modules/key/main.tf (33 lines of code) (raw):
resource "azurerm_key_vault_key" "this" {
key_opts = var.opts
key_type = var.type
key_vault_id = var.key_vault_resource_id
name = var.name
curve = var.curve
expiration_date = var.expiration_date
key_size = var.size
not_before_date = var.not_before_date
tags = var.tags
dynamic "rotation_policy" {
for_each = var.rotation_policy != null ? [var.rotation_policy] : []
content {
expire_after = rotation_policy.value.expire_after
notify_before_expiry = rotation_policy.value.notify_before_expiry
automatic {
time_before_expiry = rotation_policy.value.automatic.time_before_expiry
}
}
}
}
resource "azurerm_role_assignment" "this" {
for_each = var.role_assignments
principal_id = each.value.principal_id
scope = azurerm_key_vault_key.this.resource_versionless_id
condition = each.value.condition
condition_version = each.value.condition_version
delegated_managed_identity_resource_id = each.value.delegated_managed_identity_resource_id
principal_type = each.value.principal_type
role_definition_id = strcontains(lower(each.value.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? each.value.role_definition_id_or_name : null
role_definition_name = strcontains(lower(each.value.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? null : each.value.role_definition_id_or_name
skip_service_principal_aad_check = each.value.skip_service_principal_aad_check
}