@@ -31,8 +31,8 @@ param enableSoftDelete bool
3131// var keyVaultName = 'kv-lungcs-${envConfig}-inf'
3232
3333// removed when generalised
34- // var appShortName = 'lungcs'
35- var appShortName = 'lungal'
34+ var appShortName = 'lungcs'
35+ // var appShortName = 'lungal'
3636
3737var devCenterSuffix = substring (uniqueString (subscription ().id ), 0 , 3 )
3838var devCenterName = 'devc-hub-${hubType }-${regionShortName }-${devCenterSuffix }'
@@ -58,6 +58,7 @@ var roleID = {
5858 networkContributor : '4d97b98b-1d4f-4787-a291-c67834d212e7'
5959 rbacAdmin : 'f58310d9-a9f6-439a-9e8d-f62e7b41a168'
6060 reader : 'acdd72a7-3385-48ef-bd42-f606fba81ae7'
61+ contributor : 'b24988ac-6180-42a0-ab88-20f7382dd24c'
6162}
6263
6364
@@ -181,6 +182,16 @@ resource CDNContributorAssignment 'Microsoft.Authorization/roleAssignments@2022-
181182 }
182183}
183184
185+ @description ('Let the managed identity configure terraform' )
186+ resource TerraformContributorAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = {
187+ name : guid (subscription ().subscriptionId , hubType , 'TerraformContributor' )
188+ properties : {
189+ roleDefinitionId : subscriptionResourceId ('Microsoft.Authorization/roleDefinitions' , roleID .contributor )
190+ principalId : managedIdentiyADOtoAZ .outputs .miPrincipalID
191+ description : '${miADOtoAZname } Terraform Contributor access to subscription'
192+ }
193+ }
194+
184195@description ('Create the managed identity assumed by Github actions to trigger Azure devops pipelines' )
185196module managedIdentiyGHtoADO 'modules/managedIdentity.bicep' = {
186197 scope : managedIdentityRG
0 commit comments