@@ -85,7 +85,7 @@ var container_app_deployment container_app_deployment_info_type = {
8585var abbrs = loadJsonContent ('./abbreviations.json' )
8686
8787// ========== Managed Identity ========== //
88- module avmManagedIdentity 'br/public:avm/res/ managed-identity/user-assigned-identity:0.4.1 ' = {
88+ module avmManagedIdentity './modules/ managed-identity.bicep ' = {
8989 name : format (deployment_param .resource_name_format_string , abbrs .security .managedIdentity )
9090 params : {
9191 name : '${abbrs .security .managedIdentity }${deployment_param .solution_prefix }'
@@ -120,23 +120,36 @@ module bicepOwnerRoleAssignment 'modules/role_assignment.bicep' = {
120120// }
121121
122122// ========== Key Vault Module ========== //
123- module avmKeyVault 'br/public:avm/res/ key-vault/vault:0.12.1 ' = {
124- name : format (deployment_param .resource_name_format_string , abbrs .security .keyVault )
123+ module avmKeyVault './modules/ key-vault.bicep ' = {
124+ // name: format(deployment_param.resource_name_format_string, abbrs.security.keyVault)
125125 params : {
126- name : '${abbrs .security .keyVault }${deployment_param .solution_prefix }'
127- location : deployment_param .resource_group_location
128- tags : {
129- app : deployment_param .solution_prefix
126+ name : format (deployment_param .resource_name_format_string , abbrs .security .keyVault )
127+ keyVaultParams : {
128+ name : '${abbrs .security .keyVault }${deployment_param .solution_prefix }'
130129 location : deployment_param .resource_group_location
131- }
132- roleAssignments : [
133- {
134- principalId : avmManagedIdentity .outputs .principalId
135- roleDefinitionIdOrName : 'Key Vault Administrator'
130+ tags : {
131+ app : deployment_param .solution_prefix
132+ location : deployment_param .resource_group_location
136133 }
137- ]
138- enablePurgeProtection : false
139- enableSoftDelete : true
134+ roleAssignments : [
135+ {
136+ principalId : avmManagedIdentity .outputs .principalId
137+ roleDefinitionIdOrName : 'Key Vault Administrator'
138+ }
139+ ]
140+ enablePurgeProtection : false
141+ enableSoftDelete : true
142+ publicNetworkAccess : 'Enabled'
143+ keyvaultsku : 'standard'
144+ // Add missing AVM parameters for parity with classic resource
145+ enableRbacAuthorization : true
146+ createMode : 'default'
147+ enableTelemetry : false
148+ // networkAcls, privateEndpoints, diagnosticSettings, keys, secrets, lock can be added if needed
149+ enableVaultForDiskEncryption : true
150+ enableVaultForTemplateDeployment : true
151+ softDeleteRetentionInDays : 7
152+ }
140153 }
141154 scope : resourceGroup (resourceGroup ().name )
142155}
0 commit comments