From c05bc331a5e0ea0275ddd548900efcc7ecfd34f8 Mon Sep 17 00:00:00 2001 From: Jenny Chen Date: Wed, 27 Nov 2024 15:59:46 -0800 Subject: [PATCH] comment svc --- .../templates/mgmt-cluster.bicep | 88 +++++++++---------- 1 file changed, 44 insertions(+), 44 deletions(-) diff --git a/dev-infrastructure/templates/mgmt-cluster.bicep b/dev-infrastructure/templates/mgmt-cluster.bicep index 3670dcb5f..0292e1dac 100644 --- a/dev-infrastructure/templates/mgmt-cluster.bicep +++ b/dev-infrastructure/templates/mgmt-cluster.bicep @@ -248,50 +248,50 @@ module mgmtKeyVault '../modules/keyvault/keyvault.bicep' = { } } -var clusterServiceMISplit = split(clusterServiceMIResourceId, '/') -var clusterServiceMIResourceGroup = clusterServiceMISplit[4] -var clusterServiceMIName = last(clusterServiceMISplit) - -resource clusterServiceMI 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' existing = { - scope: resourceGroup(clusterServiceMIResourceGroup) - name: clusterServiceMIName -} - -module cxClusterServiceKeyVaultAccess '../modules/keyvault/keyvault-secret-access.bicep' = [ - for role in [ - 'Key Vault Secrets Officer' - 'Key Vault Certificate User' - 'Key Vault Certificates Officer' - ]: { - name: guid(cxKeyVaultName, clusterServiceMIResourceId, role) - params: { - keyVaultName: cxKeyVaultName - roleName: role - managedIdentityPrincipalId: clusterServiceMI.properties.principalId - } - dependsOn: [ - cxKeyVault - ] - } -] - -module msiClusterServiceKeyVaultAccess '../modules/keyvault/keyvault-secret-access.bicep' = [ - for role in [ - 'Key Vault Secrets Officer' - 'Key Vault Certificate User' - 'Key Vault Certificates Officer' - ]: { - name: guid(msiKeyVaultName, clusterServiceMIResourceId, role) - params: { - keyVaultName: msiKeyVaultName - roleName: role - managedIdentityPrincipalId: clusterServiceMI.properties.principalId - } - dependsOn: [ - msiKeyVault - ] - } -] +// var clusterServiceMISplit = split(clusterServiceMIResourceId, '/') +// var clusterServiceMIResourceGroup = clusterServiceMISplit[4] +// var clusterServiceMIName = last(clusterServiceMISplit) + +// resource clusterServiceMI 'Microsoft.ManagedIdentity/userAssignedIdentities@2023-01-31' existing = { +// scope: resourceGroup(clusterServiceMIResourceGroup) +// name: clusterServiceMIName +// } + +// module cxClusterServiceKeyVaultAccess '../modules/keyvault/keyvault-secret-access.bicep' = [ +// for role in [ +// 'Key Vault Secrets Officer' +// 'Key Vault Certificate User' +// 'Key Vault Certificates Officer' +// ]: { +// name: guid(cxKeyVaultName, clusterServiceMIResourceId, role) +// params: { +// keyVaultName: cxKeyVaultName +// roleName: role +// managedIdentityPrincipalId: clusterServiceMI.properties.principalId +// } +// dependsOn: [ +// cxKeyVault +// ] +// } +// ] + +// module msiClusterServiceKeyVaultAccess '../modules/keyvault/keyvault-secret-access.bicep' = [ +// for role in [ +// 'Key Vault Secrets Officer' +// 'Key Vault Certificate User' +// 'Key Vault Certificates Officer' +// ]: { +// name: guid(msiKeyVaultName, clusterServiceMIResourceId, role) +// params: { +// keyVaultName: msiKeyVaultName +// roleName: role +// managedIdentityPrincipalId: clusterServiceMI.properties.principalId +// } +// dependsOn: [ +// msiKeyVault +// ] +// } +// ] // // E V E N T G R I D P R I V A T E E N D P O I N T C O N N E C T I O N