@@ -44,7 +44,7 @@ resource "azurerm_virtual_network" "vnet" {
4444}
4545
4646resource "azurerm_subnet" "firewall_subnet" {
47- address_prefixes = var. firewall_subnet_address_prefixes
47+ address_prefixes = var. firewall_subnet_address_prefixes
4848 # The subnet name has to be exactly this, in order for the subnet to be used for a firewall
4949 name = " AzureFirewallSubnet"
5050 resource_group_name = azurerm_resource_group. resource_group . name
@@ -55,7 +55,7 @@ resource "azurerm_subnet" "firewall_subnet" {
5555}
5656
5757resource "azurerm_subnet" "management_subnet" {
58- address_prefixes = var. firewall_management_subnet_address_prefixes
58+ address_prefixes = var. firewall_management_subnet_address_prefixes
5959 # The subnet name has to be exactly this in order for the subnet to be used for the firewall management
6060 name = " AzureFirewallManagementSubnet"
6161 resource_group_name = azurerm_resource_group. resource_group . name
@@ -132,11 +132,11 @@ resource "azurerm_firewall_policy_rule_collection_group" "firewall_policy_rule_c
132132 }
133133
134134 application_rule_collection {
135- action = " Allow"
136- name = " AllowApplicationRules"
135+ action = " Allow"
136+ name = " AllowApplicationRules"
137137 priority = 1000
138138 rule {
139- name = " GitHub"
139+ name = " GitHub"
140140 source_addresses = [" *" ]
141141 destination_fqdns = [
142142 # These FQDNs have been taken from the GitHub documentation for self-hosted runner networking
@@ -180,7 +180,7 @@ resource "azurerm_firewall" "firewall" {
180180 location = var. location
181181 name = " ${ var . base_name } -firewall"
182182 resource_group_name = azurerm_resource_group. resource_group . name
183- firewall_policy_id = azurerm_firewall_policy. firewall_policy . id
183+ firewall_policy_id = azurerm_firewall_policy. firewall_policy . id
184184 sku_name = " AZFW_VNet"
185185 sku_tier = " Standard"
186186 ip_configuration {
0 commit comments