11resource "azurecaf_name" "cluster_role_binding" {
2- name = var. settings . name
2+ name = var. settings . name
33 resource_type = " azurerm_role_assignment"
44 prefixes = var. global_settings . prefixes
55 random_length = var. global_settings . random_length
@@ -12,19 +12,19 @@ resource "kubernetes_cluster_role_binding_v1" "cluster_role_binding" {
1212 metadata {
1313 annotations = try (var. settings . annotations , null )
1414 labels = try (var. settings . labels , null )
15- name = azurecaf_name. cluster_role_binding . result
15+ name = azurecaf_name. cluster_role_binding . result
1616 }
1717 role_ref {
18- name = try (var. cluster_role [var . settings . role_key ]. name , var. settings . role_name )
19- kind = " ClusterRole"
18+ name = try (var. cluster_role [var . settings . role_key ]. name , var. settings . role_name )
19+ kind = " ClusterRole"
2020 api_group = " rbac.authorization.k8s.io"
2121 }
2222 dynamic "subject" {
2323 for_each = try (var. settings . subjects , {})
2424 content {
25- name = coalesce (try (subject. value . name , null ), try (var. managed_identities [subject . value . lz_key ][subject . value . object_key ]. rbac_id , null ), try (var. azuread_service_principals [subject . value . lz_key ][subject . value . object_key ]. rbac_id , null ), try (var. azuread_groups [subject . value . lz_key ][subject . value . object_key ]. rbac_id , null ))
26- kind = can (subject. value . kind ) ? subject. value . kind : can (try (var. managed_identities [subject . value . lz_key ][subject . value . object_key ]. rbac_id , null )) ? " User" : can (try (var. azuread_service_principals [subject . value . lz_key ][subject . value . object_key ]. rbac_id , null )) ? " User" : can (try (var. azuread_groups [subject . value . lz_key ][subject . value . object_key ]. rbac_id , null )) ? " Group" : null
27- api_group = " rbac.authorization.k8s.io"
25+ name = coalesce (try (subject. value . name , null ), try (var. managed_identities [subject . value . lz_key ][subject . value . object_key ]. rbac_id , null ), try (var. azuread_service_principals [subject . value . lz_key ][subject . value . object_key ]. rbac_id , null ), try (var. azuread_groups [subject . value . lz_key ][subject . value . object_key ]. rbac_id , null ))
26+ kind = can (subject. value . kind ) ? subject. value . kind : can (try (var. managed_identities [subject . value . lz_key ][subject . value . object_key ]. rbac_id , null )) ? " User" : can (try (var. azuread_service_principals [subject . value . lz_key ][subject . value . object_key ]. rbac_id , null )) ? " User" : can (try (var. azuread_groups [subject . value . lz_key ][subject . value . object_key ]. rbac_id , null )) ? " Group" : null
27+ api_group = " rbac.authorization.k8s.io"
2828 }
2929 }
3030}
0 commit comments