resources.role_definitions.tf (28 lines of code) (raw):
resource "azurerm_role_definition" "enterprise_scale" {
for_each = local.azurerm_role_definition_enterprise_scale
# Special handling of OPTIONAL role_definition_id to ensure consistent and
# correct mapping of Terraform state ADDR value to Azure Resource ID value.
role_definition_id = basename(each.key)
# Mandatory resource attributes
name = each.value.role_definition_name
scope = each.value.scope_id
permissions {
actions = try(each.value.template.properties.permissions[0].actions, local.empty_list)
not_actions = try(each.value.template.properties.permissions[0].notActions, local.empty_list)
data_actions = try(each.value.template.properties.permissions[0].dataActions, local.empty_list)
not_data_actions = try(each.value.template.properties.permissions[0].notDataActions, local.empty_list)
}
# Optional resource attributes
description = try(each.value.template.properties.description, "${each.value.template.properties.roleName} Role Definition at scope ${each.value.scope_id}")
assignable_scopes = try(length(each.value.template.properties.assignableScopes) > 0, false) ? each.value.template.properties.assignableScopes : [each.value.scope_id, ]
# Set explicit dependency on Management Group deployments
depends_on = [
time_sleep.after_azurerm_management_group,
]
}
resource "time_sleep" "after_azurerm_role_definition" {
depends_on = [
time_sleep.after_azurerm_management_group,
azurerm_role_definition.enterprise_scale,
]
triggers = {
"azurerm_role_definition_enterprise_scale" = jsonencode(keys(azurerm_role_definition.enterprise_scale))
}
create_duration = local.create_duration_delay["after_azurerm_role_definition"]
destroy_duration = local.destroy_duration_delay["after_azurerm_role_definition"]
}