Skip to content

Commit 6a117c9

Browse files
authored
Enable AVM links (Azure#2812)
1 parent 9162405 commit 6a117c9

6 files changed

+14
-6
lines changed

docs/en/rules/Azure.ACR.AdminUser.md

+2
Original file line numberDiff line numberDiff line change
@@ -106,6 +106,8 @@ resource registry 'Microsoft.ContainerRegistry/registries@2023-07-01' = {
106106
}
107107
```
108108

109+
<!-- external:avm avm/res/container-registry/registry acrAdminUserEnabled -->
110+
109111
### Configure with Azure CLI
110112

111113
To configure registries that pass this rule:

docs/en/rules/Azure.ACR.AnonymousAccess.md

+2
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,8 @@ resource registry 'Microsoft.ContainerRegistry/registries@2023-08-01-preview' =
114114
}
115115
```
116116

117+
<!-- external:avm avm/res/container-registry/registry anonymousPullEnabled -->
118+
117119
### Configure with Azure CLI
118120

119121
To configure registries that pass this rule:

docs/en/rules/Azure.ACR.ContainerScan.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
2-
reviewed: 2021/11/13
2+
reviewed: 2021-11-13
33
severity: Critical
44
pillar: Security
5-
category: Azure resources
5+
category: SE:10 Monitoring and threat detection
66
resource: Container Registry
77
online version: https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.ACR.ContainerScan/
88
---
@@ -33,9 +33,9 @@ Container image vulnerability scanning with Microsoft Defender for container reg
3333

3434
- Is currently only available for Linux-hosted ACR registries.
3535
- The container registry must be accessible by Microsoft Defender for Container registries.
36-
Network access can not be restricted by firewall, Service Endpoints, or Private Endpoints.
36+
Network access can not be restricted by firewall, Service Endpoints, or Private Endpoints.
3737
- Is supported in commercial clouds.
38-
Is not currently supported in sovereign or national clouds (e.g. US Gov, China Gov, etc.).
38+
Is not currently supported in sovereign or national clouds (e.g. US Gov, China Gov, etc.).
3939

4040
## RECOMMENDATION
4141

@@ -97,7 +97,7 @@ This rule applies when analyzing resources deployed (in-flight) to Azure.
9797

9898
## LINKS
9999

100-
- [Monitor Azure resources in Microsoft Defender for Cloud](https://learn.microsoft.com/azure/architecture/framework/security/monitor-resources#containers)
100+
- [SE:10 Monitoring and threat detection](https://learn.microsoft.com/azure/well-architected/security/monitor-threats)
101101
- [Introduction to Microsoft Defender for container registries](https://learn.microsoft.com/azure/defender-for-cloud/defender-for-container-registries-introduction)
102102
- [Container security in Microsoft Defender for Cloud](https://learn.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction)
103103
- [Secure the images and run time](https://learn.microsoft.com/azure/aks/operator-best-practices-container-image-management#secure-the-images-and-run-time)

docs/en/rules/Azure.ACR.ContentTrust.md

+2
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,8 @@ resource registry 'Microsoft.ContainerRegistry/registries@2023-08-01-preview' =
100100
}
101101
```
102102

103+
<!-- external:avm avm/res/container-registry/registry trustPolicyStatus -->
104+
103105
## LINKS
104106

105107
- [Follow best practices for container security](https://learn.microsoft.com/azure/architecture/framework/security/applications-services#follow-best-practices-for-container-security)

docs/en/rules/Azure.ACR.SoftDelete.md

+2
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,8 @@ resource acr 'Microsoft.ContainerRegistry/registries@2023-01-01-preview' = {
119119
}
120120
```
121121

122+
<!-- external:avm avm/res/container-registry/registry softDeletePolicyStatus -->
123+
122124
### Configure with Azure CLI
123125

124126
```bash

docs/hooks/shortcodes.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
def on_page_markdown(markdown: str, *, page: Page, config: MkDocsConfig, files: Files) -> str:
2222
'''Hook on_page_markdown event.'''
2323

24-
return module(markdown, page, config, files)
24+
return external(module(markdown, page, config, files))
2525

2626
#
2727
# Supporting functions

0 commit comments

Comments
 (0)