modules/key/main.tf (33 lines of code) (raw):

resource "azurerm_key_vault_key" "this" { key_opts = var.opts key_type = var.type key_vault_id = var.key_vault_resource_id name = var.name curve = var.curve expiration_date = var.expiration_date key_size = var.size not_before_date = var.not_before_date tags = var.tags dynamic "rotation_policy" { for_each = var.rotation_policy != null ? [var.rotation_policy] : [] content { expire_after = rotation_policy.value.expire_after notify_before_expiry = rotation_policy.value.notify_before_expiry automatic { time_before_expiry = rotation_policy.value.automatic.time_before_expiry } } } } resource "azurerm_role_assignment" "this" { for_each = var.role_assignments principal_id = each.value.principal_id scope = azurerm_key_vault_key.this.resource_versionless_id condition = each.value.condition condition_version = each.value.condition_version delegated_managed_identity_resource_id = each.value.delegated_managed_identity_resource_id principal_type = each.value.principal_type role_definition_id = strcontains(lower(each.value.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? each.value.role_definition_id_or_name : null role_definition_name = strcontains(lower(each.value.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? null : each.value.role_definition_id_or_name skip_service_principal_aad_check = each.value.skip_service_principal_aad_check }