class Fog::Network::AzureRM::Mock

Mock class for Network Service

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

This class provides the mock implementation for unit tests.

This class provides the mock implementation for unit tests.

This class provides the mock implementation for unit tests.

This class provides the mock implementation for unit tests.

This class provides the mock implementation for unit tests.

This class provides the mock implementation for unit tests.

This class provides the mock implementation for unit tests.

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Load-Balancer Request

Mock class for Network Request

Mock class for Express Route Circuit Authorization Request

Mock class for Network Request

Mock class for Local Network Gateway Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Security Rule Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Express Route Circuit Authorization Request

Mock class for Network Request

Mock class for Network Request

Mock class for Local Network Gateway Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Express Route Circuit Request

Mock class for Express Route Circuit Authorization Request

Mock class for Express Route Circuit Peering Request

Mock class for Load-Balancer Request

Mock class for Local Network Gateway Request

Mock class for Network Interface Request

Mock class for Network Security Group Request

Mock class for Network Security Rule Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Gateway Request

Mock class for Network Gateway Connection Request

Mock class for Express Route Circuit Authorization Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Local Network Gateway Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Security Rule Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

This class provides the mock implementation for unit tests.

This class provides the mock implementation for unit tests.

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Mock class for Network Request

Public Class Methods

new(_options = {}) click to toggle source
# File lib/fog/azurerm/network.rb, line 139
def initialize(_options = {})
  begin
    require 'azure_mgmt_network'
  rescue LoadError => e
    retry if require('rubygems')
    raise e.message
  end
end

Public Instance Methods

add_address_prefixes_in_virtual_network(*) click to toggle source
# File lib/fog/azurerm/requests/network/add_address_prefixes_in_virtual_network.rb, line 26
def add_address_prefixes_in_virtual_network(*)
  {
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet',
    'name' => 'fog-vnet',
    'type' => 'Microsoft.Network/virtualNetworks',
    'location' => 'westus',
    'properties' =>
      {
        'addressSpace' =>
          {
            'addressPrefixes' =>
              [
                '10.1.0.0/16',
                '10.2.0.0/16'
              ]
          },
        'dhcpOptions' => {
          'dnsServers' => [
            '10.1.0.5',
            '10.1.0.6'
          ]
        },
        'subnets' =>
          [
            {
              'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet/subnets/fog-subnet',
              'properties' =>
                {
                  'addressPrefix' => '10.1.0.0/24',
                  'provisioningState' => 'Succeeded'
                },
              'name' => 'fog-subnet'
            }
          ],
        'resourceGuid' => 'c573f8e2-d916-493f-8b25-a681c31269ef',
        'provisioningState' => 'Succeeded'
      }
  }
end
add_dns_servers_in_virtual_network(*) click to toggle source
# File lib/fog/azurerm/requests/network/add_dns_servers_in_virtual_network.rb, line 32
def add_dns_servers_in_virtual_network(*)
  virtual_network = {
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet',
    'name' => 'fog-vnet',
    'type' => 'Microsoft.Network/virtualNetworks',
    'location' => 'westus',
    'properties' =>
      {
        'addressSpace' =>
          {
            'addressPrefixes' =>
              [
                '10.1.0.0/16',
                '10.2.0.0/16'
              ]
          },
        'dhcpOptions' => {
          'dnsServers' => [
            '10.1.0.5',
            '10.1.0.6'
          ]
        },
        'subnets' =>
          [
            {
              'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet/subnets/fog-subnet',
              'properties' =>
                {
                  'addressPrefix' => '10.1.0.0/24',
                  'provisioningState' => 'Succeeded'
                },
              'name' => 'fog-subnet'
            }
          ],
        'resourceGuid' => 'c573f8e2-d916-493f-8b25-a681c31269ef',
        'provisioningState' => 'Succeeded'
      }
  }
  vnet_mapper = Azure::ARM::Network::Models::VirtualNetwork.mapper
  @network_client.deserialize(vnet_mapper, virtual_network, 'result.body')
end
add_security_rules(resource_group_name, security_group_name, security_rules) click to toggle source
# File lib/fog/azurerm/requests/network/add_security_rules.rb, line 30
def add_security_rules(resource_group_name, security_group_name, security_rules)
  network_security_group = {
    'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}",
    'name' => security_group_name,
    'type' => 'Microsoft.Network/networkSecurityGroups',
    'location' => 'location',
    'properties' =>
      {
        'securityRules' => security_rules,
        'defaultSecurityRules' =>
          [
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowVnetInBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => 'VirtualNetwork',
                  'destinationAddressPrefix' => 'VirtualNetwork',
                  'access' => 'Allow',
                  'direction' => 'Inbound',
                  'description' => 'Allow inbound traffic from all VMs in VNET',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_000,
                  'provisioningState' => 'Updating'
                },
              'name' => 'AllowVnetInBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowAzureLoadBalancerInBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => 'AzureLoadBalancer',
                  'destinationAddressPrefix' => '*',
                  'access' => 'Allow',
                  'direction' => 'Inbound',
                  'description' => 'Allow inbound traffic from azure load balancer',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_001,
                  'provisioningState' => 'Updating'
                },
              'name' => 'AllowAzureLoadBalancerInBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/DenyAllInBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => '*',
                  'destinationAddressPrefix' => '*',
                  'access' => 'Deny',
                  'direction' => 'Inbound',
                  'description' => 'Deny all inbound traffic',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_500,
                  'provisioningState' => 'Updating'
                },
              'name' => 'DenyAllInBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowVnetOutBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => 'VirtualNetwork',
                  'destinationAddressPrefix' => 'VirtualNetwork',
                  'access' => 'Allow',
                  'direction' => 'Outbound',
                  'description' => 'Allow outbound traffic from all VMs to all VMs in VNET',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_000,
                  'provisioningState' => 'Updating'
                },
              'name' => 'AllowVnetOutBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowInternetOutBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => '*',
                  'destinationAddressPrefix' => 'Internet',
                  'access' => 'Allow',
                  'direction' => 'Outbound',
                  'description' => 'Allow outbound traffic from all VMs to Internet',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_001,
                  'provisioningState' => 'Updating'
                },
              'name' => 'AllowInternetOutBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/DenyAllOutBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => '*',
                  'destinationAddressPrefix' => '*',
                  'access' => 'Deny',
                  'direction' => 'Outbound',
                  'description' => 'Deny all outbound traffic',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_500,
                  'provisioningState' => 'Updating'
                },
              'name' => 'DenyAllOutBound'
            }
          ],
        'resourceGuid' => '9dca97e6-4789-4ebd-86e3-52b8b0da6cd4',
        'provisioningState' => 'Updating'
      }
  }
  nsg_mapper = Azure::ARM::Network::Models::NetworkSecurityGroup.mapper
  @network_client.deserialize(nsg_mapper, network_security_group, 'result.body')
end
add_subnets_in_virtual_network(*) click to toggle source
# File lib/fog/azurerm/requests/network/add_subnets_in_virtual_network.rb, line 27
def add_subnets_in_virtual_network(*)
  virtual_network = {
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet',
    'name' => 'fog-vnet',
    'type' => 'Microsoft.Network/virtualNetworks',
    'location' => 'westus',
    'properties' =>
      {
        'addressSpace' =>
          {
            'addressPrefixes' =>
              [
                '10.1.0.0/16',
                '10.2.0.0/16'
              ]
          },
        'dhcpOptions' => {
          'dnsServers' => [
            '10.1.0.5',
            '10.1.0.6'
          ]
        },
        'subnets' =>
          [
            {
              'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet/subnets/fog-subnet',
              'properties' =>
                {
                  'addressPrefix' => '10.1.0.0/24',
                  'provisioningState' => 'Succeeded'
                },
              'name' => 'fog-subnet'
            }
          ],
        'resourceGuid' => 'c573f8e2-d916-493f-8b25-a681c31269ef',
        'provisioningState' => 'Succeeded'
      }
  }
  vnet_mapper = Azure::ARM::Network::Models::VirtualNetwork.mapper
  @network_client.deserialize(vnet_mapper, virtual_network, 'result.body')
end
attach_network_security_group_to_subnet(*) click to toggle source
# File lib/fog/azurerm/requests/network/attach_network_security_group_to_subnet.rb, line 38
def attach_network_security_group_to_subnet(*)
  subnet = {
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet/subnets/fog-subnet',
    'properties' =>
      {
        'addressPrefix' => '10.1.0.0/24',
        'networkSecurityGroup' => {
          'id' => '/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityGroups/myNSG1'
        },
        'provisioningState' => 'Succeeded'
      },
    'name' => 'fog-subnet'
  }
  subnet_mapper = Azure::ARM::Network::Models::Subnet.mapper
  @network_client.deserialize(subnet_mapper, subnet, 'result.body')
end
attach_resource_to_nic(resource_group_name, nic_name, _resource_type, _resource_id) click to toggle source
# File lib/fog/azurerm/requests/network/attach_resource_to_nic.rb, line 44
def attach_resource_to_nic(resource_group_name, nic_name, _resource_type, _resource_id)
  nic = {
    'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkInterfaces/#{nic_name}",
    'name' => nic_name,
    'type' => 'Microsoft.Network/networkInterfaces',
    'location' => location,
    'properties' =>
      {
        'ipConfigurations' =>
          [
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkInterfaces/#{nic_name}/ipConfigurations/#{ip_configs_name}",
              'properties' =>
                {
                  'privateIPAddress' => '10.0.0.5',
                  'privateIPAllocationMethod' => prv_ip_alloc_method,
                  'subnet' =>
                    {
                      'id' => subnet_id
                    },
                  'publicIPAddress' =>
                    {
                      'id' => public_ip_address_id
                    },
                  'provisioningState' => 'Succeeded'
                },
              'name' => ip_configs_name
            }
          ],
        'dnsSettings' =>
          {
            'dnsServers' => [],
            'appliedDnsServers' => []
          },
        'enableIPForwarding' => false,
        'resourceGuid' => '2bff0fad-623b-4773-82b8-dc875f3aacd2',
        'provisioningState' => 'Succeeded'
      }
  }
  network_interface_mapper = Azure::ARM::Network::Models::NetworkInterface.mapper
  @network_client.deserialize(network_interface_mapper, nic, 'result.body')
end
attach_route_table_to_subnet(*) click to toggle source
# File lib/fog/azurerm/requests/network/attach_route_table_to_subnet.rb, line 38
def attach_route_table_to_subnet(*)
  subnet = {
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet/subnets/fog-subnet',
    'properties' =>
      {
        'addressPrefix' => '10.1.0.0/24',
        'routeTable' => {
          'id' => '/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/routeTables/myRT1'
        },
        'provisioningState' => 'Succeeded'
      },
    'name' => 'fog-subnet'
  }
  subnet_mapper = Azure::ARM::Network::Models::Subnet.mapper
  @network_client.deserialize(subnet_mapper, subnet, 'result.body')
end
check_express_route_cir_auth_exists(*) click to toggle source
# File lib/fog/azurerm/requests/network/check_express_route_cir_auth_exists.rb, line 25
def check_express_route_cir_auth_exists(*)
  true
end
check_express_route_circuit_exists(*) click to toggle source
# File lib/fog/azurerm/requests/network/check_express_route_circuit_exists.rb, line 25
def check_express_route_circuit_exists(*)
  true
end
check_load_balancer_exists(*) click to toggle source
# File lib/fog/azurerm/requests/network/check_load_balancer_exists.rb, line 25
def check_load_balancer_exists(*)
  true
end
check_local_net_gateway_exists(*) click to toggle source
# File lib/fog/azurerm/requests/network/check_local_net_gateway_exists.rb, line 25
def check_local_net_gateway_exists(*)
  true
end
check_net_sec_group_exists(*) click to toggle source
# File lib/fog/azurerm/requests/network/check_net_sec_group_exists.rb, line 25
def check_net_sec_group_exists(*)
  true
end
check_net_sec_rule_exists(*) click to toggle source
# File lib/fog/azurerm/requests/network/check_net_sec_rule_exists.rb, line 25
def check_net_sec_rule_exists(*)
  true
end
check_network_interface_exists(*) click to toggle source
# File lib/fog/azurerm/requests/network/check_network_interface_exists.rb, line 25
def check_network_interface_exists(*)
  true
end
check_public_ip_exists(resource_group, name) click to toggle source
# File lib/fog/azurerm/requests/network/check_public_ip_exists.rb, line 26
def check_public_ip_exists(resource_group, name)
  Fog::Logger.debug "Public IP #{name} from Resource group #{resource_group} is available."
  true
end
check_subnet_exists(*) click to toggle source
# File lib/fog/azurerm/requests/network/check_subnet_exists.rb, line 26
def check_subnet_exists(*)
  true
end
check_virtual_network_exists(resource_group, name) click to toggle source
# File lib/fog/azurerm/requests/network/check_virtual_network_exists.rb, line 26
def check_virtual_network_exists(resource_group, name)
  Fog::Logger.debug "Virtual Network #{name} from Resource group #{resource_group} is available."
  true
end
check_vnet_gateway_connection_exists(*) click to toggle source
# File lib/fog/azurerm/requests/network/check_vnet_gateway_connection_exists.rb, line 26
def check_vnet_gateway_connection_exists(*)
  true
end
check_vnet_gateway_exists(*) click to toggle source
# File lib/fog/azurerm/requests/network/check_vnet_gateway_exists.rb, line 26
def check_vnet_gateway_exists(*)
  true
end
create_load_balancer(_name, _location, _resource_group, _frontend_ip_configuration_name, _subnet_id, _private_ip_address, _private_ip_allocation_method, _public_ip_address_id, _backend_address_pool_names, _load_balancing_rules, _probes, _inbound_nat_rules, _inbound_nat_pools) click to toggle source
# File lib/fog/azurerm/requests/network/create_load_balancer.rb, line 184
def create_load_balancer(_name, _location, _resource_group, _frontend_ip_configuration_name, _subnet_id, _private_ip_address, _private_ip_allocation_method, _public_ip_address_id, _backend_address_pool_names, _load_balancing_rules, _probes, _inbound_nat_rules, _inbound_nat_pools)
end
create_or_update__virtual_network(*) click to toggle source
# File lib/fog/azurerm/requests/network/create_or_update_virtual_network.rb, line 75
def create_or_update__virtual_network(*)
  virtual_network = {
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet',
    'name' => 'fog-vnet',
    'type' => 'Microsoft.Network/virtualNetworks',
    'location' => 'westus',
    'properties' =>
      {
        'addressSpace' =>
          {
            'addressPrefixes' =>
              %w(10.1.0.0/16 10.2.0.0/16)
          },
        'subnets' =>
          [
            {
              'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet/subnets/fog-subnet',
              'properties' =>
                {
                  'addressPrefix' => [],
                  'provisioningState' => 'Succeeded'
                },
              'name' => "subnet_0_#{name}"
            }
          ],
        'resourceGuid' => 'c573f8e2-d916-493f-8b25-a681c31269ef',
        'provisioningState' => 'Succeeded'
      }
  }
  vnet_mapper = Azure::ARM::Network::Models::VirtualNetwork.mapper
  @network_client.deserialize(vnet_mapper, virtual_network, 'result.body')
end
create_or_update_express_route_circuit(*) click to toggle source
# File lib/fog/azurerm/requests/network/create_or_update_express_route_circuit.rb, line 86
def create_or_update_express_route_circuit(*)
  {
    'name' => 'CircuitName',
    'location' => 'eastus',
    'tags' => {
      'key1' => 'value1',
      'key2' => 'value2'
    },
    'sku' => {
      'name' => 'Standard_MeteredData',
      'tier' => 'Standard',
      'family' => 'MeteredData'
    },
    'properties' => {
      'serviceProviderProperties' => {
        'serviceProviderName' => 'Telenor',
        'peeringLocation' => 'London',
        'bandwidthInMbps' => 100
      }
    }
  }
end
create_or_update_express_route_circuit_authorization(*) click to toggle source
# File lib/fog/azurerm/requests/network/create_or_update_express_route_circuit_authorization.rb, line 37
def create_or_update_express_route_circuit_authorization(*)
  authorization = {
    'name' => 'authorization-name',
    'properties' => {
      'authorizationKey' => 'authorization-key',
      'authorizationUseStatus' => 'Available'
    }
  }
  authorization_mapper = Azure::ARM::Network::Models::ExpressRouteCircuitAuthorization.mapper
  @network_client.deserialize(authorization_mapper, authorization, 'result.body')
end
create_or_update_express_route_circuit_peering(*) click to toggle source
# File lib/fog/azurerm/requests/network/create_or_update_express_route_circuit_peering.rb, line 55
def create_or_update_express_route_circuit_peering(*)
  {
    'name' => 'PeeringName',
    'properties' => {
      'peeringType' => 'MicrosoftPeering',
      'peerASN' => 100,
      'primaryPeerAddressPrefix' => '192.168.1.0/30',
      'secondaryPeerAddressPrefix' => '192.168.2.0/30',
      'vlanId' => 200,
      'microsoftPeeringConfig' => {
        'advertisedpublicprefixes' => [
          '11.2.3.4/30',
          '12.2.3.4/30'
        ],
        'advertisedPublicPrefixState' => 'NotConfigured',
        'customerAsn' => 200,
        'routingRegistryName' => '<name>'
      }
    }
  }
end
create_or_update_network_interface(resource_group_name, name, location, subnet_id, public_ip_address_id, ip_configs_name, private_ip_allocation_method, private_ip_address) click to toggle source
# File lib/fog/azurerm/requests/network/create_or_update_network_interface.rb, line 75
def create_or_update_network_interface(resource_group_name, name, location, subnet_id, public_ip_address_id, ip_configs_name, private_ip_allocation_method, private_ip_address)
  nic = {
    'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkInterfaces/#{name}",
    'name' => name,
    'type' => 'Microsoft.Network/networkInterfaces',
    'location' => location,
    'properties' =>
      {
        'ipConfigurations' =>
          [
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkInterfaces/#{name}/ipConfigurations/#{ip_configs_name}",
              'properties' =>
                {
                  'privateIPAddress' => private_ip_address,
                  'privateIPAllocationMethod' => private_ip_allocation_method,
                  'subnet' =>
                    {
                      'id' => subnet_id
                    },
                  'publicIPAddress' =>
                    {
                      'id' => public_ip_address_id
                    },
                  'provisioningState' => 'Succeeded'
                },
              'name' => ip_configs_name
            }
          ],
        'dnsSettings' =>
          {
            'dnsServers' => [],
            'appliedDnsServers' => []
          },
        'enableIPForwarding' => false,
        'resourceGuid' => '2bff0fad-623b-4773-82b8-dc875f3aacd2',
        'provisioningState' => 'Succeeded'
      }
  }
  network_interface_mapper = Azure::ARM::Network::Models::NetworkInterface.mapper
  @network_client.deserialize(network_interface_mapper, nic, 'result.body')
end
create_or_update_network_security_group(resource_group_name, security_group_name, location, security_rules) click to toggle source
# File lib/fog/azurerm/requests/network/create_or_update_network_security_group.rb, line 53
def create_or_update_network_security_group(resource_group_name, security_group_name, location, security_rules)
  network_security_group = {
    'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}",
    'name' => security_group_name,
    'type' => 'Microsoft.Network/networkSecurityGroups',
    'location' => location,
    'properties' =>
      {
        'securityRules' => security_rules,
        'defaultSecurityRules' =>
          [
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowVnetInBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => 'VirtualNetwork',
                  'destinationAddressPrefix' => 'VirtualNetwork',
                  'access' => 'Allow',
                  'direction' => 'Inbound',
                  'description' => 'Allow inbound traffic from all VMs in VNET',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_000,
                  'provisioningState' => 'Updating'
                },
              'name' => 'AllowVnetInBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowAzureLoadBalancerInBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => 'AzureLoadBalancer',
                  'destinationAddressPrefix' => '*',
                  'access' => 'Allow',
                  'direction' => 'Inbound',
                  'description' => 'Allow inbound traffic from azure load balancer',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_001,
                  'provisioningState' => 'Updating'
                },
              'name' => 'AllowAzureLoadBalancerInBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/DenyAllInBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => '*',
                  'destinationAddressPrefix' => '*',
                  'access' => 'Deny',
                  'direction' => 'Inbound',
                  'description' => 'Deny all inbound traffic',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_500,
                  'provisioningState' => 'Updating'
                },
              'name' => 'DenyAllInBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowVnetOutBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => 'VirtualNetwork',
                  'destinationAddressPrefix' => 'VirtualNetwork',
                  'access' => 'Allow',
                  'direction' => 'Outbound',
                  'description' => 'Allow outbound traffic from all VMs to all VMs in VNET',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_000,
                  'provisioningState' => 'Updating'
                },
              'name' => 'AllowVnetOutBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowInternetOutBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => '*',
                  'destinationAddressPrefix' => 'Internet',
                  'access' => 'Allow',
                  'direction' => 'Outbound',
                  'description' => 'Allow outbound traffic from all VMs to Internet',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_001,
                  'provisioningState' => 'Updating'
                },
              'name' => 'AllowInternetOutBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/DenyAllOutBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => '*',
                  'destinationAddressPrefix' => '*',
                  'access' => 'Deny',
                  'direction' => 'Outbound',
                  'description' => 'Deny all outbound traffic',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_500,
                  'provisioningState' => 'Updating'
                },
              'name' => 'DenyAllOutBound'
            }
          ],
        'resourceGuid' => '9dca97e6-4789-4ebd-86e3-52b8b0da6cd4',
        'provisioningState' => 'Updating'
      }
  }
  nsg_mapper = Azure::ARM::Network::Models::NetworkSecurityGroup.mapper
  @network_client.deserialize(nsg_mapper, network_security_group, 'result.body')
end
create_or_update_network_security_rule(*) click to toggle source
# File lib/fog/azurerm/requests/network/create_or_update_network_security_rule.rb, line 35
def create_or_update_network_security_rule(*)
  network_security_rule = '{
    "name":"myNsRule",
    "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityGroups/myNsg/securityRules/myNsRule",
    "etag":"W/\"00000000-0000-0000-0000-000000000000\"",
    "properties":{
      "provisioningState":"Succeeded",
      "description":"description-of-this-rule",
      "protocol": "*",
      "sourcePortRange":"source-port-range",
      "destinationPortRange":"destination-port-range",
      "sourceAddressPrefix":"*",
      "destinationAddressPrefix":"*",
      "access":"Allow",
      "priority":6500,
      "direction":"Inbound"
    }
  }'
  network_security_rule_mapper = Azure::ARM::Network::Models::SecurityRule.mapper
  @network_client.deserialize(network_security_rule_mapper, JSON.load(network_security_rule), 'result.body')
end
create_or_update_virtual_network_gateway(*) click to toggle source
# File lib/fog/azurerm/requests/network/create_or_update_local_network_gateway.rb, line 55
def create_or_update_virtual_network_gateway(*)
  local_network_gateway = {
    'id' => '/subscriptions/<Subscription_id>/resourceGroups/learn_fog/providers/Microsoft.Network/localNetworkGateways/testLocalNetworkGateway',
    'name' => 'testLocalNetworkGateway',
    'type' => 'Microsoft.Network/localNetworkGateways',
    'location' => 'eastus',
    'properties' =>
      {
        'local_network_address_space' => {
          'address_prefixes' => []
        },
        'gateway_ip_address' => '192.168.1.1',
        'bgp_settings' => {
          'asn' => 100,
          'bgp_peering_address' => '192.168.1.2',
          'peer_weight' => 3
        }
      }
  }
  local_network_gateway_mapper = Azure::ARM::Network::Models::LocalNetworkGateway.mapper
  @network_client.deserialize(local_network_gateway_mapper, local_network_gateway, 'result.body')
end
create_or_update_virtual_network_gateway_connection(*) click to toggle source
# File lib/fog/azurerm/requests/network/create_or_update_virtual_network_gateway_connection.rb, line 61
def create_or_update_virtual_network_gateway_connection(*)
  connection = {
    'name' => 'cn1',
    'location' => 'West US',
    'tags' => { 'key1' => 'value1' },
    'properties' => {
      'virtualNetworkGateway1' => {
        'name' => 'firstgateway'
      },
      'virtualNetworkGateway2' => {
        'name' => 'secondgateway'
      },
      'connectionType' => 'SiteToSite',
      'connectivityState' => 'Connected'
    }
  }
  connection_mapper = Azure::ARM::Network::Models::VirtualNetworkGatewayConnection.mapper
  @network_client.deserialize(connection_mapper, connection, 'result.body')
end
create_public_ip(resource_group, name, location, public_ip_allocation_method) click to toggle source
# File lib/fog/azurerm/requests/network/create_or_update_public_ip.rb, line 38
def create_public_ip(resource_group, name, location, public_ip_allocation_method)
  public_ip = {
    'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/publicIPAddresses/#{name}",
    'name' => name,
    'type' => 'Microsoft.Network/publicIPAddresses',
    'location' => location,
    'properties' =>
      {
        'publicIPAllocationMethod' => public_ip_allocation_method,
        'ipAddress' => '13.91.253.67',
        'idleTimeoutInMinutes' => 4,
        'resourceGuid' => '767b1955-94de-433c-8e4a-ea0ad25e8d0c',
        'provisioningState' => 'Succeeded'
      }
  }
  public_ip_mapper = Azure::ARM::Network::Models::PublicIPAddress.mapper
  @network_client.deserialize(public_ip_mapper, public_ip, 'result.body')
end
create_subnet(*) click to toggle source
# File lib/fog/azurerm/requests/network/create_subnet.rb, line 38
def create_subnet(*)
  subnet = {
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet/subnets/fog-subnet',
    'properties' =>
      {
        'addressPrefix' => '10.1.0.0/24',
        'provisioningState' => 'Succeeded'
      },
    'name' => 'fog-subnet'
  }
  subnet_mapper = Azure::ARM::Network::Models::Subnet.mapper
  @network_client.deserialize(subnet_mapper, subnet, 'result.body')
end
delete_express_route_circuit(*) click to toggle source
# File lib/fog/azurerm/requests/network/delete_express_route_circuit.rb, line 21
def delete_express_route_circuit(*)
  Fog::Logger.debug 'Express Route Circuit {circuit_name} from Resource group {resource_group_name} deleted successfully.'
  true
end
delete_express_route_circuit_authorization(*) click to toggle source
# File lib/fog/azurerm/requests/network/delete_express_route_circuit_authorization.rb, line 22
def delete_express_route_circuit_authorization(*)
  Fog::Logger.debug 'Express Route Circuit Authorization {authorization_name} from Resource group {resource_group_name} deleted successfully.'
  true
end
delete_express_route_circuit_peering(*) click to toggle source
# File lib/fog/azurerm/requests/network/delete_express_route_circuit_peering.rb, line 21
def delete_express_route_circuit_peering(*)
  Fog::Logger.debug 'Express Route Circuit Peering {peering_name} from Resource group {resource_group_name} deleted successfully.'
  true
end
delete_load_balancer(_resource_group, _name) click to toggle source
# File lib/fog/azurerm/requests/network/delete_load_balancer.rb, line 21
def delete_load_balancer(_resource_group, _name)
  Fog::Logger.debug "Load_Balancer #{name} Deleted Successfully."
  true
end
delete_local_network_gateway(*) click to toggle source
# File lib/fog/azurerm/requests/network/delete_local_network_gateway.rb, line 22
def delete_local_network_gateway(*)
  Fog::Logger.debug 'Local Network Gateway testLocalNetworkGateway from Resource group learn_fog deleted successfully.'
  true
end
delete_network_interface(resource_group, name) click to toggle source
# File lib/fog/azurerm/requests/network/delete_network_interface.rb, line 21
def delete_network_interface(resource_group, name)
  Fog::Logger.debug "Network Interface #{name} from Resource group #{resource_group} deleted successfully."
  true
end
delete_network_security_group(resource_group, name) click to toggle source
# File lib/fog/azurerm/requests/network/delete_network_security_group.rb, line 23
def delete_network_security_group(resource_group, name)
  Fog::Logger.debug "Network Security Group #{name} from Resource group #{resource_group} deleted successfully."
  true
end
delete_network_security_rule(*) click to toggle source
# File lib/fog/azurerm/requests/network/delete_network_security_rule.rb, line 23
def delete_network_security_rule(*)
  Fog::Logger.debug 'Network Security Rule test-security-rule from Resource group test-rg deleted successfully.'
  true
end
delete_public_ip(resource_group, name) click to toggle source
# File lib/fog/azurerm/requests/network/delete_public_ip.rb, line 20
def delete_public_ip(resource_group, name)
  Fog::Logger.debug "Public IP #{name} from Resource group #{resource_group} deleted successfully."
  true
end
delete_subnet(resource_group, name, virtual_network_name) click to toggle source
# File lib/fog/azurerm/requests/network/delete_subnet.rb, line 21
def delete_subnet(resource_group, name, virtual_network_name)
  Fog::Logger.debug "Subnet #{name} of Virtual Network #{virtual_network_name} from Resource group #{resource_group} deleted successfully."
  true
end
delete_virtual_network(resource_group, name) click to toggle source
# File lib/fog/azurerm/requests/network/delete_virtual_network.rb, line 21
def delete_virtual_network(resource_group, name)
  Fog::Logger.debug "Virtual Network #{name} from Resource group #{resource_group} deleted successfully."
  true
end
delete_virtual_network_gateway(resource_group_name, virtual_network_gateway_name) click to toggle source
# File lib/fog/azurerm/requests/network/delete_virtual_network_gateway.rb, line 21
def delete_virtual_network_gateway(resource_group_name, virtual_network_gateway_name)
  Fog::Logger.debug "Virtual Network Gateway #{virtual_network_gateway_name} from Resource group #{resource_group_name} deleted successfully."
  true
end
delete_virtual_network_gateway_connection(*) click to toggle source
# File lib/fog/azurerm/requests/network/delete_virtual_network_gateway_connection.rb, line 22
def delete_virtual_network_gateway_connection(*)
  Fog::Logger.debug 'Virtual Network Gateway Connection deleted successfully.'
  true
end
detach_network_security_group_from_subnet(*) click to toggle source
# File lib/fog/azurerm/requests/network/detach_network_security_group_from_subnet.rb, line 35
def detach_network_security_group_from_subnet(*)
  subnet = {
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet/subnets/fog-subnet',
    'properties' =>
      {
        'addressPrefix' => '10.1.0.0/24',
        'provisioningState' => 'Succeeded'
      },
    'name' => 'fog-subnet'
  }
  subnet_mapper = Azure::ARM::Network::Models::Subnet.mapper
  @network_client.deserialize(subnet_mapper, subnet, 'result.body')
end
detach_resource_from_nic(resource_group_name, nic_name, _resource_type) click to toggle source
# File lib/fog/azurerm/requests/network/detach_resource_from_nic.rb, line 36
def detach_resource_from_nic(resource_group_name, nic_name, _resource_type)
  nic = {
    'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkInterfaces/#{nic_name}",
    'name' => nic_name,
    'type' => 'Microsoft.Network/networkInterfaces',
    'location' => location,
    'properties' =>
      {
        'ipConfigurations' =>
          [
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkInterfaces/#{nic_name}/ipConfigurations/#{ip_configs_name}",
              'properties' =>
                {
                  'privateIPAddress' => '10.0.0.5',
                  'privateIPAllocationMethod' => prv_ip_alloc_method,
                  'subnet' =>
                    {
                      'id' => subnet_id
                    },
                  'publicIPAddress' =>
                    {
                      'id' => public_ip_address_id
                    },
                  'provisioningState' => 'Succeeded'
                },
              'name' => ip_configs_name
            }
          ],
        'dnsSettings' =>
          {
            'dnsServers' => [],
            'appliedDnsServers' => []
          },
        'enableIPForwarding' => false,
        'resourceGuid' => '2bff0fad-623b-4773-82b8-dc875f3aacd2',
        'provisioningState' => 'Succeeded'
      }
  }
  network_interface_mapper = Azure::ARM::Network::Models::NetworkInterface.mapper
  @network_client.deserialize(network_interface_mapper, nic, 'result.body')
end
detach_route_table_from_subnet(*) click to toggle source
# File lib/fog/azurerm/requests/network/detach_route_table_from_subnet.rb, line 35
def detach_route_table_from_subnet(*)
  subnet = {
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet/subnets/fog-subnet',
    'properties' =>
      {
        'addressPrefix' => '10.1.0.0/24',
        'provisioningState' => 'Succeeded'
      },
    'name' => 'fog-subnet'
  }
  subnet_mapper = Azure::ARM::Network::Models::Subnet.mapper
  @network_client.deserialize(subnet_mapper, subnet, 'result.body')
end
get_available_ipaddress_count(*) click to toggle source
# File lib/fog/azurerm/requests/network/get_available_ipaddresses_count.rb, line 17
def get_available_ipaddress_count(*)
  65_531
end
get_connection_shared_key(*) click to toggle source
# File lib/fog/azurerm/requests/network/get_connection_shared_key.rb, line 19
def get_connection_shared_key(*)
  Fog::Logger.debug 'Get the shared key of Connection successfully.'
end
get_express_route_circuit(*) click to toggle source
# File lib/fog/azurerm/requests/network/get_express_route_circuit.rb, line 19
def get_express_route_circuit(*)
  {
    'name' => 'circuit_name',
    'id' => '/subscriptions/########-####-####-####-############/resourceGroup/resource_group_name/providers/Microsoft.Network/expressRouteCircuits/circuit_name',
    'etag' => 'W/\"00000000-0000-0000-0000-000000000000\"',
    'location' => 'eastus',
    'tags' => {
      'key1' => 'value1',
      'key2' => 'value2'
    },
    'sku' => {
      'name' => 'Standard_MeteredData',
      'tier' => 'Standard',
      'family' => 'MeteredData'
    },
    'properties' => {
      'provisioningState' => 'Succeeded',
      'circuitProvisioningState' => 'Enabled',
      'serviceProviderProvisioningState' => 'Provisioned',
      'serviceProviderProperties' => {
        'serviceProviderName' => 'Telenor',
        'peeringLocation' => 'London',
        'bandwidthInMbps' => 100
      }
    },
    'serviceKey' => '<unique service key for circuit>',
    'serviceProviderNotes' => '<notes set only by ServiceProvider>'
  }
end
get_express_route_circuit_authorization(*) click to toggle source
# File lib/fog/azurerm/requests/network/get_express_route_circuit_authorization.rb, line 21
def get_express_route_circuit_authorization(*)
  authorization = {
    'name' => 'authorization-name',
    'properties' => {
      'authorizationKey' => 'authorization-key',
      'authorizationUseStatus' => 'Available'
    }
  }
  authorization_mapper = Azure::ARM::Network::Models::ExpressRouteCircuitAuthorization.mapper
  @network_client.deserialize(authorization_mapper, authorization, 'result.body')
end
get_express_route_circuit_peering(*) click to toggle source
# File lib/fog/azurerm/requests/network/get_express_route_circuit_peering.rb, line 20
def get_express_route_circuit_peering(*)
  {
    'name' => 'peering_name',
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/resource_group_name/providers/Microsoft.Network/expressRouteCircuits/circuit_name/peerings/peering_name',
    'etag' => '',
    'properties' => {
      'provisioningState' => 'Succeeded',
      'peeringType' => 'MicrosoftPeering',
      'peerASN' => '',
      'primaryPeerAddressPrefix' => '',
      'secondaryPeerAddressPrefix' => '',
      'primaryAzurePort' => 22,
      'secondaryAzurePort' => 21,
      'state' => 'Enabled',
      'sharedKey' => '',
      'vlanId' => 100,
      'microsoftPeeringConfig' => {
        'advertisedpublicprefixes' => %w(prefix1 prefix2),
        'advertisedPublicPrefixState' => 'ValidationNeeded',
        'customerAsn' => '',
        'routingRegistryName' => ''
      }
    }
  }
end
get_load_balancer(*) click to toggle source
# File lib/fog/azurerm/requests/network/get_load_balancer.rb, line 21
def get_load_balancer(*)
  response = '{
    "name":"mylb1",
    "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/mylb1",
    "location":"North US",
    "tags":{
      "key":"value"
    },
    "etag":"W/\"00000000-0000-0000-0000-000000000000\"",
    "properties":{
      "resourceGuid":"6ECBD4C1-0DC1-4D86-9F6E-4A58F83C9023",
      "provisioningState":"Succeeded",
      "frontendIPConfigurations":[
        {
          "name":"myip1",
          "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/mylb1/frontendIPConfigurations/myip1",
          "etag":"W/\"00000000-0000-0000-0000-000000000000\"",
          "properties":{
            "provisioningState":"Succeeded",
            "subnet":{
              "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/virtualNetworks/myvnet1/subnets/mysubnet1"
            },
            "privateIPAddress":"10.0.0.10",
            "privateIPAllocationMethod":"Static",
            "publicIPAddress":{
              "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/publicIPAddresses/myip1"
            },
            "loadBalancingRules":[
              {
                "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/myLB1/loadBalancingRules/rule1"
              }
            ],
            "inboundNatRules":[
              {
                "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/myLB1/inboundNatRules/rule1"
              }
            ]
          }
        }
      ],
      "backendAddressPools":[
        {
          "name":"pool1",
          "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/mylb1/backendAddressPools/pool1",
          "etag":"W/\"00000000-0000-0000-0000-000000000000\"",
          "properties":{
            "provisioningState":"Succeeded",
            "backendIPConfigurations":[
              {
                "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkInterfaces/vm1nic1/ipConfigurations/ip1"
              }
            ],
            "loadBalancingRules":[
              {
                "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/myLB1/loadBalancingRules/rule1"
              }
            ]
          }
        }
      ],
      "loadBalancingRules":[
        {
          "name":"HTTP Traffic",
          "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/mylb1/loadBalancingRules/rule1",
          "etag":"W/\"00000000-0000-0000-0000-000000000000\"",
          "properties":{
            "provisioningState":"Succeeded",
            "frontendIPConfiguration":{
              "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/myLB1/frontendIPConfigurations/ip1"
            },
            "backendAddressPool":{
              "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/myLB1/backendAddressPool/pool1"
            },
            "protocol":"Tcp",
            "frontendPort":80,
            "backendPort":8080,
            "probe":{
              "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/myLB1/probes/probe1"
            },
            "enableFloatingIP":true,
            "idleTimeoutInMinutes":4,
            "loadDistribution":"Default"
          }
        }
      ],
      "probes":[
        {
          "name":"my probe 1",
          "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/myLB1/probes/my probe 1",
          "etag":"W/\"00000000-0000-0000-0000-000000000000\"",
          "properties":{
            "provisioningState":"Succeeded",
            "protocol":"Tcp",
            "port":8080,
            "requestPath":"myprobeapp1/myprobe1.svc",
            "intervalInSeconds":5,
            "numberOfProbes":16,
            "loadBalancingRules":[
              {
                "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/myLB1/loadBalancingRules/rule1"
              }
            ]
          }
        }
      ],
      "inboundNatRules":[
        {
          "name":"RDP Traffic",
          "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/myLB1/inboundNatRules/RDP Traffic",
          "etag":"W/\"00000000-0000-0000-0000-000000000000\"",
          "properties":{
            "provisioningState":"Succeeded",
            "frontendIPConfiguration":{
              "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/myLB1/frontendIPConfigurations/ip1"
            },
            "backendIPConfiguration":{
              "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkInterfaces/vm1nic1/ipConfigurations/ip1"
            },
            "protocol":"Tcp",
            "frontendPort":3389,
            "backendPort":3389
          }
        }
      ],
      "inboundNatPools":[
        {
          "name": "RDPForVMSS1",
          "id": "/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers /Microsoft.Network/loadBalancers/myLB1/inboundNatRules/RDPForVMSS1",
          "etag": "W/\"00000000-0000-0000-0000-000000000000\"",
          "properties": {
            "provisioningState": "Updating|Deleting|Failed|Succeeded",
            "frontendIPConfiguration": {
              "id": "/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/loadBalancers/myLB1/frontendIPConfigurations/ip1"
            },
            "protocol": "Tcp",
            "frontendPortRangeStart": 50000,
            "frontendPortRangeEnd": 50500,
            "backendPort": 3389
          }
        }
      ]
    }
  }'
  load_balancer_mapper = Azure::ARM::Network::Models::LoadBalancer.mapper
  @network_client.deserialize(load_balancer_mapper, JSON.load(response), 'result.body')
end
get_local_network_gateway(*) click to toggle source
# File lib/fog/azurerm/requests/network/get_local_network_gateway.rb, line 22
def get_local_network_gateway(*)
  local_network_gateway = {
    'id' => '/subscriptions/<Subscription_id>/resourceGroups/learn_fog/providers/Microsoft.Network/localNetworkGateways/testLocalNetworkGateway',
    'name' => 'testLocalNetworkGateway',
    'type' => 'Microsoft.Network/localNetworkGateways',
    'location' => 'eastus',
    'properties' =>
      {
        'local_network_address_space' => {
          'address_prefixes' => []
        },
        'gateway_ip_address' => '192.168.1.1',
        'bgp_settings' => {
          'asn' => 100,
          'bgp_peering_address' => '192.168.1.2',
          'peer_weight' => 3
        }
      }
  }
  local_network_gateway_mapper = Azure::ARM::Network::Models::LocalNetworkGateway.mapper
  @network_client.deserialize(local_network_gateway_mapper, local_network_gateway, 'result.body')
end
get_network_interface(resource_group_name, nic_name) click to toggle source
# File lib/fog/azurerm/requests/network/get_network_interface.rb, line 19
def get_network_interface(resource_group_name, nic_name)
  nic = {
    'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkInterfaces/#{nic_name}",
    'name' => nic_name,
    'type' => 'Microsoft.Network/networkInterfaces',
    'location' => 'westus',
    'properties' =>
      {
        'ipConfigurations' =>
          [
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkInterfaces/test-NIC/ipConfigurations/ipconfig1",
              'properties' =>
                {
                  'privateIPAddress' => '10.2.0.4',
                  'privateIPAllocationMethod' => 'Dynamic',
                  'subnet' =>
                    {
                      'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/virtualNetworks/testVnet/subnets/fog-test-subnet"
                    },
                  'provisioningState' => 'Succeeded'
                },
              'name' => 'ipconfig1'
            }
          ],
        'dnsSettings' =>
          {
            'dnsServers' => [],
            'appliedDnsServers' => []
          },
        'enableIPForwarding' => false,
        'resourceGuid' => '51e01337-fb15-4b04-b9de-e91537c764fd',
        'provisioningState' => 'Succeeded'
      }
  }
  network_interface_mapper = Azure::ARM::Network::Models::NetworkInterface.mapper
  @network_client.deserialize(network_interface_mapper, nic, 'result.body')
end
get_network_security_group(resource_group_name, security_group_name) click to toggle source
# File lib/fog/azurerm/requests/network/get_network_security_group.rb, line 23
def get_network_security_group(resource_group_name, security_group_name)
  network_security_group = {
    'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}",
    'name' => security_group_name,
    'type' => 'Microsoft.Network/networkSecurityGroups',
    'location' => 'westus',
    'properties' =>
      {
        'securityRules' =>
          [
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/securityRules/testRule",
              'properties' =>
                {
                  'protocol' => 'tcp',
                  'sourceAddressPrefix' => '0.0.0.0/0',
                  'destinationAddressPrefix' => '0.0.0.0/0',
                  'access' => 'Allow',
                  'direction' => 'Inbound',
                  'sourcePortRange' => '22',
                  'destinationPortRange' => '22',
                  'priority' => 100,
                  'provisioningState' => 'Succeeded'
                },
              'name' => 'testRule'
            }
          ],
        'defaultSecurityRules' =>
          [
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowVnetInBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => 'VirtualNetwork',
                  'destinationAddressPrefix' => 'VirtualNetwork',
                  'access' => 'Allow',
                  'direction' => 'Inbound',
                  'description' => 'Allow inbound traffic from all VMs in VNET',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_000,
                  'provisioningState' => 'Succeeded'
                },
              'name' => 'AllowVnetInBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowAzureLoadBalancerInBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => 'AzureLoadBalancer',
                  'destinationAddressPrefix' => '*',
                  'access' => 'Allow',
                  'direction' => 'Inbound',
                  'description' => 'Allow inbound traffic from azure load balancer',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_001,
                  'provisioningState' => 'Succeeded'
                },
              'name' => 'AllowAzureLoadBalancerInBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/DenyAllInBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => '*',
                  'destinationAddressPrefix' => '*',
                  'access' => 'Deny',
                  'direction' => 'Inbound',
                  'description' => 'Deny all inbound traffic',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_500,
                  'provisioningState' => 'Succeeded'
                },
              'name' => 'DenyAllInBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowVnetOutBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => 'VirtualNetwork',
                  'destinationAddressPrefix' => 'VirtualNetwork',
                  'access' => 'Allow',
                  'direction' => 'Outbound',
                  'description' => 'Allow outbound traffic from all VMs to all VMs in VNET',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_000,
                  'provisioningState' => 'Succeeded'
                },
              'name' => 'AllowVnetOutBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowInternetOutBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => '*',
                  'destinationAddressPrefix' => 'Internet',
                  'access' => 'Allow',
                  'direction' => 'Outbound',
                  'description' => 'Allow outbound traffic from all VMs to Internet',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_001,
                  'provisioningState' => 'Succeeded'
                },
              'name' => 'AllowInternetOutBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/DenyAllOutBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => '*',
                  'destinationAddressPrefix' => '*',
                  'access' => 'Deny',
                  'direction' => 'Outbound',
                  'description' => 'Deny all outbound traffic',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_500,
                  'provisioningState' => 'Succeeded'
                },
              'name' => 'DenyAllOutBound'
            }
          ],
        'resourceGuid' => '9dca97e6-4789-4ebd-86e3-52b8b0da6cd4',
        'provisioningState' => 'Succeeded'
      }
  }
  nsg_mapper = Azure::ARM::Network::Models::NetworkSecurityGroup.mapper
  @network_client.deserialize(nsg_mapper, network_security_group, 'result.body')
end
get_network_security_rule(*) click to toggle source
# File lib/fog/azurerm/requests/network/get_network_security_rule.rb, line 23
def get_network_security_rule(*)
  nsr = '{
      "name":"myNsRule",
      "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityGroups/myNsg/securityRules/myNsRule",
      "etag":"W/\"00000000-0000-0000-0000-000000000000\"",
      "properties":{
        "provisioningState":"Succeeded",
        "description":"description-of-this-rule",
        "protocol": "*",
        "sourcePortRange":"source-port-range",
        "destinationPortRange":"destination-port-range",
        "sourceAddressPrefix":"*",
        "destinationAddressPrefix":"*",
        "access":"Allow",
        "priority":6500,
        "direction":"Inbound"
      }
  }'
  nsr_mapper = Azure::ARM::Network::Models::SecurityRule.mapper
  @network_client.deserialize(nsr_mapper, JSON.load(nsr), 'result.body')
end
get_public_ip(resource_group_name, public_ip_name) click to toggle source
# File lib/fog/azurerm/requests/network/get_public_ip.rb, line 20
def get_public_ip(resource_group_name, public_ip_name)
  public_ip = {
    'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/publicIPAddresses/#{public_ip_name}",
    'name' => public_ip_name,
    'type' => 'Microsoft.Network/publicIPAddresses',
    'location' => 'westus',
    'properties' =>
      {
        'publicIPAllocationMethod' => 'Dynamic',
        'ipAddress' => '13.91.253.67',
        'idleTimeoutInMinutes' => 4,
        'resourceGuid' => '767b1955-94de-433c-8e4a-ea0ad25e8d0c',
        'provisioningState' => 'Succeeded'
      }
  }
  public_ip_mapper = Azure::ARM::Network::Models::PublicIPAddress.mapper
  @network_client.deserialize(public_ip_mapper, public_ip, 'result.body')
end
get_subnet(*) click to toggle source
# File lib/fog/azurerm/requests/network/get_subnet.rb, line 21
def get_subnet(*)
  subnet = {
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet/subnets/fog-subnet',
    'properties' =>
      {
        'addressPrefix' => '10.1.0.0/24',
        'provisioningState' => 'Succeeded'
      },
    'name' => 'fog-subnet'
  }
  subnet_mapper = Azure::ARM::Network::Models::Subnet.mapper
  @network_client.deserialize(subnet_mapper, subnet, 'result.body')
end
get_virtual_network(*) click to toggle source
# File lib/fog/azurerm/requests/network/get_virtual_network.rb, line 27
def get_virtual_network(*)
  virtual_network = {
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet',
    'name' => 'fog-vnet',
    'type' => 'Microsoft.Network/virtualNetworks',
    'location' => 'westus',
    'properties' =>
      {
        'addressSpace' =>
          {
            'addressPrefixes' =>
              %w(10.1.0.0/16 10.2.0.0/16)
          },
        'subnets' =>
          [
            {
              'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet/subnets/fog-subnet',
              'properties' =>
                {
                  'addressPrefix' => '10.1.0.0/24',
                  'provisioningState' => 'Succeeded'
                },
              'name' => 'fog-subnet'
            }
          ],
        'resourceGuid' => 'c573f8e2-d916-493f-8b25-a681c31269ef',
        'provisioningState' => 'Succeeded'
      }
  }
  vnet_mapper = Azure::ARM::Network::Models::VirtualNetwork.mapper
  @network_client.deserialize(vnet_mapper, virtual_network, 'result.body')
end
get_virtual_network_gateway(*) click to toggle source
# File lib/fog/azurerm/requests/network/get_virtual_network_gateway.rb, line 21
def get_virtual_network_gateway(*)
  gateway = {
    'name' => 'myvirtualgateway1',
    'id' => '/subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/microsoft.network/virtualNetworkGateways/myvirtualgateway1',
    'location' => 'West US',
    'tags' => { 'key1' => 'value1' },
    'properties' => {
      'gatewayType' => 'DynamicRouting',
      'gatewaySize' => 'Default',
      'subnet' => {
        'id' => '/subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/microsoft.network/virtualNetworks/<virtualNetworkName>/subnets/subnet1'
      },
      'vipAddress' => '{vipAddress}',
      'bgpEnabled' => true,
      'vpnClientAddressPool' => ['{vpnClientAddressPoolPrefix}'],
      'defaultSites' => ['mysite1']
    }
  }
  gateway_mapper = Azure::ARM::Network::Models::VirtualNetworkGateway.mapper
  @network_client.deserialize(gateway_mapper, gateway, 'result.body')
end
get_virtual_network_gateway_connection(*) click to toggle source
# File lib/fog/azurerm/requests/network/get_virtual_network_gateway_connection.rb, line 22
def get_virtual_network_gateway_connection(*)
  connection = {
    'name' => 'cn1',
    'id' => '/subscriptions/{subscription-id}/resourceGroups/{resource_group_name}/providers/microsoft.network/connections/connection1',
    'location' => 'West US',
    'tags' => { 'key1' => 'value1' },
    'properties' => {
      'virtualNetworkGateway1' => {
        'name' => 'firstgateway',
        'id' => '/subscriptions/{subscription-id}/resourceGroups/{resource_group_name}/providers/microsoft.network/SiteToSite/firstgateway'
      },
      'virtualNetworkGateway2' => {
        'name' => 'secondgateway',
        'id' => '/subscriptions/{subscription-id}/resourceGroups/{resource_group_name}/providers/microsoft.network/SiteToSite/secondgateway'
      },
      'connectionType' => 'SiteToSite',
      'connectivityState' => 'Connected'
    }
  }
  connection_mapper = Azure::ARM::Network::Models::VirtualNetworkGatewayConnection.mapper
  @network_client.deserialize(connection_mapper, connection, 'result.body')
end
list_express_route_circuit_authorizations(*) click to toggle source
# File lib/fog/azurerm/requests/network/list_express_route_circuit_authorizations.rb, line 21
def list_express_route_circuit_authorizations(*)
  authorizations = [
    {
      'name' => 'authorization-name',
      'properties' => {
        'authorizationKey' => 'authorization-key',
        'authorizationUseStatus' => 'Available'
      }
    }
  ]
  authorization_mapper = Azure::ARM::Network::Models::ExpressRouteCircuitAuthorization.mapper
  @network_client.deserialize(authorization_mapper, authorizations, 'result.body')
end
list_express_route_circuit_peerings(*) click to toggle source
# File lib/fog/azurerm/requests/network/list_express_route_circuit_peerings.rb, line 20
def list_express_route_circuit_peerings(*)
  [
    {
      'name' => 'AzurePrivatePeering',
      'id' => '/subscriptions/########-####-####-####-############/resourceGroups/resource_group_name/providers/Microsoft.Network/expressRouteCircuits/circuit_name/peerings/Private',
      'etag' => 'W/\"cb87537e-fd92-48c7-905f-2efc95a47c8f\"',
      'properties' => {
        'provisioningState' => 'Succeeded',
        'peeringType' => 'AzurePrivatePeering',
        'azureASN' => 120,
        'peerASN' => 100,
        'primaryPeerAddressPrefix' => '192.168.1.0/30',
        'secondaryPeerAddressPrefix' => '192.168.2.0/30',
        'primaryAzurePort' => 'BRKAZUREIXP01-BN1-04GMR-CIS-1-PRIMARY',
        'secondaryAzurePort' => 'BRKAZUREIXP01-DM2-04GMR-CIS-1-SECONDARY',
        'state' => 'Enabled',
        'vlanId' => 200
      }
    }
  ]
end
list_express_route_circuits(*) click to toggle source
# File lib/fog/azurerm/requests/network/list_express_route_circuits.rb, line 19
def list_express_route_circuits(*)
  [
    {
      'name' => 'testCircuit',
      'id' => '/subscriptions/########-####-####-####-############/resourceGroup/resource_group_name/providers/Microsoft.Network/expressRouteCircuits/circuitName',
      'etag' => 'W/\"00000000-0000-0000-0000-000000000000\"',
      'location' => 'eastus',
      'tags' => {
        'key1' => 'value1',
        'key2' => 'value2'
      },
      'sku' => {
        'name' => 'Standard_MeteredData',
        'tier' => 'Standard',
        'family' => 'MeteredData'
      },
      'properties' => {
        'provisioningState' => 'Succeeded',
        'circuitProvisioningState' => 'Enabled',
        'serviceProviderProvisioningState' => 'Provisioned',
        'serviceProviderProperties' => {
          'serviceProviderName' => 'Telenor',
          'peeringLocation' => 'London',
          'bandwidthInMbps' => 100
        }
      },
      'serviceKey' => '<unique service key for circuit>',
      'serviceProviderNotes' => '<notes set only by ServiceProvider>'
    }
  ]
end
list_express_route_service_providers() click to toggle source
# File lib/fog/azurerm/requests/network/list_express_route_service_providers.rb, line 20
def list_express_route_service_providers
  [
    {
      'name' => 'Telenor',
      'peeringLocations' => %w(London Karachi),
      'bandwidthsOffered' => [
        {
          'offerName' => '100Mbps',
          'valueInMbps' => 100
        }
      ]
    }
  ]
end
list_load_balancers(_resource_group) click to toggle source
# File lib/fog/azurerm/requests/network/list_load_balancers.rb, line 21
def list_load_balancers(_resource_group)
  lb = Azure::ARM::Network::Models::LoadBalancer.new
  lb.name = 'fogtestloadbalancer'
  lb.location = 'West US'
  lb.properties = Azure::ARM::Network::Models::LoadBalancerPropertiesFormat.new
  [lb]
end
list_load_balancers_in_subscription() click to toggle source
# File lib/fog/azurerm/requests/network/list_load_balancers_in_subscription.rb, line 21
def list_load_balancers_in_subscription
  lb = Azure::ARM::Network::Models::LoadBalancer.new
  lb.name = 'fogtestloadbalancer'
  lb.location = 'West US'
  lb.properties = Azure::ARM::Network::Models::LoadBalancerPropertiesFormat.new
  [lb]
end
list_network_interfaces(resource_group) click to toggle source
# File lib/fog/azurerm/requests/network/list_network_interfaces.rb, line 20
def list_network_interfaces(resource_group)
  nic =
    {
      'value' =>
        [
          {
            'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/networkInterfaces/test-NIC",
            'name' => 'test-NIC',
            'type' => 'Microsoft.Network/networkInterfaces',
            'location' => 'westus',
            'properties' =>
              {
                'ipConfigurations' =>
                  [
                    {
                      'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/networkInterfaces/test-NIC/ipConfigurations/ipconfig1",
                      'properties' =>
                        {
                          'privateIPAddress' => '10.2.0.4',
                          'privateIPAllocationMethod' => 'Dynamic',
                          'subnet' =>
                             {
                               'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/virtualNetworks/testVnet/subnets/fog-test-subnet"
                             },
                          'provisioningState' => 'Succeeded'
                        },
                      'name' => 'ipconfig1'
                    }
                  ],
                'dnsSettings' =>
                  {
                    'dnsServers' => [],
                    'appliedDnsServers' => []
                  },
                'enableIPForwarding' => false,
                'resourceGuid' => '51e01337-fb15-4b04-b9de-e91537c764fd',
                'provisioningState' => 'Succeeded'
              }
          }
        ]
    }
  network_interface_mapper = Azure::ARM::Network::Models::NetworkInterfaceListResult.mapper
  @network_client.deserialize(network_interface_mapper, nic, 'result.body').value
end
list_network_security_groups(resource_group) click to toggle source
# File lib/fog/azurerm/requests/network/list_network_security_groups.rb, line 23
def list_network_security_groups(resource_group)
  nsg_list_result = {
    'value' => [
      {
        'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/networkSecurityGroups/testGroup",
        'name' => 'testGroup',
        'type' => 'Microsoft.Network/networkSecurityGroups',
        'location' => 'westus',
        'properties' =>
          {
            'securityRules' =>
              [
                {
                  'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/networkSecurityGroups/testGroup/securityRules/testRule",
                  'properties' =>
                    {
                      'protocol' => 'tcp',
                      'sourceAddressPrefix' => '0.0.0.0/0',
                      'destinationAddressPrefix' => '0.0.0.0/0',
                      'access' => 'Allow',
                      'direction' => 'Inbound',
                      'sourcePortRange' => '22',
                      'destinationPortRange' => '22',
                      'priority' => 100,
                      'provisioningState' => 'Succeeded'
                    },
                  'name' => 'testRule'
                }
              ],
            'defaultSecurityRules' =>
              [
                {
                  'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/networkSecurityGroups/testGroup/defaultSecurityRules/AllowVnetInBound",
                  'properties' =>
                    {
                      'protocol' => '*',
                      'sourceAddressPrefix' => 'VirtualNetwork',
                      'destinationAddressPrefix' => 'VirtualNetwork',
                      'access' => 'Allow',
                      'direction' => 'Inbound',
                      'description' => 'Allow inbound traffic from all VMs in VNET',
                      'sourcePortRange' => '*',
                      'destinationPortRange' => '*',
                      'priority' => 65_000,
                      'provisioningState' => 'Succeeded'
                    },
                  'name' => 'AllowVnetInBound'
                },
                {
                  'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/networkSecurityGroups/testGroup/defaultSecurityRules/AllowAzureLoadBalancerInBound",
                  'properties' =>
                    {
                      'protocol' => '*',
                      'sourceAddressPrefix' => 'AzureLoadBalancer',
                      'destinationAddressPrefix' => '*',
                      'access' => 'Allow',
                      'direction' => 'Inbound',
                      'description' => 'Allow inbound traffic from azure load balancer',
                      'sourcePortRange' => '*',
                      'destinationPortRange' => '*',
                      'priority' => 65_001,
                      'provisioningState' => 'Succeeded'
                    },
                  'name' => 'AllowAzureLoadBalancerInBound'
                },
                {
                  'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/networkSecurityGroups/testGroup/defaultSecurityRules/DenyAllInBound",
                  'properties' =>
                    {
                      'protocol' => '*',
                      'sourceAddressPrefix' => '*',
                      'destinationAddressPrefix' => '*',
                      'access' => 'Deny',
                      'direction' => 'Inbound',
                      'description' => 'Deny all inbound traffic',
                      'sourcePortRange' => '*',
                      'destinationPortRange' => '*',
                      'priority' => 65_500,
                      'provisioningState' => 'Succeeded'
                    },
                  'name' => 'DenyAllInBound'
                },
                {
                  'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/networkSecurityGroups/testGroup/defaultSecurityRules/AllowVnetOutBound",
                  'properties' =>
                    {
                      'protocol' => '*',
                      'sourceAddressPrefix' => 'VirtualNetwork',
                      'destinationAddressPrefix' => 'VirtualNetwork',
                      'access' => 'Allow',
                      'direction' => 'Outbound',
                      'description' => 'Allow outbound traffic from all VMs to all VMs in VNET',
                      'sourcePortRange' => '*',
                      'destinationPortRange' => '*',
                      'priority' => 65_000,
                      'provisioningState' => 'Succeeded'
                    },
                  'name' => 'AllowVnetOutBound'
                },
                {
                  'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/networkSecurityGroups/testGroup/defaultSecurityRules/AllowInternetOutBound",
                  'properties' =>
                    {
                      'protocol' => '*',
                      'sourceAddressPrefix' => '*',
                      'destinationAddressPrefix' => 'Internet',
                      'access' => 'Allow',
                      'direction' => 'Outbound',
                      'description' => 'Allow outbound traffic from all VMs to Internet',
                      'sourcePortRange' => '*',
                      'destinationPortRange' => '*',
                      'priority' => 65_001,
                      'provisioningState' => 'Succeeded'
                    },
                  'name' => 'AllowInternetOutBound'
                },
                {
                  'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/networkSecurityGroups/testGroup/defaultSecurityRules/DenyAllOutBound",
                  'properties' =>
                    {
                      'protocol' => '*',
                      'sourceAddressPrefix' => '*',
                      'destinationAddressPrefix' => '*',
                      'access' => 'Deny',
                      'direction' => 'Outbound',
                      'description' => 'Deny all outbound traffic',
                      'sourcePortRange' => '*',
                      'destinationPortRange' => '*',
                      'priority' => 65_500,
                      'provisioningState' => 'Succeeded'
                    },
                  'name' => 'DenyAllOutBound'
                }
              ],
            'resourceGuid' => '9dca97e6-4789-4ebd-86e3-52b8b0da6cd4',
            'provisioningState' => 'Succeeded'
          }
      }
    ]
  }
  nsg_mapper = Azure::ARM::Network::Models::NetworkInterfaceListResult.mapper
  @network_client.deserialize(nsg_mapper, nsg_list_result, 'result.body').value
end
list_network_security_rules(*) click to toggle source
# File lib/fog/azurerm/requests/network/list_network_security_rules.rb, line 23
def list_network_security_rules(*)
  nsr_list = '{
    "value":[
      {
        "name":"myNsRule",
        "id":"/subscriptions/{guid}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityGroups/myNsg/securityRules/myNsRule",
        "etag":"W/\"00000000-0000-0000-0000-000000000000\"",
        "properties":{
          "provisioningState":"Succeeded",
          "description":"description-of-this-rule",
          "protocol": "*",
          "sourcePortRange":"source-port-range",
          "destinationPortRange":"destination-port-range",
          "sourceAddressPrefix":"*",
          "destinationAddressPrefix":"*",
          "access":"Allow",
          "priority":100,
          "direction":"Inbound"
        }
      }
  ]
  }'
  nsr_mapper = Azure::ARM::Network::Models::SecurityRuleListResult.mapper
  @network_client.deserialize(nsr_mapper, JSON.load(nsr_list), 'result.body')
end
list_public_ips(resource_group) click to toggle source
# File lib/fog/azurerm/requests/network/list_public_ips.rb, line 20
def list_public_ips(resource_group)
  public_ip = {
    'value' =>
    [
      {
        'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/publicIPAddresses/test-PubIP",
        'name' => 'test-PubIP',
        'type' => 'Microsoft.Network/publicIPAddresses',
        'location' => 'westus',
        'properties' =>
          {
            'publicIPAllocationMethod' => 'Static',
            'ipAddress' => '13.93.203.153',
            'idleTimeoutInMinutes' => 4,
            'resourceGuid' => 'c78f0c95-d8b9-409b-897c-74260b686392',
            'provisioningState' => 'Succeeded'
          }
      }
    ]
  }
  public_ip_mapper = Azure::ARM::Network::Models::PublicIPAddressListResult.mapper
  @network_client.deserialize(public_ip_mapper, public_ip, 'result.body').value
end
list_subnets(resource_group, virtual_network_name) click to toggle source
# File lib/fog/azurerm/requests/network/list_subnets.rb, line 20
def list_subnets(resource_group, virtual_network_name)
  subnet = {
    'value' => [
      {
        'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/virtualNetworks/#{virtual_network_name}/subnets/subnet_0_testVnet",
        'properties' =>
          {
            'addressPrefix' => '10.1.0.0/24',
            'provisioningState' => 'Succeeded'
          },
        'name' => 'subnet_0_testVnet'
      },
      {
        'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/virtualNetworks/#{virtual_network_name}/subnets/fog-test-subnet",
        'properties' =>
          {
            'addressPrefix' => '10.2.0.0/16',
            'ipConfigurations' =>
              [
                {
                  'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/networkInterfaces/test-NIC/ipConfigurations/ipconfig1"
                }
              ],
            'provisioningState' => 'Succeeded'
          },
        'name' => 'fog-test-subnet'
      }
    ]
  }
  subnet_mapper = Azure::ARM::Network::Models::SubnetListResult.mapper
  @network_client.deserialize(subnet_mapper, subnet, 'result.body').value
end
list_virtual_network_gateway_connections(*) click to toggle source
# File lib/fog/azurerm/requests/network/list_virtual_network_gateway_connections.rb, line 21
def list_virtual_network_gateway_connections(*)
  connection = {
    'value' => [
      {
        'name' => 'cn1',
        'id' => '/subscriptions/{subscription-id}/resourceGroups/{resource_group_name}/providers/microsoft.network/connections/connection1',
        'location' => 'West US',
        'tags' => { 'key1' => 'value1' },
        'properties' => {
          'virtualNetworkGateway1' => {
            'name' => 'firstgateway',
            'id' => '/subscriptions/{subscription-id}/resourceGroups/{resource_group_name}/providers/microsoft.network/SiteToSite/firstgateway'
          },
          'virtualNetworkGateway2' => {
            'name' => 'secondgateway',
            'id' => '/subscriptions/{subscription-id}/resourceGroups/{resource_group_name}/providers/microsoft.network/SiteToSite/secondgateway'
          },
          'connectionType' => 'SiteToSite',
          'connectivityState' => 'Connected'
        }
      }
    ]
  }
  connection_mapper = Azure::ARM::Network::Models::VirtualNetworkGatewayConnectionListResult.mapper
  @network_client.deserialize(connection_mapper, connection, 'result.body').value
end
list_virtual_network_gateways(*) click to toggle source
# File lib/fog/azurerm/requests/network/list_local_network_gateways.rb, line 21
def list_virtual_network_gateways(*)
  local_network_gateway = {
    'value' => [
      {
        'id' => '/subscriptions/<Subscription_id>/resourceGroups/learn_fog/providers/Microsoft.Network/localNetworkGateways/testLocalNetworkGateway',
        'name' => 'testLocalNetworkGateway',
        'type' => 'Microsoft.Network/localNetworkGateways',
        'location' => 'eastus',
        'properties' =>
          {
            'local_network_address_space' => {
              'address_prefixes' => []
            },
            'gateway_ip_address' => '192.168.1.1',
            'bgp_settings' => {
              'asn' => 100,
              'bgp_peering_address' => '192.168.1.2',
              'peer_weight' => 3
            }
          }
      }
    ]
  }
  local_network_gateway_mapper = Azure::ARM::Network::Models::LocalNetworkGatewayListResult.mapper
  @network_client.deserialize(local_network_gateway_mapper, local_network_gateway, 'result.body')
end
list_virtual_networks(resource_group) click to toggle source
# File lib/fog/azurerm/requests/network/list_virtual_networks.rb, line 20
def list_virtual_networks(resource_group)
  virtual_network = {
    'value' => [
      {
        'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/virtualNetworks/testVnet",
        'name' => 'testVnet',
        'type' => 'Microsoft.Network/virtualNetworks',
        'location' => 'westus',
        'properties' =>
          {
            'addressSpace' =>
              {
                'addressPrefixes' =>
                  %w(10.1.0.0/16 10.2.0.0/16)
              },
            'subnets' =>
              [
                {
                  'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/virtualNetworks/testVnet/subnets/subnet_0_testVnet",
                  'properties' =>
                    {
                      'addressPrefix' => '10.1.0.0/24',
                      'provisioningState' => 'Succeeded'
                    },
                  'name' => 'subnet_0_testVnet'
                },
                {
                  'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/virtualNetworks/testVnet/subnets/fog-test-subnet",
                  'properties' =>
                    {
                      'addressPrefix' => '10.2.0.0/16',
                      'ipConfigurations' =>
                        [
                          {
                            'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group}/providers/Microsoft.Network/networkInterfaces/test-NIC/ipConfigurations/ipconfig1"
                          }
                        ],
                      'provisioningState' => 'Succeeded'
                    },
                  'name' => 'fog-test-subnet'
                }
              ],
            'resourceGuid' => 'c573f8e2-d916-493f-8b25-a681c31269ef',
            'provisioningState' => 'Succeeded'
          }
      }
    ]
  }
  vnet_mapper = Azure::ARM::Network::Models::VirtualNetworkListResult.mapper
  @network_client.deserialize(vnet_mapper, virtual_network, 'result.body').value
end
list_virtual_networks_in_subscription() click to toggle source
# File lib/fog/azurerm/requests/network/list_virtual_networks_in_subscription.rb, line 20
def list_virtual_networks_in_subscription
  virtual_network = {
    'value' => [
      {
        'id' => '/subscriptions/########-####-####-####-############/resourceGroups/TestRG/providers/Microsoft.Network/virtualNetworks/testVnet',
        'name' => 'testVnet',
        'type' => 'Microsoft.Network/virtualNetworks',
        'location' => 'westus',
        'properties' =>
          {
            'addressSpace' =>
              {
                'addressPrefixes' =>
                  %w(10.1.0.0/16 10.2.0.0/16)
              },
            'subnets' =>
              [
                {
                  'id' => '/subscriptions/########-####-####-####-############/resourceGroups/TestRG/providers/Microsoft.Network/virtualNetworks/testVnet/subnets/subnet_0_testVnet',
                  'properties' =>
                    {
                      'addressPrefix' => '10.1.0.0/24',
                      'provisioningState' => 'Succeeded'
                    },
                  'name' => 'subnet_0_testVnet'
                },
                {
                  'id' => '/subscriptions/########-####-####-####-############/resourceGroups/TestRG/providers/Microsoft.Network/virtualNetworks/testVnet/subnets/fog-test-subnet',
                  'properties' =>
                    {
                      'addressPrefix' => '10.2.0.0/16',
                      'ipConfigurations' =>
                        [
                          {
                            'id' => '/subscriptions/########-####-####-####-############/resourceGroups/TestRG/providers/Microsoft.Network/networkInterfaces/test-NIC/ipConfigurations/ipconfig1'
                          }
                        ],
                      'provisioningState' => 'Succeeded'
                    },
                  'name' => 'fog-test-subnet'
                }
              ],
            'resourceGuid' => 'c573f8e2-d916-493f-8b25-a681c31269ef',
            'provisioningState' => 'Succeeded'
          }
      }
    ]
  }
  vnet_mapper = Azure::ARM::Network::Models::VirtualNetworkListResult.mapper
  @network_client.deserialize(vnet_mapper, virtual_network, 'result.body')
end
remove_address_prefixes_from_virtual_network(*) click to toggle source
# File lib/fog/azurerm/requests/network/remove_address_prefixes_from_virtual_network.rb, line 26
def remove_address_prefixes_from_virtual_network(*)
  virtual_network = {
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet',
    'name' => 'fog-vnet',
    'type' => 'Microsoft.Network/virtualNetworks',
    'location' => 'westus',
    'properties' =>
      {
        'addressSpace' =>
          {
            'addressPrefixes' =>
              [
                '10.1.0.0/16'
              ]
          },
        'dhcpOptions' => {
          'dnsServers' => [
            '10.1.0.5',
            '10.1.0.6'
          ]
        },
        'subnets' =>
          [
            {
              'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet/subnets/fog-subnet',
              'properties' =>
                {
                  'addressPrefix' => '10.1.0.0/24',
                  'provisioningState' => 'Succeeded'
                },
              'name' => 'fog-subnet'
            }
          ],
        'resourceGuid' => 'c573f8e2-d916-493f-8b25-a681c31269ef',
        'provisioningState' => 'Succeeded'
      }
  }
  vnet_mapper = Azure::ARM::Network::Models::VirtualNetwork.mapper
  @network_client.deserialize(vnet_mapper, virtual_network, 'result.body')
end
remove_dns_servers_from_virtual_network(*) click to toggle source
# File lib/fog/azurerm/requests/network/remove_dns_servers_from_virtual_network.rb, line 26
def remove_dns_servers_from_virtual_network(*)
  virtual_network = {
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet',
    'name' => 'fog-vnet',
    'type' => 'Microsoft.Network/virtualNetworks',
    'location' => 'westus',
    'properties' =>
      {
        'addressSpace' =>
          {
            'addressPrefixes' =>
              [
                '10.1.0.0/16',
                '10.2.0.0/16'
              ]
          },
        'dhcpOptions' => {
          'dnsServers' => [
            '10.1.0.5'
          ]
        },
        'subnets' =>
          [
            {
              'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet/subnets/fog-subnet',
              'properties' =>
                {
                  'addressPrefix' => '10.1.0.0/24',
                  'provisioningState' => 'Succeeded'
                },
              'name' => 'fog-subnet'
            }
          ],
        'resourceGuid' => 'c573f8e2-d916-493f-8b25-a681c31269ef',
        'provisioningState' => 'Succeeded'
      }
  }
  vnet_mapper = Azure::ARM::Network::Models::VirtualNetwork.mapper
  @network_client.deserialize(vnet_mapper, virtual_network, 'result.body')
end
remove_security_rule(resource_group_name, security_group_name, _security_rule_name) click to toggle source
# File lib/fog/azurerm/requests/network/remove_security_rule.rb, line 33
def remove_security_rule(resource_group_name, security_group_name, _security_rule_name)
  network_security_group = {
    'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{name}",
    'name' => security_group_name,
    'type' => 'Microsoft.Network/networkSecurityGroups',
    'location' => 'location',
    'properties' =>
      {
        'securityRules' => [],
        'defaultSecurityRules' =>
          [
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowVnetInBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => 'VirtualNetwork',
                  'destinationAddressPrefix' => 'VirtualNetwork',
                  'access' => 'Allow',
                  'direction' => 'Inbound',
                  'description' => 'Allow inbound traffic from all VMs in VNET',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_000,
                  'provisioningState' => 'Updating'
                },
              'name' => 'AllowVnetInBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowAzureLoadBalancerInBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => 'AzureLoadBalancer',
                  'destinationAddressPrefix' => '*',
                  'access' => 'Allow',
                  'direction' => 'Inbound',
                  'description' => 'Allow inbound traffic from azure load balancer',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_001,
                  'provisioningState' => 'Updating'
                },
              'name' => 'AllowAzureLoadBalancerInBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/DenyAllInBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => '*',
                  'destinationAddressPrefix' => '*',
                  'access' => 'Deny',
                  'direction' => 'Inbound',
                  'description' => 'Deny all inbound traffic',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_500,
                  'provisioningState' => 'Updating'
                },
              'name' => 'DenyAllInBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowVnetOutBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => 'VirtualNetwork',
                  'destinationAddressPrefix' => 'VirtualNetwork',
                  'access' => 'Allow',
                  'direction' => 'Outbound',
                  'description' => 'Allow outbound traffic from all VMs to all VMs in VNET',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_000,
                  'provisioningState' => 'Updating'
                },
              'name' => 'AllowVnetOutBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/AllowInternetOutBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => '*',
                  'destinationAddressPrefix' => 'Internet',
                  'access' => 'Allow',
                  'direction' => 'Outbound',
                  'description' => 'Allow outbound traffic from all VMs to Internet',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_001,
                  'provisioningState' => 'Updating'
                },
              'name' => 'AllowInternetOutBound'
            },
            {
              'id' => "/subscriptions/########-####-####-####-############/resourceGroups/#{resource_group_name}/providers/Microsoft.Network/networkSecurityGroups/#{security_group_name}/defaultSecurityRules/DenyAllOutBound",
              'properties' =>
                {
                  'protocol' => '*',
                  'sourceAddressPrefix' => '*',
                  'destinationAddressPrefix' => '*',
                  'access' => 'Deny',
                  'direction' => 'Outbound',
                  'description' => 'Deny all outbound traffic',
                  'sourcePortRange' => '*',
                  'destinationPortRange' => '*',
                  'priority' => 65_500,
                  'provisioningState' => 'Updating'
                },
              'name' => 'DenyAllOutBound'
            }
          ],
        'resourceGuid' => '9dca97e6-4789-4ebd-86e3-52b8b0da6cd4',
        'provisioningState' => 'Updating'
      }
  }
  nsg_mapper = Azure::ARM::Network::Models::NetworkSecurityGroup.mapper
  @network_client.deserialize(nsg_mapper, network_security_group, 'result.body')
end
remove_subnets_from_virtual_network(*) click to toggle source
# File lib/fog/azurerm/requests/network/remove_subnets_from_virtual_network.rb, line 26
def remove_subnets_from_virtual_network(*)
  virtual_network = {
    'id' => '/subscriptions/########-####-####-####-############/resourceGroups/fog-rg/providers/Microsoft.Network/virtualNetworks/fog-vnet',
    'name' => 'fog-vnet',
    'type' => 'Microsoft.Network/virtualNetworks',
    'location' => 'westus',
    'properties' =>
      {
        'addressSpace' =>
          {
            'addressPrefixes' =>
              [
                '10.1.0.0/16',
                '10.2.0.0/16'
              ]
          },
        'dhcpOptions' => {
          'dnsServers' => [
            '10.1.0.5',
            '10.1.0.6'
          ]
        },
        'subnets' => [],
        'resourceGuid' => 'c573f8e2-d916-493f-8b25-a681c31269ef',
        'provisioningState' => 'Succeeded'
      }
  }
  vnet_mapper = Azure::ARM::Network::Models::VirtualNetwork.mapper
  @network_client.deserialize(vnet_mapper, virtual_network, 'result.body')
end
reset_connection_shared_key(*) click to toggle source
# File lib/fog/azurerm/requests/network/reset_connection_shared_key.rb, line 29
def reset_connection_shared_key(*)
  Fog::Logger.debug 'Reset the shared key of Connection successfully.'
  true
end
set_connection_shared_key(*) click to toggle source
# File lib/fog/azurerm/requests/network/set_connection_shared_key.rb, line 29
def set_connection_shared_key(*)
  Fog::Logger.debug 'Set the shared key of Connection successfully.'
  true
end