main.tf (106 lines of code) (raw):

data "azurerm_client_config" "current" {} resource "azapi_resource" "this_environment" { type = "Microsoft.App/managedEnvironments@2024-03-01" body = { properties = merge({ appLogsConfiguration = { "destination" = var.log_analytics_workspace_destination logAnalyticsConfiguration = var.log_analytics_workspace_destination == "log-analytics" ? { "customerId" = var.log_analytics_workspace_customer_id "sharedKey" = var.log_analytics_workspace_primary_shared_key } : null } customDomainConfiguration = { "certificatePassword" = var.custom_domain_certificate_password "dnsSuffix" = var.custom_domain_dns_suffix } daprAIInstrumentationKey = var.dapr_application_insights_connection_string peerAuthentication = { "mtls" : { "enabled" = var.peer_authentication_enabled } } vnetConfiguration = var.infrastructure_subnet_id != null ? { "internal" = var.internal_load_balancer_enabled "infrastructureSubnetId" = var.infrastructure_subnet_id } : null workloadProfiles = local.workload_profiles zoneRedundant = var.zone_redundancy_enabled }, # Only include the infrastructureResourceGroup property if it is set # # Background: When using workload profiles, Azure will create a managed resource group for the container app environment. # If you want to specify a name for this resource group, you use the infrastructure_resource_group_name variable. # If you do not specify a name, Azure will create a name like "ME_myEnvironmentName_myResourceGroup_myRegion". # # The problem: if you do not specify a name, the next time a deployment runs, Terraform will see that the infrastructure_resource_group_name # has changed from null to the managed name, and will try to update the resource. This fails the idempotency check "no changes to plan after apply". var.infrastructure_resource_group_name != null ? { infrastructureResourceGroup = var.infrastructure_resource_group_name } : {} ) } location = var.location name = var.name parent_id = "/subscriptions/${data.azurerm_client_config.current.subscription_id}/resourceGroups/${var.resource_group_name}" response_export_values = [ "properties.customDomainConfiguration", "properties.daprAIInstrumentationKey", "properties.defaultDomain", "properties.infrastructureResourceGroup", "properties.dockerBridgeCidr", "properties.platformReservedCidr", "properties.platformReservedDnsIP", "properties.staticIp", ] schema_validation_enabled = true tags = var.tags dynamic "timeouts" { for_each = var.timeouts == null ? [] : [var.timeouts] content { create = timeouts.value.create delete = timeouts.value.delete read = timeouts.value.read update = timeouts.value.update } } } resource "azurerm_management_lock" "this" { count = var.lock != null ? 1 : 0 lock_level = var.lock.kind name = coalesce(var.lock.name, "lock-${var.lock.kind}") scope = azapi_resource.this_environment.id notes = var.lock.kind == "CanNotDelete" ? "Cannot delete the resource or its child resources." : "Cannot delete or modify the resource or its child resources." } resource "azurerm_role_assignment" "this" { for_each = var.role_assignments principal_id = each.value.principal_id scope = azapi_resource.this_environment.id condition = each.value.condition condition_version = each.value.condition_version delegated_managed_identity_resource_id = each.value.delegated_managed_identity_resource_id role_definition_id = strcontains(lower(each.value.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? each.value.role_definition_id_or_name : null role_definition_name = strcontains(lower(each.value.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? null : each.value.role_definition_id_or_name skip_service_principal_aad_check = each.value.skip_service_principal_aad_check } resource "azurerm_monitor_diagnostic_setting" "this" { for_each = var.diagnostic_settings name = each.value.name != null ? each.value.name : "diag-${var.name}" target_resource_id = azapi_resource.this_environment.id eventhub_authorization_rule_id = each.value.event_hub_authorization_rule_resource_id eventhub_name = each.value.event_hub_name log_analytics_destination_type = each.value.log_analytics_destination_type log_analytics_workspace_id = each.value.workspace_resource_id partner_solution_id = each.value.marketplace_partner_resource_id storage_account_id = each.value.storage_account_resource_id dynamic "enabled_log" { for_each = each.value.log_categories content { category = enabled_log.value } } dynamic "enabled_log" { for_each = each.value.log_groups content { category_group = enabled_log.value } } dynamic "metric" { for_each = each.value.metric_categories content { category = metric.value } } }