Open sentryzero opened 2 days ago
logic app code block
resource "azurerm_logic_app_standard" "example" { name = local.logicapp_name location = var.azure_region resource_group_name = data.azurerm_resource_group.rg.name app_service_plan_id = azurerm_app_service_plan.asp.id storage_account_name = module.storage_account.storage_resource_name storage_account_access_key = module.storage_account.storage_access_key
site_config { public_network_access_enabled = false }
app_settings = { }
}
Hi @sentryzero,
The error message you've shared and the behaviour you described seem to belong to the Azure provider rather than to Terraform Core.
Are you suggesting that Terraform Core should have done something differently here to allow the provider to work?
We can only change behaviours of Terraform Core in this repository, so if this is a problem with the Azure provider's own behaviour then we'd need to discuss that in the provider's repository instead. If you are requesting that Terraform Core should behave differently then it would help if you could state the problem in more general terms, without referring to the Azure provider features directly.
Thanks!
Terraform Version
Terraform Configuration Files
Debug Output
Expected Behavior
The following should deploy a Logic App and bypass the Azure Policy. This should happen as the site_config block has the public_network_access_enabled flag set to false.
Actual Behavior
The Policy "App Service apps should disable public network access" prevents the deployment as the default value of true is parsed first.
Steps to Reproduce
Additional Context
https://github.com/hashicorp/terraform-provider-azurerm/issues/23809
References
No response