Skip to content

Commit

Permalink
Update to latest
Browse files Browse the repository at this point in the history
  • Loading branch information
AlexanderSehr committed Oct 26, 2024
1 parent ca29be8 commit 864628c
Show file tree
Hide file tree
Showing 6 changed files with 31 additions and 444 deletions.
10 changes: 5 additions & 5 deletions avm/res/key-vault/vault/key/main.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ param kty string = 'EC'
@description('Optional. Key release policy.')
param releasePolicy object?

import { roleAssignmentType } from 'br/public:avm/utl/types/avm-common-types:0.1.0'
import { roleAssignmentType } from 'br/public:avm/utl/types/avm-common-types:0.2.1'
@description('Optional. Array of role assignments to create.')
param roleAssignments roleAssignmentType[]?

Expand Down Expand Up @@ -131,11 +131,11 @@ resource key 'Microsoft.KeyVault/vaults/keys@2022-07-01' = {
keySize: keySize
kty: kty
release_policy: releasePolicy ?? {}
...(empty(rotationPolicy)
? {}
: {
...(!empty(rotationPolicy)
? {
rotationPolicy: rotationPolicy
})
}
: {})
}
}

Expand Down
6 changes: 3 additions & 3 deletions avm/res/key-vault/vault/key/main.json
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"_generator": {
"name": "bicep",
"version": "0.30.23.60470",
"templateHash": "2736442603035200222"
"templateHash": "10368124970633936286"
},
"name": "Key Vault Keys",
"description": "This module deploys a Key Vault Key.",
Expand Down Expand Up @@ -84,7 +84,7 @@
"metadata": {
"description": "An AVM-aligned type for a role assignment.",
"__bicep_imported_from!": {
"sourceTemplate": "br:mcr.microsoft.com/bicep/avm/utl/types/avm-common-types:0.1.0"
"sourceTemplate": "br:mcr.microsoft.com/bicep/avm/utl/types/avm-common-types:0.2.1"
}
}
}
Expand Down Expand Up @@ -238,7 +238,7 @@
"apiVersion": "2022-07-01",
"name": "[format('{0}/{1}', parameters('keyVaultName'), parameters('name'))]",
"tags": "[parameters('tags')]",
"properties": "[shallowMerge(createArray(createObject('attributes', createObject('enabled', parameters('attributesEnabled'), 'exp', parameters('attributesExp'), 'nbf', parameters('attributesNbf')), 'curveName', parameters('curveName'), 'keyOps', parameters('keyOps'), 'keySize', parameters('keySize'), 'kty', parameters('kty'), 'release_policy', coalesce(parameters('releasePolicy'), createObject())), if(empty(parameters('rotationPolicy')), createObject(), createObject('rotationPolicy', parameters('rotationPolicy')))))]",
"properties": "[shallowMerge(createArray(createObject('attributes', createObject('enabled', parameters('attributesEnabled'), 'exp', parameters('attributesExp'), 'nbf', parameters('attributesNbf')), 'curveName', parameters('curveName'), 'keyOps', parameters('keyOps'), 'keySize', parameters('keySize'), 'kty', parameters('kty'), 'release_policy', coalesce(parameters('releasePolicy'), createObject())), if(not(empty(parameters('rotationPolicy'))), createObject('rotationPolicy', parameters('rotationPolicy')), createObject())))]",
"dependsOn": [
"keyVault"
]
Expand Down
10 changes: 5 additions & 5 deletions avm/res/key-vault/vault/main.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -63,22 +63,22 @@ param networkAcls object?
])
param publicNetworkAccess string = ''

import { lockType } from 'br/public:avm/utl/types/avm-common-types:0.1.0'
import { lockType } from 'br/public:avm/utl/types/avm-common-types:0.2.1'
@description('Optional. The lock settings of the service.')
param lock lockType?

import { roleAssignmentType } from 'br/public:avm/utl/types/avm-common-types:0.1.0'
import { roleAssignmentType } from 'br/public:avm/utl/types/avm-common-types:0.2.1'
@description('Optional. Array of role assignments to create.')
param roleAssignments roleAssignmentType[]?

import { privateEndpointSingleServiceType } from 'br/public:avm/utl/types/avm-common-types:0.1.0'
import { privateEndpointSingleServiceType } from 'br/public:avm/utl/types/avm-common-types:0.2.1'
@description('Optional. Configuration details for private endpoints. For security reasons, it is recommended to use private endpoints whenever possible.')
param privateEndpoints privateEndpointSingleServiceType[]?

@description('Optional. Resource tags.')
param tags object?

import { diagnosticSettingFullType } from 'br/public:avm/utl/types/avm-common-types:0.1.0'
import { diagnosticSettingFullType } from 'br/public:avm/utl/types/avm-common-types:0.2.1'
@description('Optional. The diagnostic settings of the service.')
param diagnosticSettings diagnosticSettingFullType[]?

Expand Down Expand Up @@ -404,7 +404,7 @@ output privateEndpoints privateEndpointOutputType[] = [

@description('The properties of the created secrets.')
output secrets credentialOutputType[] = [
#disable-next-line outputs-should-not-contain-secrets // Only returning the references, not a secret value
#disable-next-line outputs-should-not-contain-secrets // Only returning the references, not any secret value
for index in range(0, length(secrets ?? [])): {
resourceId: keyVault_secrets[index].outputs.resourceId
uri: keyVault_secrets[index].outputs.secretUri
Expand Down
Loading

0 comments on commit 864628c

Please sign in to comment.