main.tf (35 lines of code) (raw):
resource "azurerm_app_service_environment_v3" "this" {
name = var.name # calling code must supply the name
resource_group_name = var.resource_group_name
subnet_id = var.subnet_id
allow_new_private_endpoint_connections = var.allow_new_private_endpoint_connections
dedicated_host_count = var.dedicated_host_count
internal_load_balancing_mode = var.internal_load_balancing_mode
remote_debugging_enabled = var.remote_debugging_enabled
tags = var.tags
zone_redundant = var.zone_redundant
dynamic "cluster_setting" {
for_each = var.cluster_setting
content {
name = cluster_setting.name
value = cluster_setting.value
}
}
}
# required AVM resources interfaces
resource "azurerm_management_lock" "this" {
count = var.lock != null ? 1 : 0
lock_level = var.lock.kind
name = coalesce(var.lock.name, "lock-${var.lock.kind}")
scope = azurerm_app_service_environment_v3.this.id
}
resource "azurerm_role_assignment" "this" {
for_each = var.role_assignments
principal_id = each.value.principal_id
scope = azurerm_app_service_environment_v3.this.id
condition = each.value.condition
condition_version = each.value.condition_version
delegated_managed_identity_resource_id = each.value.delegated_managed_identity_resource_id
role_definition_id = strcontains(lower(each.value.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? each.value.role_definition_id_or_name : null
role_definition_name = strcontains(lower(each.value.role_definition_id_or_name), lower(local.role_definition_resource_substring)) ? null : each.value.role_definition_id_or_name
skip_service_principal_aad_check = each.value.skip_service_principal_aad_check
}