forked from Azure/terraform-azurerm-vnet
-
Notifications
You must be signed in to change notification settings - Fork 0
/
main.tf
104 lines (86 loc) · 4.16 KB
/
main.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
resource "azurerm_virtual_network" "vnet" {
address_space = var.address_space
location = var.vnet_location
name = var.vnet_name
resource_group_name = var.resource_group_name
bgp_community = var.bgp_community
dns_servers = var.dns_servers
tags = merge(var.tags, (/*<box>*/ (var.tracing_tags_enabled ? { for k, v in /*</box>*/ {
avm_git_commit = "2b2f05969200c71b6609f4cdfa9120d48af55537"
avm_git_file = "main.tf"
avm_git_last_modified_at = "2022-11-29 07:03:18"
avm_git_org = "Azure"
avm_git_repo = "terraform-azurerm-vnet"
avm_yor_trace = "265da606-d6d1-4f59-8765-479b6d50e7d7"
} /*<box>*/ : replace(k, "avm_", var.tracing_tags_prefix) => v } : {}) /*</box>*/), (/*<box>*/ (var.tracing_tags_enabled ? { for k, v in /*</box>*/ {
avm_yor_name = "vnet"
} /*<box>*/ : replace(k, "avm_", var.tracing_tags_prefix) => v } : {}) /*</box>*/))
dynamic "ddos_protection_plan" {
for_each = var.ddos_protection_plan != null ? [var.ddos_protection_plan] : []
content {
enable = ddos_protection_plan.value.enable
id = ddos_protection_plan.value.id
}
}
}
moved {
from = azurerm_subnet.subnet
to = azurerm_subnet.subnet_count
}
resource "azurerm_subnet" "subnet_count" {
count = var.use_for_each ? 0 : length(var.subnet_names)
address_prefixes = [var.subnet_prefixes[count.index]]
name = var.subnet_names[count.index]
resource_group_name = var.resource_group_name
virtual_network_name = azurerm_virtual_network.vnet.name
enforce_private_link_endpoint_network_policies = lookup(var.subnet_enforce_private_link_endpoint_network_policies, var.subnet_names[count.index], false)
enforce_private_link_service_network_policies = lookup(var.subnet_enforce_private_link_service_network_policies, var.subnet_names[count.index], false)
service_endpoints = lookup(var.subnet_service_endpoints, var.subnet_names[count.index], null)
dynamic "delegation" {
for_each = lookup(var.subnet_delegation, var.subnet_names[count.index], {})
content {
name = delegation.key
service_delegation {
name = lookup(delegation.value, "service_name")
actions = lookup(delegation.value, "service_actions", [])
}
}
}
}
resource "azurerm_subnet" "subnet_for_each" {
for_each = var.use_for_each ? toset(var.subnet_names) : []
address_prefixes = [local.subnet_names_prefixes[each.value]]
name = each.value
resource_group_name = var.resource_group_name
virtual_network_name = azurerm_virtual_network.vnet.name
enforce_private_link_endpoint_network_policies = lookup(var.subnet_enforce_private_link_endpoint_network_policies, each.value, false)
enforce_private_link_service_network_policies = lookup(var.subnet_enforce_private_link_service_network_policies, each.value, false)
service_endpoints = lookup(var.subnet_service_endpoints, each.value, null)
dynamic "delegation" {
for_each = lookup(var.subnet_delegation, each.value, {})
content {
name = delegation.key
service_delegation {
name = lookup(delegation.value, "service_name")
actions = lookup(delegation.value, "service_actions", [])
}
}
}
}
locals {
azurerm_subnets = var.use_for_each ? [for s in azurerm_subnet.subnet_for_each : s] : [for s in azurerm_subnet.subnet_count : s]
azurerm_subnets_name_id_map = {
for index, subnet in local.azurerm_subnets :
subnet.name => subnet.id
}
}
resource "azurerm_subnet_network_security_group_association" "vnet" {
for_each = var.nsg_ids
network_security_group_id = each.value
subnet_id = local.azurerm_subnets_name_id_map[each.key]
}
resource "azurerm_subnet_route_table_association" "vnet" {
for_each = var.route_tables_ids
route_table_id = each.value
subnet_id = local.azurerm_subnets_name_id_map[each.key]
}