-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmain.subnet.tf
72 lines (57 loc) · 3.02 KB
/
main.subnet.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
# Creating Subnets within the Virtual Network.
resource "azurerm_subnet" "subnet" {
for_each = var.subnets
address_prefixes = each.value.address_prefixes
name = each.key
resource_group_name = var.resource_group_name
virtual_network_name = azurerm_virtual_network.vnet.name
private_endpoint_network_policies_enabled = each.value.private_endpoint_network_policies_enabled
private_link_service_network_policies_enabled = each.value.private_link_service_network_policies_enabled
service_endpoint_policy_ids = each.value.service_endpoint_policy_ids
service_endpoints = each.value.service_endpoints
dynamic "delegation" {
for_each = each.value.delegations == null ? [] : each.value.delegations
content {
name = delegation.value.name
service_delegation {
name = delegation.value.service_delegation.name
actions = delegation.value.service_delegation.actions
}
}
}
# Do not remove this `depends_on` or we'll met a parallel related issue that failed the creation of `azurerm_subnet_route_table_association` and `azurerm_subnet_network_security_group_association`
depends_on = [azurerm_virtual_network_dns_servers.vnet_dns]
}
locals {
azurerm_subnet_name2id = {
for index, subnet in azurerm_subnet.subnet :
subnet.name => subnet.id
}
}
resource "azurerm_subnet_network_security_group_association" "vnet" {
for_each = local.subnet_with_network_security_group
network_security_group_id = each.value
subnet_id = local.azurerm_subnet_name2id[each.key]
}
resource "azurerm_subnet_route_table_association" "vnet" {
for_each = local.subnets_with_route_table
route_table_id = each.value
subnet_id = local.azurerm_subnet_name2id[each.key]
}
resource "azurerm_subnet_nat_gateway_association" "nat_gw" {
for_each = local.subnet_with_nat_gateway
nat_gateway_id = each.value
subnet_id = local.azurerm_subnet_name2id[each.key]
}
#Required AVM Shared interfaces
resource "azurerm_role_assignment" "subnet_level" {
for_each = var.role_assignments
principal_id = each.value.principal_id
scope = azurerm_subnet.subnet[each.key].id
condition = each.value.condition
condition_version = each.value.condition_version
delegated_managed_identity_resource_id = each.value.delegated_managed_identity_resource_id
role_definition_id = strcontains(lower(each.value.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? each.value.role_definition_id_or_name : null
role_definition_name = strcontains(lower(each.value.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? null : each.value.role_definition_id_or_name
skip_service_principal_aad_check = each.value.skip_service_principal_aad_check
}