From df450df1bfdbe6b3dfc861438439161d5bc35dc6 Mon Sep 17 00:00:00 2001 From: Marc Schier Date: Mon, 11 Nov 2024 17:19:04 +0100 Subject: [PATCH] Fix deployment script (#2364) --- deploy/templates/azuredeploy.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/deploy/templates/azuredeploy.json b/deploy/templates/azuredeploy.json index fee016f858..1eb0526d64 100644 --- a/deploy/templates/azuredeploy.json +++ b/deploy/templates/azuredeploy.json @@ -381,7 +381,7 @@ "iotHubContributorRoleId": "[subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '4fc6c259-987e-4a07-842e-c321cc9d413f')]", "iotHubPrincipalRoleAssignment": "[guid(parameters('iotHubName'), parameters('userPrincipalId'))]", "iotHubRoleAssignment": "[guid(parameters('iotHubName'), parameters('managedIdentityName'))]", - "iotHubRoleAssignmentResourceId": "[resourceId('Microsoft.Resources/deployments', variables('iotHubRoleAssignment'))]", + "iotHubRoleAssignmentResourceId": "[tenantResourceId('Microsoft.Authorization/roleAssignments', variables('iotHubRoleAssignment'))]", "iotHubKeyResource": "[resourceId('Microsoft.Devices/Iothubs/Iothubkeys', parameters('iotHubName'), variables('iotHubKeyName'))]", "iothubTelemetryConsumerGroup": "telemetry", "iothubEventsConsumerGroup": "events", @@ -392,7 +392,7 @@ "storagePrincipalBlobDataOwnerRoleAssignment": "[guid(parameters('storageName'), 'StorageBlobDataOwner', parameters('userPrincipalId'))]", "storagePrincipalStorageAccountContributorRoleAssignment": "[guid(parameters('storageName'), 'StorageAccountContributor', parameters('userPrincipalId'))]", "storageRoleAssignment": "[guid(parameters('storageName'), parameters('managedIdentityName'))]", - "storageRoleAssignmentResourceId": "[resourceId('Microsoft.Resources/deployments', variables('storageRoleAssignment'))]", + "storageRoleAssignmentResourceId": "[tenantResourceId('Microsoft.Authorization/roleAssignments', variables('storageRoleAssignment'))]", "keyVaultResourceId": "[resourceId('Microsoft.KeyVault/vaults', parameters('keyVaultName'))]", "keyVaultSecretUserRoleId": "[subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'b86a8fe4-44ce-4948-aee5-eccb2c155cd7')]", "keyVaultPrincipalRoleAssignment": "[guid(parameters('keyVaultName'), parameters('userPrincipalId'))]", @@ -400,7 +400,7 @@ "keyVaultAccessPolicies": "[if(and(not(empty(parameters('userPrincipalId'))), parameters('keyVaultUseAccessPolicies')), createArray(variables('keyVaultPrincipalAccessPolicy')), createArray())]", "keyVaultSecretOfficerRoleId": "[subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'b86a8fe4-44ce-4948-aee5-eccb2c155cd7')]", "keyVaultRoleAssignment": "[guid(parameters('keyVaultName'), parameters('managedIdentityName'))]", - "keyVaultRoleAssignmentResourceId": "[resourceId('Microsoft.Resources/deployments', variables('keyVaultRoleAssignment'))]", + "keyVaultRoleAssignmentResourceId": "[tenantResourceId('Microsoft.Authorization/roleAssignments', variables('keyVaultRoleAssignment'))]", "configurationResourceName": "[concat(deployment().name, '.configuration')]", "configurationResourceId": "[resourceId('Microsoft.Resources/deployments', variables('configurationResourceName'))]", "dpsResourceId": "[resourceId('Microsoft.Devices/provisioningServices', parameters('dpsName'))]",