Skip to content

Commit 34e0b6d

Browse files
committed
add secrets
1 parent b58f7f6 commit 34e0b6d

1 file changed

Lines changed: 1 addition & 19 deletions

File tree

infra/main.bicep

Lines changed: 1 addition & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -55,14 +55,7 @@ resource containerApp 'Microsoft.App/containerApps@2025-01-01' = {
5555
external: true
5656
targetPort: 7050
5757
}
58-
secrets: [
59-
{
60-
name: 'jwt-token-secret'
61-
keyVaultUrl: '${keyVault.properties.vaultUri}secrets/jwt-token-secret'
62-
identity: 'system'
63-
}
64-
]
65-
}
58+
}
6659
template: {
6760
containers: [
6861
{
@@ -76,7 +69,6 @@ resource containerApp 'Microsoft.App/containerApps@2025-01-01' = {
7669
{ name: 'OPTIMIZER_TIME_LIMIT', value: '25' }
7770
{ name: 'OPTIMIZER_NUM_THREADS', value: '1' }
7871
{ name: 'GUNICORN_CMD_ARGS', value: '--workers 4 --max-requests 32 --access-logfile -' }
79-
{ name: 'JWT_TOKEN_SECRET', secretRef: 'jwt-token-secret' }
8072
]
8173
probes: [
8274
{
@@ -118,15 +110,5 @@ resource containerApp 'Microsoft.App/containerApps@2025-01-01' = {
118110
}
119111
}
120112

121-
// Key Vault Secrets User role for the Container App's managed identity
122-
resource kvRoleAssignment 'Microsoft.Authorization/roleAssignments@2022-04-01' = {
123-
name: guid(keyVault.id, containerApp.id, '4633458b-17de-408a-b874-0445c86b69e6')
124-
scope: keyVault
125-
properties: {
126-
roleDefinitionId: subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '4633458b-17de-408a-b874-0445c86b69e6')
127-
principalId: containerApp.identity.principalId
128-
principalType: 'ServicePrincipal'
129-
}
130-
}
131113

132114
output fqdn string = containerApp.properties.configuration.ingress.fqdn

0 commit comments

Comments
 (0)