Skip to content

Commit

Permalink
use the right it
Browse files Browse the repository at this point in the history
  • Loading branch information
Adam Smith authored and Adam Smith committed Oct 11, 2024
1 parent 7e2a254 commit 0b6ca1b
Show file tree
Hide file tree
Showing 5 changed files with 9 additions and 9 deletions.
4 changes: 2 additions & 2 deletions modules/cloudaccess/wf_cluster_manager.tf
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ resource "azurerm_role_assignment" "clustermanager" {
count = var.enable_cluster_manager && var.from_azure ? 1 : 0

scope = data.azurerm_subscription.primary.id
role_definition_id = azurerm_role_definition.clustermanager[0].id
role_definition_id = azurerm_role_definition.clustermanager[0].role_definition_resource_id
principal_id = var.wayfinder_identity_azure_principal_id

depends_on = [
Expand All @@ -44,7 +44,7 @@ resource "azurerm_role_assignment" "clustermanager_federated" {
count = var.enable_cluster_manager && (var.from_aws || var.from_gcp) ? 1 : 0

scope = data.azurerm_subscription.primary.id
role_definition_id = azurerm_role_definition.clustermanager[0].id
role_definition_id = azurerm_role_definition.clustermanager[0].role_definition_resource_id
principal_id = azurerm_user_assigned_identity.federated_identity[0].principal_id

depends_on = [
Expand Down
4 changes: 2 additions & 2 deletions modules/cloudaccess/wf_dnszone_manager.tf
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ resource "azurerm_role_assignment" "dnszonemanager" {
count = var.enable_dns_zone_manager && var.from_azure ? 1 : 0

scope = data.azurerm_subscription.primary.id
role_definition_id = azurerm_role_definition.dnszonemanager[0].id
role_definition_id = azurerm_role_definition.dnszonemanager[0].role_definition_resource_id
principal_id = var.wayfinder_identity_azure_principal_id

depends_on = [
Expand All @@ -44,7 +44,7 @@ resource "azurerm_role_assignment" "dnszonemanager_federated" {
count = var.enable_dns_zone_manager && (var.from_aws || var.from_gcp) ? 1 : 0

scope = data.azurerm_subscription.primary.id
role_definition_id = azurerm_role_definition.dnszonemanager[0].id
role_definition_id = azurerm_role_definition.dnszonemanager[0].role_definition_resource_id
principal_id = azurerm_user_assigned_identity.federated_identity[0].principal_id

depends_on = [
Expand Down
4 changes: 2 additions & 2 deletions modules/cloudaccess/wf_network_manager.tf
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ resource "azurerm_role_assignment" "networkmanager" {
count = var.enable_network_manager && var.from_azure ? 1 : 0

scope = data.azurerm_subscription.primary.id
role_definition_id = azurerm_role_definition.networkmanager[0].id
role_definition_id = azurerm_role_definition.networkmanager[0].role_definition_resource_id
principal_id = var.wayfinder_identity_azure_principal_id

depends_on = [
Expand All @@ -44,7 +44,7 @@ resource "azurerm_role_assignment" "networkmanager_federated" {
count = var.enable_network_manager && (var.from_aws || var.from_gcp) ? 1 : 0

scope = data.azurerm_subscription.primary.id
role_definition_id = azurerm_role_definition.networkmanager[0].id
role_definition_id = azurerm_role_definition.networkmanager[0].role_definition_resource_id
principal_id = azurerm_user_assigned_identity.federated_identity[0].principal_id

depends_on = [
Expand Down
4 changes: 2 additions & 2 deletions modules/cloudaccess/wf_peering_acceptor.tf
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ resource "azurerm_role_assignment" "peeringacceptor" {
count = var.enable_peering_acceptor && var.from_azure ? 1 : 0

scope = data.azurerm_subscription.primary.id
role_definition_id = azurerm_role_definition.peeringacceptor[0].id
role_definition_id = azurerm_role_definition.peeringacceptor[0].role_definition_resource_id
principal_id = var.wayfinder_identity_azure_principal_id

depends_on = [
Expand All @@ -44,7 +44,7 @@ resource "azurerm_role_assignment" "peeringacceptor_federated" {
count = var.enable_peering_acceptor && (var.from_aws || var.from_gcp) ? 1 : 0

scope = data.azurerm_subscription.primary.id
role_definition_id = azurerm_role_definition.peeringacceptor[0].id
role_definition_id = azurerm_role_definition.peeringacceptor[0].role_definition_resource_id
principal_id = azurerm_user_assigned_identity.federated_identity[0].principal_id

depends_on = [
Expand Down
2 changes: 1 addition & 1 deletion modules/cloudaccess/wf_privatelink_manager.tf
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ resource "azurerm_role_assignment" "privatelinkmanager" {
count = var.enable_private_link_manager && var.from_azure ? 1 : 0

scope = data.azurerm_subscription.primary.id
role_definition_id = azurerm_role_definition.privatelinkmanager[0].id
role_definition_id = azurerm_role_definition.privatelinkmanager[0].role_definition_resource_id
principal_id = var.wayfinder_identity_azure_principal_id

depends_on = [
Expand Down

0 comments on commit 0b6ca1b

Please sign in to comment.