor_rule_name" { + value = azurerm_cdn_frontdoor_rule.example.name +} + +output "cdn_frontdoor_secret_name" { + value = azurerm_cdn_frontdoor_secret.example.name +} + +output "cdn_frontdoor_security_policy_name" { + value = azurerm_cdn_frontdoor_security_policy.example.name +} + +output "cdn_frontdoor_route_name" { + value = azurerm_cdn_frontdoor_route.example.name +} + +output "cdn_frontdoor_custom_domain_name" { + value = azurerm_cdn_frontdoor_custom_domain.contoso.name +} + +output "dns_txt_record_name" { + value = azurerm_dns_txt_record.contoso.name +} + +output "dns_cname_record_name" { + value = azurerm_dns_cname_record.contoso.name +} \ No newline at end of file diff --git a/quickstart/101-front-door-cmk-byoc-custom-domain/providers.tf b/quickstart/101-front-door-cmk-byoc-custom-domain/providers.tf new file mode 100644 index 000000000..058b68717 --- /dev/null +++ b/quickstart/101-front-door-cmk-byoc-custom-domain/providers.tf @@ -0,0 +1,18 @@ +terraform { + required_version = ">=1.0" + + required_providers { + azurerm = { + source = "hashicorp/azurerm" + version = "~>3.0" + } + random = { + source = "hashicorp/random" + version = "~>3.0" + } + } +} + +provider "azurerm" { + features {} +} \ No newline at end of file diff --git a/quickstart/101-front-door-cmk-byoc-custom-domain/variables.tf b/quickstart/101-front-door-cmk-byoc-custom-domain/variables.tf new file mode 100644 index 000000000..fcda94120 --- /dev/null +++ b/quickstart/101-front-door-cmk-byoc-custom-domain/variables.tf @@ -0,0 +1,95 @@ +variable "resource_group_name_prefix" { + type = string + default = "rg" + description = "Prefix of the resource group name that's combined with a random ID so name is unique in your Azure subscription." +} + +variable "resource_group_location" { + type = string + default = "eastus" + description = "Location of the resource group." +} + +variable "key_vault_name" { + type = string + description = "The name of the Key Vault resource. The value will be randomly generated if blank." + default = "" +} + +variable "key_vault_certificate_name" { + type = string + description = "The name of the Key Vault certificate resource. The value will be randomly generated if blank." + default = "" +} + +variable "dns_zone_name" { + type = string + description = "The name of the DNS Zone resource. The value will be randomly generated if blank." + default = "" +} + +variable "cdn_frontdoor_profile_name" { + type = string + description = "The name of the CDN Frontdoor profile resource. The value will be randomly generated if blank." + default = "" +} + +variable "cdn_frontdoor_firewall_policy_name" { + type = string + description = "The name of the CDN Frontdoor firewall policy resource. The value will be randomly generated if blank." + default = "" +} + +variable "cdn_frontdoor_endpoint_name" { + type = string + description = "The name of the CDN Frontdoor endpoint resource. The value will be randomly generated if blank." + default = "" +} + +variable "cdn_frontdoor_origin_group_name" { + type = string + description = "The name of the CDN Frontdoor origin group resource. The value will be randomly generated if blank." + default = "" +} + +variable "cdn_frontdoor_origin_name" { + type = string + description = "The name of the CDN Frontdoor origin resource. The value will be randomly generated if blank." + default = "" +} + +variable "cdn_frontdoor_rule_set_name" { + type = string + description = "The name of the CDN Frontdoor rule set resource. The value will be randomly generated if blank." + default = "" +} + +variable "cdn_frontdoor_rule_name" { + type = string + description = "The name of the CDN Frontdoor rule resource. The value will be randomly generated if blank." + default = "" +} + +variable "cdn_frontdoor_secret_name" { + type = string + description = "The name of the CDN Frontdoor secret resource. The value will be randomly generated if blank." + default = "" +} + +variable "cdn_frontdoor_security_policy_name" { + type = string + description = "The name of the CDN Frontdoor security policy resource. The value will be randomly generated if blank." + default = "" +} + +variable "cdn_frontdoor_route_name" { + type = string + description = "The name of the CDN Frontdoor route resource. The value will be randomly generated if blank." + default = "" +} + +variable "cdn_frontdoor_custom_domain_name" { + type = string + description = "The name of the CDN Frontdoor custom domain resource. The value will be randomly generated if blank." + default = "" +} \ No newline at end of file