main.tables.tf (31 lines of code) (raw):
resource "azapi_resource" "table" {
for_each = var.tables
type = "Microsoft.Storage/storageAccounts/tableServices/tables@2023-01-01"
body = {
properties = {
signed_identifiers = each.value.signed_identifiers == null ? [] : each.value.signed_identifiers
}
}
name = each.value.name
parent_id = "${azurerm_storage_account.this.id}/tableServices/default"
schema_validation_enabled = false
dynamic "timeouts" {
for_each = each.value.timeouts == null ? [] : [each.value.timeouts]
content {
create = timeouts.value.create
delete = timeouts.value.delete
read = timeouts.value.read
}
}
}
# Enable role assignments for tables
resource "azurerm_role_assignment" "tables" {
for_each = local.tables_role_assignments
principal_id = each.value.role_assignment.principal_id
# the resource manager id is not exposed directly by the AzureRM provider - https://github.com/hashicorp/terraform-provider-azurerm/issues/21525
scope = "${azurerm_storage_account.this.id}/tableServices/default/tables/${azapi_resource.table[each.value.table_key].name}"
condition = each.value.role_assignment.condition
condition_version = each.value.role_assignment.condition_version
delegated_managed_identity_resource_id = each.value.role_assignment.delegated_managed_identity_resource_id
role_definition_id = strcontains(lower(each.value.role_assignment.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? each.value.role_assignment.role_definition_id_or_name : null
role_definition_name = strcontains(lower(each.value.role_assignment.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? null : each.value.role_assignment.role_definition_id_or_name
skip_service_principal_aad_check = each.value.role_assignment.skip_service_principal_aad_check
}