From 9730cf3e4fc2e00ee163daf73f65fac905acfdfa Mon Sep 17 00:00:00 2001 From: Elisa Anzelmo Date: Wed, 1 Jun 2022 12:03:14 +0200 Subject: [PATCH 1/6] file rename --- .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../A/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../MX/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 .../.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} | 0 99 files changed, 0 insertions(+), 0 deletions(-) rename arm/Microsoft.AAD/DomainServices/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.AnalysisServices/servers/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.ApiManagement/service/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.AppConfiguration/configurationStores/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Automation/automationAccounts/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.CognitiveServices/accounts/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Compute/availabilitySets/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Compute/diskEncryptionSets/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Compute/disks/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Compute/galleries/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Compute/galleries/images/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Compute/images/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Compute/proximityPlacementGroups/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Compute/virtualMachineScaleSets/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Compute/virtualMachines/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.ContainerRegistry/registries/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.ContainerService/managedClusters/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.DataFactory/factories/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Databricks/workspaces/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.DesktopVirtualization/applicationgroups/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.DesktopVirtualization/hostpools/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.DesktopVirtualization/scalingplans/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.DesktopVirtualization/workspaces/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.DocumentDB/databaseAccounts/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.EventGrid/systemTopics/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.EventGrid/topics/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.EventHub/namespaces/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.EventHub/namespaces/eventhubs/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.HealthBot/healthBots/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Insights/actionGroups/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Insights/activityLogAlerts/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Insights/components/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Insights/metricAlerts/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Insights/privateLinkScopes/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Insights/scheduledQueryRules/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.KeyVault/vaults/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.KeyVault/vaults/keys/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.KeyVault/vaults/secrets/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Logic/workflows/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.MachineLearningServices/workspaces/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.ManagedIdentity/userAssignedIdentities/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Management/managementGroups/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.NetApp/netAppAccounts/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.NetApp/netAppAccounts/capacityPools/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.NetApp/netAppAccounts/capacityPools/volumes/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/applicationGateways/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/applicationSecurityGroups/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/azureFirewalls/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/bastionHosts/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/ddosProtectionPlans/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/expressRouteCircuits/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/frontDoors/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/ipGroups/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/loadBalancers/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/localNetworkGateways/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/natGateways/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/networkInterfaces/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/networkSecurityGroups/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/networkWatchers/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/privateDnsZones/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/privateDnsZones/A/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/privateDnsZones/AAAA/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/privateDnsZones/CNAME/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/privateDnsZones/MX/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/privateDnsZones/PTR/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/privateDnsZones/SOA/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/privateDnsZones/SRV/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/privateDnsZones/TXT/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/privateEndpoints/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/publicIPAddresses/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/publicIPPrefixes/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/routeTables/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/trafficmanagerprofiles/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/virtualNetworkGateways/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/virtualNetworks/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/virtualNetworks/subnets/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/virtualWans/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Network/vpnSites/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.OperationalInsights/workspaces/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.RecoveryServices/vaults/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Resources/resourceGroups/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.ServiceBus/namespaces/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.ServiceBus/namespaces/queues/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.ServiceBus/namespaces/topics/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.ServiceFabric/clusters/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Sql/managedInstances/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Sql/servers/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Storage/storageAccounts/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Storage/storageAccounts/blobServices/containers/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Storage/storageAccounts/fileServices/shares/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Storage/storageAccounts/queueServices/queues/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Synapse/privateLinkHubs/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.VirtualMachineImages/imageTemplates/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Web/connections/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Web/hostingEnvironments/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Web/serverfarms/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Web/sites/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename arm/Microsoft.Web/staticSites/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) rename constructs/Microsoft.Authorization/roleAssignments-multiRolesMultiPrincipals/.bicep/{nested_rbac.bicep => nested_roleAssignments.bicep} (100%) diff --git a/arm/Microsoft.AAD/DomainServices/.bicep/nested_rbac.bicep b/arm/Microsoft.AAD/DomainServices/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.AAD/DomainServices/.bicep/nested_rbac.bicep rename to arm/Microsoft.AAD/DomainServices/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.AnalysisServices/servers/.bicep/nested_rbac.bicep b/arm/Microsoft.AnalysisServices/servers/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.AnalysisServices/servers/.bicep/nested_rbac.bicep rename to arm/Microsoft.AnalysisServices/servers/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.ApiManagement/service/.bicep/nested_rbac.bicep b/arm/Microsoft.ApiManagement/service/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.ApiManagement/service/.bicep/nested_rbac.bicep rename to arm/Microsoft.ApiManagement/service/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.AppConfiguration/configurationStores/.bicep/nested_rbac.bicep b/arm/Microsoft.AppConfiguration/configurationStores/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.AppConfiguration/configurationStores/.bicep/nested_rbac.bicep rename to arm/Microsoft.AppConfiguration/configurationStores/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Automation/automationAccounts/.bicep/nested_rbac.bicep b/arm/Microsoft.Automation/automationAccounts/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Automation/automationAccounts/.bicep/nested_rbac.bicep rename to arm/Microsoft.Automation/automationAccounts/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.CognitiveServices/accounts/.bicep/nested_rbac.bicep b/arm/Microsoft.CognitiveServices/accounts/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.CognitiveServices/accounts/.bicep/nested_rbac.bicep rename to arm/Microsoft.CognitiveServices/accounts/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Compute/availabilitySets/.bicep/nested_rbac.bicep b/arm/Microsoft.Compute/availabilitySets/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Compute/availabilitySets/.bicep/nested_rbac.bicep rename to arm/Microsoft.Compute/availabilitySets/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Compute/diskEncryptionSets/.bicep/nested_rbac.bicep b/arm/Microsoft.Compute/diskEncryptionSets/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Compute/diskEncryptionSets/.bicep/nested_rbac.bicep rename to arm/Microsoft.Compute/diskEncryptionSets/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Compute/disks/.bicep/nested_rbac.bicep b/arm/Microsoft.Compute/disks/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Compute/disks/.bicep/nested_rbac.bicep rename to arm/Microsoft.Compute/disks/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Compute/galleries/.bicep/nested_rbac.bicep b/arm/Microsoft.Compute/galleries/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Compute/galleries/.bicep/nested_rbac.bicep rename to arm/Microsoft.Compute/galleries/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Compute/galleries/images/.bicep/nested_rbac.bicep b/arm/Microsoft.Compute/galleries/images/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Compute/galleries/images/.bicep/nested_rbac.bicep rename to arm/Microsoft.Compute/galleries/images/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Compute/images/.bicep/nested_rbac.bicep b/arm/Microsoft.Compute/images/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Compute/images/.bicep/nested_rbac.bicep rename to arm/Microsoft.Compute/images/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Compute/proximityPlacementGroups/.bicep/nested_rbac.bicep b/arm/Microsoft.Compute/proximityPlacementGroups/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Compute/proximityPlacementGroups/.bicep/nested_rbac.bicep rename to arm/Microsoft.Compute/proximityPlacementGroups/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Compute/virtualMachineScaleSets/.bicep/nested_rbac.bicep b/arm/Microsoft.Compute/virtualMachineScaleSets/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Compute/virtualMachineScaleSets/.bicep/nested_rbac.bicep rename to arm/Microsoft.Compute/virtualMachineScaleSets/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Compute/virtualMachines/.bicep/nested_rbac.bicep b/arm/Microsoft.Compute/virtualMachines/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Compute/virtualMachines/.bicep/nested_rbac.bicep rename to arm/Microsoft.Compute/virtualMachines/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.ContainerRegistry/registries/.bicep/nested_rbac.bicep b/arm/Microsoft.ContainerRegistry/registries/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.ContainerRegistry/registries/.bicep/nested_rbac.bicep rename to arm/Microsoft.ContainerRegistry/registries/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.ContainerService/managedClusters/.bicep/nested_rbac.bicep b/arm/Microsoft.ContainerService/managedClusters/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.ContainerService/managedClusters/.bicep/nested_rbac.bicep rename to arm/Microsoft.ContainerService/managedClusters/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.DataFactory/factories/.bicep/nested_rbac.bicep b/arm/Microsoft.DataFactory/factories/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.DataFactory/factories/.bicep/nested_rbac.bicep rename to arm/Microsoft.DataFactory/factories/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Databricks/workspaces/.bicep/nested_rbac.bicep b/arm/Microsoft.Databricks/workspaces/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Databricks/workspaces/.bicep/nested_rbac.bicep rename to arm/Microsoft.Databricks/workspaces/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.DesktopVirtualization/applicationgroups/.bicep/nested_rbac.bicep b/arm/Microsoft.DesktopVirtualization/applicationgroups/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.DesktopVirtualization/applicationgroups/.bicep/nested_rbac.bicep rename to arm/Microsoft.DesktopVirtualization/applicationgroups/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.DesktopVirtualization/hostpools/.bicep/nested_rbac.bicep b/arm/Microsoft.DesktopVirtualization/hostpools/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.DesktopVirtualization/hostpools/.bicep/nested_rbac.bicep rename to arm/Microsoft.DesktopVirtualization/hostpools/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.DesktopVirtualization/scalingplans/.bicep/nested_rbac.bicep b/arm/Microsoft.DesktopVirtualization/scalingplans/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.DesktopVirtualization/scalingplans/.bicep/nested_rbac.bicep rename to arm/Microsoft.DesktopVirtualization/scalingplans/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.DesktopVirtualization/workspaces/.bicep/nested_rbac.bicep b/arm/Microsoft.DesktopVirtualization/workspaces/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.DesktopVirtualization/workspaces/.bicep/nested_rbac.bicep rename to arm/Microsoft.DesktopVirtualization/workspaces/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.DocumentDB/databaseAccounts/.bicep/nested_rbac.bicep b/arm/Microsoft.DocumentDB/databaseAccounts/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.DocumentDB/databaseAccounts/.bicep/nested_rbac.bicep rename to arm/Microsoft.DocumentDB/databaseAccounts/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.EventGrid/systemTopics/.bicep/nested_rbac.bicep b/arm/Microsoft.EventGrid/systemTopics/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.EventGrid/systemTopics/.bicep/nested_rbac.bicep rename to arm/Microsoft.EventGrid/systemTopics/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.EventGrid/topics/.bicep/nested_rbac.bicep b/arm/Microsoft.EventGrid/topics/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.EventGrid/topics/.bicep/nested_rbac.bicep rename to arm/Microsoft.EventGrid/topics/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.EventHub/namespaces/.bicep/nested_rbac.bicep b/arm/Microsoft.EventHub/namespaces/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.EventHub/namespaces/.bicep/nested_rbac.bicep rename to arm/Microsoft.EventHub/namespaces/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.EventHub/namespaces/eventhubs/.bicep/nested_rbac.bicep b/arm/Microsoft.EventHub/namespaces/eventhubs/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.EventHub/namespaces/eventhubs/.bicep/nested_rbac.bicep rename to arm/Microsoft.EventHub/namespaces/eventhubs/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.HealthBot/healthBots/.bicep/nested_rbac.bicep b/arm/Microsoft.HealthBot/healthBots/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.HealthBot/healthBots/.bicep/nested_rbac.bicep rename to arm/Microsoft.HealthBot/healthBots/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Insights/actionGroups/.bicep/nested_rbac.bicep b/arm/Microsoft.Insights/actionGroups/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Insights/actionGroups/.bicep/nested_rbac.bicep rename to arm/Microsoft.Insights/actionGroups/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Insights/activityLogAlerts/.bicep/nested_rbac.bicep b/arm/Microsoft.Insights/activityLogAlerts/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Insights/activityLogAlerts/.bicep/nested_rbac.bicep rename to arm/Microsoft.Insights/activityLogAlerts/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Insights/components/.bicep/nested_rbac.bicep b/arm/Microsoft.Insights/components/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Insights/components/.bicep/nested_rbac.bicep rename to arm/Microsoft.Insights/components/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Insights/metricAlerts/.bicep/nested_rbac.bicep b/arm/Microsoft.Insights/metricAlerts/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Insights/metricAlerts/.bicep/nested_rbac.bicep rename to arm/Microsoft.Insights/metricAlerts/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Insights/privateLinkScopes/.bicep/nested_rbac.bicep b/arm/Microsoft.Insights/privateLinkScopes/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Insights/privateLinkScopes/.bicep/nested_rbac.bicep rename to arm/Microsoft.Insights/privateLinkScopes/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Insights/scheduledQueryRules/.bicep/nested_rbac.bicep b/arm/Microsoft.Insights/scheduledQueryRules/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Insights/scheduledQueryRules/.bicep/nested_rbac.bicep rename to arm/Microsoft.Insights/scheduledQueryRules/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.KeyVault/vaults/.bicep/nested_rbac.bicep b/arm/Microsoft.KeyVault/vaults/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.KeyVault/vaults/.bicep/nested_rbac.bicep rename to arm/Microsoft.KeyVault/vaults/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.KeyVault/vaults/keys/.bicep/nested_rbac.bicep b/arm/Microsoft.KeyVault/vaults/keys/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.KeyVault/vaults/keys/.bicep/nested_rbac.bicep rename to arm/Microsoft.KeyVault/vaults/keys/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.KeyVault/vaults/secrets/.bicep/nested_rbac.bicep b/arm/Microsoft.KeyVault/vaults/secrets/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.KeyVault/vaults/secrets/.bicep/nested_rbac.bicep rename to arm/Microsoft.KeyVault/vaults/secrets/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Logic/workflows/.bicep/nested_rbac.bicep b/arm/Microsoft.Logic/workflows/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Logic/workflows/.bicep/nested_rbac.bicep rename to arm/Microsoft.Logic/workflows/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.MachineLearningServices/workspaces/.bicep/nested_rbac.bicep b/arm/Microsoft.MachineLearningServices/workspaces/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.MachineLearningServices/workspaces/.bicep/nested_rbac.bicep rename to arm/Microsoft.MachineLearningServices/workspaces/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.ManagedIdentity/userAssignedIdentities/.bicep/nested_rbac.bicep b/arm/Microsoft.ManagedIdentity/userAssignedIdentities/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.ManagedIdentity/userAssignedIdentities/.bicep/nested_rbac.bicep rename to arm/Microsoft.ManagedIdentity/userAssignedIdentities/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Management/managementGroups/.bicep/nested_rbac.bicep b/arm/Microsoft.Management/managementGroups/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Management/managementGroups/.bicep/nested_rbac.bicep rename to arm/Microsoft.Management/managementGroups/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.NetApp/netAppAccounts/.bicep/nested_rbac.bicep b/arm/Microsoft.NetApp/netAppAccounts/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.NetApp/netAppAccounts/.bicep/nested_rbac.bicep rename to arm/Microsoft.NetApp/netAppAccounts/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.NetApp/netAppAccounts/capacityPools/.bicep/nested_rbac.bicep b/arm/Microsoft.NetApp/netAppAccounts/capacityPools/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.NetApp/netAppAccounts/capacityPools/.bicep/nested_rbac.bicep rename to arm/Microsoft.NetApp/netAppAccounts/capacityPools/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.NetApp/netAppAccounts/capacityPools/volumes/.bicep/nested_rbac.bicep b/arm/Microsoft.NetApp/netAppAccounts/capacityPools/volumes/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.NetApp/netAppAccounts/capacityPools/volumes/.bicep/nested_rbac.bicep rename to arm/Microsoft.NetApp/netAppAccounts/capacityPools/volumes/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/applicationGateways/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/applicationGateways/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/applicationGateways/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/applicationGateways/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/applicationSecurityGroups/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/applicationSecurityGroups/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/applicationSecurityGroups/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/applicationSecurityGroups/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/azureFirewalls/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/azureFirewalls/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/azureFirewalls/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/azureFirewalls/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/bastionHosts/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/bastionHosts/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/bastionHosts/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/bastionHosts/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/ddosProtectionPlans/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/ddosProtectionPlans/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/ddosProtectionPlans/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/ddosProtectionPlans/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/expressRouteCircuits/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/expressRouteCircuits/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/expressRouteCircuits/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/expressRouteCircuits/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/frontDoors/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/frontDoors/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/frontDoors/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/frontDoors/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/ipGroups/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/ipGroups/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/ipGroups/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/ipGroups/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/loadBalancers/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/loadBalancers/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/loadBalancers/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/loadBalancers/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/localNetworkGateways/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/localNetworkGateways/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/localNetworkGateways/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/localNetworkGateways/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/natGateways/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/natGateways/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/natGateways/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/natGateways/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/networkInterfaces/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/networkInterfaces/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/networkInterfaces/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/networkInterfaces/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/networkSecurityGroups/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/networkSecurityGroups/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/networkSecurityGroups/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/networkSecurityGroups/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/networkWatchers/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/networkWatchers/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/networkWatchers/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/networkWatchers/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/privateDnsZones/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/privateDnsZones/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/privateDnsZones/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/privateDnsZones/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/privateDnsZones/A/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/privateDnsZones/A/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/privateDnsZones/A/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/privateDnsZones/A/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/privateDnsZones/AAAA/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/privateDnsZones/AAAA/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/privateDnsZones/AAAA/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/privateDnsZones/AAAA/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/privateDnsZones/CNAME/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/privateDnsZones/CNAME/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/privateDnsZones/CNAME/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/privateDnsZones/CNAME/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/privateDnsZones/MX/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/privateDnsZones/MX/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/privateDnsZones/MX/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/privateDnsZones/MX/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/privateDnsZones/PTR/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/privateDnsZones/PTR/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/privateDnsZones/PTR/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/privateDnsZones/PTR/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/privateDnsZones/SOA/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/privateDnsZones/SOA/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/privateDnsZones/SOA/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/privateDnsZones/SOA/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/privateDnsZones/SRV/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/privateDnsZones/SRV/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/privateDnsZones/SRV/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/privateDnsZones/SRV/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/privateDnsZones/TXT/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/privateDnsZones/TXT/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/privateDnsZones/TXT/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/privateDnsZones/TXT/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/privateEndpoints/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/privateEndpoints/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/privateEndpoints/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/privateEndpoints/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/publicIPAddresses/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/publicIPAddresses/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/publicIPAddresses/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/publicIPAddresses/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/publicIPPrefixes/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/publicIPPrefixes/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/publicIPPrefixes/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/publicIPPrefixes/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/routeTables/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/routeTables/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/routeTables/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/routeTables/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/trafficmanagerprofiles/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/trafficmanagerprofiles/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/trafficmanagerprofiles/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/trafficmanagerprofiles/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/virtualNetworkGateways/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/virtualNetworkGateways/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/virtualNetworkGateways/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/virtualNetworkGateways/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/virtualNetworks/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/virtualNetworks/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/virtualNetworks/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/virtualNetworks/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/virtualNetworks/subnets/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/virtualNetworks/subnets/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/virtualNetworks/subnets/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/virtualNetworks/subnets/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/virtualWans/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/virtualWans/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/virtualWans/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/virtualWans/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Network/vpnSites/.bicep/nested_rbac.bicep b/arm/Microsoft.Network/vpnSites/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Network/vpnSites/.bicep/nested_rbac.bicep rename to arm/Microsoft.Network/vpnSites/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.OperationalInsights/workspaces/.bicep/nested_rbac.bicep b/arm/Microsoft.OperationalInsights/workspaces/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.OperationalInsights/workspaces/.bicep/nested_rbac.bicep rename to arm/Microsoft.OperationalInsights/workspaces/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.RecoveryServices/vaults/.bicep/nested_rbac.bicep b/arm/Microsoft.RecoveryServices/vaults/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.RecoveryServices/vaults/.bicep/nested_rbac.bicep rename to arm/Microsoft.RecoveryServices/vaults/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Resources/resourceGroups/.bicep/nested_rbac.bicep b/arm/Microsoft.Resources/resourceGroups/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Resources/resourceGroups/.bicep/nested_rbac.bicep rename to arm/Microsoft.Resources/resourceGroups/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.ServiceBus/namespaces/.bicep/nested_rbac.bicep b/arm/Microsoft.ServiceBus/namespaces/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.ServiceBus/namespaces/.bicep/nested_rbac.bicep rename to arm/Microsoft.ServiceBus/namespaces/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.ServiceBus/namespaces/queues/.bicep/nested_rbac.bicep b/arm/Microsoft.ServiceBus/namespaces/queues/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.ServiceBus/namespaces/queues/.bicep/nested_rbac.bicep rename to arm/Microsoft.ServiceBus/namespaces/queues/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.ServiceBus/namespaces/topics/.bicep/nested_rbac.bicep b/arm/Microsoft.ServiceBus/namespaces/topics/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.ServiceBus/namespaces/topics/.bicep/nested_rbac.bicep rename to arm/Microsoft.ServiceBus/namespaces/topics/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.ServiceFabric/clusters/.bicep/nested_rbac.bicep b/arm/Microsoft.ServiceFabric/clusters/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.ServiceFabric/clusters/.bicep/nested_rbac.bicep rename to arm/Microsoft.ServiceFabric/clusters/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Sql/managedInstances/.bicep/nested_rbac.bicep b/arm/Microsoft.Sql/managedInstances/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Sql/managedInstances/.bicep/nested_rbac.bicep rename to arm/Microsoft.Sql/managedInstances/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Sql/servers/.bicep/nested_rbac.bicep b/arm/Microsoft.Sql/servers/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Sql/servers/.bicep/nested_rbac.bicep rename to arm/Microsoft.Sql/servers/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Storage/storageAccounts/.bicep/nested_rbac.bicep b/arm/Microsoft.Storage/storageAccounts/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Storage/storageAccounts/.bicep/nested_rbac.bicep rename to arm/Microsoft.Storage/storageAccounts/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Storage/storageAccounts/blobServices/containers/.bicep/nested_rbac.bicep b/arm/Microsoft.Storage/storageAccounts/blobServices/containers/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Storage/storageAccounts/blobServices/containers/.bicep/nested_rbac.bicep rename to arm/Microsoft.Storage/storageAccounts/blobServices/containers/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Storage/storageAccounts/fileServices/shares/.bicep/nested_rbac.bicep b/arm/Microsoft.Storage/storageAccounts/fileServices/shares/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Storage/storageAccounts/fileServices/shares/.bicep/nested_rbac.bicep rename to arm/Microsoft.Storage/storageAccounts/fileServices/shares/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Storage/storageAccounts/queueServices/queues/.bicep/nested_rbac.bicep b/arm/Microsoft.Storage/storageAccounts/queueServices/queues/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Storage/storageAccounts/queueServices/queues/.bicep/nested_rbac.bicep rename to arm/Microsoft.Storage/storageAccounts/queueServices/queues/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Synapse/privateLinkHubs/.bicep/nested_rbac.bicep b/arm/Microsoft.Synapse/privateLinkHubs/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Synapse/privateLinkHubs/.bicep/nested_rbac.bicep rename to arm/Microsoft.Synapse/privateLinkHubs/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.VirtualMachineImages/imageTemplates/.bicep/nested_rbac.bicep b/arm/Microsoft.VirtualMachineImages/imageTemplates/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.VirtualMachineImages/imageTemplates/.bicep/nested_rbac.bicep rename to arm/Microsoft.VirtualMachineImages/imageTemplates/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Web/connections/.bicep/nested_rbac.bicep b/arm/Microsoft.Web/connections/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Web/connections/.bicep/nested_rbac.bicep rename to arm/Microsoft.Web/connections/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Web/hostingEnvironments/.bicep/nested_rbac.bicep b/arm/Microsoft.Web/hostingEnvironments/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Web/hostingEnvironments/.bicep/nested_rbac.bicep rename to arm/Microsoft.Web/hostingEnvironments/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Web/serverfarms/.bicep/nested_rbac.bicep b/arm/Microsoft.Web/serverfarms/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Web/serverfarms/.bicep/nested_rbac.bicep rename to arm/Microsoft.Web/serverfarms/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Web/sites/.bicep/nested_rbac.bicep b/arm/Microsoft.Web/sites/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Web/sites/.bicep/nested_rbac.bicep rename to arm/Microsoft.Web/sites/.bicep/nested_roleAssignments.bicep diff --git a/arm/Microsoft.Web/staticSites/.bicep/nested_rbac.bicep b/arm/Microsoft.Web/staticSites/.bicep/nested_roleAssignments.bicep similarity index 100% rename from arm/Microsoft.Web/staticSites/.bicep/nested_rbac.bicep rename to arm/Microsoft.Web/staticSites/.bicep/nested_roleAssignments.bicep diff --git a/constructs/Microsoft.Authorization/roleAssignments-multiRolesMultiPrincipals/.bicep/nested_rbac.bicep b/constructs/Microsoft.Authorization/roleAssignments-multiRolesMultiPrincipals/.bicep/nested_roleAssignments.bicep similarity index 100% rename from constructs/Microsoft.Authorization/roleAssignments-multiRolesMultiPrincipals/.bicep/nested_rbac.bicep rename to constructs/Microsoft.Authorization/roleAssignments-multiRolesMultiPrincipals/.bicep/nested_roleAssignments.bicep From 6e5e52daf1f108071f5eb7f992557c4d9bf1a32c Mon Sep 17 00:00:00 2001 From: Elisa Anzelmo Date: Wed, 1 Jun 2022 12:09:33 +0200 Subject: [PATCH 2/6] reference to files updated --- arm/Microsoft.AAD/DomainServices/deploy.bicep | 2 +- arm/Microsoft.AnalysisServices/servers/deploy.bicep | 2 +- arm/Microsoft.ApiManagement/service/deploy.bicep | 2 +- .../configurationStores/deploy.bicep | 2 +- .../automationAccounts/deploy.bicep | 2 +- arm/Microsoft.CognitiveServices/accounts/deploy.bicep | 2 +- arm/Microsoft.Compute/availabilitySets/deploy.bicep | 2 +- arm/Microsoft.Compute/diskEncryptionSets/deploy.bicep | 2 +- arm/Microsoft.Compute/disks/deploy.bicep | 2 +- arm/Microsoft.Compute/galleries/deploy.bicep | 2 +- arm/Microsoft.Compute/galleries/images/deploy.bicep | 2 +- arm/Microsoft.Compute/images/deploy.bicep | 2 +- .../proximityPlacementGroups/deploy.bicep | 2 +- .../virtualMachineScaleSets/deploy.bicep | 2 +- arm/Microsoft.Compute/virtualMachines/deploy.bicep | 2 +- .../registries/deploy.bicep | 2 +- .../managedClusters/deploy.bicep | 2 +- arm/Microsoft.DataFactory/factories/deploy.bicep | 2 +- arm/Microsoft.Databricks/workspaces/deploy.bicep | 2 +- .../applicationgroups/deploy.bicep | 2 +- .../hostpools/deploy.bicep | 2 +- .../scalingplans/deploy.bicep | 2 +- .../workspaces/deploy.bicep | 2 +- arm/Microsoft.DocumentDB/databaseAccounts/deploy.bicep | 2 +- arm/Microsoft.EventGrid/systemTopics/deploy.bicep | 2 +- arm/Microsoft.EventGrid/topics/deploy.bicep | 2 +- arm/Microsoft.EventHub/namespaces/deploy.bicep | 2 +- .../namespaces/eventhubs/deploy.bicep | 2 +- arm/Microsoft.HealthBot/healthBots/deploy.bicep | 2 +- arm/Microsoft.Insights/actionGroups/deploy.bicep | 2 +- arm/Microsoft.Insights/activityLogAlerts/deploy.bicep | 2 +- arm/Microsoft.Insights/components/deploy.bicep | 2 +- arm/Microsoft.Insights/metricAlerts/deploy.bicep | 2 +- arm/Microsoft.Insights/privateLinkScopes/deploy.bicep | 2 +- .../scheduledQueryRules/deploy.bicep | 2 +- arm/Microsoft.KeyVault/vaults/deploy.bicep | 2 +- arm/Microsoft.KeyVault/vaults/keys/deploy.bicep | 2 +- arm/Microsoft.KeyVault/vaults/secrets/deploy.bicep | 2 +- arm/Microsoft.Logic/workflows/deploy.bicep | 2 +- .../workspaces/deploy.bicep | 2 +- .../userAssignedIdentities/deploy.bicep | 2 +- arm/Microsoft.Management/managementGroups/deploy.bicep | 2 +- .../netAppAccounts/capacityPools/deploy.bicep | 2 +- .../netAppAccounts/capacityPools/volumes/deploy.bicep | 2 +- arm/Microsoft.NetApp/netAppAccounts/deploy.bicep | 2 +- arm/Microsoft.Network/applicationGateways/deploy.bicep | 2 +- .../applicationSecurityGroups/deploy.bicep | 2 +- arm/Microsoft.Network/azureFirewalls/deploy.bicep | 2 +- arm/Microsoft.Network/bastionHosts/deploy.bicep | 2 +- arm/Microsoft.Network/ddosProtectionPlans/deploy.bicep | 2 +- .../expressRouteCircuits/deploy.bicep | 2 +- arm/Microsoft.Network/frontDoors/deploy.bicep | 2 +- arm/Microsoft.Network/ipGroups/deploy.bicep | 2 +- arm/Microsoft.Network/loadBalancers/deploy.bicep | 2 +- .../localNetworkGateways/deploy.bicep | 2 +- arm/Microsoft.Network/natGateways/deploy.bicep | 2 +- arm/Microsoft.Network/networkInterfaces/deploy.bicep | 2 +- .../networkSecurityGroups/deploy.bicep | 2 +- arm/Microsoft.Network/networkWatchers/deploy.bicep | 2 +- arm/Microsoft.Network/privateDnsZones/A/deploy.bicep | 2 +- .../privateDnsZones/AAAA/deploy.bicep | 2 +- .../privateDnsZones/CNAME/deploy.bicep | 2 +- arm/Microsoft.Network/privateDnsZones/MX/deploy.bicep | 2 +- arm/Microsoft.Network/privateDnsZones/PTR/deploy.bicep | 2 +- arm/Microsoft.Network/privateDnsZones/SOA/deploy.bicep | 2 +- arm/Microsoft.Network/privateDnsZones/SRV/deploy.bicep | 2 +- arm/Microsoft.Network/privateDnsZones/TXT/deploy.bicep | 2 +- arm/Microsoft.Network/privateDnsZones/deploy.bicep | 2 +- arm/Microsoft.Network/privateEndpoints/deploy.bicep | 2 +- arm/Microsoft.Network/publicIPAddresses/deploy.bicep | 2 +- arm/Microsoft.Network/publicIPPrefixes/deploy.bicep | 2 +- arm/Microsoft.Network/routeTables/deploy.bicep | 2 +- .../trafficmanagerprofiles/deploy.bicep | 2 +- .../virtualNetworkGateways/deploy.bicep | 2 +- arm/Microsoft.Network/virtualNetworks/deploy.bicep | 2 +- .../virtualNetworks/subnets/deploy.bicep | 2 +- arm/Microsoft.Network/virtualWans/deploy.bicep | 2 +- arm/Microsoft.Network/vpnSites/deploy.bicep | 2 +- .../workspaces/deploy.bicep | 2 +- arm/Microsoft.RecoveryServices/vaults/deploy.bicep | 2 +- arm/Microsoft.Resources/resourceGroups/deploy.bicep | 2 +- arm/Microsoft.ServiceBus/namespaces/deploy.bicep | 2 +- .../namespaces/queues/deploy.bicep | 2 +- .../namespaces/topics/deploy.bicep | 2 +- arm/Microsoft.ServiceFabric/clusters/deploy.bicep | 2 +- arm/Microsoft.Sql/managedInstances/deploy.bicep | 2 +- arm/Microsoft.Sql/servers/deploy.bicep | 2 +- .../blobServices/containers/deploy.bicep | 2 +- arm/Microsoft.Storage/storageAccounts/deploy.bicep | 2 +- .../storageAccounts/fileServices/shares/deploy.bicep | 2 +- .../storageAccounts/queueServices/queues/deploy.bicep | 2 +- arm/Microsoft.Synapse/privateLinkHubs/deploy.bicep | 2 +- .../imageTemplates/deploy.bicep | 2 +- arm/Microsoft.Web/connections/deploy.bicep | 2 +- arm/Microsoft.Web/hostingEnvironments/deploy.bicep | 2 +- arm/Microsoft.Web/serverfarms/deploy.bicep | 2 +- arm/Microsoft.Web/sites/deploy.bicep | 2 +- arm/Microsoft.Web/staticSites/deploy.bicep | 2 +- .../deploy.bicep | 8 ++++---- docs/wiki/The library - Module design.md | 10 +++++----- .../pipelines/resourcePublish/Get-ModulesToPublish.ps1 | 2 +- utilities/tools/Get-LinkedModuleList.ps1 | 2 +- 102 files changed, 109 insertions(+), 109 deletions(-) diff --git a/arm/Microsoft.AAD/DomainServices/deploy.bicep b/arm/Microsoft.AAD/DomainServices/deploy.bicep index b8b482446d..1a42139144 100644 --- a/arm/Microsoft.AAD/DomainServices/deploy.bicep +++ b/arm/Microsoft.AAD/DomainServices/deploy.bicep @@ -240,7 +240,7 @@ resource domainService_lock 'Microsoft.Authorization/locks@2017-04-01' = if (loc scope: domainService } -module domainService_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module domainService_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-VNet-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.AnalysisServices/servers/deploy.bicep b/arm/Microsoft.AnalysisServices/servers/deploy.bicep index 728a95e5c7..f549bfb65b 100644 --- a/arm/Microsoft.AnalysisServices/servers/deploy.bicep +++ b/arm/Microsoft.AnalysisServices/servers/deploy.bicep @@ -143,7 +143,7 @@ resource server_diagnosticSettings 'Microsoft.Insights/diagnosticsettings@2021-0 scope: server } -module server_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module server_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-AnServicesServer-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.ApiManagement/service/deploy.bicep b/arm/Microsoft.ApiManagement/service/deploy.bicep index 29dc9381fd..2cf2514c6f 100644 --- a/arm/Microsoft.ApiManagement/service/deploy.bicep +++ b/arm/Microsoft.ApiManagement/service/deploy.bicep @@ -441,7 +441,7 @@ resource apiManagementService_diagnosticSettings 'Microsoft.Insights/diagnosticS scope: apiManagementService } -module apiManagementService_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module apiManagementService_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-Apim-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.AppConfiguration/configurationStores/deploy.bicep b/arm/Microsoft.AppConfiguration/configurationStores/deploy.bicep index 7e48dd6af2..b6ed8acd15 100644 --- a/arm/Microsoft.AppConfiguration/configurationStores/deploy.bicep +++ b/arm/Microsoft.AppConfiguration/configurationStores/deploy.bicep @@ -177,7 +177,7 @@ resource appConfiguration_diagnosticSettings 'Microsoft.Insights/diagnosticsetti scope: appConfiguration } -module appConfiguration_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module appConfiguration_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-AppConfig-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Automation/automationAccounts/deploy.bicep b/arm/Microsoft.Automation/automationAccounts/deploy.bicep index b076c71097..4da6768ac7 100644 --- a/arm/Microsoft.Automation/automationAccounts/deploy.bicep +++ b/arm/Microsoft.Automation/automationAccounts/deploy.bicep @@ -372,7 +372,7 @@ module automationAccount_privateEndpoints '../../Microsoft.Network/privateEndpoi } }] -module automationAccount_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module automationAccount_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-AutoAccount-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.CognitiveServices/accounts/deploy.bicep b/arm/Microsoft.CognitiveServices/accounts/deploy.bicep index abe3a86d52..bd452db8c5 100644 --- a/arm/Microsoft.CognitiveServices/accounts/deploy.bicep +++ b/arm/Microsoft.CognitiveServices/accounts/deploy.bicep @@ -264,7 +264,7 @@ module cognitiveServices_privateEndpoints '../../Microsoft.Network/privateEndpoi } }] -module cognitiveServices_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module cognitiveServices_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-CognitiveServices-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Compute/availabilitySets/deploy.bicep b/arm/Microsoft.Compute/availabilitySets/deploy.bicep index 416f8573fe..a51daba79d 100644 --- a/arm/Microsoft.Compute/availabilitySets/deploy.bicep +++ b/arm/Microsoft.Compute/availabilitySets/deploy.bicep @@ -73,7 +73,7 @@ resource availabilitySet_lock 'Microsoft.Authorization/locks@2017-04-01' = if (l scope: availabilitySet } -module availabilitySet_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module availabilitySet_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-AvSet-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Compute/diskEncryptionSets/deploy.bicep b/arm/Microsoft.Compute/diskEncryptionSets/deploy.bicep index 450cc072f2..5751f949a7 100644 --- a/arm/Microsoft.Compute/diskEncryptionSets/deploy.bicep +++ b/arm/Microsoft.Compute/diskEncryptionSets/deploy.bicep @@ -84,7 +84,7 @@ module keyVaultAccessPolicies '.bicep/nested_kvAccessPolicy.bicep' = { scope: resourceGroup(split(keyVaultId, '/')[2], split(keyVaultId, '/')[4]) } -module diskEncryptionSet_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module diskEncryptionSet_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-DiskEncrSet-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Compute/disks/deploy.bicep b/arm/Microsoft.Compute/disks/deploy.bicep index 98a1afaaf1..b64584c9c2 100644 --- a/arm/Microsoft.Compute/disks/deploy.bicep +++ b/arm/Microsoft.Compute/disks/deploy.bicep @@ -176,7 +176,7 @@ resource disk_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lock != 'Not scope: disk } -module disk_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module disk_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-AvSet-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Compute/galleries/deploy.bicep b/arm/Microsoft.Compute/galleries/deploy.bicep index 4a421a8f2b..550ce9226e 100644 --- a/arm/Microsoft.Compute/galleries/deploy.bicep +++ b/arm/Microsoft.Compute/galleries/deploy.bicep @@ -61,7 +61,7 @@ resource gallery_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lock != ' scope: gallery } -module gallery_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module gallery_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-Gallery-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Compute/galleries/images/deploy.bicep b/arm/Microsoft.Compute/galleries/images/deploy.bicep index beab97c68f..b25780dd5e 100644 --- a/arm/Microsoft.Compute/galleries/images/deploy.bicep +++ b/arm/Microsoft.Compute/galleries/images/deploy.bicep @@ -150,7 +150,7 @@ resource image 'Microsoft.Compute/galleries/images@2020-09-30' = { } } -module galleryImage_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module galleryImage_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${deployment().name}-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Compute/images/deploy.bicep b/arm/Microsoft.Compute/images/deploy.bicep index bfb2bfaee5..dc01ff1312 100644 --- a/arm/Microsoft.Compute/images/deploy.bicep +++ b/arm/Microsoft.Compute/images/deploy.bicep @@ -62,7 +62,7 @@ resource image 'Microsoft.Compute/images@2021-04-01' = { } } -module image_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module image_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-Image-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Compute/proximityPlacementGroups/deploy.bicep b/arm/Microsoft.Compute/proximityPlacementGroups/deploy.bicep index 90f06cff8f..1e58f51542 100644 --- a/arm/Microsoft.Compute/proximityPlacementGroups/deploy.bicep +++ b/arm/Microsoft.Compute/proximityPlacementGroups/deploy.bicep @@ -58,7 +58,7 @@ resource proximityPlacementGroup_lock 'Microsoft.Authorization/locks@2017-04-01' scope: proximityPlacementGroup } -module proximityPlacementGroup_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module proximityPlacementGroup_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-ProxPlaceGroup-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Compute/virtualMachineScaleSets/deploy.bicep b/arm/Microsoft.Compute/virtualMachineScaleSets/deploy.bicep index 3546ea8c18..ffade1e1f8 100644 --- a/arm/Microsoft.Compute/virtualMachineScaleSets/deploy.bicep +++ b/arm/Microsoft.Compute/virtualMachineScaleSets/deploy.bicep @@ -647,7 +647,7 @@ resource vmss_diagnosticSettings 'Microsoft.Insights/diagnosticSettings@2021-05- scope: vmss } -module vmss_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module vmss_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-VMSS-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Compute/virtualMachines/deploy.bicep b/arm/Microsoft.Compute/virtualMachines/deploy.bicep index 4f5851acb2..41c5b47e98 100644 --- a/arm/Microsoft.Compute/virtualMachines/deploy.bicep +++ b/arm/Microsoft.Compute/virtualMachines/deploy.bicep @@ -647,7 +647,7 @@ resource virtualMachine_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lo scope: virtualMachine } -module virtualMachine_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module virtualMachine_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-VM-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.ContainerRegistry/registries/deploy.bicep b/arm/Microsoft.ContainerRegistry/registries/deploy.bicep index f3da157b87..db4ec873b3 100644 --- a/arm/Microsoft.ContainerRegistry/registries/deploy.bicep +++ b/arm/Microsoft.ContainerRegistry/registries/deploy.bicep @@ -271,7 +271,7 @@ resource registry_diagnosticSettingName 'Microsoft.Insights/diagnosticsettings@2 scope: registry } -module registry_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module registry_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-ContainerRegistry-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.ContainerService/managedClusters/deploy.bicep b/arm/Microsoft.ContainerService/managedClusters/deploy.bicep index a7a2e2476e..34ff434faa 100644 --- a/arm/Microsoft.ContainerService/managedClusters/deploy.bicep +++ b/arm/Microsoft.ContainerService/managedClusters/deploy.bicep @@ -555,7 +555,7 @@ resource managedCluster_diagnosticSettings 'Microsoft.Insights/diagnosticsetting scope: managedCluster } -module managedCluster_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module managedCluster_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-ManagedCluster-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.DataFactory/factories/deploy.bicep b/arm/Microsoft.DataFactory/factories/deploy.bicep index 15043a78ca..0b5f121c18 100644 --- a/arm/Microsoft.DataFactory/factories/deploy.bicep +++ b/arm/Microsoft.DataFactory/factories/deploy.bicep @@ -206,7 +206,7 @@ resource dataFactory_diagnosticSettings 'Microsoft.Insights/diagnosticsettings@2 scope: dataFactory } -module dataFactory_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module dataFactory_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-DataFactory-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Databricks/workspaces/deploy.bicep b/arm/Microsoft.Databricks/workspaces/deploy.bicep index 6a9addb035..6c68092f98 100644 --- a/arm/Microsoft.Databricks/workspaces/deploy.bicep +++ b/arm/Microsoft.Databricks/workspaces/deploy.bicep @@ -140,7 +140,7 @@ resource workspace_diagnosticSettings 'Microsoft.Insights/diagnosticsettings@202 scope: workspace } -module workspace_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module workspace_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-DataBricks-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.DesktopVirtualization/applicationgroups/deploy.bicep b/arm/Microsoft.DesktopVirtualization/applicationgroups/deploy.bicep index c9db7baa9c..75e6235f23 100644 --- a/arm/Microsoft.DesktopVirtualization/applicationgroups/deploy.bicep +++ b/arm/Microsoft.DesktopVirtualization/applicationgroups/deploy.bicep @@ -150,7 +150,7 @@ module appGroup_applications 'applications/deploy.bicep' = [for (application, in } }] -module appGroup_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module appGroup_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-AppGroup-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.DesktopVirtualization/hostpools/deploy.bicep b/arm/Microsoft.DesktopVirtualization/hostpools/deploy.bicep index fcfcc58e46..6ecf52e75b 100644 --- a/arm/Microsoft.DesktopVirtualization/hostpools/deploy.bicep +++ b/arm/Microsoft.DesktopVirtualization/hostpools/deploy.bicep @@ -186,7 +186,7 @@ resource hostPool_diagnosticSettings 'Microsoft.Insights/diagnosticsettings@2021 scope: hostPool } -module hostPool_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module hostPool_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-HostPool-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.DesktopVirtualization/scalingplans/deploy.bicep b/arm/Microsoft.DesktopVirtualization/scalingplans/deploy.bicep index ff6481d64d..e3cd280024 100644 --- a/arm/Microsoft.DesktopVirtualization/scalingplans/deploy.bicep +++ b/arm/Microsoft.DesktopVirtualization/scalingplans/deploy.bicep @@ -135,7 +135,7 @@ resource scalingplan_diagnosticSettings 'Microsoft.Insights/diagnosticsettings@2 scope: scalingPlan } -module scalingplan_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module scalingplan_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-Workspace-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.DesktopVirtualization/workspaces/deploy.bicep b/arm/Microsoft.DesktopVirtualization/workspaces/deploy.bicep index 1c5be804e2..c214c99cf7 100644 --- a/arm/Microsoft.DesktopVirtualization/workspaces/deploy.bicep +++ b/arm/Microsoft.DesktopVirtualization/workspaces/deploy.bicep @@ -117,7 +117,7 @@ resource workspace_diagnosticSettings 'Microsoft.Insights/diagnosticsettings@202 scope: workspace } -module workspace_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module workspace_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-Workspace-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.DocumentDB/databaseAccounts/deploy.bicep b/arm/Microsoft.DocumentDB/databaseAccounts/deploy.bicep index d4040cb764..31d4d3962c 100644 --- a/arm/Microsoft.DocumentDB/databaseAccounts/deploy.bicep +++ b/arm/Microsoft.DocumentDB/databaseAccounts/deploy.bicep @@ -240,7 +240,7 @@ resource databaseAccount_diagnosticSettings 'Microsoft.Insights/diagnosticsettin scope: databaseAccount } -module databaseAccount_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module databaseAccount_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.EventGrid/systemTopics/deploy.bicep b/arm/Microsoft.EventGrid/systemTopics/deploy.bicep index 61585c61eb..037a750d46 100644 --- a/arm/Microsoft.EventGrid/systemTopics/deploy.bicep +++ b/arm/Microsoft.EventGrid/systemTopics/deploy.bicep @@ -140,7 +140,7 @@ resource systemTopic_diagnosticSettings 'Microsoft.Insights/diagnosticsettings@2 scope: systemTopic } -module systemTopic_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module systemTopic_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-EventGrid-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.EventGrid/topics/deploy.bicep b/arm/Microsoft.EventGrid/topics/deploy.bicep index 67ebee0e73..65e004b559 100644 --- a/arm/Microsoft.EventGrid/topics/deploy.bicep +++ b/arm/Microsoft.EventGrid/topics/deploy.bicep @@ -151,7 +151,7 @@ module topic_privateEndpoints '../../Microsoft.Network/privateEndpoints/deploy.b } }] -module topic_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module topic_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-topic-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.EventHub/namespaces/deploy.bicep b/arm/Microsoft.EventHub/namespaces/deploy.bicep index b73b846109..7b73643df2 100644 --- a/arm/Microsoft.EventHub/namespaces/deploy.bicep +++ b/arm/Microsoft.EventHub/namespaces/deploy.bicep @@ -297,7 +297,7 @@ module eventHubNamespace_privateEndpoints '../../Microsoft.Network/privateEndpoi } }] -module eventHubNamespace_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module eventHubNamespace_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-EvhbNamespace-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.EventHub/namespaces/eventhubs/deploy.bicep b/arm/Microsoft.EventHub/namespaces/eventhubs/deploy.bicep index 1fd8958db7..aaa586efd1 100644 --- a/arm/Microsoft.EventHub/namespaces/eventhubs/deploy.bicep +++ b/arm/Microsoft.EventHub/namespaces/eventhubs/deploy.bicep @@ -177,7 +177,7 @@ module eventHub_authorizationRules 'authorizationRules/deploy.bicep' = [for (aut } }] -module eventHub_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module eventHub_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${deployment().name}-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.HealthBot/healthBots/deploy.bicep b/arm/Microsoft.HealthBot/healthBots/deploy.bicep index d2fa21acc8..7290dbcbff 100644 --- a/arm/Microsoft.HealthBot/healthBots/deploy.bicep +++ b/arm/Microsoft.HealthBot/healthBots/deploy.bicep @@ -55,7 +55,7 @@ resource azureHealthBot_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lo scope: azureHealthBot } -module healthBot_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module healthBot_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-HealthBot-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Insights/actionGroups/deploy.bicep b/arm/Microsoft.Insights/actionGroups/deploy.bicep index ff7a611104..8f369c1ff4 100644 --- a/arm/Microsoft.Insights/actionGroups/deploy.bicep +++ b/arm/Microsoft.Insights/actionGroups/deploy.bicep @@ -81,7 +81,7 @@ resource actionGroup 'microsoft.insights/actionGroups@2019-06-01' = { } } -module actionGroup_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module actionGroup_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-ActionGroup-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Insights/activityLogAlerts/deploy.bicep b/arm/Microsoft.Insights/activityLogAlerts/deploy.bicep index b37cdfa502..4453cb6395 100644 --- a/arm/Microsoft.Insights/activityLogAlerts/deploy.bicep +++ b/arm/Microsoft.Insights/activityLogAlerts/deploy.bicep @@ -64,7 +64,7 @@ resource activityLogAlert 'Microsoft.Insights/activityLogAlerts@2020-10-01' = { } } -module activityLogAlert_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module activityLogAlert_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-ActivityLogAlert-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Insights/components/deploy.bicep b/arm/Microsoft.Insights/components/deploy.bicep index 2b1451f710..df25c2a77a 100644 --- a/arm/Microsoft.Insights/components/deploy.bicep +++ b/arm/Microsoft.Insights/components/deploy.bicep @@ -86,7 +86,7 @@ resource appInsights 'Microsoft.Insights/components@2020-02-02' = { } } -module appInsights_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module appInsights_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-AppInsights-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Insights/metricAlerts/deploy.bicep b/arm/Microsoft.Insights/metricAlerts/deploy.bicep index bb6d50b327..2fbc4fdc0d 100644 --- a/arm/Microsoft.Insights/metricAlerts/deploy.bicep +++ b/arm/Microsoft.Insights/metricAlerts/deploy.bicep @@ -119,7 +119,7 @@ resource metricAlert 'Microsoft.Insights/metricAlerts@2018-03-01' = { } } -module metricAlert_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module metricAlert_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-MetricAlert-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Insights/privateLinkScopes/deploy.bicep b/arm/Microsoft.Insights/privateLinkScopes/deploy.bicep index 256e05565d..e7e6e49641 100644 --- a/arm/Microsoft.Insights/privateLinkScopes/deploy.bicep +++ b/arm/Microsoft.Insights/privateLinkScopes/deploy.bicep @@ -88,7 +88,7 @@ module privateLinkScope_privateEndpoints '../../Microsoft.Network/privateEndpoin } }] -module privateLinkScope_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module privateLinkScope_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-PvtLinkScope-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Insights/scheduledQueryRules/deploy.bicep b/arm/Microsoft.Insights/scheduledQueryRules/deploy.bicep index 56c1f8bad0..d59d88817a 100644 --- a/arm/Microsoft.Insights/scheduledQueryRules/deploy.bicep +++ b/arm/Microsoft.Insights/scheduledQueryRules/deploy.bicep @@ -105,7 +105,7 @@ resource queryRule 'Microsoft.Insights/scheduledQueryRules@2021-02-01-preview' = } } -module queryRule_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module queryRule_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-QueryRule-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.KeyVault/vaults/deploy.bicep b/arm/Microsoft.KeyVault/vaults/deploy.bicep index 65a88b5af8..3e6ec8f46e 100644 --- a/arm/Microsoft.KeyVault/vaults/deploy.bicep +++ b/arm/Microsoft.KeyVault/vaults/deploy.bicep @@ -301,7 +301,7 @@ module keyVault_privateEndpoints '../../Microsoft.Network/privateEndpoints/deplo } }] -module keyVault_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module keyVault_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-KeyVault-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.KeyVault/vaults/keys/deploy.bicep b/arm/Microsoft.KeyVault/vaults/keys/deploy.bicep index de0962508b..60432671eb 100644 --- a/arm/Microsoft.KeyVault/vaults/keys/deploy.bicep +++ b/arm/Microsoft.KeyVault/vaults/keys/deploy.bicep @@ -88,7 +88,7 @@ resource key 'Microsoft.KeyVault/vaults/keys@2019-09-01' = { } } -module key_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module key_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${deployment().name}-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.KeyVault/vaults/secrets/deploy.bicep b/arm/Microsoft.KeyVault/vaults/secrets/deploy.bicep index 1918cd7bc5..ceb2663d0b 100644 --- a/arm/Microsoft.KeyVault/vaults/secrets/deploy.bicep +++ b/arm/Microsoft.KeyVault/vaults/secrets/deploy.bicep @@ -61,7 +61,7 @@ resource secret 'Microsoft.KeyVault/vaults/secrets@2019-09-01' = { } } -module secret_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module secret_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${deployment().name}-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Logic/workflows/deploy.bicep b/arm/Microsoft.Logic/workflows/deploy.bicep index cdd469662f..6f1845f5aa 100644 --- a/arm/Microsoft.Logic/workflows/deploy.bicep +++ b/arm/Microsoft.Logic/workflows/deploy.bicep @@ -208,7 +208,7 @@ resource logicApp_diagnosticSettings 'Microsoft.Insights/diagnosticsettings@2021 scope: logicApp } -module logicApp_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module logicApp_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-LogicApp-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.MachineLearningServices/workspaces/deploy.bicep b/arm/Microsoft.MachineLearningServices/workspaces/deploy.bicep index 0fe12a8f55..276f4976dc 100644 --- a/arm/Microsoft.MachineLearningServices/workspaces/deploy.bicep +++ b/arm/Microsoft.MachineLearningServices/workspaces/deploy.bicep @@ -275,7 +275,7 @@ module workspace_privateEndpoints '../../Microsoft.Network/privateEndpoints/depl } }] -module workspace_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module workspace_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-MLWorkspace-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.ManagedIdentity/userAssignedIdentities/deploy.bicep b/arm/Microsoft.ManagedIdentity/userAssignedIdentities/deploy.bicep index e60c093e4a..d23a90bd7f 100644 --- a/arm/Microsoft.ManagedIdentity/userAssignedIdentities/deploy.bicep +++ b/arm/Microsoft.ManagedIdentity/userAssignedIdentities/deploy.bicep @@ -48,7 +48,7 @@ resource userMsi_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lock != ' scope: userMsi } -module userMsi_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module userMsi_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-UserMSI-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Management/managementGroups/deploy.bicep b/arm/Microsoft.Management/managementGroups/deploy.bicep index bef5e6561f..5f8475dfb4 100644 --- a/arm/Microsoft.Management/managementGroups/deploy.bicep +++ b/arm/Microsoft.Management/managementGroups/deploy.bicep @@ -44,7 +44,7 @@ resource managementGroup 'Microsoft.Management/managementGroups@2021-04-01' = { } } -module managementGroup_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module managementGroup_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name)}-ManagementGroup-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.NetApp/netAppAccounts/capacityPools/deploy.bicep b/arm/Microsoft.NetApp/netAppAccounts/capacityPools/deploy.bicep index 529388c313..e63a3f136b 100644 --- a/arm/Microsoft.NetApp/netAppAccounts/capacityPools/deploy.bicep +++ b/arm/Microsoft.NetApp/netAppAccounts/capacityPools/deploy.bicep @@ -91,7 +91,7 @@ module capacityPool_volumes 'volumes/deploy.bicep' = [for (volume, index) in vol } }] -module capacityPool_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module capacityPool_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${deployment().name}-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.NetApp/netAppAccounts/capacityPools/volumes/deploy.bicep b/arm/Microsoft.NetApp/netAppAccounts/capacityPools/volumes/deploy.bicep index efc2a05185..8c4a6eae33 100644 --- a/arm/Microsoft.NetApp/netAppAccounts/capacityPools/volumes/deploy.bicep +++ b/arm/Microsoft.NetApp/netAppAccounts/capacityPools/volumes/deploy.bicep @@ -76,7 +76,7 @@ resource volume 'Microsoft.NetApp/netAppAccounts/capacityPools/volumes@2021-06-0 } } -module volume_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module volume_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${deployment().name}-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.NetApp/netAppAccounts/deploy.bicep b/arm/Microsoft.NetApp/netAppAccounts/deploy.bicep index 76f5353940..19e8d96e44 100644 --- a/arm/Microsoft.NetApp/netAppAccounts/deploy.bicep +++ b/arm/Microsoft.NetApp/netAppAccounts/deploy.bicep @@ -86,7 +86,7 @@ resource netAppAccount_lock 'Microsoft.Authorization/locks@2017-04-01' = if (loc scope: netAppAccount } -module netAppAccount_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module netAppAccount_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-ANFAccount-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/applicationGateways/deploy.bicep b/arm/Microsoft.Network/applicationGateways/deploy.bicep index f5bbb4e76c..4f71041417 100644 --- a/arm/Microsoft.Network/applicationGateways/deploy.bicep +++ b/arm/Microsoft.Network/applicationGateways/deploy.bicep @@ -342,7 +342,7 @@ resource applicationGateway_diagnosticSettingName 'Microsoft.Insights/diagnostic scope: applicationGateway } -module applicationGateway_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module applicationGateway_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-AppGateway-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/applicationSecurityGroups/deploy.bicep b/arm/Microsoft.Network/applicationSecurityGroups/deploy.bicep index 844e47bb2f..c0e8b5e135 100644 --- a/arm/Microsoft.Network/applicationSecurityGroups/deploy.bicep +++ b/arm/Microsoft.Network/applicationSecurityGroups/deploy.bicep @@ -49,7 +49,7 @@ resource applicationSecurityGroup_lock 'Microsoft.Authorization/locks@2017-04-01 scope: applicationSecurityGroup } -module applicationSecurityGroup_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module applicationSecurityGroup_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-AppSecurityGroup-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/azureFirewalls/deploy.bicep b/arm/Microsoft.Network/azureFirewalls/deploy.bicep index def11ea777..8c3ce6851b 100644 --- a/arm/Microsoft.Network/azureFirewalls/deploy.bicep +++ b/arm/Microsoft.Network/azureFirewalls/deploy.bicep @@ -267,7 +267,7 @@ resource azureFirewall_diagnosticSettings 'Microsoft.Insights/diagnosticSettings scope: azureFirewall } -module azureFirewall_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module azureFirewall_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-AzFW-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/bastionHosts/deploy.bicep b/arm/Microsoft.Network/bastionHosts/deploy.bicep index 542b69ba1b..b31fcc705b 100644 --- a/arm/Microsoft.Network/bastionHosts/deploy.bicep +++ b/arm/Microsoft.Network/bastionHosts/deploy.bicep @@ -173,7 +173,7 @@ resource azureBastion_diagnosticSettings 'Microsoft.Insights/diagnosticSettings@ scope: azureBastion } -module azureBastion_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module azureBastion_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-Bastion-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/ddosProtectionPlans/deploy.bicep b/arm/Microsoft.Network/ddosProtectionPlans/deploy.bicep index a1006d95f9..7d0ca5f0d6 100644 --- a/arm/Microsoft.Network/ddosProtectionPlans/deploy.bicep +++ b/arm/Microsoft.Network/ddosProtectionPlans/deploy.bicep @@ -50,7 +50,7 @@ resource ddosProtectionPlan_lock 'Microsoft.Authorization/locks@2017-04-01' = if scope: ddosProtectionPlan } -module ddosProtectionPlan_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module ddosProtectionPlan_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-DDoSProtectionPlan-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/expressRouteCircuits/deploy.bicep b/arm/Microsoft.Network/expressRouteCircuits/deploy.bicep index 591a386f46..9dd7f107c3 100644 --- a/arm/Microsoft.Network/expressRouteCircuits/deploy.bicep +++ b/arm/Microsoft.Network/expressRouteCircuits/deploy.bicep @@ -196,7 +196,7 @@ resource expressRouteCircuits_diagnosticSettings 'Microsoft.Insights/diagnosticS scope: expressRouteCircuits } -module expressRouteCircuits_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module expressRouteCircuits_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-ExpRouteCircuits-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/frontDoors/deploy.bicep b/arm/Microsoft.Network/frontDoors/deploy.bicep index 1fd96fbb1b..f8d1a7fc34 100644 --- a/arm/Microsoft.Network/frontDoors/deploy.bicep +++ b/arm/Microsoft.Network/frontDoors/deploy.bicep @@ -157,7 +157,7 @@ resource frontDoor_diagnosticSettingName 'Microsoft.Insights/diagnosticSettings@ scope: frontDoor } -module frontDoor_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module frontDoor_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-AppGateway-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/ipGroups/deploy.bicep b/arm/Microsoft.Network/ipGroups/deploy.bicep index c9a4c54e45..cec97da141 100644 --- a/arm/Microsoft.Network/ipGroups/deploy.bicep +++ b/arm/Microsoft.Network/ipGroups/deploy.bicep @@ -55,7 +55,7 @@ resource ipGroup_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lock != ' scope: ipGroup } -module ipGroup_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module ipGroup_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-IPGroup-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/loadBalancers/deploy.bicep b/arm/Microsoft.Network/loadBalancers/deploy.bicep index c1758136af..495f7885be 100644 --- a/arm/Microsoft.Network/loadBalancers/deploy.bicep +++ b/arm/Microsoft.Network/loadBalancers/deploy.bicep @@ -246,7 +246,7 @@ resource loadBalancer_diagnosticSettings 'Microsoft.Insights/diagnosticSettings@ scope: loadBalancer } -module loadBalancer_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module loadBalancer_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-LoadBalancer-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/localNetworkGateways/deploy.bicep b/arm/Microsoft.Network/localNetworkGateways/deploy.bicep index 0957133b2a..55d5cebdd6 100644 --- a/arm/Microsoft.Network/localNetworkGateways/deploy.bicep +++ b/arm/Microsoft.Network/localNetworkGateways/deploy.bicep @@ -81,7 +81,7 @@ resource localNetworkGateway_lock 'Microsoft.Authorization/locks@2017-04-01' = i scope: localNetworkGateway } -module localNetworkGateway_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module localNetworkGateway_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-LocalNetworkGateway-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/natGateways/deploy.bicep b/arm/Microsoft.Network/natGateways/deploy.bicep index d026761804..8a86213b5b 100644 --- a/arm/Microsoft.Network/natGateways/deploy.bicep +++ b/arm/Microsoft.Network/natGateways/deploy.bicep @@ -193,7 +193,7 @@ resource natGateway_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lock ! scope: natGateway } -module natGateway_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module natGateway_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-NatGateway-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/networkInterfaces/deploy.bicep b/arm/Microsoft.Network/networkInterfaces/deploy.bicep index c3c5666abc..526749e365 100644 --- a/arm/Microsoft.Network/networkInterfaces/deploy.bicep +++ b/arm/Microsoft.Network/networkInterfaces/deploy.bicep @@ -144,7 +144,7 @@ resource networkInterface_lock 'Microsoft.Authorization/locks@2017-04-01' = if ( scope: networkInterface } -module networkInterface_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module networkInterface_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-NIC-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/networkSecurityGroups/deploy.bicep b/arm/Microsoft.Network/networkSecurityGroups/deploy.bicep index 4aa11c1808..704f8b3842 100644 --- a/arm/Microsoft.Network/networkSecurityGroups/deploy.bicep +++ b/arm/Microsoft.Network/networkSecurityGroups/deploy.bicep @@ -150,7 +150,7 @@ resource networkSecurityGroup_diagnosticSettings 'Microsoft.Insights/diagnosticS scope: networkSecurityGroup } -module networkSecurityGroup_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module networkSecurityGroup_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-NSG-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/networkWatchers/deploy.bicep b/arm/Microsoft.Network/networkWatchers/deploy.bicep index 4b6d5bcb6c..aa71ecf145 100644 --- a/arm/Microsoft.Network/networkWatchers/deploy.bicep +++ b/arm/Microsoft.Network/networkWatchers/deploy.bicep @@ -58,7 +58,7 @@ resource networkWatcher_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lo scope: networkWatcher } -module networkWatcher_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module networkWatcher_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-NW-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/privateDnsZones/A/deploy.bicep b/arm/Microsoft.Network/privateDnsZones/A/deploy.bicep index 3c88b840e1..49e6309abf 100644 --- a/arm/Microsoft.Network/privateDnsZones/A/deploy.bicep +++ b/arm/Microsoft.Network/privateDnsZones/A/deploy.bicep @@ -45,7 +45,7 @@ resource A 'Microsoft.Network/privateDnsZones/A@2020-06-01' = { } } -module A_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module A_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name)}-PDNSA-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/privateDnsZones/AAAA/deploy.bicep b/arm/Microsoft.Network/privateDnsZones/AAAA/deploy.bicep index 29c7a66879..4d31d07420 100644 --- a/arm/Microsoft.Network/privateDnsZones/AAAA/deploy.bicep +++ b/arm/Microsoft.Network/privateDnsZones/AAAA/deploy.bicep @@ -45,7 +45,7 @@ resource AAAA 'Microsoft.Network/privateDnsZones/AAAA@2020-06-01' = { } } -module AAAA_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module AAAA_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name)}-PDNSAAAA-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/privateDnsZones/CNAME/deploy.bicep b/arm/Microsoft.Network/privateDnsZones/CNAME/deploy.bicep index de45e6d935..230320b6dc 100644 --- a/arm/Microsoft.Network/privateDnsZones/CNAME/deploy.bicep +++ b/arm/Microsoft.Network/privateDnsZones/CNAME/deploy.bicep @@ -45,7 +45,7 @@ resource CNAME 'Microsoft.Network/privateDnsZones/CNAME@2020-06-01' = { } } -module CNAME_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module CNAME_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name)}-PDNSCNAME-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/privateDnsZones/MX/deploy.bicep b/arm/Microsoft.Network/privateDnsZones/MX/deploy.bicep index 3e182064f0..7bd01356fb 100644 --- a/arm/Microsoft.Network/privateDnsZones/MX/deploy.bicep +++ b/arm/Microsoft.Network/privateDnsZones/MX/deploy.bicep @@ -45,7 +45,7 @@ resource MX 'Microsoft.Network/privateDnsZones/MX@2020-06-01' = { } } -module MX_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module MX_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name)}-PDNSMX-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/privateDnsZones/PTR/deploy.bicep b/arm/Microsoft.Network/privateDnsZones/PTR/deploy.bicep index cbc32f2f90..4d83d996ba 100644 --- a/arm/Microsoft.Network/privateDnsZones/PTR/deploy.bicep +++ b/arm/Microsoft.Network/privateDnsZones/PTR/deploy.bicep @@ -31,7 +31,7 @@ resource defaultTelemetry 'Microsoft.Resources/deployments@2021-04-01' = if (ena } } -module PTR_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module PTR_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name)}-PDNSPTR-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/privateDnsZones/SOA/deploy.bicep b/arm/Microsoft.Network/privateDnsZones/SOA/deploy.bicep index 3bbb21a150..256047114d 100644 --- a/arm/Microsoft.Network/privateDnsZones/SOA/deploy.bicep +++ b/arm/Microsoft.Network/privateDnsZones/SOA/deploy.bicep @@ -45,7 +45,7 @@ resource SOA 'Microsoft.Network/privateDnsZones/SOA@2020-06-01' = { } } -module SOA_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module SOA_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name)}-PDNSSOA-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/privateDnsZones/SRV/deploy.bicep b/arm/Microsoft.Network/privateDnsZones/SRV/deploy.bicep index d17d2468bf..d15b8b6a32 100644 --- a/arm/Microsoft.Network/privateDnsZones/SRV/deploy.bicep +++ b/arm/Microsoft.Network/privateDnsZones/SRV/deploy.bicep @@ -45,7 +45,7 @@ resource SRV 'Microsoft.Network/privateDnsZones/SRV@2020-06-01' = { } } -module SRV_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module SRV_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name)}-PDNSSRV-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/privateDnsZones/TXT/deploy.bicep b/arm/Microsoft.Network/privateDnsZones/TXT/deploy.bicep index f4b71e4bb0..e718bdbcdb 100644 --- a/arm/Microsoft.Network/privateDnsZones/TXT/deploy.bicep +++ b/arm/Microsoft.Network/privateDnsZones/TXT/deploy.bicep @@ -45,7 +45,7 @@ resource TXT 'Microsoft.Network/privateDnsZones/TXT@2020-06-01' = { } } -module TXT_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module TXT_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name)}-PDNSTXT-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/privateDnsZones/deploy.bicep b/arm/Microsoft.Network/privateDnsZones/deploy.bicep index 8bd8c22e85..eb99085d2c 100644 --- a/arm/Microsoft.Network/privateDnsZones/deploy.bicep +++ b/arm/Microsoft.Network/privateDnsZones/deploy.bicep @@ -194,7 +194,7 @@ resource privateDnsZone_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lo scope: privateDnsZone } -module privateDnsZone_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module privateDnsZone_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-PrivateDnsZone-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/privateEndpoints/deploy.bicep b/arm/Microsoft.Network/privateEndpoints/deploy.bicep index 3bfde4e6db..2c94b9f721 100644 --- a/arm/Microsoft.Network/privateEndpoints/deploy.bicep +++ b/arm/Microsoft.Network/privateEndpoints/deploy.bicep @@ -93,7 +93,7 @@ resource privateEndpoint_lock 'Microsoft.Authorization/locks@2017-04-01' = if (l scope: privateEndpoint } -module privateEndpoint_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module privateEndpoint_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-PrivateEndpoint-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/publicIPAddresses/deploy.bicep b/arm/Microsoft.Network/publicIPAddresses/deploy.bicep index 031eded83e..df1ed96280 100644 --- a/arm/Microsoft.Network/publicIPAddresses/deploy.bicep +++ b/arm/Microsoft.Network/publicIPAddresses/deploy.bicep @@ -170,7 +170,7 @@ resource publicIpAddress_diagnosticSettings 'Microsoft.Insights/diagnosticSettin scope: publicIpAddress } -module publicIpAddress_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module publicIpAddress_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-PIPAddress-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/publicIPPrefixes/deploy.bicep b/arm/Microsoft.Network/publicIPPrefixes/deploy.bicep index 0af3d87a67..161c1bebdc 100644 --- a/arm/Microsoft.Network/publicIPPrefixes/deploy.bicep +++ b/arm/Microsoft.Network/publicIPPrefixes/deploy.bicep @@ -61,7 +61,7 @@ resource publicIpPrefix_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lo scope: publicIpPrefix } -module publicIpPrefix_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module publicIpPrefix_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-PIPPrefix-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/routeTables/deploy.bicep b/arm/Microsoft.Network/routeTables/deploy.bicep index 3f493639de..4113055d91 100644 --- a/arm/Microsoft.Network/routeTables/deploy.bicep +++ b/arm/Microsoft.Network/routeTables/deploy.bicep @@ -58,7 +58,7 @@ resource routeTable_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lock ! scope: routeTable } -module routeTable_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module routeTable_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-RouteTable-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/trafficmanagerprofiles/deploy.bicep b/arm/Microsoft.Network/trafficmanagerprofiles/deploy.bicep index da5b05b4bf..9b30cfa2dc 100644 --- a/arm/Microsoft.Network/trafficmanagerprofiles/deploy.bicep +++ b/arm/Microsoft.Network/trafficmanagerprofiles/deploy.bicep @@ -170,7 +170,7 @@ resource trafficManagerProfile_diagnosticSettings 'Microsoft.Insights/diagnostic scope: trafficManagerProfile } -module trafficManagerProfile_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module trafficManagerProfile_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name)}-TrafficManagerProfile-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep b/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep index ca9369f1a2..87217954b4 100644 --- a/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep +++ b/arm/Microsoft.Network/virtualNetworkGateways/deploy.bicep @@ -381,7 +381,7 @@ resource virtualNetworkGateway_diagnosticSettings 'Microsoft.Insights/diagnostic scope: virtualNetworkGateway } -module virtualNetworkGateway_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module virtualNetworkGateway_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-VNetGateway-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/virtualNetworks/deploy.bicep b/arm/Microsoft.Network/virtualNetworks/deploy.bicep index f01654b201..00d33b2c40 100644 --- a/arm/Microsoft.Network/virtualNetworks/deploy.bicep +++ b/arm/Microsoft.Network/virtualNetworks/deploy.bicep @@ -235,7 +235,7 @@ resource virtualNetwork_diagnosticSettings 'Microsoft.Insights/diagnosticSetting scope: virtualNetwork } -module virtualNetwork_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module virtualNetwork_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-VNet-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/virtualNetworks/subnets/deploy.bicep b/arm/Microsoft.Network/virtualNetworks/subnets/deploy.bicep index d9ebbc90ba..c894752a1d 100644 --- a/arm/Microsoft.Network/virtualNetworks/subnets/deploy.bicep +++ b/arm/Microsoft.Network/virtualNetworks/subnets/deploy.bicep @@ -97,7 +97,7 @@ resource subnet 'Microsoft.Network/virtualNetworks/subnets@2021-05-01' = { } } -module subnet_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module subnet_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, subnet.id)}-Subnet-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/virtualWans/deploy.bicep b/arm/Microsoft.Network/virtualWans/deploy.bicep index ee927daf3c..558e9e350b 100644 --- a/arm/Microsoft.Network/virtualWans/deploy.bicep +++ b/arm/Microsoft.Network/virtualWans/deploy.bicep @@ -70,7 +70,7 @@ resource virtualWan_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lock ! scope: virtualWan } -module virtualWan_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module virtualWan_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-VWan-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Network/vpnSites/deploy.bicep b/arm/Microsoft.Network/vpnSites/deploy.bicep index 333b81739f..216e17dbe0 100644 --- a/arm/Microsoft.Network/vpnSites/deploy.bicep +++ b/arm/Microsoft.Network/vpnSites/deploy.bicep @@ -86,7 +86,7 @@ resource vpnSite_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lock != ' scope: vpnSite } -module vpnSite_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module vpnSite_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-VWan-Rbac-${index}' params: { principalIds: roleAssignment.principalIds diff --git a/arm/Microsoft.OperationalInsights/workspaces/deploy.bicep b/arm/Microsoft.OperationalInsights/workspaces/deploy.bicep index a4e5217b9c..985d6af6ec 100644 --- a/arm/Microsoft.OperationalInsights/workspaces/deploy.bicep +++ b/arm/Microsoft.OperationalInsights/workspaces/deploy.bicep @@ -255,7 +255,7 @@ resource logAnalyticsWorkspace_lock 'Microsoft.Authorization/locks@2017-04-01' = scope: logAnalyticsWorkspace } -module logAnalyticsWorkspace_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module logAnalyticsWorkspace_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-LAW-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.RecoveryServices/vaults/deploy.bicep b/arm/Microsoft.RecoveryServices/vaults/deploy.bicep index d139a63e4d..125eb8ba1e 100644 --- a/arm/Microsoft.RecoveryServices/vaults/deploy.bicep +++ b/arm/Microsoft.RecoveryServices/vaults/deploy.bicep @@ -261,7 +261,7 @@ resource rsv_diagnosticSettings 'Microsoft.Insights/diagnosticSettings@2021-05-0 scope: rsv } -module rsv_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module rsv_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-RSV-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Resources/resourceGroups/deploy.bicep b/arm/Microsoft.Resources/resourceGroups/deploy.bicep index 81f31d26bc..d906dd8567 100644 --- a/arm/Microsoft.Resources/resourceGroups/deploy.bicep +++ b/arm/Microsoft.Resources/resourceGroups/deploy.bicep @@ -52,7 +52,7 @@ module resourceGroup_lock '.bicep/nested_lock.bicep' = if (lock != 'NotSpecified } } -module resourceGroup_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module resourceGroup_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-RG-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.ServiceBus/namespaces/deploy.bicep b/arm/Microsoft.ServiceBus/namespaces/deploy.bicep index 3ce9d0e7e5..f69878bbbb 100644 --- a/arm/Microsoft.ServiceBus/namespaces/deploy.bicep +++ b/arm/Microsoft.ServiceBus/namespaces/deploy.bicep @@ -329,7 +329,7 @@ module serviceBusNamespace_privateEndpoints '../../Microsoft.Network/privateEndp } }] -module serviceBusNamespace_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module serviceBusNamespace_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${deployment().name}-rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.ServiceBus/namespaces/queues/deploy.bicep b/arm/Microsoft.ServiceBus/namespaces/queues/deploy.bicep index a6f9d94625..182104d413 100644 --- a/arm/Microsoft.ServiceBus/namespaces/queues/deploy.bicep +++ b/arm/Microsoft.ServiceBus/namespaces/queues/deploy.bicep @@ -140,7 +140,7 @@ resource queue_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lock != 'No scope: queue } -module queue_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module queue_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${deployment().name}-rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.ServiceBus/namespaces/topics/deploy.bicep b/arm/Microsoft.ServiceBus/namespaces/topics/deploy.bicep index 97fc4780ba..8ac4890e3a 100644 --- a/arm/Microsoft.ServiceBus/namespaces/topics/deploy.bicep +++ b/arm/Microsoft.ServiceBus/namespaces/topics/deploy.bicep @@ -136,7 +136,7 @@ resource topic_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lock != 'No scope: topic } -module topic_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module topic_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${deployment().name}-rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.ServiceFabric/clusters/deploy.bicep b/arm/Microsoft.ServiceFabric/clusters/deploy.bicep index f65b959456..183c1dedc0 100644 --- a/arm/Microsoft.ServiceFabric/clusters/deploy.bicep +++ b/arm/Microsoft.ServiceFabric/clusters/deploy.bicep @@ -290,7 +290,7 @@ resource serviceFabricCluster_lock 'Microsoft.Authorization/locks@2017-04-01' = } // Service Fabric cluster RBAC assignment -module serviceFabricCluster_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module serviceFabricCluster_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-ServiceFabric-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Sql/managedInstances/deploy.bicep b/arm/Microsoft.Sql/managedInstances/deploy.bicep index 8e71c4c829..00ada4dcea 100644 --- a/arm/Microsoft.Sql/managedInstances/deploy.bicep +++ b/arm/Microsoft.Sql/managedInstances/deploy.bicep @@ -270,7 +270,7 @@ resource managedInstance_diagnosticSettings 'Microsoft.Insights/diagnosticsettin scope: managedInstance } -module managedInstance_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module managedInstance_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-SqlMi-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Sql/servers/deploy.bicep b/arm/Microsoft.Sql/servers/deploy.bicep index a9b2bc7bfc..0253d8608f 100644 --- a/arm/Microsoft.Sql/servers/deploy.bicep +++ b/arm/Microsoft.Sql/servers/deploy.bicep @@ -102,7 +102,7 @@ resource server_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lock != 'N scope: server } -module server_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module server_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-Sql-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Storage/storageAccounts/blobServices/containers/deploy.bicep b/arm/Microsoft.Storage/storageAccounts/blobServices/containers/deploy.bicep index d7574e5249..77bb63b5f7 100644 --- a/arm/Microsoft.Storage/storageAccounts/blobServices/containers/deploy.bicep +++ b/arm/Microsoft.Storage/storageAccounts/blobServices/containers/deploy.bicep @@ -70,7 +70,7 @@ module immutabilityPolicy 'immutabilityPolicies/deploy.bicep' = if (!empty(immut } } -module container_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module container_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${deployment().name}-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Storage/storageAccounts/deploy.bicep b/arm/Microsoft.Storage/storageAccounts/deploy.bicep index 9f7b348c5b..845fee5c3b 100644 --- a/arm/Microsoft.Storage/storageAccounts/deploy.bicep +++ b/arm/Microsoft.Storage/storageAccounts/deploy.bicep @@ -237,7 +237,7 @@ resource storageAccount_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lo scope: storageAccount } -module storageAccount_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module storageAccount_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-Storage-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Storage/storageAccounts/fileServices/shares/deploy.bicep b/arm/Microsoft.Storage/storageAccounts/fileServices/shares/deploy.bicep index 10895d2c9e..c70d661c65 100644 --- a/arm/Microsoft.Storage/storageAccounts/fileServices/shares/deploy.bicep +++ b/arm/Microsoft.Storage/storageAccounts/fileServices/shares/deploy.bicep @@ -62,7 +62,7 @@ resource fileShare 'Microsoft.Storage/storageAccounts/fileServices/shares@2021-0 } } -module fileShare_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module fileShare_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${deployment().name}-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Storage/storageAccounts/queueServices/queues/deploy.bicep b/arm/Microsoft.Storage/storageAccounts/queueServices/queues/deploy.bicep index 9a08797969..b812d142f1 100644 --- a/arm/Microsoft.Storage/storageAccounts/queueServices/queues/deploy.bicep +++ b/arm/Microsoft.Storage/storageAccounts/queueServices/queues/deploy.bicep @@ -45,7 +45,7 @@ resource queue 'Microsoft.Storage/storageAccounts/queueServices/queues@2019-06-0 } } -module queue_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module queue_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${deployment().name}-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Synapse/privateLinkHubs/deploy.bicep b/arm/Microsoft.Synapse/privateLinkHubs/deploy.bicep index bd284655c7..7c88a73d6d 100644 --- a/arm/Microsoft.Synapse/privateLinkHubs/deploy.bicep +++ b/arm/Microsoft.Synapse/privateLinkHubs/deploy.bicep @@ -53,7 +53,7 @@ resource privateLinkHub_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lo } // RBAC -module privateLinkHub_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module privateLinkHub_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${deployment().name}-rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.VirtualMachineImages/imageTemplates/deploy.bicep b/arm/Microsoft.VirtualMachineImages/imageTemplates/deploy.bicep index a8cd986798..db8a72f7ae 100644 --- a/arm/Microsoft.VirtualMachineImages/imageTemplates/deploy.bicep +++ b/arm/Microsoft.VirtualMachineImages/imageTemplates/deploy.bicep @@ -164,7 +164,7 @@ resource imageTemplate_lock 'Microsoft.Authorization/locks@2017-04-01' = if (loc scope: imageTemplate } -module imageTemplate_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module imageTemplate_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-ImageTemplate-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Web/connections/deploy.bicep b/arm/Microsoft.Web/connections/deploy.bicep index d2635f4627..8fd1368afd 100644 --- a/arm/Microsoft.Web/connections/deploy.bicep +++ b/arm/Microsoft.Web/connections/deploy.bicep @@ -82,7 +82,7 @@ resource connection_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lock ! scope: connection } -module connection_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module connection_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-Connection-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Web/hostingEnvironments/deploy.bicep b/arm/Microsoft.Web/hostingEnvironments/deploy.bicep index 534a8e0f45..4947f18b9d 100644 --- a/arm/Microsoft.Web/hostingEnvironments/deploy.bicep +++ b/arm/Microsoft.Web/hostingEnvironments/deploy.bicep @@ -166,7 +166,7 @@ resource appServiceEnvironment_diagnosticSettings 'Microsoft.Insights/diagnostic scope: appServiceEnvironment } -module appServiceEnvironment_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module appServiceEnvironment_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-AppServiceEnv-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Web/serverfarms/deploy.bicep b/arm/Microsoft.Web/serverfarms/deploy.bicep index 7dff1b0ad0..941d4f3860 100644 --- a/arm/Microsoft.Web/serverfarms/deploy.bicep +++ b/arm/Microsoft.Web/serverfarms/deploy.bicep @@ -158,7 +158,7 @@ resource appServicePlan_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lo scope: appServicePlan } -module appServicePlan_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module appServicePlan_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-AppServicePlan-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Web/sites/deploy.bicep b/arm/Microsoft.Web/sites/deploy.bicep index 765a0e21ee..beb0d4cea3 100644 --- a/arm/Microsoft.Web/sites/deploy.bicep +++ b/arm/Microsoft.Web/sites/deploy.bicep @@ -244,7 +244,7 @@ resource app_diagnosticSettings 'Microsoft.Insights/diagnosticSettings@2021-05-0 scope: app } -module app_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module app_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-Site-Rbac-${index}' params: { description: contains(roleAssignment, 'description') ? roleAssignment.description : '' diff --git a/arm/Microsoft.Web/staticSites/deploy.bicep b/arm/Microsoft.Web/staticSites/deploy.bicep index 2b80083a7c..a485d49520 100644 --- a/arm/Microsoft.Web/staticSites/deploy.bicep +++ b/arm/Microsoft.Web/staticSites/deploy.bicep @@ -127,7 +127,7 @@ resource staticSite_lock 'Microsoft.Authorization/locks@2017-04-01' = if (lock ! scope: staticSite } -module staticSite_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module staticSite_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${uniqueString(deployment().name, location)}-StaticSite-Rbac-${index}' params: { principalIds: roleAssignment.principalIds diff --git a/constructs/Microsoft.Authorization/roleAssignments-multiRolesMultiPrincipals/deploy.bicep b/constructs/Microsoft.Authorization/roleAssignments-multiRolesMultiPrincipals/deploy.bicep index 420aeee2f2..0fbe0c0688 100644 --- a/constructs/Microsoft.Authorization/roleAssignments-multiRolesMultiPrincipals/deploy.bicep +++ b/constructs/Microsoft.Authorization/roleAssignments-multiRolesMultiPrincipals/deploy.bicep @@ -30,7 +30,7 @@ resource defaultTelemetry 'Microsoft.Resources/deployments@2021-04-01' = if (ena } } -module nested_rbac_mg '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: if (!empty(managementGroupId) && empty(subscriptionId) && empty(resourceGroupName)) { +module nested_role_assignments_mg '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: if (!empty(managementGroupId) && empty(subscriptionId) && empty(resourceGroupName)) { name: 'roleAssignment-mg-${guid(roleAssignment.roleDefinitionIdOrName)}-${index}' params: { principalIds: roleAssignment.principalIds @@ -40,7 +40,7 @@ module nested_rbac_mg '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) } }] -module nested_rbac_sub '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: if (empty(managementGroupId) && !empty(subscriptionId) && empty(resourceGroupName)) { +module nested_role_assignments_sub '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: if (empty(managementGroupId) && !empty(subscriptionId) && empty(resourceGroupName)) { name: 'roleAssignment-sub-${guid(roleAssignment.roleDefinitionIdOrName)}-${index}' params: { principalIds: roleAssignment.principalIds @@ -50,7 +50,7 @@ module nested_rbac_sub '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) } }] -module nested_rbac_rg '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: if (empty(managementGroupId) && !empty(resourceGroupName) && !empty(subscriptionId)) { +module nested_role_assignments_rg '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: if (empty(managementGroupId) && !empty(resourceGroupName) && !empty(subscriptionId)) { name: 'roleAssignment-rg-${guid(roleAssignment.roleDefinitionIdOrName)}-${index}' params: { principalIds: roleAssignment.principalIds @@ -62,7 +62,7 @@ module nested_rbac_rg '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) }] @description('The scope of the deployed role assignments.') -output roleAssignmentScope string = !empty(managementGroupId) ? nested_rbac_mg[0].outputs.roleAssignmentScope : (!empty(resourceGroupName) ? nested_rbac_rg[0].outputs.roleAssignmentScope : nested_rbac_sub[0].outputs.roleAssignmentScope) +output roleAssignmentScope string = !empty(managementGroupId) ? nested_role_assignments_mg[0].outputs.roleAssignmentScope : (!empty(resourceGroupName) ? nested_role_assignments_rg[0].outputs.roleAssignmentScope : nested_role_assignments_sub[0].outputs.roleAssignmentScope) @description('The names of the deployed role assignments.') output roleAssignments array = roleAssignments diff --git a/docs/wiki/The library - Module design.md b/docs/wiki/The library - Module design.md index 9c825706db..d7a411d5c3 100644 --- a/docs/wiki/The library - Module design.md +++ b/docs/wiki/The library - Module design.md @@ -113,7 +113,7 @@ Use the following naming standard for module files and folders: > ├─ .bicep > | ├─ nested_components.bicep > | ├─ nested_privateEndpoint.bicep - > | ├─ nested_rbac.bicep + > | ├─ nested_roleAssignments.bicep > | └─ nested_serverfarms.bicep > ├─ .parameters > | └─ parameters.json @@ -161,7 +161,7 @@ The RBAC deployment has 2 elements to it. A module that contains the implementat @description('Optional. Array of role assignment objects that contain the \'roleDefinitionIdOrName\' and \'principalId\' to define RBAC role assignments on this resource. In the roleDefinitionIdOrName attribute, you can provide either the display name of the role definition, or its fully qualified ID in the following format: \'/providers/Microsoft.Authorization/roleDefinitions/c2f4ef07-c644-48eb-af81-4b1b4947fb11\'.') param roleAssignments array = [] -module _rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { +module _rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { name: '${deployment().name}-rbac-${index}' params: { principalIds: roleAssignment.principalIds @@ -171,11 +171,11 @@ module _rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, in }] ``` -#### 2nd Element as nested `.bicep/nested_rbac.bicep` file +#### 2nd Element as nested `.bicep/nested_roleAssignments.bicep` file Here you specify the platform roles available for the main resource. -The `builtInRoleNames` variable contains the list of applicable roles for the specific resource which the `nested_rbac.bicep` template applies. +The `builtInRoleNames` variable contains the list of applicable roles for the specific resource which the `nested_roleAssignments.bicep` template applies. >**Note**: You use the helper script [Get-FormattedRBACRoles.ps1](./Contribution%20guide%20-%20Get%20formatted%20RBAC%20roles) to extract a formatted list of RBAC roles used in the CARML modules based on the RBAC lists in Azure. The element requires you to provide both the `principalIds` & `roleDefinitionOrIdName` to assign to the principal IDs. Also, the `resourceId` is target resource's resource ID that allows us to reference it as an `existing` resource. Note, the implementation of the `split` in the resource reference becomes longer the deeper you go in the child-resource hierarchy. @@ -445,7 +445,7 @@ While exceptions might be needed, the following guidance should be followed as m ``` > **Example**: for the `roleAssignment` deployment in the key vault `secrets` template > ``` - > module secret_rbac '.bicep/nested_rbac.bicep' = [for (roleAssignment, index) in roleAssignments: { + > module secret_rbac '.bicep/nested_roleAssignments.bicep' = [for (roleAssignment, index) in roleAssignments: { > name: '${deployment().name}-Rbac-${index}' > ``` diff --git a/utilities/pipelines/resourcePublish/Get-ModulesToPublish.ps1 b/utilities/pipelines/resourcePublish/Get-ModulesToPublish.ps1 index 689a9534b7..57c18ff75e 100644 --- a/utilities/pipelines/resourcePublish/Get-ModulesToPublish.ps1 +++ b/utilities/pipelines/resourcePublish/Get-ModulesToPublish.ps1 @@ -79,7 +79,7 @@ This function will search the current directory and all parent directories for a Mandatory. Path to the folder/file that should be searched .EXAMPLE -Find-TemplateFile -Path "C:\Repos\Azure\ResourceModules\arm\Microsoft.Storage\storageAccounts\tableServices\tables\.bicep\nested_rbac.bicep" +Find-TemplateFile -Path "C:\Repos\Azure\ResourceModules\arm\Microsoft.Storage\storageAccounts\tableServices\tables\.bicep\nested_roleAssignments.bicep" Directory: C:\Repos\Azure\ResourceModules\arm\Microsoft.Storage\storageAccounts\tableServices\tables diff --git a/utilities/tools/Get-LinkedModuleList.ps1 b/utilities/tools/Get-LinkedModuleList.ps1 index ebc4ea81f2..2d6a8608e1 100644 --- a/utilities/tools/Get-LinkedModuleList.ps1 +++ b/utilities/tools/Get-LinkedModuleList.ps1 @@ -17,7 +17,7 @@ Get-LinkedModuleList Invoke the function with the default path. Returns an object such as: { "Microsoft.Compute/availabilitySets": { - "localPathReferences": ".bicep/nested_rbac.bicep", + "localPathReferences": ".bicep/nested_roleAssignments.bicep", "remoteReferences": null, "resourceReferences": [ "Microsoft.Resources/deployments@2021-04-01", From b51d6e5aa6d63bb3ea98a22f7c4d344f66c9694e Mon Sep 17 00:00:00 2001 From: Elisa Anzelmo Date: Wed, 1 Jun 2022 12:30:53 +0200 Subject: [PATCH 3/6] readme file updated --- arm/Microsoft.KeyVault/vaults/readme.md | 1 + 1 file changed, 1 insertion(+) diff --git a/arm/Microsoft.KeyVault/vaults/readme.md b/arm/Microsoft.KeyVault/vaults/readme.md index 43b4f23147..6ecf79f56b 100644 --- a/arm/Microsoft.KeyVault/vaults/readme.md +++ b/arm/Microsoft.KeyVault/vaults/readme.md @@ -405,6 +405,7 @@ privateEndpoints: [ module vaults './Microsoft.KeyVault/vaults/deploy.bicep' = { name: '${uniqueString(deployment().name)}-vaults' params: { + } ``` From 44814dbff9553895e5ebc26ffbc261337384fede Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Elena=20Batanero=20Garc=C3=ADa?= Date: Tue, 7 Jun 2022 15:57:41 +0200 Subject: [PATCH 4/6] Updated README.md's --- .../automationAccounts/readme.md | 1 + arm/Microsoft.Compute/virtualMachines/readme.md | 17 +---------------- arm/Microsoft.EventHub/namespaces/readme.md | 1 + arm/Microsoft.ServiceBus/namespaces/readme.md | 1 + .../readme.md | 1 + 5 files changed, 5 insertions(+), 16 deletions(-) diff --git a/arm/Microsoft.Automation/automationAccounts/readme.md b/arm/Microsoft.Automation/automationAccounts/readme.md index 49b775fa0c..9fe087ec9c 100644 --- a/arm/Microsoft.Automation/automationAccounts/readme.md +++ b/arm/Microsoft.Automation/automationAccounts/readme.md @@ -374,6 +374,7 @@ userAssignedIdentities: { "keyVersion" : { "value" : "9917c14be51d4d93b37218de7d326f60" }, + "userAssignedIdentities": { "value": { "/subscriptions/<>/resourcegroups/validation-rg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/adp-<>-az-msi-x-001": {} diff --git a/arm/Microsoft.Compute/virtualMachines/readme.md b/arm/Microsoft.Compute/virtualMachines/readme.md index 69727052d0..514dd6ca0b 100644 --- a/arm/Microsoft.Compute/virtualMachines/readme.md +++ b/arm/Microsoft.Compute/virtualMachines/readme.md @@ -1739,22 +1739,7 @@ module virtualMachines './Microsoft.Compute/virtualMachines/deploy.bicep' = { } } adminUsername: 'localAdminUser' - adminPassword: [ - { - Value: { - keyVault: { - id: '/subscriptions/<>/resourceGroups/validation-rg/providers/Microsoft.KeyVault/vaults/adp-<>-az-kv-x-001' - } - secretName: 'adminPassword' - } - MemberType: 8 - IsSettable: true - IsGettable: true - TypeNameOfValue: 'System.Management.Automation.PSCustomObject' - Name: 'reference' - IsInstance: true - } - ] + adminPassword: kv1.getSecret('adminPassword') nicConfigurations: [ { nicSuffix: '-nic-01' diff --git a/arm/Microsoft.EventHub/namespaces/readme.md b/arm/Microsoft.EventHub/namespaces/readme.md index be4e504c71..a78fe18ed9 100644 --- a/arm/Microsoft.EventHub/namespaces/readme.md +++ b/arm/Microsoft.EventHub/namespaces/readme.md @@ -306,6 +306,7 @@ userAssignedIdentities: { module namespaces './Microsoft.EventHub/namespaces/deploy.bicep' = { name: '${uniqueString(deployment().name)}-namespaces' params: { + } ``` diff --git a/arm/Microsoft.ServiceBus/namespaces/readme.md b/arm/Microsoft.ServiceBus/namespaces/readme.md index ebdb27c5d3..5bdc77443b 100644 --- a/arm/Microsoft.ServiceBus/namespaces/readme.md +++ b/arm/Microsoft.ServiceBus/namespaces/readme.md @@ -318,6 +318,7 @@ userAssignedIdentities: { module namespaces './Microsoft.ServiceBus/namespaces/deploy.bicep' = { name: '${uniqueString(deployment().name)}-namespaces' params: { + } ``` diff --git a/constructs/Microsoft.Authorization/roleAssignments-multiRolesMultiPrincipals/readme.md b/constructs/Microsoft.Authorization/roleAssignments-multiRolesMultiPrincipals/readme.md index 9d53d19b2f..33de0faaef 100644 --- a/constructs/Microsoft.Authorization/roleAssignments-multiRolesMultiPrincipals/readme.md +++ b/constructs/Microsoft.Authorization/roleAssignments-multiRolesMultiPrincipals/readme.md @@ -27,6 +27,7 @@ This module deploys Role Assignments. | `roleAssignments` | array | `[]` | Array of role assignment objects that contain the 'roleDefinitionIdOrName' and 'principalIds' to define RBAC role assignments on this resource. In the roleDefinitionIdOrName attribute, you can provide either the display name of the role definition, or its fully qualified ID in the following format: '/providers/Microsoft.Authorization/roleDefinitions/c2f4ef07-c644-48eb-af81-4b1b4947fb11'. | | `subscriptionId` | string | `''` | Subscription ID of the subscription to assign the RBAC role to. If no Resource Group name is provided, the module deploys at subscription level, therefore assigns the provided RBAC role to the subscription. | + ### Parameter Usage: `roleAssignments` Create a role assignment for the given resource. If you want to assign a service principal / managed identity that is created in the same deployment, make sure to also specify the `'principalType'` parameter and set it to `'ServicePrincipal'`. This will ensure the role assignment waits for the principal's propagation in Azure. From 162fbe959df647bf865972de52cc41e0c0b81316 Mon Sep 17 00:00:00 2001 From: Elena Batanero <46710322+elbatane@users.noreply.github.com> Date: Wed, 8 Jun 2022 10:16:46 +0200 Subject: [PATCH 5/6] Update docs/wiki/The library - Module design.md Co-authored-by: Erika Gressi <56914614+eriqua@users.noreply.github.com> --- docs/wiki/The library - Module design.md | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/docs/wiki/The library - Module design.md b/docs/wiki/The library - Module design.md index 950bc88116..ddf4a29377 100644 --- a/docs/wiki/The library - Module design.md +++ b/docs/wiki/The library - Module design.md @@ -115,10 +115,7 @@ Use the following naming standard for module files and folders: >Microsoft.Web >└─ sites > ├─ .bicep - > | ├─ nested_components.bicep - > | ├─ nested_privateEndpoint.bicep - > | ├─ nested_roleAssignments.bicep - > | └─ nested_serverfarms.bicep + > | └─ nested_roleAssignments.bicep > ├─ .parameters > | └─ parameters.json > ├─ deploy.bicep From 9d71fcc04d428ea3c3ba8056c9169b7cc0435362 Mon Sep 17 00:00:00 2001 From: Elena Batanero <46710322+elbatane@users.noreply.github.com> Date: Wed, 8 Jun 2022 10:17:06 +0200 Subject: [PATCH 6/6] Update docs/wiki/The library - Module design.md Co-authored-by: Erika Gressi <56914614+eriqua@users.noreply.github.com> --- docs/wiki/The library - Module design.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/docs/wiki/The library - Module design.md b/docs/wiki/The library - Module design.md index ddf4a29377..324fadc414 100644 --- a/docs/wiki/The library - Module design.md +++ b/docs/wiki/The library - Module design.md @@ -10,9 +10,6 @@ This section details the design principles followed by the CARML Bicep modules. - [**Child-Resources**](#child-resources) - [Naming](#naming) - [Patterns](#patterns) - - [1st Element in main resource](#1st-element-in-main-resource) - - [2nd Element as nested `.bicep/nested_roleAssignments.bicep` file](#2nd-element-as-nested-bicepnested_roleassignmentsbicep-file) - - [1st element in main resource](#1st-element-in-main-resource-1) - [Bicep template guidelines](#bicep-template-guidelines) - [Parameters](#parameters) - [Variables](#variables)