main.containers.tf (33 lines of code) (raw):

# This uses azapi in order to avoid having to grant data plane permissions resource "azapi_resource" "containers" { for_each = var.containers type = "Microsoft.Storage/storageAccounts/blobServices/containers@2023-01-01" body = { properties = { metadata = each.value.metadata == null ? {} : each.value.metadata publicAccess = each.value.public_access immutableStorageWithVersioning = each.value.immutable_storage_with_versioning == "" ? {} : each.value.immutable_storage_with_versioning } } name = each.value.name parent_id = "${azurerm_storage_account.this.id}/blobServices/default" schema_validation_enabled = false #https://github.com/Azure/terraform-provider-azapi/issues/497 dynamic "timeouts" { for_each = each.value.timeouts == null ? [] : [each.value.timeouts] content { create = timeouts.value.create delete = timeouts.value.delete read = timeouts.value.read } } } # Enable role assignments for containers resource "azurerm_role_assignment" "containers" { for_each = local.containers_role_assignments principal_id = each.value.role_assignment.principal_id scope = azapi_resource.containers[each.value.container_key].id condition = each.value.role_assignment.condition condition_version = each.value.role_assignment.condition_version delegated_managed_identity_resource_id = each.value.role_assignment.delegated_managed_identity_resource_id role_definition_id = strcontains(lower(each.value.role_assignment.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? each.value.role_assignment.role_definition_id_or_name : null role_definition_name = strcontains(lower(each.value.role_assignment.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? null : each.value.role_assignment.role_definition_id_or_name skip_service_principal_aad_check = each.value.role_assignment.skip_service_principal_aad_check }