@@ -40,8 +40,8 @@ resource "google_access_context_manager_service_perimeter" "regular_service_peri
40
40
ingress_from {
41
41
dynamic "sources" {
42
42
for_each = merge (
43
- { for k , v in lookup (ingress_policies. value [" from" ][ " sources" ] , " resources" , []) : v => " resource" },
44
- { for k , v in lookup (ingress_policies. value [" from" ][ " sources" ] , " access_levels" , []) : v => " access_level" })
43
+ { for k , v in lookup (lookup ( ingress_policies. value [" from" ], " sources" , {}) , " resources" , []) : v => " resource" },
44
+ { for k , v in lookup (lookup ( ingress_policies. value [" from" ], " sources" , {}) , " access_levels" , []) : v => " access_level" })
45
45
content {
46
46
resource = sources. value == " resource" ? sources. key : null
47
47
access_level = sources. value == " access_level" ? sources. key != " *" ? " accessPolicies/${ var . policy } /accessLevels/${ sources . key } " : " *" : null
@@ -79,7 +79,7 @@ resource "google_access_context_manager_service_perimeter" "regular_service_peri
79
79
identity_type = lookup (egress_policies. value [" from" ], " identity_type" , null )
80
80
identities = lookup (egress_policies. value [" from" ], " identities" , null )
81
81
dynamic "sources" {
82
- for_each = { for k , v in lookup (egress_policies. value [" from" ][ " sources" ] , " access_levels" , []) : v => " access_level" }
82
+ for_each = { for k , v in lookup (lookup ( egress_policies. value [" from" ], " sources" , {}) , " access_levels" , []) : v => " access_level" }
83
83
content {
84
84
access_level = sources. value == " access_level" ? sources. key != " *" ? " accessPolicies/${ var . policy } /accessLevels/${ sources . key } " : " *" : null
85
85
}
@@ -134,8 +134,8 @@ resource "google_access_context_manager_service_perimeter" "regular_service_peri
134
134
ingress_from {
135
135
dynamic "sources" {
136
136
for_each = merge (
137
- { for k , v in lookup (ingress_policies_dry_run. value [" from" ][ " sources" ] , " resources" , []) : v => " resource" },
138
- { for k , v in lookup (ingress_policies_dry_run. value [" from" ][ " sources" ] , " access_levels" , []) : v => " access_level" })
137
+ { for k , v in lookup (lookup ( ingress_policies_dry_run. value [" from" ], " sources" , {}) , " resources" , []) : v => " resource" },
138
+ { for k , v in lookup (lookup ( ingress_policies_dry_run. value [" from" ], " sources" , {}) , " access_levels" , []) : v => " access_level" })
139
139
content {
140
140
resource = sources. value == " resource" ? sources. key : null
141
141
access_level = sources. value == " access_level" ? sources. key != " *" ? " accessPolicies/${ var . policy } /accessLevels/${ sources . key } " : " *" : null
@@ -173,7 +173,7 @@ resource "google_access_context_manager_service_perimeter" "regular_service_peri
173
173
identity_type = lookup (egress_policies_dry_run. value [" from" ], " identity_type" , null )
174
174
identities = lookup (egress_policies_dry_run. value [" from" ], " identities" , null )
175
175
dynamic "sources" {
176
- for_each = { for k , v in lookup (egress_policies_dry_run. value [" from" ][ " sources" ] , " access_levels" , []) : v => " access_level" }
176
+ for_each = { for k , v in lookup (lookup ( egress_policies_dry_run. value [" from" ], " sources" , {}) , " access_levels" , []) : v => " access_level" }
177
177
content {
178
178
access_level = sources. value == " access_level" ? sources. key != " *" ? " accessPolicies/${ var . policy } /accessLevels/${ sources . key } " : " *" : null
179
179
}
0 commit comments