deploy/terraform/bootstrap/sap_library/transform.tf (73 lines of code) (raw):

# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. locals { infrastructure = { environment = var.environment region = var.location codename = var.codename resource_group = { name = var.resourcegroup_name arm_id = var.resourcegroup_arm_id } tags = try(coalesce(var.resourcegroup_tags, var.tags, {}), {}) } deployer = { use = var.use_deployer } key_vault = { kv_spn_id = coalesce(var.spn_keyvault_id, local.spn_key_vault_arm_id) } storage_account_sapbits = { arm_id = var.library_sapmedia_arm_id name = var.library_sapmedia_name account_tier = var.library_sapmedia_account_tier account_replication_type = var.library_sapmedia_account_replication_type account_kind = var.library_sapmedia_account_kind file_share = { enable_deployment = var.library_sapmedia_file_share_enable_deployment is_existing = var.library_sapmedia_file_share_is_existing name = coalesce(var.library_sapmedia_file_share_name,module.sap_namegenerator.naming.resource_suffixes.sapbits) } sapbits_blob_container = { enable_deployment = var.library_sapmedia_blob_container_enable_deployment is_existing = var.library_sapmedia_blob_container_is_existing name = coalesce(var.library_sapmedia_blob_container_name, module.sap_namegenerator.naming.resource_suffixes.sapbits) } shared_access_key_enabled = var.shared_access_key_enabled public_network_access_enabled = var.public_network_access_enabled enable_firewall_for_keyvaults_and_storage = var.enable_firewall_for_keyvaults_and_storage } storage_account_tfstate = { arm_id = var.library_terraform_state_arm_id name = var.library_terraform_state_name account_tier = var.library_terraform_state_account_tier account_replication_type = var.library_terraform_state_account_replication_type account_kind = var.library_terraform_state_account_kind tfstate_blob_container = { is_existing = var.library_terraform_state_blob_container_is_existing name = var.library_terraform_state_blob_container_name } tfvars_blob_container = { is_existing = var.library_terraform_vars_blob_container_is_existing name = var.library_terraform_vars_blob_container_name } ansible_blob_container = { is_existing = var.library_ansible_blob_container_is_existing name = var.library_ansible_blob_container_name } shared_access_key_enabled = var.shared_access_key_enabled public_network_access_enabled = var.public_network_access_enabled enable_firewall_for_keyvaults_and_storage = var.enable_firewall_for_keyvaults_and_storage } dns_settings = { use_custom_dns_a_registration = var.use_custom_dns_a_registration dns_label = var.dns_label dns_zone_names = var.dns_zone_names management_dns_resourcegroup_name = trimspace(var.management_dns_resourcegroup_name) management_dns_subscription_id = var.management_dns_subscription_id privatelink_dns_subscription_id = var.privatelink_dns_subscription_id != var.management_dns_subscription_id ? var.privatelink_dns_subscription_id : var.management_dns_subscription_id privatelink_dns_resourcegroup_name = var.management_dns_resourcegroup_name != var.privatelink_dns_resourcegroup_name ? var.privatelink_dns_resourcegroup_name : var.management_dns_resourcegroup_name register_storage_accounts_keyvaults_with_dns = var.register_storage_accounts_keyvaults_with_dns register_endpoints_with_dns = var.register_endpoints_with_dns create_privatelink_dns_zones = var.create_privatelink_dns_zones additional_network_id = var.additional_network_id } }