File tree 3 files changed +15
-15
lines changed
{{cookiecutter.__src_folder_name}}/infra
3 files changed +15
-15
lines changed Original file line number Diff line number Diff line change @@ -64,7 +64,7 @@ def tests_valid_bicep(bakery):
64
64
)
65
65
)
66
66
result = subprocess .run (commands , capture_output = True , text = True )
67
- assert result .returncode == 0
67
+ assert result .returncode == 0 , result . stderr
68
68
69
69
@pytest .mark .skip (reason = "not implmented yet" )
70
70
def tests_mongo_builds_use_mongo_db_vars (bakery , default_context ):
Original file line number Diff line number Diff line change @@ -100,23 +100,21 @@ module app 'core/host/container-app-upsert.bicep' = {
100
100
]
101
101
secrets : {
102
102
{% if cookiecutter .db_resource in ("postgres -flexible ", "cosmos -postgres ") %}
103
- {
104
- 'dbserver-password' : dbserverPassword
105
- }
103
+ 'dbserver-password' : {
104
+ value : dbserverPassword
105
+ }
106
106
{% endif %}
107
107
{% if cookiecutter .project_backend in ("django ", "flask ") %}
108
- {
109
- name : 'secret-key'
110
- keyVaultUrl : '${keyVault .properties .vaultUri }secrets/SECRETKEY'
111
- identity : webIdentity .id
112
- }
108
+ 'secret-key' : {
109
+ keyVaultUrl : '${keyVault .properties .vaultUri }secrets/SECRETKEY'
110
+ identity : webIdentity .id
111
+ }
113
112
{% endif %}
114
113
{% if "mongodb " in cookiecutter .db_resource %}
115
- {
116
- name : 'azure-cosmos-connection-string'
117
- keyVaultUrl : '${keyVault .properties .vaultUri }secrets/AZURE-COSMOS-CONNECTION-STRING'
118
- identity : webIdentity .id
119
- }
114
+ 'azure-cosmos-connection-string' : {
115
+ keyVaultUrl : '${keyVault .properties .vaultUri }secrets/AZURE-COSMOS-CONNECTION-STRING'
116
+ identity : webIdentity .id
117
+ }
120
118
{% endif %}
121
119
}
122
120
{% if cookiecutter .db_resource == "postgres -addon " %}
Original file line number Diff line number Diff line change @@ -130,7 +130,9 @@ resource app 'Microsoft.App/containerApps@2023-05-02-preview' = {
130
130
} : { enabled : false }
131
131
secrets : [for secret in items (secrets ): {
132
132
name : secret .key
133
- value : secret .value
133
+ value : secret .value .value
134
+ keyVaultUrl : secret .value .keyVault
135
+ identity : secret .value .identity
134
136
}]
135
137
service : !empty (serviceType ) ? { type : serviceType } : null
136
138
registries : usePrivateRegistry ? [
You can’t perform that action at this time.
0 commit comments