Open imens-frankd opened 5 months ago
Below is part of the plan file that describes the resource
{"address":"azuread_application_permission_scope.example","mode":"managed","type":"azuread_application_permission_scope","name":"example","provider_name":"registry.terraform.io/hashicorp/azuread","schema_version":0,"values":{"admin_consent_description":"Example permission","admin_consent_display_name":"example-permission","application_id":"/applications/8a6246ce-89f4-495d-b222-e8c3ae152e13","timeouts":null,"type":"Admin","user_consent_description":null,"user_consent_display_name":null,"value":"example-permission"},"sensitive_values":{}}
When condition on resource which has its own type property fails
Since azuread_application_permission_scope doesn't have a name property I want to exlude it from the scenario that I use to ensure all resource names are lower case. I have done the same for azuread_application which works. It doesn't work for azuread_application_permission_scope and the test fails. I suspect that it has something to do with the fact that azuread_application_permission_scope itself has a property called type.
To Reproduce
Feature File:
Plan File:
Sample Terraform Code:
Used
terraform-compliance
Parameters:podman run --rm -v ./:/target -i eerkunt/terraform-compliance -f features -p main.tfplan.json
Running via Docker:
Yes
Running container with podman v4.9.2
Error Output:
Test scenario fails
Expected Behavior:
Test scenario is skipped for resource of type azuread_application_permission_scope
Tested Versions:
v1.3.47
v1.7.3
your python runtime version, if running as a python package
Additional Context:
Using provider registry.terraform.io/hashicorp/azuread v2.47.0