Skip to content

Commit 9691694

Browse files
authored
Merge pull request #94 from NHSDigital/cd-2
[DTOS-9339] Pipeline fixes
2 parents 5d2955a + 9213a0d commit 9691694

2 files changed

Lines changed: 1 addition & 2 deletions

File tree

.azuredevops/pipelines/deploy.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@ parameters:
99
type: object
1010
default:
1111
- dev
12-
- int
1312

1413
stages:
1514
- ${{ each env in parameters.environments }}:

infrastructure/terraform/resource_group_init/core.bicep

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ resource rbacAdminAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01
3838
properties: {
3939
roleDefinitionId: subscriptionResourceId('Microsoft.Authorization/roleDefinitions', roleID.rbacAdmin)
4040
principalId: miPrincipalId
41-
condition: '((!(ActionMatches{\'Microsoft.Authorization/roleAssignments/write\'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${roleID.kvSecretUser}} AND @Request[Microsoft.Authorization/roleAssignments:PrincipalType] ForAnyOfAnyValues:StringEqualsIgnoreCase {\'ServicePrincipal\'})) AND ((!(ActionMatches{\'Microsoft.Authorization/roleAssignments/delete\'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${roleID.kvSecretUser}} AND @Resource[Microsoft.Authorization/roleAssignments:PrincipalType] ForAnyOfAnyValues:StringEqualsIgnoreCase {\'ServicePrincipal\'}))'
41+
condition: '((!(ActionMatches{\'Microsoft.Authorization/roleAssignments/write\'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${roleID.kvSecretUser}})) AND ((!(ActionMatches{\'Microsoft.Authorization/roleAssignments/delete\'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals {${roleID.kvSecretUser}}))'
4242
conditionVersion: '2.0'
4343
description: '${miName} Role Based Access Control Administrator access to subscription. Only allows assigninging the Key Vault Secrets User role to Service Principals.'
4444
}

0 commit comments

Comments
 (0)