generated from Azure/terraform-verified-module
-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathmodules.appservice.keyvault.tf
37 lines (32 loc) · 1.67 KB
/
modules.appservice.keyvault.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
module "mod_key_vault" {
depends_on = [
azurerm_user_assigned_identity.app_identity
]
source = "azurenoops/overlays-key-vault/azurerm"
version = "~> 2.0"
count = var.create_app_keyvault ? 1 : 0
existing_resource_group_name = local.resource_group_name
location = local.location
environment = var.environment
deploy_environment = var.deploy_environment
org_name = var.org_name
workload_name = var.workload_name
# Creating Private Endpoint requires, VNet name to create a Private Endpoint
# By default this will create a `privatelink.vaultcore.azure.net` DNS zone. if created in commercial cloud
# To use existing subnet, specify `existing_private_subnet_name` with valid subnet name.
# To use existing private DNS zone specify `existing_private_dns_zone` with valid zone name.
enable_private_endpoint = var.create_app_keyvault
virtual_network_name = data.azurerm_virtual_network.pe_vnet.name
existing_private_dns_zone = var.existing_keyvault_private_dns_zone != null ? var.existing_keyvault_private_dns_zone : null
existing_private_subnet_name = data.azurerm_subnet.pe_subnet.name
# Current user should be here to be able to create keys and secrets
#admin_objects_ids = [
# data.azuread_group.admin_group.id
#]
# This is to enable resource locks for the key vault.
enable_resource_locks = var.enable_resource_locks
# Tags for Azure Resources
add_tags = merge(var.add_tags, local.default_tags)
}