@@ -188,7 +188,7 @@ var deploymentName = deployment().name
188
188
// Used by the AKS agent pools to talk to the ACR
189
189
// The actual cluster's identity does not need federation
190
190
module kubeletId 'modules/userAssignedIdentity.bicep' = {
191
- name : '${deploymentName }_uai_kubelet'
191
+ // name: '${deploymentName}_uai_kubelet'
192
192
params : {
193
193
baseName : '${baseName }-kubelet'
194
194
location : location
@@ -202,7 +202,7 @@ module kubeletId 'modules/userAssignedIdentity.bicep' = {
202
202
// IMPORTANT: If you're using your own Disks, StaticIP, KubeletId, Vnet or RouteTable ...
203
203
// This user needs permissions on them
204
204
module controlPlaneId 'modules/userAssignedIdentity.bicep' = {
205
- name : '${deploymentName }_uai_controlPlaneId'
205
+ // name: '${deploymentName}_uai_controlPlaneId'
206
206
params : {
207
207
baseName : '${baseName }-aks'
208
208
location : location
@@ -212,7 +212,7 @@ module controlPlaneId 'modules/userAssignedIdentity.bicep' = {
212
212
213
213
// For the KubeletId, Managed Identity Operator
214
214
module kubelet_iam 'modules/resourceRoleAssignment.bicep' = {
215
- name : '${deploymentName }_kubelet_iam'
215
+ // name: '${deploymentName}_kubelet_iam'
216
216
params : {
217
217
principalIds : [ controlPlaneId .outputs .principalId ]
218
218
resourceId : kubeletId .outputs .id
@@ -222,7 +222,7 @@ module kubelet_iam 'modules/resourceRoleAssignment.bicep' = {
222
222
223
223
// We can't deploy the cluster until the control plane identity owns the kubelet identity
224
224
module waitForRole 'modules/deploymentScript.bicep' = {
225
- name : '${deploymentName }_wait_role'
225
+ // name: '${deploymentName}_wait_role'
226
226
params : {
227
227
name : 'waitForRoleAssignment'
228
228
location : location
@@ -262,7 +262,7 @@ module waitForRole 'modules/deploymentScript.bicep' = {
262
262
263
263
264
264
module keyVault 'modules/keyVault.bicep' = {
265
- name : '${deploymentName }_keyvault'
265
+ // name: '${deploymentName}_keyvault'
266
266
params : {
267
267
baseName : baseName
268
268
location : location
@@ -271,7 +271,7 @@ module keyVault 'modules/keyVault.bicep' = {
271
271
}
272
272
273
273
module aks 'modules/managedCluster.bicep' = {
274
- name : '${deploymentName }_aks'
274
+ // name: '${deploymentName}_aks'
275
275
dependsOn : [ waitForRole ]
276
276
params : {
277
277
baseName : baseName
@@ -301,7 +301,7 @@ module aks 'modules/managedCluster.bicep' = {
301
301
}
302
302
303
303
module fluxId 'modules/userAssignedIdentity.bicep' = {
304
- name : '${deploymentName }_uai_fluxId'
304
+ // name: '${deploymentName}_uai_fluxId'
305
305
params : {
306
306
baseName : 'flux'
307
307
location : location
@@ -323,7 +323,7 @@ param installFluxManually bool = false
323
323
324
324
// Managed Flux (obviously depends on the fluxId which depends on aks)
325
325
module flux 'modules/flux.bicep' = if (!installFluxManually ) {
326
- name : '${deploymentName }_flux'
326
+ // name: '${deploymentName}_flux'
327
327
params : {
328
328
baseName : baseName
329
329
identityClientId : fluxId .outputs .clientId
@@ -346,7 +346,7 @@ module flux 'modules/flux.bicep' = if (!installFluxManually) {
346
346
// }
347
347
348
348
module iam_admin_aks 'modules/resourceRoleAssignment.bicep' = {
349
- name : '${deploymentName }_iam_admin_aks'
349
+ // name: '${deploymentName}_iam_admin_aks'
350
350
params : {
351
351
principalIds : [ adminId ]
352
352
resourceId : aks .outputs .id
@@ -355,7 +355,7 @@ module iam_admin_aks 'modules/resourceRoleAssignment.bicep' = {
355
355
}
356
356
357
357
module iam_admin_kv_secrets 'modules/resourceRoleAssignment.bicep' = {
358
- name : '${deploymentName }_iam_admin_kv_secrets'
358
+ // name: '${deploymentName}_iam_admin_kv_secrets'
359
359
params : {
360
360
principalIds : [ adminId ]
361
361
resourceId : keyVault .outputs .id
@@ -364,7 +364,7 @@ module iam_admin_kv_secrets 'modules/resourceRoleAssignment.bicep' = {
364
364
}
365
365
366
366
module iam_admin_kv_crypto 'modules/resourceRoleAssignment.bicep' = {
367
- name : '${deploymentName }_iam_admin_kv_crypto'
367
+ // name: '${deploymentName}_iam_admin_kv_crypto'
368
368
params : {
369
369
principalIds : [ adminId ]
370
370
resourceId : keyVault .outputs .id
@@ -373,7 +373,7 @@ module iam_admin_kv_crypto 'modules/resourceRoleAssignment.bicep' = {
373
373
}
374
374
375
375
module iam_flux_crypto 'modules/resourceRoleAssignment.bicep' = {
376
- name : '${deploymentName }_iam_flux_crypto'
376
+ // name: '${deploymentName}_iam_flux_crypto'
377
377
params : {
378
378
principalIds : [ fluxId .outputs .principalId ]
379
379
resourceId : keyVault .outputs .id
0 commit comments