@@ -93,7 +93,7 @@ var container_app_deployment container_app_deployment_info_type = {
9393var abbrs = loadJsonContent ('./abbreviations.json' )
9494
9595// ========== Managed Identity ========== //
96- module avmManagedIdentity 'br/public:avm/res/ managed-identity/user-assigned-identity:0.4.1 ' = {
96+ module avmManagedIdentity './modules/ managed-identity.bicep ' = {
9797 name : format (deployment_param .resource_name_format_string , abbrs .security .managedIdentity )
9898 params : {
9999 name : '${abbrs .security .managedIdentity }${deployment_param .solution_prefix }'
@@ -128,24 +128,36 @@ module bicepOwnerRoleAssignment 'modules/role_assignment.bicep' = {
128128// }
129129
130130// ========== Key Vault Module ========== //
131- module avmKeyVault 'br/public:avm/res/ key-vault/vault:0.12.1 ' = {
131+ module avmKeyVault './modules/ key-vault.bicep ' = {
132132 name : format (deployment_param .resource_name_format_string , abbrs .security .keyVault )
133133 params : {
134- name : '${abbrs .security .keyVault }${deployment_param .solution_prefix }'
135- location : deployment_param .resource_group_location
136- tags : {
137- app : deployment_param .solution_prefix
134+ name : format (deployment_param .resource_name_format_string , abbrs .security .keyVault )
135+ keyVaultParams : {
136+ name : '${abbrs .security .keyVault }${deployment_param .solution_prefix }'
138137 location : deployment_param .resource_group_location
139- }
140- roleAssignments : [
141- {
142- principalId : avmManagedIdentity .outputs .principalId
143- roleDefinitionIdOrName : 'Key Vault Administrator'
138+ tags : {
139+ app : deployment_param .solution_prefix
140+ location : deployment_param .resource_group_location
144141 }
145- ]
146- enablePurgeProtection : false
147- enableSoftDelete : true
148- enableRbacAuthorization : true
142+ roleAssignments : [
143+ {
144+ principalId : avmManagedIdentity .outputs .principalId
145+ roleDefinitionIdOrName : 'Key Vault Administrator'
146+ }
147+ ]
148+ enablePurgeProtection : false
149+ enableSoftDelete : true
150+ publicNetworkAccess : 'Enabled'
151+ keyvaultsku : 'standard'
152+ // Add missing AVM parameters for parity with classic resource
153+ enableRbacAuthorization : true
154+ createMode : 'default'
155+ enableTelemetry : false
156+ // networkAcls, privateEndpoints, diagnosticSettings, keys, secrets, lock can be added if needed
157+ enableVaultForDiskEncryption : true
158+ enableVaultForTemplateDeployment : true
159+ softDeleteRetentionInDays : 7
160+ }
149161 }
150162 scope : resourceGroup (resourceGroup ().name )
151163}
0 commit comments