-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathr-identity.tf
63 lines (51 loc) · 2.26 KB
/
r-identity.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
locals {
user_assigned_identity_name = coalesce(
var.name_overrides.user_assigned_identity,
join("-", compact([
"id", var.name, "prd", local.location_short[var.location], var.name_suffix
]))
)
}
resource "azurerm_user_assigned_identity" "this" {
name = local.user_assigned_identity_name
location = var.location
resource_group_name = var.resource_group_name
tags = var.tags
}
resource "azurerm_federated_identity_credential" "this" {
for_each = var.runner_github_environments
name = each.key
audience = ["api://AzureADTokenExchange"]
issuer = "https://token.actions.githubusercontent.com"
parent_id = azurerm_user_assigned_identity.this.id
resource_group_name = azurerm_user_assigned_identity.this.resource_group_name
subject = "repo:${var.runner_github_repo}:environment:${each.value}"
}
resource "azurerm_role_assignment" "management_group_owner" {
for_each = data.azurerm_management_group.managed_by_launchpad
principal_id = azurerm_user_assigned_identity.this.principal_id
role_definition_name = "Owner"
scope = each.value.id
}
resource "azurerm_role_assignment" "subscription_owner" {
for_each = data.azurerm_subscription.managed_by_launchpad
principal_id = azurerm_user_assigned_identity.this.principal_id
role_definition_name = "Owner"
scope = each.value.id
}
resource "azurerm_role_assignment" "resource_specific" {
for_each = var.create_role_assignments ? {
for key, value in {
storage_blob_owner = {
role_definition_name = "Storage Blob Data Owner"
scope = "/subscriptions/${data.azurerm_client_config.current.subscription_id}/resourceGroups/${var.resource_group_name}"
},
key_vault_admin = var.create_key_vault ? {
role_definition_name = "Key Vault Administrator"
scope = "/subscriptions/${data.azurerm_client_config.current.subscription_id}/resourceGroups/${var.resource_group_name}"
} : null
} : key => value if value != null } : {}
principal_id = azurerm_user_assigned_identity.this.principal_id
scope = each.value.scope
role_definition_name = each.value.role_definition_name
}