modules/volume/locals.tf (30 lines of code) (raw):

locals { avs_data_store = var.avs_data_store == true ? "Enabled" : "Disabled" creation_token = var.creation_token != null ? var.creation_token : var.name enable_sub_volumes = var.enable_sub_volumes == true ? "Enabled" : "Disabled" security_style = var.security_style == null ? contains([for protocol in var.protocol_types : lower(protocol)], "CIFS") ? "NTFS" : "Unix" : var.security_style smb_access_based_enumeration_enabled = var.smb_access_based_enumeration_enabled == true ? "Enabled" : "Disabled" smb_non_browsable = var.smb_non_browsable == true ? "Enabled" : "Disabled" volume_size_in_bytes = var.volume_size_in_gib * 1073741824 } locals { export_policy_rules = length(coalesce(var.export_policy_rules, {})) > 0 ? [ for rule in var.export_policy_rules : { ruleIndex = rule.rule_index allowedClients = join(",", rule.allowed_clients) chownMode = rule.chown_mode cifs = rule.cifs nfsv3 = rule.nfsv3 nfsv41 = rule.nfsv41 hasRootAccess = rule.has_root_access kerberos5iReadOnly = rule.kerberos5i_ro kerberos5iReadWrite = rule.kerberos5i_rw kerberos5pReadOnly = rule.kerberos5p_ro kerberos5pReadWrite = rule.kerberos5p_rw kerberos5ReadOnly = rule.kerberos5_ro kerberos5ReadWrite = rule.kerberos5_rw unixReadOnly = rule.unix_ro unixReadWrite = rule.unix_rw } ] : null }