Skip to content

Commit 4801dac

Browse files
committed
Update keyvault
1 parent bd4dbf0 commit 4801dac

5 files changed

Lines changed: 25 additions & 19 deletions

File tree

keyvault.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,13 @@ module "keyvaults" {
66
global_settings = local.global_settings
77
client_config = local.client_config
88
settings = each.value
9-
resource_groups = local.combined_objects_resource_groups
109
diagnostics = local.combined_diagnostics
1110
vnets = local.combined_objects_networking
1211
azuread_groups = local.combined_objects_azuread_groups
1312
managed_identities = local.combined_objects_managed_identities
14-
base_tags = try(local.global_settings.inherit_tags, false) ? try(local.combined_objects_resource_groups[try(each.value.resource_group.lz_key, local.client_config.landingzone_key)][try(each.value.resource_group.key, each.value.resource_group_key)].tags, {}) : {}
1513
private_dns = local.combined_objects_private_dns
14+
resource_group = local.combined_objects_resource_groups[try(each.value.resource_group.lz_key, local.client_config.landingzone_key)][try(each.value.resource_group.key, each.value.resource_group_key)]
15+
base_tags = local.global_settings.inherit_tags
1616
}
1717

1818
#

modules/security/keyvault/keyvault.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
locals {
22
# Need to update the storage tags if the environment tag is updated with the rover command line
3-
tags = try(var.settings.tags, null) == null ? null : try(var.settings.tags.environment, null) == null ? var.settings.tags : merge(lookup(var.settings, "tags", {}), { "environment" : var.global_settings.environment })
3+
caf_tags = try(var.settings.tags, null) == null ? null : try(var.settings.tags.environment, null) == null ? var.settings.tags : merge(lookup(var.settings, "tags", {}), { "environment" : var.global_settings.environment })
44
}
55

66
# naming convention
@@ -17,11 +17,11 @@ resource "azurecaf_name" "keyvault" {
1717
resource "azurerm_key_vault" "keyvault" {
1818

1919
name = azurecaf_name.keyvault.result
20-
location = lookup(var.settings, "region", null) == null ? local.resource_group.location : var.global_settings.regions[var.settings.region]
21-
resource_group_name = local.resource_group.name
20+
location = local.location
21+
resource_group_name = local.resource_group_name
2222
tenant_id = var.client_config.tenant_id
2323
sku_name = try(var.settings.sku_name, "standard")
24-
tags = try(merge(var.base_tags, local.tags), {})
24+
tags = merge(local.tags, local.caf_tags, try(var.settings.tags, null))
2525
enabled_for_deployment = try(var.settings.enabled_for_deployment, false)
2626
enabled_for_disk_encryption = try(var.settings.enabled_for_disk_encryption, false)
2727
enabled_for_template_deployment = try(var.settings.enabled_for_template_deployment, false)

modules/security/keyvault/main.tf

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,18 @@ terraform {
44
source = "aztfmod/azurecaf"
55
}
66
}
7-
87
}
98

109
locals {
11-
resource_group = coalesce(
12-
try(var.resource_groups[var.client_config.landingzone_key][var.settings.resource_group_key], null),
13-
try(var.resource_groups[var.settings.lz_key][var.settings.resource_group_key], null),
14-
try(var.resource_groups[var.client_config.landingzone_key][var.settings.resource_group.key], null),
15-
try(var.resource_groups[var.settings.resource_group.lz_key][var.settings.resource_group.key], null)
10+
tags = var.base_tags ? merge(
11+
var.global_settings.tags,
12+
try(var.resource_group.tags, null),
13+
try(var.settings.tags, null)
14+
) : merge(
15+
try(var.settings.tags,
16+
null)
1617
)
18+
19+
location = var.resource_group.location
20+
resource_group_name = var.resource_group.name
1721
}

modules/security/keyvault/private_endpoints.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,8 @@ module "private_endpoint" {
1010

1111
resource_id = azurerm_key_vault.keyvault.id
1212
name = each.value.name
13-
location = var.resource_groups[try(each.value.resource_group.lz_key, var.client_config.landingzone_key)][try(each.value.resource_group.key, each.value.resource_group_key)].location
14-
resource_group_name = var.resource_groups[try(each.value.resource_group.lz_key, var.client_config.landingzone_key)][try(each.value.resource_group.key, each.value.resource_group_key)].name
13+
location = local.location
14+
resource_group_name = local.resource_group_name
1515
subnet_id = can(each.value.subnet_id) ? each.value.subnet_id : var.vnets[try(each.value.lz_key, var.client_config.landingzone_key)][each.value.vnet_key].subnets[each.value.subnet_key].id
1616
settings = each.value
1717
global_settings = var.global_settings

modules/security/keyvault/variables.tf

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@ variable "global_settings" {
44
variable "client_config" {
55
description = "Client configuration object (see module README.md)."
66
}
7-
variable "resource_groups" {}
87
variable "settings" {}
98
variable "vnets" {
109
default = {}
@@ -19,10 +18,13 @@ variable "managed_identities" {
1918
variable "diagnostics" {
2019
default = {}
2120
}
22-
variable "base_tags" {
23-
description = "Base tags for the resource to be inherited from the resource group."
24-
type = map(any)
25-
}
2621
variable "private_dns" {
2722
default = {}
23+
}
24+
variable "resource_group" {
25+
description = "Resource group object"
26+
}
27+
variable "base_tags" {
28+
description = "Base tags for the resource to be inherited from the resource group."
29+
type = bool
2830
}

0 commit comments

Comments
 (0)