diff --git a/modules/Microsoft.AAD/DomainServices/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.AAD/DomainServices/.bicep/nested_roleAssignments.bicep index 2fe0de97a8..823ea8001a 100644 --- a/modules/Microsoft.AAD/DomainServices/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.AAD/DomainServices/.bicep/nested_roleAssignments.bicep @@ -53,7 +53,7 @@ var builtInRoleNames = { } resource AzureADDS 'Microsoft.AAD/DomainServices@2021-05-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.AnalysisServices/servers/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.AnalysisServices/servers/.bicep/nested_roleAssignments.bicep index b188862891..9bfc9a1f18 100644 --- a/modules/Microsoft.AnalysisServices/servers/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.AnalysisServices/servers/.bicep/nested_roleAssignments.bicep @@ -50,7 +50,7 @@ var builtInRoleNames = { } resource server 'Microsoft.AnalysisServices/servers@2017-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.ApiManagement/service/.bicep/nested_authorizationServers.bicep b/modules/Microsoft.ApiManagement/service/.bicep/nested_authorizationServers.bicep index 19a6255925..2690818c27 100644 --- a/modules/Microsoft.ApiManagement/service/.bicep/nested_authorizationServers.bicep +++ b/modules/Microsoft.ApiManagement/service/.bicep/nested_authorizationServers.bicep @@ -80,7 +80,7 @@ resource defaultTelemetry 'Microsoft.Resources/deployments@2021-04-01' = if (ena } resource keyVault 'Microsoft.KeyVault/vaults@2019-09-01' existing = { - name: last(split(clientCredentialsKeyVaultId, '/')) + name: last(split(clientCredentialsKeyVaultId, '/'))! scope: resourceGroup(split(clientCredentialsKeyVaultId, '/')[2], split(clientCredentialsKeyVaultId, '/')[4]) } diff --git a/modules/Microsoft.ApiManagement/service/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.ApiManagement/service/.bicep/nested_roleAssignments.bicep index be542fc690..2a2a446e46 100644 --- a/modules/Microsoft.ApiManagement/service/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.ApiManagement/service/.bicep/nested_roleAssignments.bicep @@ -54,7 +54,7 @@ var builtInRoleNames = { } resource service 'Microsoft.ApiManagement/service@2020-12-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.AppConfiguration/configurationStores/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.AppConfiguration/configurationStores/.bicep/nested_roleAssignments.bicep index 0d4d4a7ed9..bd3923df33 100644 --- a/modules/Microsoft.AppConfiguration/configurationStores/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.AppConfiguration/configurationStores/.bicep/nested_roleAssignments.bicep @@ -52,7 +52,7 @@ var builtInRoleNames = { } resource appConfiguration 'Microsoft.AppConfiguration/configurationStores@2021-10-01-preview' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.AppConfiguration/configurationStores/keyValues/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.AppConfiguration/configurationStores/keyValues/.bicep/nested_roleAssignments.bicep index 0d4d4a7ed9..bd3923df33 100644 --- a/modules/Microsoft.AppConfiguration/configurationStores/keyValues/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.AppConfiguration/configurationStores/keyValues/.bicep/nested_roleAssignments.bicep @@ -52,7 +52,7 @@ var builtInRoleNames = { } resource appConfiguration 'Microsoft.AppConfiguration/configurationStores@2021-10-01-preview' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.AppConfiguration/configurationStores/readme.md b/modules/Microsoft.AppConfiguration/configurationStores/readme.md index 006ed05a02..0484058cc4 100644 --- a/modules/Microsoft.AppConfiguration/configurationStores/readme.md +++ b/modules/Microsoft.AppConfiguration/configurationStores/readme.md @@ -19,8 +19,8 @@ This module deploys an App Configuration Store. | `Microsoft.Authorization/locks` | [2020-05-01](https://learn.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2020-05-01/locks) | | `Microsoft.Authorization/roleAssignments` | [2022-04-01](https://learn.microsoft.com/en-us/azure/templates/Microsoft.Authorization/2022-04-01/roleAssignments) | | `Microsoft.Insights/diagnosticSettings` | [2021-05-01-preview](https://learn.microsoft.com/en-us/azure/templates/Microsoft.Insights/2021-05-01-preview/diagnosticSettings) | -| `Microsoft.Network/privateEndpoints` | [2022-05-01](https://learn.microsoft.com/en-us/azure/templates/Microsoft.Network/2022-05-01/privateEndpoints) | -| `Microsoft.Network/privateEndpoints/privateDnsZoneGroups` | [2022-05-01](https://learn.microsoft.com/en-us/azure/templates/Microsoft.Network/2022-05-01/privateEndpoints/privateDnsZoneGroups) | +| `Microsoft.Network/privateEndpoints` | [2022-07-01](https://learn.microsoft.com/en-us/azure/templates/Microsoft.Network/2022-07-01/privateEndpoints) | +| `Microsoft.Network/privateEndpoints/privateDnsZoneGroups` | [2022-07-01](https://learn.microsoft.com/en-us/azure/templates/Microsoft.Network/2022-07-01/privateEndpoints/privateDnsZoneGroups) | ## Parameters diff --git a/modules/Microsoft.Automation/automationAccounts/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Automation/automationAccounts/.bicep/nested_roleAssignments.bicep index 1bcff18b58..575f471ef5 100644 --- a/modules/Microsoft.Automation/automationAccounts/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Automation/automationAccounts/.bicep/nested_roleAssignments.bicep @@ -54,7 +54,7 @@ var builtInRoleNames = { } resource automationAccount 'Microsoft.Automation/automationAccounts@2020-01-13-preview' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Automation/automationAccounts/deploy.bicep b/modules/Microsoft.Automation/automationAccounts/deploy.bicep index 2122ff9e48..182085feb3 100644 --- a/modules/Microsoft.Automation/automationAccounts/deploy.bicep +++ b/modules/Microsoft.Automation/automationAccounts/deploy.bicep @@ -175,12 +175,12 @@ resource defaultTelemetry 'Microsoft.Resources/deployments@2021-04-01' = if (ena } resource cMKKeyVault 'Microsoft.KeyVault/vaults@2021-10-01' existing = if (!empty(cMKKeyVaultResourceId)) { - name: last(split(cMKKeyVaultResourceId, '/')) + name: last(split(cMKKeyVaultResourceId, '/'))! scope: resourceGroup(split(cMKKeyVaultResourceId, '/')[2], split(cMKKeyVaultResourceId, '/')[4]) } resource cMKKeyVaultKey 'Microsoft.KeyVault/vaults/keys@2021-10-01' existing = if (!empty(cMKKeyVaultResourceId) && !empty(cMKKeyName)) { - name: '${last(split(cMKKeyVaultResourceId, '/'))}/${cMKKeyName}' + name: '${last(split(cMKKeyVaultResourceId, '/'))}/${cMKKeyName}'! scope: resourceGroup(split(cMKKeyVaultResourceId, '/')[2], split(cMKKeyVaultResourceId, '/')[4]) } @@ -285,7 +285,7 @@ module automationAccount_linkedService '../../Microsoft.OperationalInsights/work name: '${uniqueString(deployment().name, location)}-AutoAccount-LinkedService' params: { name: 'automation' - logAnalyticsWorkspaceName: last(split(linkedWorkspaceResourceId, '/')) + logAnalyticsWorkspaceName: last(split(linkedWorkspaceResourceId, '/'))! enableDefaultTelemetry: enableReferencedModulesTelemetry resourceId: automationAccount.id tags: tags @@ -300,7 +300,7 @@ module automationAccount_solutions '../../Microsoft.OperationsManagement/solutio params: { name: gallerySolution.name location: location - logAnalyticsWorkspaceName: last(split(linkedWorkspaceResourceId, '/')) + logAnalyticsWorkspaceName: last(split(linkedWorkspaceResourceId, '/'))! product: contains(gallerySolution, 'product') ? gallerySolution.product : 'OMSGallery' publisher: contains(gallerySolution, 'publisher') ? gallerySolution.publisher : 'Microsoft' enableDefaultTelemetry: enableReferencedModulesTelemetry diff --git a/modules/Microsoft.Automation/automationAccounts/runbooks/deploy.bicep b/modules/Microsoft.Automation/automationAccounts/runbooks/deploy.bicep index e765feaa92..4deabf5fba 100644 --- a/modules/Microsoft.Automation/automationAccounts/runbooks/deploy.bicep +++ b/modules/Microsoft.Automation/automationAccounts/runbooks/deploy.bicep @@ -66,7 +66,7 @@ resource automationAccount 'Microsoft.Automation/automationAccounts@2020-01-13-p } resource storageAccount 'Microsoft.Storage/storageAccounts@2021-06-01' existing = if (!empty(scriptStorageAccountId)) { - name: last(split(scriptStorageAccountId, '/')) + name: last(split(scriptStorageAccountId, '/'))! scope: resourceGroup(split(scriptStorageAccountId, '/')[2], split(scriptStorageAccountId, '/')[4]) } diff --git a/modules/Microsoft.Batch/batchAccounts/deploy.bicep b/modules/Microsoft.Batch/batchAccounts/deploy.bicep index 6136f483b2..66e2512960 100644 --- a/modules/Microsoft.Batch/batchAccounts/deploy.bicep +++ b/modules/Microsoft.Batch/batchAccounts/deploy.bicep @@ -189,7 +189,7 @@ resource defaultTelemetry 'Microsoft.Resources/deployments@2021-04-01' = if (ena } resource keyVaultReferenceKeyVault 'Microsoft.KeyVault/vaults@2021-10-01' existing = if (!empty(keyVaultReferenceResourceId)) { - name: last(split(keyVaultReferenceResourceId, '/')) + name: last(split(keyVaultReferenceResourceId, '/'))! scope: resourceGroup(split(keyVaultReferenceResourceId, '/')[2], split(keyVaultReferenceResourceId, '/')[4]) } diff --git a/modules/Microsoft.CDN/profiles/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.CDN/profiles/.bicep/nested_roleAssignments.bicep index 33d1b39d1f..e74c410f30 100644 --- a/modules/Microsoft.CDN/profiles/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.CDN/profiles/.bicep/nested_roleAssignments.bicep @@ -54,7 +54,7 @@ var builtInRoleNames = { } resource cdnProfile 'Microsoft.Cdn/profiles@2021-06-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Cache/redis/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Cache/redis/.bicep/nested_roleAssignments.bicep index 27e8502c5e..144412b6a5 100644 --- a/modules/Microsoft.Cache/redis/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Cache/redis/.bicep/nested_roleAssignments.bicep @@ -51,7 +51,7 @@ var builtInRoleNames = { } resource redisCache 'Microsoft.Cache/redis@2021-06-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.CognitiveServices/accounts/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.CognitiveServices/accounts/.bicep/nested_roleAssignments.bicep index ed7297a553..122d8cc535 100644 --- a/modules/Microsoft.CognitiveServices/accounts/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.CognitiveServices/accounts/.bicep/nested_roleAssignments.bicep @@ -74,7 +74,7 @@ var builtInRoleNames = { } resource account 'Microsoft.CognitiveServices/accounts@2017-04-18' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.CognitiveServices/accounts/deploy.bicep b/modules/Microsoft.CognitiveServices/accounts/deploy.bicep index fbcdb24386..a70dacda30 100644 --- a/modules/Microsoft.CognitiveServices/accounts/deploy.bicep +++ b/modules/Microsoft.CognitiveServices/accounts/deploy.bicep @@ -219,17 +219,17 @@ resource defaultTelemetry 'Microsoft.Resources/deployments@2021-04-01' = if (ena } resource cMKKeyVault 'Microsoft.KeyVault/vaults@2021-06-01-preview' existing = if (!empty(cMKKeyVaultResourceId)) { - name: last(split(cMKKeyVaultResourceId, '/')) + name: last(split(cMKKeyVaultResourceId, '/'))! scope: resourceGroup(split(cMKKeyVaultResourceId, '/')[2], split(cMKKeyVaultResourceId, '/')[4]) } resource cMKKeyVaultKey 'Microsoft.KeyVault/vaults/keys@2021-10-01' existing = if (!empty(cMKKeyVaultResourceId) && !empty(cMKKeyName)) { - name: '${last(split(cMKKeyVaultResourceId, '/'))}/${cMKKeyName}' + name: '${last(split(cMKKeyVaultResourceId, '/'))}/${cMKKeyName}'! scope: resourceGroup(split(cMKKeyVaultResourceId, '/')[2], split(cMKKeyVaultResourceId, '/')[4]) } resource cMKUserAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2018-11-30' existing = if (!empty(cMKUserAssignedIdentityResourceId)) { - name: last(split(cMKUserAssignedIdentityResourceId, '/')) + name: last(split(cMKUserAssignedIdentityResourceId, '/'))! scope: resourceGroup(split(cMKUserAssignedIdentityResourceId, '/')[2], split(cMKUserAssignedIdentityResourceId, '/')[4]) } diff --git a/modules/Microsoft.Compute/availabilitySets/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Compute/availabilitySets/.bicep/nested_roleAssignments.bicep index 1b757f51b5..e1e07fe8f7 100644 --- a/modules/Microsoft.Compute/availabilitySets/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Compute/availabilitySets/.bicep/nested_roleAssignments.bicep @@ -69,7 +69,7 @@ var builtInRoleNames = { } resource availabilitySet 'Microsoft.Compute/availabilitySets@2021-04-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Compute/disks/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Compute/disks/.bicep/nested_roleAssignments.bicep index ffce1b670c..b0dc0da2b3 100644 --- a/modules/Microsoft.Compute/disks/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Compute/disks/.bicep/nested_roleAssignments.bicep @@ -69,7 +69,7 @@ var builtInRoleNames = { } resource disk 'Microsoft.Compute/disks@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Compute/galleries/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Compute/galleries/.bicep/nested_roleAssignments.bicep index 4ca78fd889..2123618c94 100644 --- a/modules/Microsoft.Compute/galleries/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Compute/galleries/.bicep/nested_roleAssignments.bicep @@ -69,7 +69,7 @@ var builtInRoleNames = { } resource gallery 'Microsoft.Compute/galleries@2021-10-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Compute/images/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Compute/images/.bicep/nested_roleAssignments.bicep index 7eab60207b..5535d7cce5 100644 --- a/modules/Microsoft.Compute/images/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Compute/images/.bicep/nested_roleAssignments.bicep @@ -69,7 +69,7 @@ var builtInRoleNames = { } resource image 'Microsoft.Compute/images@2021-04-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Compute/proximityPlacementGroups/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Compute/proximityPlacementGroups/.bicep/nested_roleAssignments.bicep index 06dd696a13..219f3566f0 100644 --- a/modules/Microsoft.Compute/proximityPlacementGroups/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Compute/proximityPlacementGroups/.bicep/nested_roleAssignments.bicep @@ -69,7 +69,7 @@ var builtInRoleNames = { } resource proximityPlacementGroup 'Microsoft.Compute/proximityPlacementGroups@2021-04-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Compute/virtualMachineScaleSets/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Compute/virtualMachineScaleSets/.bicep/nested_roleAssignments.bicep index 3b83ae817d..1001b308c3 100644 --- a/modules/Microsoft.Compute/virtualMachineScaleSets/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Compute/virtualMachineScaleSets/.bicep/nested_roleAssignments.bicep @@ -69,7 +69,7 @@ var builtInRoleNames = { } resource vmss 'Microsoft.Compute/virtualMachineScaleSets@2021-04-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Compute/virtualMachineScaleSets/deploy.bicep b/modules/Microsoft.Compute/virtualMachineScaleSets/deploy.bicep index a2d4817bb9..cfada8e96e 100644 --- a/modules/Microsoft.Compute/virtualMachineScaleSets/deploy.bicep +++ b/modules/Microsoft.Compute/virtualMachineScaleSets/deploy.bicep @@ -504,7 +504,7 @@ module vmss_microsoftAntiMalwareExtension 'extensions/deploy.bicep' = if (extens } resource vmss_logAnalyticsWorkspace 'Microsoft.OperationalInsights/workspaces@2021-06-01' existing = if (!empty(monitoringWorkspaceId)) { - name: last(split(monitoringWorkspaceId, '/')) + name: last(split(monitoringWorkspaceId, '/'))! scope: resourceGroup(split(monitoringWorkspaceId, '/')[2], split(monitoringWorkspaceId, '/')[4]) } diff --git a/modules/Microsoft.Compute/virtualMachines/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Compute/virtualMachines/.bicep/nested_roleAssignments.bicep index cab3f981fd..481c9cd2b0 100644 --- a/modules/Microsoft.Compute/virtualMachines/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Compute/virtualMachines/.bicep/nested_roleAssignments.bicep @@ -69,7 +69,7 @@ var builtInRoleNames = { } resource virtualMachine 'Microsoft.Compute/virtualMachines@2021-07-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Compute/virtualMachines/deploy.bicep b/modules/Microsoft.Compute/virtualMachines/deploy.bicep index 431598d160..2ba72c507c 100644 --- a/modules/Microsoft.Compute/virtualMachines/deploy.bicep +++ b/modules/Microsoft.Compute/virtualMachines/deploy.bicep @@ -568,7 +568,7 @@ module vm_microsoftAntiMalwareExtension 'extensions/deploy.bicep' = if (extensio } resource vm_logAnalyticsWorkspace 'Microsoft.OperationalInsights/workspaces@2021-06-01' existing = if (!empty(monitoringWorkspaceId)) { - name: last(split(monitoringWorkspaceId, '/')) + name: last(split(monitoringWorkspaceId, '/'))! scope: az.resourceGroup(split(monitoringWorkspaceId, '/')[2], split(monitoringWorkspaceId, '/')[4]) } diff --git a/modules/Microsoft.ContainerInstance/containerGroups/deploy.bicep b/modules/Microsoft.ContainerInstance/containerGroups/deploy.bicep index 102f82d098..ccf8bcc9f2 100644 --- a/modules/Microsoft.ContainerInstance/containerGroups/deploy.bicep +++ b/modules/Microsoft.ContainerInstance/containerGroups/deploy.bicep @@ -115,12 +115,12 @@ resource defaultTelemetry 'Microsoft.Resources/deployments@2021-04-01' = if (ena } resource cmkKeyVault 'Microsoft.KeyVault/vaults@2021-06-01-preview' existing = if (!empty(cMKKeyVaultResourceId)) { - name: last(split(cMKKeyVaultResourceId, '/')) + name: last(split(cMKKeyVaultResourceId, '/'))! scope: resourceGroup(split(cMKKeyVaultResourceId, '/')[2], split(cMKKeyVaultResourceId, '/')[4]) } resource cMKKeyVaultKey 'Microsoft.KeyVault/vaults/keys@2021-10-01' existing = if (!empty(cMKKeyVaultResourceId) && !empty(cMKKeyName)) { - name: '${last(split(cMKKeyVaultResourceId, '/'))}/${cMKKeyName}' + name: '${last(split(cMKKeyVaultResourceId, '/'))}/${cMKKeyName}'! scope: resourceGroup(split(cMKKeyVaultResourceId, '/')[2], split(cMKKeyVaultResourceId, '/')[4]) } diff --git a/modules/Microsoft.ContainerRegistry/registries/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.ContainerRegistry/registries/.bicep/nested_roleAssignments.bicep index 5d61532077..f52f72fb00 100644 --- a/modules/Microsoft.ContainerRegistry/registries/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.ContainerRegistry/registries/.bicep/nested_roleAssignments.bicep @@ -56,7 +56,7 @@ var builtInRoleNames = { } resource registry 'Microsoft.ContainerRegistry/registries@2021-09-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.ContainerRegistry/registries/deploy.bicep b/modules/Microsoft.ContainerRegistry/registries/deploy.bicep index 373c3b467a..69c2b86b73 100644 --- a/modules/Microsoft.ContainerRegistry/registries/deploy.bicep +++ b/modules/Microsoft.ContainerRegistry/registries/deploy.bicep @@ -237,7 +237,7 @@ resource defaultTelemetry 'Microsoft.Resources/deployments@2021-04-01' = if (ena } resource cMKUserAssignedIdentity 'Microsoft.ManagedIdentity/userAssignedIdentities@2018-11-30' existing = if (!empty(cMKUserAssignedIdentityResourceId)) { - name: last(split(cMKUserAssignedIdentityResourceId, '/')) + name: last(split(cMKUserAssignedIdentityResourceId, '/'))! scope: resourceGroup(split(cMKUserAssignedIdentityResourceId, '/')[2], split(cMKUserAssignedIdentityResourceId, '/')[4]) } diff --git a/modules/Microsoft.ContainerService/managedClusters/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.ContainerService/managedClusters/.bicep/nested_roleAssignments.bicep index 371cc24e6d..76ec2d9279 100644 --- a/modules/Microsoft.ContainerService/managedClusters/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.ContainerService/managedClusters/.bicep/nested_roleAssignments.bicep @@ -63,7 +63,7 @@ var builtInRoleNames = { } resource managedCluster 'Microsoft.ContainerService/managedClusters@2022-04-02-preview' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.DBforPostgreSQL/flexibleServers/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.DBforPostgreSQL/flexibleServers/.bicep/nested_roleAssignments.bicep index 09ffe05521..b6ca729690 100644 --- a/modules/Microsoft.DBforPostgreSQL/flexibleServers/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.DBforPostgreSQL/flexibleServers/.bicep/nested_roleAssignments.bicep @@ -50,7 +50,7 @@ var builtInRoleNames = { } resource flexibleServer 'Microsoft.DBforPostgreSQL/flexibleServers@2022-01-20-preview' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.DataFactory/factories/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.DataFactory/factories/.bicep/nested_roleAssignments.bicep index 425ca3da84..602a515be8 100644 --- a/modules/Microsoft.DataFactory/factories/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.DataFactory/factories/.bicep/nested_roleAssignments.bicep @@ -51,7 +51,7 @@ var builtInRoleNames = { } resource dataFactory 'Microsoft.DataFactory/factories@2018-06-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.DataFactory/factories/deploy.bicep b/modules/Microsoft.DataFactory/factories/deploy.bicep index e40458ab16..92dba79597 100644 --- a/modules/Microsoft.DataFactory/factories/deploy.bicep +++ b/modules/Microsoft.DataFactory/factories/deploy.bicep @@ -165,7 +165,7 @@ var identity = identityType != 'None' ? { var enableReferencedModulesTelemetry = false resource cMKKeyVault 'Microsoft.KeyVault/vaults@2021-10-01' existing = if (!empty(cMKKeyVaultResourceId)) { - name: last(split(cMKKeyVaultResourceId, '/')) + name: last(split(cMKKeyVaultResourceId, '/'))! scope: resourceGroup(split(cMKKeyVaultResourceId, '/')[2], split(cMKKeyVaultResourceId, '/')[4]) } diff --git a/modules/Microsoft.DataProtection/backupVaults/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.DataProtection/backupVaults/.bicep/nested_roleAssignments.bicep index 8bdd8e3cbf..c6f393cae4 100644 --- a/modules/Microsoft.DataProtection/backupVaults/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.DataProtection/backupVaults/.bicep/nested_roleAssignments.bicep @@ -53,7 +53,7 @@ var builtInRoleNames = { } resource backupVault 'Microsoft.DataProtection/backupVaults@2022-03-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Databricks/workspaces/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Databricks/workspaces/.bicep/nested_roleAssignments.bicep index 63661c9c38..22520b5668 100644 --- a/modules/Microsoft.Databricks/workspaces/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Databricks/workspaces/.bicep/nested_roleAssignments.bicep @@ -50,7 +50,7 @@ var builtInRoleNames = { } resource workspace 'Microsoft.Databricks/workspaces@2018-04-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.DesktopVirtualization/applicationgroups/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.DesktopVirtualization/applicationgroups/.bicep/nested_roleAssignments.bicep index a35ca0548f..1aee597f5a 100644 --- a/modules/Microsoft.DesktopVirtualization/applicationgroups/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.DesktopVirtualization/applicationgroups/.bicep/nested_roleAssignments.bicep @@ -64,7 +64,7 @@ var builtInRoleNames = { } resource appGroup 'Microsoft.DesktopVirtualization/applicationgroups@2021-07-12' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.DesktopVirtualization/scalingplans/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.DesktopVirtualization/scalingplans/.bicep/nested_roleAssignments.bicep index 6ca2747da0..0d14135f56 100644 --- a/modules/Microsoft.DesktopVirtualization/scalingplans/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.DesktopVirtualization/scalingplans/.bicep/nested_roleAssignments.bicep @@ -64,7 +64,7 @@ var builtInRoleNames = { } resource scalingPlan 'Microsoft.DesktopVirtualization/scalingPlans@2022-04-01-preview' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.DevTestLab/labs/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.DevTestLab/labs/.bicep/nested_roleAssignments.bicep index 33b6b89a51..63c64c9666 100644 --- a/modules/Microsoft.DevTestLab/labs/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.DevTestLab/labs/.bicep/nested_roleAssignments.bicep @@ -52,7 +52,7 @@ var builtInRoleNames = { } resource lab 'Microsoft.DevTestLab/labs@2018-09-15' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.DocumentDB/databaseAccounts/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.DocumentDB/databaseAccounts/.bicep/nested_roleAssignments.bicep index 738cbe492e..dbc76c08e2 100644 --- a/modules/Microsoft.DocumentDB/databaseAccounts/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.DocumentDB/databaseAccounts/.bicep/nested_roleAssignments.bicep @@ -55,7 +55,7 @@ var builtInRoleNames = { } resource databaseAccount 'Microsoft.DocumentDB/databaseAccounts@2022-08-15' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.DocumentDB/databaseAccounts/gremlinDatabases/deploy.bicep b/modules/Microsoft.DocumentDB/databaseAccounts/gremlinDatabases/deploy.bicep index 77bb2ee40b..46d819a5c6 100644 --- a/modules/Microsoft.DocumentDB/databaseAccounts/gremlinDatabases/deploy.bicep +++ b/modules/Microsoft.DocumentDB/databaseAccounts/gremlinDatabases/deploy.bicep @@ -29,11 +29,6 @@ var enableReferencedModulesTelemetry = false var identityType = systemAssignedIdentity ? (!empty(userAssignedIdentities) ? 'SystemAssigned, UserAssigned' : 'SystemAssigned') : (!empty(userAssignedIdentities) ? 'UserAssigned' : 'None') -var identity = identityType != 'None' ? { - type: identityType - userAssignedIdentities: !empty(userAssignedIdentities) ? userAssignedIdentities : null -} : null - resource defaultTelemetry 'Microsoft.Resources/deployments@2021-04-01' = if (enableDefaultTelemetry) { name: 'pid-47ed15a6-730a-4827-bcb4-0fd963ffbd82-${uniqueString(deployment().name)}' properties: { @@ -61,7 +56,10 @@ resource gremlinDatabase 'Microsoft.DocumentDB/databaseAccounts/gremlinDatabases name: name tags: tags parent: databaseAccount - identity: identity + identity: (identityType != 'None' ? { + type: identityType + userAssignedIdentities: !empty(userAssignedIdentities) ? userAssignedIdentities : null + } : null)! properties: { options: databaseOptions resource: { diff --git a/modules/Microsoft.EventGrid/domains/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.EventGrid/domains/.bicep/nested_roleAssignments.bicep index ec6f0bcf69..24298f3f65 100644 --- a/modules/Microsoft.EventGrid/domains/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.EventGrid/domains/.bicep/nested_roleAssignments.bicep @@ -56,7 +56,7 @@ var builtInRoleNames = { } resource domain 'Microsoft.EventGrid/domains@2022-06-15' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.EventGrid/systemTopics/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.EventGrid/systemTopics/.bicep/nested_roleAssignments.bicep index 770749be80..0c5e1742a5 100644 --- a/modules/Microsoft.EventGrid/systemTopics/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.EventGrid/systemTopics/.bicep/nested_roleAssignments.bicep @@ -56,7 +56,7 @@ var builtInRoleNames = { } resource systemTopic 'Microsoft.EventGrid/systemTopics@2021-12-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.EventGrid/topics/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.EventGrid/topics/.bicep/nested_roleAssignments.bicep index d664c9f25c..8d9f2d8716 100644 --- a/modules/Microsoft.EventGrid/topics/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.EventGrid/topics/.bicep/nested_roleAssignments.bicep @@ -56,7 +56,7 @@ var builtInRoleNames = { } resource eventGrid 'Microsoft.EventGrid/topics@2020-06-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.EventHub/namespaces/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.EventHub/namespaces/.bicep/nested_roleAssignments.bicep index 3a9c4d892e..ce3d1715c5 100644 --- a/modules/Microsoft.EventHub/namespaces/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.EventHub/namespaces/.bicep/nested_roleAssignments.bicep @@ -55,7 +55,7 @@ var builtInRoleNames = { } resource eventHubNamespace 'Microsoft.EventHub/namespaces@2021-11-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.HealthBot/healthBots/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.HealthBot/healthBots/.bicep/nested_roleAssignments.bicep index 732a2fffc5..4ff5ec8671 100644 --- a/modules/Microsoft.HealthBot/healthBots/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.HealthBot/healthBots/.bicep/nested_roleAssignments.bicep @@ -50,7 +50,7 @@ var builtInRoleNames = { } resource healthBot 'Microsoft.HealthBot/healthBots@2021-06-10' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.HealthcareApis/workspaces/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.HealthcareApis/workspaces/.bicep/nested_roleAssignments.bicep index 7652376ede..62a7c1b5ed 100644 --- a/modules/Microsoft.HealthcareApis/workspaces/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.HealthcareApis/workspaces/.bicep/nested_roleAssignments.bicep @@ -58,7 +58,7 @@ var builtInRoleNames = { } resource workspace 'Microsoft.HealthcareApis/workspaces@2022-06-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Insights/actionGroups/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Insights/actionGroups/.bicep/nested_roleAssignments.bicep index 2e4c755031..9caffdadd7 100644 --- a/modules/Microsoft.Insights/actionGroups/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Insights/actionGroups/.bicep/nested_roleAssignments.bicep @@ -177,7 +177,7 @@ var builtInRoleNames = { } resource actionGroup 'microsoft.insights/actionGroups@2019-06-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Insights/activityLogAlerts/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Insights/activityLogAlerts/.bicep/nested_roleAssignments.bicep index 7123c40e21..e26ff76649 100644 --- a/modules/Microsoft.Insights/activityLogAlerts/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Insights/activityLogAlerts/.bicep/nested_roleAssignments.bicep @@ -177,7 +177,7 @@ var builtInRoleNames = { } resource activityLogAlert 'Microsoft.Insights/activityLogAlerts@2020-10-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Insights/components/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Insights/components/.bicep/nested_roleAssignments.bicep index e90efd8249..d0d453ebfa 100644 --- a/modules/Microsoft.Insights/components/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Insights/components/.bicep/nested_roleAssignments.bicep @@ -177,7 +177,7 @@ var builtInRoleNames = { } resource appInsights 'Microsoft.Insights/components@2020-02-02' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Insights/dataCollectionEndpoints/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Insights/dataCollectionEndpoints/.bicep/nested_roleAssignments.bicep index 0ff6a8fa4f..3ffa2a553c 100644 --- a/modules/Microsoft.Insights/dataCollectionEndpoints/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Insights/dataCollectionEndpoints/.bicep/nested_roleAssignments.bicep @@ -178,7 +178,7 @@ var builtInRoleNames = { } resource dataCollectionEndpoint 'Microsoft.Insights/dataCollectionEndpoints@2021-04-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Insights/metricAlerts/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Insights/metricAlerts/.bicep/nested_roleAssignments.bicep index 14926339c1..421339ccd6 100644 --- a/modules/Microsoft.Insights/metricAlerts/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Insights/metricAlerts/.bicep/nested_roleAssignments.bicep @@ -177,7 +177,7 @@ var builtInRoleNames = { } resource metricAlert 'Microsoft.Insights/metricAlerts@2018-03-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Insights/privateLinkScopes/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Insights/privateLinkScopes/.bicep/nested_roleAssignments.bicep index b8f3e4342a..0d5c50c4d6 100644 --- a/modules/Microsoft.Insights/privateLinkScopes/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Insights/privateLinkScopes/.bicep/nested_roleAssignments.bicep @@ -177,7 +177,7 @@ var builtInRoleNames = { } resource privateLinkScope 'Microsoft.Insights/privateLinkScopes@2019-10-17-preview' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Insights/scheduledQueryRules/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Insights/scheduledQueryRules/.bicep/nested_roleAssignments.bicep index e3b7bae2c0..cb859b6e02 100644 --- a/modules/Microsoft.Insights/scheduledQueryRules/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Insights/scheduledQueryRules/.bicep/nested_roleAssignments.bicep @@ -177,7 +177,7 @@ var builtInRoleNames = { } resource queryAlert 'microsoft.insights/scheduledQueryRules@2018-04-16' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.KeyVault/vaults/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.KeyVault/vaults/.bicep/nested_roleAssignments.bicep index d8e9a3646e..703da7d9fd 100644 --- a/modules/Microsoft.KeyVault/vaults/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.KeyVault/vaults/.bicep/nested_roleAssignments.bicep @@ -61,7 +61,7 @@ var builtInRoleNames = { } resource keyVault 'Microsoft.KeyVault/vaults@2019-09-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Logic/workflows/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Logic/workflows/.bicep/nested_roleAssignments.bicep index 7ae5755672..eea681537a 100644 --- a/modules/Microsoft.Logic/workflows/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Logic/workflows/.bicep/nested_roleAssignments.bicep @@ -56,7 +56,7 @@ var builtInRoleNames = { } resource logicApp 'Microsoft.Logic/workflows@2019-05-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.MachineLearningServices/workspaces/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.MachineLearningServices/workspaces/.bicep/nested_roleAssignments.bicep index ca6832b22c..13cf9a2109 100644 --- a/modules/Microsoft.MachineLearningServices/workspaces/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.MachineLearningServices/workspaces/.bicep/nested_roleAssignments.bicep @@ -55,7 +55,7 @@ var builtInRoleNames = { } resource workspace 'Microsoft.MachineLearningServices/workspaces@2022-05-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Maintenance/maintenanceConfigurations/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Maintenance/maintenanceConfigurations/.bicep/nested_roleAssignments.bicep index eb67c24478..e61842f731 100644 --- a/modules/Microsoft.Maintenance/maintenanceConfigurations/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Maintenance/maintenanceConfigurations/.bicep/nested_roleAssignments.bicep @@ -51,7 +51,7 @@ var builtInRoleNames = { } resource maintenanceConfiguration 'Microsoft.Maintenance/maintenanceConfigurations@2021-05-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.ManagedIdentity/userAssignedIdentities/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.ManagedIdentity/userAssignedIdentities/.bicep/nested_roleAssignments.bicep index 85e2552442..19a13565d0 100644 --- a/modules/Microsoft.ManagedIdentity/userAssignedIdentities/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.ManagedIdentity/userAssignedIdentities/.bicep/nested_roleAssignments.bicep @@ -52,7 +52,7 @@ var builtInRoleNames = { } resource userMsi 'Microsoft.ManagedIdentity/userAssignedIdentities@2018-11-30' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Management/managementGroups/deploy.bicep b/modules/Microsoft.Management/managementGroups/deploy.bicep index 4e8697c331..43c3105a89 100644 --- a/modules/Microsoft.Management/managementGroups/deploy.bicep +++ b/modules/Microsoft.Management/managementGroups/deploy.bicep @@ -7,7 +7,7 @@ param name string param displayName string = '' @description('Optional. The management group parent ID. Defaults to current scope.') -param parentId string = last(split(az.managementGroup().id, '/')) +param parentId string = last(split(az.managementGroup().id, '/'))! @description('Optional. Location deployment metadata.') param location string = deployment().location diff --git a/modules/Microsoft.NetApp/netAppAccounts/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.NetApp/netAppAccounts/.bicep/nested_roleAssignments.bicep index 650e9155a4..96eec8d35c 100644 --- a/modules/Microsoft.NetApp/netAppAccounts/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.NetApp/netAppAccounts/.bicep/nested_roleAssignments.bicep @@ -50,7 +50,7 @@ var builtInRoleNames = { } resource netAppAccount 'Microsoft.NetApp/netAppAccounts@2022-01-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/applicationSecurityGroups/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/applicationSecurityGroups/.bicep/nested_roleAssignments.bicep index f93e339165..45dcbb5790 100644 --- a/modules/Microsoft.Network/applicationSecurityGroups/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/applicationSecurityGroups/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource applicationSecurityGroup 'Microsoft.Network/applicationSecurityGroups@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/azureFirewalls/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/azureFirewalls/.bicep/nested_roleAssignments.bicep index 9bb7af9a87..3cc1c32e52 100644 --- a/modules/Microsoft.Network/azureFirewalls/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/azureFirewalls/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource azureFirewall 'Microsoft.Network/azureFirewalls@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/bastionHosts/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/bastionHosts/.bicep/nested_roleAssignments.bicep index 2a2a4a9da5..2745e53c5d 100644 --- a/modules/Microsoft.Network/bastionHosts/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/bastionHosts/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource azureBastion 'Microsoft.Network/bastionHosts@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/ddosProtectionPlans/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/ddosProtectionPlans/.bicep/nested_roleAssignments.bicep index db1bb5d472..eb0b83a9bd 100644 --- a/modules/Microsoft.Network/ddosProtectionPlans/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/ddosProtectionPlans/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource ddosProtectionPlan 'Microsoft.Network/ddosProtectionPlans@2022-07-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/dnsResolvers/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/dnsResolvers/.bicep/nested_roleAssignments.bicep index b9562d3d1e..851535918f 100644 --- a/modules/Microsoft.Network/dnsResolvers/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/dnsResolvers/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource dnsResolver 'Microsoft.Network/ddosProtectionPlans@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/expressRouteCircuits/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/expressRouteCircuits/.bicep/nested_roleAssignments.bicep index 39b7935902..422229d187 100644 --- a/modules/Microsoft.Network/expressRouteCircuits/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/expressRouteCircuits/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource expressRouteCircuits 'Microsoft.Network/expressRouteCircuits@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/frontDoors/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/frontDoors/.bicep/nested_roleAssignments.bicep index e7151eee17..a08c7fc5db 100644 --- a/modules/Microsoft.Network/frontDoors/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/frontDoors/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource frontDoor 'Microsoft.Network/frontDoors@2020-05-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/ipGroups/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/ipGroups/.bicep/nested_roleAssignments.bicep index d7301c8053..d7360aea21 100644 --- a/modules/Microsoft.Network/ipGroups/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/ipGroups/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource ipGroup 'Microsoft.Network/ipGroups@2022-07-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/loadBalancers/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/loadBalancers/.bicep/nested_roleAssignments.bicep index 02217ad0cd..9429a76569 100644 --- a/modules/Microsoft.Network/loadBalancers/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/loadBalancers/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource loadBalancer 'Microsoft.Network/loadBalancers@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/localNetworkGateways/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/localNetworkGateways/.bicep/nested_roleAssignments.bicep index c569cc6171..8ee1720331 100644 --- a/modules/Microsoft.Network/localNetworkGateways/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/localNetworkGateways/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource localNetworkGateway 'Microsoft.Network/localNetworkGateways@2022-07-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/natGateways/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/natGateways/.bicep/nested_roleAssignments.bicep index 633fcc49c7..a732b89238 100644 --- a/modules/Microsoft.Network/natGateways/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/natGateways/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource natGateway 'Microsoft.Network/natGateways@2022-07-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/networkInterfaces/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/networkInterfaces/.bicep/nested_roleAssignments.bicep index 2066adef4b..4daeb86cdd 100644 --- a/modules/Microsoft.Network/networkInterfaces/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/networkInterfaces/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource networkInterface 'Microsoft.Network/networkInterfaces@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/networkManagers/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/networkManagers/.bicep/nested_roleAssignments.bicep index 2060aa9e25..80d273028c 100644 --- a/modules/Microsoft.Network/networkManagers/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/networkManagers/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource networkManager 'Microsoft.Network/networkManagers@2022-07-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/networkSecurityGroups/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/networkSecurityGroups/.bicep/nested_roleAssignments.bicep index cfca38f0cc..338893afb7 100644 --- a/modules/Microsoft.Network/networkSecurityGroups/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/networkSecurityGroups/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource networkSecurityGroup 'Microsoft.Network/networkSecurityGroups@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/networkWatchers/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/networkWatchers/.bicep/nested_roleAssignments.bicep index 2a403fcfa8..312a15a924 100644 --- a/modules/Microsoft.Network/networkWatchers/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/networkWatchers/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource networkWatcher 'Microsoft.Network/networkWatchers@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/privateDnsZones/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/privateDnsZones/.bicep/nested_roleAssignments.bicep index df9f3b4ad3..0f3aa46415 100644 --- a/modules/Microsoft.Network/privateDnsZones/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/privateDnsZones/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource privateDnsZone 'Microsoft.Network/privateDnsZones@2018-09-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/privateEndpoints/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/privateEndpoints/.bicep/nested_roleAssignments.bicep index 7481547f06..4a11b40a0c 100644 --- a/modules/Microsoft.Network/privateEndpoints/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/privateEndpoints/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource privateEndpoint 'Microsoft.Network/privateEndpoints@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/privateEndpoints/privateDnsZoneGroups/deploy.bicep b/modules/Microsoft.Network/privateEndpoints/privateDnsZoneGroups/deploy.bicep index c5aa1fd1bf..7f0064f68b 100644 --- a/modules/Microsoft.Network/privateEndpoints/privateDnsZoneGroups/deploy.bicep +++ b/modules/Microsoft.Network/privateEndpoints/privateDnsZoneGroups/deploy.bicep @@ -25,7 +25,7 @@ resource defaultTelemetry 'Microsoft.Resources/deployments@2021-04-01' = if (ena } var privateDnsZoneConfigs = [for privateDNSResourceId in privateDNSResourceIds: { - name: last(split(privateDNSResourceId, '/')) + name: last(split(privateDNSResourceId, '/'))! properties: { privateDnsZoneId: privateDNSResourceId } diff --git a/modules/Microsoft.Network/privateLinkServices/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/privateLinkServices/.bicep/nested_roleAssignments.bicep index a1d93445f4..4b567558e1 100644 --- a/modules/Microsoft.Network/privateLinkServices/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/privateLinkServices/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource privateLinkService 'Microsoft.Network/privateLinkServices@2022-01-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/publicIPAddresses/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/publicIPAddresses/.bicep/nested_roleAssignments.bicep index d972966f38..350d03736c 100644 --- a/modules/Microsoft.Network/publicIPAddresses/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/publicIPAddresses/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource publicIpAddress 'Microsoft.Network/publicIPAddresses@2022-07-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/publicIPPrefixes/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/publicIPPrefixes/.bicep/nested_roleAssignments.bicep index da2a0b4f9b..eda08a659e 100644 --- a/modules/Microsoft.Network/publicIPPrefixes/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/publicIPPrefixes/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource publicIpPrefix 'Microsoft.Network/publicIPPrefixes@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/routeTables/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/routeTables/.bicep/nested_roleAssignments.bicep index 42d10a9dad..838fe20667 100644 --- a/modules/Microsoft.Network/routeTables/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/routeTables/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource routeTable 'Microsoft.Network/routeTables@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/trafficmanagerprofiles/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/trafficmanagerprofiles/.bicep/nested_roleAssignments.bicep index c809d85a69..0368ff96fd 100644 --- a/modules/Microsoft.Network/trafficmanagerprofiles/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/trafficmanagerprofiles/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource trafficmanagerprofile 'Microsoft.Network/trafficmanagerprofiles@2018-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/virtualNetworkGateways/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/virtualNetworkGateways/.bicep/nested_roleAssignments.bicep index ca8ae42df8..40c8c3d213 100644 --- a/modules/Microsoft.Network/virtualNetworkGateways/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/virtualNetworkGateways/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource virtualNetworkGateway 'Microsoft.Network/virtualNetworkGateways@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/virtualNetworks/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/virtualNetworks/.bicep/nested_roleAssignments.bicep index cec8adeb11..7a408efc6d 100644 --- a/modules/Microsoft.Network/virtualNetworks/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/virtualNetworks/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource virtualNetwork 'Microsoft.Network/virtualNetworks@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/virtualNetworks/deploy.bicep b/modules/Microsoft.Network/virtualNetworks/deploy.bicep index e69b049a0d..c0e30ddfa8 100644 --- a/modules/Microsoft.Network/virtualNetworks/deploy.bicep +++ b/modules/Microsoft.Network/virtualNetworks/deploy.bicep @@ -233,7 +233,7 @@ module virtualNetwork_peering_remote 'virtualNetworkPeerings/deploy.bicep' = [fo name: '${uniqueString(deployment().name, location)}-virtualNetworkPeering-remote-${index}' scope: resourceGroup(split(peering.remoteVirtualNetworkId, '/')[2], split(peering.remoteVirtualNetworkId, '/')[4]) params: { - localVnetName: last(split(peering.remoteVirtualNetworkId, '/')) + localVnetName: last(split(peering.remoteVirtualNetworkId, '/'))! remoteVirtualNetworkId: virtualNetwork.id name: contains(peering, 'remotePeeringName') ? peering.remotePeeringName : '${last(split(peering.remoteVirtualNetworkId, '/'))}-${name}' allowForwardedTraffic: contains(peering, 'remotePeeringAllowForwardedTraffic') ? peering.remotePeeringAllowForwardedTraffic : true diff --git a/modules/Microsoft.Network/virtualWans/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/virtualWans/.bicep/nested_roleAssignments.bicep index ec95146136..9a3e0ca255 100644 --- a/modules/Microsoft.Network/virtualWans/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/virtualWans/.bicep/nested_roleAssignments.bicep @@ -75,7 +75,7 @@ var builtInRoleNames = { } resource virtualWan 'Microsoft.Network/virtualWans@2021-08-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Network/vpnSites/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Network/vpnSites/.bicep/nested_roleAssignments.bicep index e676fb953c..bfc115f9e6 100644 --- a/modules/Microsoft.Network/vpnSites/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Network/vpnSites/.bicep/nested_roleAssignments.bicep @@ -45,7 +45,7 @@ var builtInRoleNames = { } resource vpnSite 'Microsoft.Network/vpnSites@2022-07-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.OperationalInsights/workspaces/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.OperationalInsights/workspaces/.bicep/nested_roleAssignments.bicep index 7c90ac5b64..c5678e3ea9 100644 --- a/modules/Microsoft.OperationalInsights/workspaces/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.OperationalInsights/workspaces/.bicep/nested_roleAssignments.bicep @@ -57,7 +57,7 @@ var builtInRoleNames = { } resource logAnalyticsWorkspace 'Microsoft.OperationalInsights/workspaces@2021-06-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.OperationalInsights/workspaces/storageInsightConfigs/deploy.bicep b/modules/Microsoft.OperationalInsights/workspaces/storageInsightConfigs/deploy.bicep index cd4af9e97f..90ee2961b7 100644 --- a/modules/Microsoft.OperationalInsights/workspaces/storageInsightConfigs/deploy.bicep +++ b/modules/Microsoft.OperationalInsights/workspaces/storageInsightConfigs/deploy.bicep @@ -32,7 +32,7 @@ resource defaultTelemetry 'Microsoft.Resources/deployments@2021-04-01' = if (ena } resource storageAccount 'Microsoft.Storage/storageAccounts@2021-06-01' existing = { - name: last(split(storageAccountId, '/')) + name: last(split(storageAccountId, '/'))! } resource workspace 'Microsoft.OperationalInsights/workspaces@2021-06-01' existing = { diff --git a/modules/Microsoft.Purview/accounts/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Purview/accounts/.bicep/nested_roleAssignments.bicep index 0287728458..726c2313a3 100644 --- a/modules/Microsoft.Purview/accounts/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Purview/accounts/.bicep/nested_roleAssignments.bicep @@ -53,7 +53,7 @@ var builtInRoleNames = { } resource purviewAccount 'Microsoft.Purview/accounts@2021-07-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.RecoveryServices/vaults/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.RecoveryServices/vaults/.bicep/nested_roleAssignments.bicep index 338e62dce6..cbc4955998 100644 --- a/modules/Microsoft.RecoveryServices/vaults/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.RecoveryServices/vaults/.bicep/nested_roleAssignments.bicep @@ -57,7 +57,7 @@ var builtInRoleNames = { } resource rsv 'Microsoft.RecoveryServices/vaults@2022-09-10' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.ServiceBus/namespaces/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.ServiceBus/namespaces/.bicep/nested_roleAssignments.bicep index d7059e06a3..113b9ea501 100644 --- a/modules/Microsoft.ServiceBus/namespaces/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.ServiceBus/namespaces/.bicep/nested_roleAssignments.bicep @@ -53,7 +53,7 @@ var builtInRoleNames = { } resource namespace 'Microsoft.ServiceBus/namespaces@2021-11-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.ServiceBus/namespaces/deploy.bicep b/modules/Microsoft.ServiceBus/namespaces/deploy.bicep index d04dfceb68..787cb4f046 100644 --- a/modules/Microsoft.ServiceBus/namespaces/deploy.bicep +++ b/modules/Microsoft.ServiceBus/namespaces/deploy.bicep @@ -173,12 +173,12 @@ resource defaultTelemetry 'Microsoft.Resources/deployments@2021-04-01' = if (ena } resource cMKKeyVault 'Microsoft.KeyVault/vaults@2021-10-01' existing = if (!empty(cMKKeyVaultResourceId)) { - name: last(split(cMKKeyVaultResourceId, '/')) + name: last(split(cMKKeyVaultResourceId, '/'))! scope: resourceGroup(split(cMKKeyVaultResourceId, '/')[2], split(cMKKeyVaultResourceId, '/')[4]) } resource cMKKeyVaultKey 'Microsoft.KeyVault/vaults/keys@2021-10-01' existing = if (!empty(cMKKeyVaultResourceId) && !empty(cMKKeyName)) { - name: '${last(split(cMKKeyVaultResourceId, '/'))}/${cMKKeyName}' + name: '${last(split(cMKKeyVaultResourceId, '/'))}/${cMKKeyName}'! scope: resourceGroup(split(cMKKeyVaultResourceId, '/')[2], split(cMKKeyVaultResourceId, '/')[4]) } diff --git a/modules/Microsoft.ServiceFabric/clusters/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.ServiceFabric/clusters/.bicep/nested_roleAssignments.bicep index 3fda3eec0e..9286fecdae 100644 --- a/modules/Microsoft.ServiceFabric/clusters/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.ServiceFabric/clusters/.bicep/nested_roleAssignments.bicep @@ -50,7 +50,7 @@ var builtInRoleNames = { } resource serviceFabricCluster 'Microsoft.ServiceFabric/clusters@2021-06-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.SignalRService/signalR/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.SignalRService/signalR/.bicep/nested_roleAssignments.bicep index b2cdd35571..27c5f8a0d9 100644 --- a/modules/Microsoft.SignalRService/signalR/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.SignalRService/signalR/.bicep/nested_roleAssignments.bicep @@ -58,7 +58,7 @@ var builtInRoleNames = { } resource signalR 'Microsoft.SignalRService/signalR@2022-02-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.SignalRService/webPubSub/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.SignalRService/webPubSub/.bicep/nested_roleAssignments.bicep index 68110f398a..25f58111c2 100644 --- a/modules/Microsoft.SignalRService/webPubSub/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.SignalRService/webPubSub/.bicep/nested_roleAssignments.bicep @@ -58,7 +58,7 @@ var builtInRoleNames = { } resource webPubSub 'Microsoft.SignalRService/webPubSub@2021-10-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Sql/managedInstances/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Sql/managedInstances/.bicep/nested_roleAssignments.bicep index f503d3d3bb..48a68284ab 100644 --- a/modules/Microsoft.Sql/managedInstances/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Sql/managedInstances/.bicep/nested_roleAssignments.bicep @@ -55,7 +55,7 @@ var builtInRoleNames = { } resource managedInstance 'Microsoft.Sql/managedInstances@2022-02-01-preview' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Sql/managedInstances/databases/deploy.bicep b/modules/Microsoft.Sql/managedInstances/databases/deploy.bicep index e7392c82d4..6acae2547f 100644 --- a/modules/Microsoft.Sql/managedInstances/databases/deploy.bicep +++ b/modules/Microsoft.Sql/managedInstances/databases/deploy.bicep @@ -178,7 +178,7 @@ module database_backupShortTermRetentionPolicy 'backupShortTermRetentionPolicies name: '${deployment().name}-BackupShortTRetPol' params: { managedInstanceName: managedInstanceName - databaseName: last(split(database.name, '/')) + databaseName: last(split(database.name, '/'))! name: backupShortTermRetentionPoliciesObj.name retentionDays: contains(backupShortTermRetentionPoliciesObj, 'retentionDays') ? backupShortTermRetentionPoliciesObj.retentionDays : 35 enableDefaultTelemetry: enableReferencedModulesTelemetry @@ -189,7 +189,7 @@ module database_backupLongTermRetentionPolicy 'backupLongTermRetentionPolicies/d name: '${deployment().name}-BackupLongTRetPol' params: { managedInstanceName: managedInstanceName - databaseName: last(split(database.name, '/')) + databaseName: last(split(database.name, '/'))! name: backupLongTermRetentionPoliciesObj.name weekOfYear: contains(backupLongTermRetentionPoliciesObj, 'weekOfYear') ? backupLongTermRetentionPoliciesObj.weekOfYear : 5 weeklyRetention: contains(backupLongTermRetentionPoliciesObj, 'weeklyRetention') ? backupLongTermRetentionPoliciesObj.weeklyRetention : 'P1M' diff --git a/modules/Microsoft.Sql/servers/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Sql/servers/.bicep/nested_roleAssignments.bicep index cd8330d40b..6967264751 100644 --- a/modules/Microsoft.Sql/servers/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Sql/servers/.bicep/nested_roleAssignments.bicep @@ -55,7 +55,7 @@ var builtInRoleNames = { } resource server 'Microsoft.Sql/servers@2022-02-01-preview' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Storage/storageAccounts/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Storage/storageAccounts/.bicep/nested_roleAssignments.bicep index ae1fe0ba35..42446f6746 100644 --- a/modules/Microsoft.Storage/storageAccounts/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Storage/storageAccounts/.bicep/nested_roleAssignments.bicep @@ -78,7 +78,7 @@ var builtInRoleNames = { } resource storageAccount 'Microsoft.Storage/storageAccounts@2022-05-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Storage/storageAccounts/deploy.bicep b/modules/Microsoft.Storage/storageAccounts/deploy.bicep index 9a05b78792..03d3f8830a 100644 --- a/modules/Microsoft.Storage/storageAccounts/deploy.bicep +++ b/modules/Microsoft.Storage/storageAccounts/deploy.bicep @@ -235,7 +235,7 @@ resource defaultTelemetry 'Microsoft.Resources/deployments@2021-04-01' = if (ena } resource keyVault 'Microsoft.KeyVault/vaults@2021-06-01-preview' existing = if (!empty(cMKKeyVaultResourceId)) { - name: last(split(cMKKeyVaultResourceId, '/')) + name: last(split(cMKKeyVaultResourceId, '/'))! scope: resourceGroup(split(cMKKeyVaultResourceId, '/')[2], split(cMKKeyVaultResourceId, '/')[4]) } diff --git a/modules/Microsoft.Synapse/privateLinkHubs/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Synapse/privateLinkHubs/.bicep/nested_roleAssignments.bicep index 488d8c7feb..e6851ad570 100644 --- a/modules/Microsoft.Synapse/privateLinkHubs/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Synapse/privateLinkHubs/.bicep/nested_roleAssignments.bicep @@ -50,7 +50,7 @@ var builtInRoleNames = { } resource privateLinkHub 'Microsoft.Synapse/privateLinkHubs@2021-06-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Synapse/workspaces/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Synapse/workspaces/.bicep/nested_roleAssignments.bicep index 3c819e4ab1..b94aef4cf6 100644 --- a/modules/Microsoft.Synapse/workspaces/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Synapse/workspaces/.bicep/nested_roleAssignments.bicep @@ -19,7 +19,7 @@ var builtInRoleNames = { } resource workspace 'Microsoft.Synapse/workspaces@2021-06-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Synapse/workspaces/deploy.bicep b/modules/Microsoft.Synapse/workspaces/deploy.bicep index f83f5fe890..6f782413cb 100644 --- a/modules/Microsoft.Synapse/workspaces/deploy.bicep +++ b/modules/Microsoft.Synapse/workspaces/deploy.bicep @@ -164,7 +164,7 @@ var diagnosticsLogs = contains(diagnosticLogCategoriesToEnable, 'allLogs') ? [ var enableReferencedModulesTelemetry = false resource cMKKeyVault 'Microsoft.KeyVault/vaults@2021-10-01' existing = if (!empty(cMKKeyVaultResourceId)) { - name: last(split(cMKKeyVaultResourceId, '/')) + name: last(split(cMKKeyVaultResourceId, '/'))! scope: resourceGroup(split(cMKKeyVaultResourceId, '/')[2], split(cMKKeyVaultResourceId, '/')[4]) } diff --git a/modules/Microsoft.VirtualMachineImages/imageTemplates/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.VirtualMachineImages/imageTemplates/.bicep/nested_roleAssignments.bicep index 83e19de362..9d8fad5c60 100644 --- a/modules/Microsoft.VirtualMachineImages/imageTemplates/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.VirtualMachineImages/imageTemplates/.bicep/nested_roleAssignments.bicep @@ -50,7 +50,7 @@ var builtInRoleNames = { } resource imageTemplate 'Microsoft.VirtualMachineImages/imageTemplates@2020-02-14' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Web/connections/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Web/connections/.bicep/nested_roleAssignments.bicep index 235d72fbeb..116b78de2c 100644 --- a/modules/Microsoft.Web/connections/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Web/connections/.bicep/nested_roleAssignments.bicep @@ -56,7 +56,7 @@ var builtInRoleNames = { } resource connection 'Microsoft.Web/connections@2016-06-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Web/hostingEnvironments/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Web/hostingEnvironments/.bicep/nested_roleAssignments.bicep index 7985507ef6..1d4ebf0c56 100644 --- a/modules/Microsoft.Web/hostingEnvironments/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Web/hostingEnvironments/.bicep/nested_roleAssignments.bicep @@ -56,7 +56,7 @@ var builtInRoleNames = { } resource appServiceEnvironment 'Microsoft.Web/hostingEnvironments@2021-02-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Web/serverfarms/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Web/serverfarms/.bicep/nested_roleAssignments.bicep index 596ec5c47f..ceb4ae0d8f 100644 --- a/modules/Microsoft.Web/serverfarms/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Web/serverfarms/.bicep/nested_roleAssignments.bicep @@ -56,7 +56,7 @@ var builtInRoleNames = { } resource appServicePlan 'Microsoft.Web/serverfarms@2021-02-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Web/sites/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Web/sites/.bicep/nested_roleAssignments.bicep index 522ff59f5f..d78b6261b6 100644 --- a/modules/Microsoft.Web/sites/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Web/sites/.bicep/nested_roleAssignments.bicep @@ -56,7 +56,7 @@ var builtInRoleNames = { } resource app 'Microsoft.Web/sites@2020-12-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: { diff --git a/modules/Microsoft.Web/sites/config-appsettings/deploy.bicep b/modules/Microsoft.Web/sites/config-appsettings/deploy.bicep index bb68b2f1ff..982ae70ab1 100644 --- a/modules/Microsoft.Web/sites/config-appsettings/deploy.bicep +++ b/modules/Microsoft.Web/sites/config-appsettings/deploy.bicep @@ -53,12 +53,12 @@ resource app 'Microsoft.Web/sites@2022-03-01' existing = { } resource appInsight 'microsoft.insights/components@2020-02-02' existing = if (!empty(appInsightId)) { - name: last(split(appInsightId, '/')) + name: last(split(appInsightId, '/'))! scope: resourceGroup(split(appInsightId, '/')[2], split(appInsightId, '/')[4]) } resource storageAccount 'Microsoft.Storage/storageAccounts@2021-02-01' existing = if (!empty(storageAccountId)) { - name: last(split(storageAccountId, '/')) + name: last(split(storageAccountId, '/'))! scope: resourceGroup(split(storageAccountId, '/')[2], split(storageAccountId, '/')[4]) } diff --git a/modules/Microsoft.Web/sites/slots/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Web/sites/slots/.bicep/nested_roleAssignments.bicep index 3f4fc40849..c504349543 100644 --- a/modules/Microsoft.Web/sites/slots/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Web/sites/slots/.bicep/nested_roleAssignments.bicep @@ -48,7 +48,7 @@ var appName = split(resourceId, '/')[indexOf(split(resourceId, '/'), 'sites') + resource app 'Microsoft.Web/sites@2020-12-01' existing = { name: appName resource slot 'slots' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } } diff --git a/modules/Microsoft.Web/sites/slots/config-appsettings/deploy.bicep b/modules/Microsoft.Web/sites/slots/config-appsettings/deploy.bicep index 671241c5ff..1830170f5e 100644 --- a/modules/Microsoft.Web/sites/slots/config-appsettings/deploy.bicep +++ b/modules/Microsoft.Web/sites/slots/config-appsettings/deploy.bicep @@ -59,12 +59,12 @@ resource app 'Microsoft.Web/sites@2022-03-01' existing = { } resource appInsight 'microsoft.insights/components@2020-02-02' existing = if (!empty(appInsightId)) { - name: last(split(appInsightId, '/')) + name: last(split(appInsightId, '/'))! scope: resourceGroup(split(appInsightId, '/')[2], split(appInsightId, '/')[4]) } resource storageAccount 'Microsoft.Storage/storageAccounts@2021-02-01' existing = if (!empty(storageAccountId)) { - name: last(split(storageAccountId, '/')) + name: last(split(storageAccountId, '/'))! scope: resourceGroup(split(storageAccountId, '/')[2], split(storageAccountId, '/')[4]) } diff --git a/modules/Microsoft.Web/staticSites/.bicep/nested_roleAssignments.bicep b/modules/Microsoft.Web/staticSites/.bicep/nested_roleAssignments.bicep index 0725d0466d..b61850b960 100644 --- a/modules/Microsoft.Web/staticSites/.bicep/nested_roleAssignments.bicep +++ b/modules/Microsoft.Web/staticSites/.bicep/nested_roleAssignments.bicep @@ -26,7 +26,7 @@ var builtInRoleNames = { } resource staticSite 'Microsoft.Web/staticSites@2021-02-01' existing = { - name: last(split(resourceId, '/')) + name: last(split(resourceId, '/'))! } resource roleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = [for principalId in principalIds: {