@@ -25,32 +25,16 @@ module "prerequisites" {
2525 tags = var. tags
2626}
2727
28- # This keyvault is NOT firewalled.
29- resource "azurerm_key_vault" "example" {
30- name = var. name
31- location = var. location
32- resource_group_name = module. prerequisites . resource_group_name
33- enable_rbac_authorization = true
34-
35- tenant_id = data. azurerm_client_config . current . tenant_id
36- soft_delete_retention_days = 7
37- purge_protection_enabled = false
38-
39- sku_name = " standard"
40-
41- tags = var. tags
42- }
43-
4428# This will give the current user admin permissions on the key vault
4529resource "azurerm_role_assignment" "current_user" {
46- scope = azurerm_key_vault . example . id
30+ scope = module . prerequisites . key_vault_id
4731 role_definition_name = " Key Vault Administrator"
4832 principal_id = data. azurerm_client_config . current . object_id
4933}
5034
5135resource "azurerm_key_vault_certificate" "example" {
5236 name = var. name
53- key_vault_id = azurerm_key_vault . example . id
37+ key_vault_id = module . prerequisites . key_vault_id
5438
5539 certificate_policy {
5640 issuer_parameters {
@@ -101,7 +85,7 @@ resource "azurerm_key_vault_certificate" "example" {
10185}
10286
10387resource "azurerm_role_assignment" "example" {
104- scope = azurerm_key_vault . example . id
88+ scope = module . prerequisites . key_vault_id
10589 role_definition_name = " Key Vault Secrets User"
10690 principal_id = module. prerequisites . managed_identity_principal_id
10791}
0 commit comments