main.tf (81 lines of code) (raw):
# required AVM resources interfaces
resource "azurerm_management_lock" "this" {
count = var.lock != null ? 1 : 0
lock_level = var.lock.kind
name = coalesce(var.lock.name, "lock-${var.lock.kind}")
scope = azurerm_batch_account.this.id
notes = var.lock.kind == "CanNotDelete" ? "Cannot delete the resource or its child resources." : "Cannot delete or modify the resource or its child resources."
}
resource "azurerm_role_assignment" "this" {
for_each = var.role_assignments
principal_id = each.value.principal_id
scope = azurerm_batch_account.this.id
condition = each.value.condition
condition_version = each.value.condition_version
delegated_managed_identity_resource_id = each.value.delegated_managed_identity_resource_id
role_definition_id = strcontains(lower(each.value.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? each.value.role_definition_id_or_name : null
role_definition_name = strcontains(lower(each.value.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? null : each.value.role_definition_id_or_name
skip_service_principal_aad_check = each.value.skip_service_principal_aad_check
}
# Azure Batch Account Resource
resource "azurerm_batch_account" "this" {
location = var.location
name = var.name
resource_group_name = var.resource_group_name
allowed_authentication_modes = var.allowed_authentication_modes
pool_allocation_mode = var.pool_allocation_mode
public_network_access_enabled = var.public_network_access_enabled
storage_account_authentication_mode = var.storage_account_authentication_mode
storage_account_id = var.storage_account_id
storage_account_node_identity = var.storage_account_node_identity
tags = var.tags != null ? var.tags : {}
# Dynamic block for encryption
dynamic "encryption" {
for_each = var.encryption != null ? [var.encryption] : []
content {
key_vault_key_id = encryption.value.key_vault_key_id
}
}
# Dynamic block for identity
dynamic "identity" {
for_each = var.identity
content {
type = identity.value.type
identity_ids = identity.value.identity_ids
}
}
# Dynamic block for key_vault_reference (required when pool_allocation_mode = "UserSubscription")
dynamic "key_vault_reference" {
for_each = var.key_vault_reference != null ? [var.key_vault_reference] : []
content {
id = key_vault_reference.value.id
url = key_vault_reference.value.url
}
}
# Dynamic block for network_profile
dynamic "network_profile" {
for_each = var.network_profile
content {
dynamic "account_access" {
for_each = network_profile.value.account_access != null ? [network_profile.value.account_access] : []
content {
default_action = account_access.value.default_action
dynamic "ip_rule" {
for_each = account_access.value.ip_rules != null ? account_access.value.ip_rules : {}
content {
ip_range = ip_rule.value.ip_range
action = ip_rule.value.action
}
}
}
}
dynamic "node_management_access" {
for_each = network_profile.value.node_management_access != null ? [network_profile.value.node_management_access] : []
content {
default_action = node_management_access.value.default_action
dynamic "ip_rule" {
for_each = node_management_access.value.ip_rules != null ? node_management_access.value.ip_rules : {}
content {
ip_range = ip_rule.value.ip_range
action = ip_rule.value.action
}
}
}
}
}
}
}