Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Refactor role assignment filtering in Get-RoleAssignmentList.ps1 #4515

Merged
merged 7 commits into from
Mar 4, 2024
22 changes: 15 additions & 7 deletions utilities/tools/Get-RoleAssignmentList.ps1
Original file line number Diff line number Diff line change
Expand Up @@ -57,19 +57,24 @@ function Get-RoleAssignmentList {
if ("$ProviderNamespace/$ResourceType" -eq 'Microsoft.Authorization/RoleAssignments') {
# No filter
$relevantRoles = $roleDefinitions
} else {
}
else {
# Filter Action based
$relevantRoles += $roleDefinitions | Where-Object {
$_.Actions -like "$ProviderNamespace/$ResourceType/*" -or
$_.Actions -like "$ProviderNamespace/`**" -or
$_.Actions -like '`**'
AlexanderSehr marked this conversation as resolved.
Show resolved Hide resolved
# Leave general roles (https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#general)
$_.Id -eq 'b24988ac-6180-42a0-ab88-20f7382dd24c' -or # Contributor
$_.Id -eq '8e3af657-a8ff-443c-a75c-2fe8c4bcb635' -or # Owner
$_.Id -eq 'acdd72a7-3385-48ef-bd42-f606fba81ae7' -or # Reader
$_.Id -eq 'f58310d9-a9f6-439a-9e8d-f62e7b41a168' -or # Role Based Access Control Administrator
$_.Id -eq '18d7d88d-d35e-4fb5-a5c3-7773c20a72d9' # User Access Administrator
}

# Filter Data Action based
$relevantRoles += $roleDefinitions | Where-Object {
$_.DataActions -like "$ProviderNamespace/$ResourceType/*" -or
$_.DataActions -like "$ProviderNamespace/`**" -or
$_.DataActions -like '`**'
$_.DataActions -like "$ProviderNamespace/`**"
}
}

Expand All @@ -80,17 +85,20 @@ function Get-RoleAssignmentList {
foreach ($role in $relevantRoles | Sort-Object -Property 'Name' -Unique) {
if ($role.Name -match '\s') {
$resBicep += "'{0}': subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '{1}')" -f $role.Name, $role.Id
} else {
}
else {
$resBicep += "{0}: subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '{1}')" -f $role.Name, $role.Id
}
$resArm += "`"{0}`": `"[subscriptionResourceId('Microsoft.Authorization/roleDefinitions', '{1}')]`"," -f $role.Name, $role.Id
}
} else {
}
else {
# different output format for the 'Microsoft.Authorization/RoleAssignments' module
foreach ($role in $relevantRoles | Sort-Object -Property 'Name' -Unique) {
if ($role.Name -match '\s') {
$resBicep += "'{0}': '/providers/Microsoft.Authorization/roleDefinitions/{1}'" -f $role.Name, $role.Id
} else {
}
else {
$resBicep += "{0}: '/providers/Microsoft.Authorization/roleDefinitions/{1}'" -f $role.Name, $role.Id
}
$resArm += "`"{0}`": `"/providers/Microsoft.Authorization/roleDefinitions/{1}`"" -f $role.Name, $role.Id
Expand Down