4.File.Cache/AOS/main.tf (141 lines of code) (raw):
terraform {
required_version = ">=1.11.0"
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "~>4.27.0"
}
azuread = {
source = "hashicorp/azuread"
version = "~>3.3.0"
}
avere = {
source = "hashicorp/avere"
version = "~>1.3.0"
}
time = {
source = "hashicorp/time"
version = "~>0.13.0"
}
}
backend azurerm {
key = "4.File.Cache.AOS"
use_azuread_auth = true
}
}
provider azurerm {
features {
}
subscription_id = data.terraform_remote_state.core.outputs.subscriptionId
storage_use_azuread = true
}
variable resourceGroupName {
type = string
}
variable storageTargets {
type = list(object({
enable = bool
name = string
clientPath = string
usageModel = string
hostName = string
containerName = string
resourceGroupName = string
fileIntervals = object({
verificationSeconds = number
writeBackSeconds = number
})
vfxtJunctions = list(object({
storageExport = string
storagePath = string
clientPath = string
}))
}))
}
variable dnsRecord {
type = object({
name = string
ttlSeconds = number
})
}
variable virtualNetwork {
type = object({
name = string
subnetName = string
resourceGroupName = string
privateDNS = object({
zoneName = string
resourceGroupName = string
})
})
}
variable activeDirectory {
type = object({
enable = bool
domain = object({
name = string
})
machine = object({
name = string
adminLogin = object({
userName = string
userPassword = string
})
})
})
}
data azurerm_subscription current {}
data terraform_remote_state core {
backend = "local"
config = {
path = "../../0.Core.Foundation/terraform.tfstate"
}
}
data azurerm_user_assigned_identity studio {
name = data.terraform_remote_state.core.outputs.managedIdentity.name
resource_group_name = data.terraform_remote_state.core.outputs.resourceGroup.name
}
data azurerm_key_vault studio {
name = data.terraform_remote_state.core.outputs.keyVault.name
resource_group_name = data.terraform_remote_state.core.outputs.resourceGroup.name
}
data azurerm_key_vault_secret admin_username {
name = data.terraform_remote_state.core.outputs.keyVault.secretName.adminUsername
key_vault_id = data.azurerm_key_vault.studio.id
}
data azurerm_key_vault_secret admin_password {
name = data.terraform_remote_state.core.outputs.keyVault.secretName.adminPassword
key_vault_id = data.azurerm_key_vault.studio.id
}
data azurerm_key_vault_secret ssh_key_public {
name = data.terraform_remote_state.core.outputs.keyVault.secretName.sshKeyPublic
key_vault_id = data.azurerm_key_vault.studio.id
}
data azurerm_virtual_network studio {
name = var.virtualNetwork.name
resource_group_name = var.virtualNetwork.resourceGroupName
}
data azurerm_subnet cache {
name = var.virtualNetwork.subnetName
resource_group_name = data.azurerm_virtual_network.studio.resource_group_name
virtual_network_name = data.azurerm_virtual_network.studio.name
}
resource azurerm_resource_group cache {
name = var.resourceGroupName
location = data.azurerm_virtual_network.studio.location
tags = {
AAA = basename(path.cwd)
}
}
output privateDNS {
value = {
hpc = var.hpcCache.enable ? {
fqdn = azurerm_private_dns_a_record.cache_hpc[0].fqdn
records = azurerm_private_dns_a_record.cache_hpc[0].records
} : null
vfxt = var.vfxtCache.enable ? {
fqdn = azurerm_private_dns_a_record.cache_vfxt[0].fqdn
records = azurerm_private_dns_a_record.cache_vfxt[0].records
} : null
}
}