resources.role_definitions.tf (28 lines of code) (raw):

resource "azurerm_role_definition" "enterprise_scale" { for_each = local.azurerm_role_definition_enterprise_scale # Special handling of OPTIONAL role_definition_id to ensure consistent and # correct mapping of Terraform state ADDR value to Azure Resource ID value. role_definition_id = basename(each.key) # Mandatory resource attributes name = each.value.role_definition_name scope = each.value.scope_id permissions { actions = try(each.value.template.properties.permissions[0].actions, local.empty_list) not_actions = try(each.value.template.properties.permissions[0].notActions, local.empty_list) data_actions = try(each.value.template.properties.permissions[0].dataActions, local.empty_list) not_data_actions = try(each.value.template.properties.permissions[0].notDataActions, local.empty_list) } # Optional resource attributes description = try(each.value.template.properties.description, "${each.value.template.properties.roleName} Role Definition at scope ${each.value.scope_id}") assignable_scopes = try(length(each.value.template.properties.assignableScopes) > 0, false) ? each.value.template.properties.assignableScopes : [each.value.scope_id, ] # Set explicit dependency on Management Group deployments depends_on = [ time_sleep.after_azurerm_management_group, ] } resource "time_sleep" "after_azurerm_role_definition" { depends_on = [ time_sleep.after_azurerm_management_group, azurerm_role_definition.enterprise_scale, ] triggers = { "azurerm_role_definition_enterprise_scale" = jsonencode(keys(azurerm_role_definition.enterprise_scale)) } create_duration = local.create_duration_delay["after_azurerm_role_definition"] destroy_duration = local.destroy_duration_delay["after_azurerm_role_definition"] }