Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
48 commits
Select commit Hold shift + click to select a range
0ca69c6
Location of connection must be dynamic (#432)
ArtiomMatiom Oct 9, 2024
a1f21f7
Added -Force param to Logic App Standard to bypass confict errors on …
pipalmic Oct 10, 2024
6ac57d2
Merge pull request #433 from recognizegroup/feature/21762-force-param
tom-reinders Oct 10, 2024
280cc79
Allow Access Policy name to be speficied explicitely AB#21752
pipalmic Oct 11, 2024
5e3dad1
Merge pull request #434 from recognizegroup/feature/21752-optional-ac…
tom-reinders Oct 14, 2024
c0d5db6
Add variable to configure logging extent (#435)
ArtiomMatiom Oct 17, 2024
4119db7
Update main.tf
ArtiomMatiom Oct 31, 2024
5208ac3
format
ArtiomMatiom Oct 31, 2024
0e2d066
Merge pull request #436 from recognizegroup/bugfix/22046-standard-log…
tom-reinders Oct 31, 2024
aaaea8c
Add dimension and frequency configuration (#437)
ArtiomMatiom Dec 3, 2024
4c533f6
Added optional diagnostic settings for Standard Logic Apps
pipalmic Dec 9, 2024
9dfaa56
Merge pull request #438 from recognizegroup/feature/22222-standard-ap…
tom-reinders Dec 9, 2024
1f82ced
Adding role validation into api policy
patrik-pa4k Dec 17, 2024
632020e
Merge pull request #439 from recognizegroup/feature/22184-add-role-va…
tom-reinders Dec 17, 2024
c99e758
Api management support multiple roles validation AB#22184 (#440)
patrik-pa4k Dec 18, 2024
54d9f82
feat: Apply diagnostic settings changes once the deployment is finish…
pipalmic Jan 9, 2025
7f0035a
Upgraded default TLS on SB (since older are going to be deprecated)
pipalmic Jan 16, 2025
4d48c43
Update modules/azure/service_bus_public/variables.tf
pipalmic Jan 16, 2025
b019960
Merge pull request #442 from recognizegroup/feature/22690-default-tls…
tom-reinders Jan 16, 2025
9670b2b
Adding optional setting for diagnostic categories
patrik-pa4k Jan 24, 2025
5f63790
fix TF formating
patrik-pa4k Jan 24, 2025
e5881ee
Merge pull request #443 from recognizegroup/feature/22857-standard-lo…
tom-reinders Jan 24, 2025
83293e7
Adding property to enable/disable sftp on storage account
patrik-pa4k Feb 6, 2025
9eb0cff
Merge pull request #444 from recognizegroup/feature/22884-storage-acc…
tom-reinders Feb 7, 2025
bd34ceb
feat: Added Standard Logic App with Managed Identity and IP restricti…
pipalmic Feb 9, 2025
531c548
Merged Standard Logic App modules into a single one
pipalmic Feb 10, 2025
a11dcd9
Omit MICROSOFT_PROVIDER_AUTHENTICATION_SECRET when not applicable
pipalmic Feb 10, 2025
8b93e56
Reverse condition
pipalmic Feb 10, 2025
90ec974
Updated appsettings configuration
pipalmic Feb 11, 2025
9f54751
Merge pull request #445 from recognizegroup/feature/22793-workflow-po…
tom-reinders Feb 11, 2025
3d384a2
fix: Removed validation for optional module AB#23089 (#446)
pipalmic Feb 14, 2025
7d3735a
added app_scale_limit into windows azure function module
IsonsoftZdenek Feb 28, 2025
58c4041
update of app_scale_limit to leverage null or not being set
IsonsoftZdenek Mar 3, 2025
8877d33
update the condition and remove comment
IsonsoftZdenek Mar 3, 2025
f7d08b9
app_scale_limit set default to 0
IsonsoftZdenek Mar 4, 2025
bfe49f2
Merge pull request #447 from recognizegroup/feature/31597-concurrency…
tom-reinders Mar 4, 2025
eb1a782
feat: Enable option to configure runtime_scale_monitoring_enabled
pipalmic Mar 27, 2025
67939cd
Merge pull request #448 from recognizegroup/feature/23418-enable-runt…
tom-reinders Mar 27, 2025
11bb82e
feat: Allow APIM API bytes_to_log to be specified
pipalmic Mar 31, 2025
c0e42c4
Merge pull request #449 from recognizegroup/feature/optional-bytes-to…
tom-reinders Mar 31, 2025
053c069
Updated terraform providers to their latest minor versions (#450)
nikola-petrovic-valcon Jul 15, 2025
2bd6cf5
Updated TF providers: Merging into develop (#451)
nikola-petrovic-valcon Oct 8, 2025
6cc7620
Add version to ignore_changes
Feb 13, 2026
931976f
Merge pull request #453 from recognizegroup/feature/ignore_changes_my…
MPronk67 Feb 13, 2026
c57f693
fix: resolve diagnostic settings inconsistent plan error for function…
DutchKel Mar 5, 2026
36674e2
style: fix pre-existing terraform fmt issues in function_app_linux_ma…
DutchKel Mar 5, 2026
7ecfefd
style: fix all pre-existing terraform fmt issues
DutchKel Mar 5, 2026
18a7640
Merge main and resolve formatting conflicts
DutchKel Mar 5, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion modules/azure/api_management_api_simple/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -113,7 +113,7 @@ resource "azurerm_api_management_api_diagnostic" "api_diagnostic" {

# This temporary output is used to retrieve the XML content of the API policy.
output "api_policy_xml_content" {
value = azurerm_api_management_api_policy.api_policy.xml_content
value = azurerm_api_management_api_policy.api_policy.xml_content
description = "The XML content of the API policy."
}

Expand Down
62 changes: 31 additions & 31 deletions modules/azure/frontdoor_standard/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -24,17 +24,17 @@ resource "azurerm_cdn_frontdoor_profile" "fd_profile" {

# Endpoint
resource "azurerm_cdn_frontdoor_endpoint" "fd_endpoint" {
name = var.name
name = var.name
cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.fd_profile.id
}

# Custom domains
resource "azurerm_cdn_frontdoor_custom_domain" "fd_custom_domains" {
for_each = { for custom_domain in var.custom_domains: custom_domain.name => custom_domain }
name = each.key
for_each = { for custom_domain in var.custom_domains : custom_domain.name => custom_domain }

name = each.key
cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.fd_profile.id
host_name = each.value.host_name
host_name = each.value.host_name

tls {
certificate_type = "ManagedCertificate"
Expand All @@ -43,9 +43,9 @@ resource "azurerm_cdn_frontdoor_custom_domain" "fd_custom_domains" {

# Origin groups
resource "azurerm_cdn_frontdoor_origin_group" "fd_origin_groups" {
for_each = { for group in var.origin_groups : group.name => group }
for_each = { for group in var.origin_groups : group.name => group }

name = each.key
name = each.key
cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.fd_profile.id

session_affinity_enabled = false
Expand All @@ -57,28 +57,28 @@ resource "azurerm_cdn_frontdoor_origin_group" "fd_origin_groups" {
request_type = each.value.health_probe.request_type
}

load_balancing { }
load_balancing {}
}

# Origins
resource "azurerm_cdn_frontdoor_origin" "fd_origins" {
for_each = {
for group in var.origin_groups :
group.name => group.origins[0] # assumes 1 origin per origin group (can be expanded)
group.name => group.origins[0] # assumes 1 origin per origin group (can be expanded)
}

name = each.key
cdn_frontdoor_origin_group_id = azurerm_cdn_frontdoor_origin_group.fd_origin_groups[each.key].id

certificate_name_check_enabled = false

host_name = each.value.host_name
http_port = each.value.http_port
https_port = each.value.https_port
origin_host_header = each.value.origin_host_header
priority = each.value.priority
weight = each.value.weight
enabled = each.value.enabled
host_name = each.value.host_name
http_port = each.value.http_port
https_port = each.value.https_port
origin_host_header = each.value.origin_host_header
priority = each.value.priority
weight = each.value.weight
enabled = each.value.enabled
}

# Redirect Rule Set
Expand Down Expand Up @@ -118,11 +118,11 @@ resource "azurerm_cdn_frontdoor_route" "fd_redirect_routes" {
cdn_frontdoor_rule_set_ids = [azurerm_cdn_frontdoor_rule_set.fd_rs_redirect.id]
cdn_frontdoor_custom_domain_ids = [azurerm_cdn_frontdoor_custom_domain.fd_custom_domains[each.value.custom_domain_name].id]

enabled = each.value.enabled
patterns_to_match = each.value.patterns_to_match
supported_protocols = each.value.supported_protocols
https_redirect_enabled = false
link_to_default_domain = false
enabled = each.value.enabled
patterns_to_match = each.value.patterns_to_match
supported_protocols = each.value.supported_protocols
https_redirect_enabled = false
link_to_default_domain = false
}

# Routes (forwarding)
Expand All @@ -136,25 +136,25 @@ resource "azurerm_cdn_frontdoor_route" "fd_forwarding_routes" {
cdn_frontdoor_origin_group_id = azurerm_cdn_frontdoor_origin_group.fd_origin_groups[each.value.origin_group_name].id
cdn_frontdoor_origin_ids = [azurerm_cdn_frontdoor_origin.fd_origins[each.value.origin_group_name].id]
cdn_frontdoor_custom_domain_ids = [azurerm_cdn_frontdoor_custom_domain.fd_custom_domains[each.value.custom_domain_name].id]
enabled = each.value.enabled
patterns_to_match = each.value.patterns_to_match
supported_protocols = each.value.supported_protocols
https_redirect_enabled = false
forwarding_protocol = "HttpsOnly"
link_to_default_domain = false

enabled = each.value.enabled
patterns_to_match = each.value.patterns_to_match
supported_protocols = each.value.supported_protocols
https_redirect_enabled = false
forwarding_protocol = "HttpsOnly"
link_to_default_domain = false
}

data "azurerm_cdn_frontdoor_firewall_policy" "fd_firewall_policy" {
count = var.security_policy == null ? 0 : 1
count = var.security_policy == null ? 0 : 1
name = var.security_policy.firewall_policy_name
resource_group_name = var.resource_group_name
}

# Security policy
resource "azurerm_cdn_frontdoor_security_policy" "fd_security_policy" {
count = var.security_policy == null ? 0 : 1
name = "${var.security_policy.firewall_policy_name}-securityPolicy"
name = "${var.security_policy.firewall_policy_name}-securityPolicy"
cdn_frontdoor_profile_id = azurerm_cdn_frontdoor_profile.fd_profile.id

security_policies {
Expand Down
2 changes: 1 addition & 1 deletion modules/azure/frontdoor_standard/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,7 @@ variable "forwarding_routes" {

variable "origin_groups" {
type = list(object({
name = string
name = string
health_probe = optional(object({
protocol = string
interval_in_seconds = number
Expand Down
31 changes: 5 additions & 26 deletions modules/azure/function_app_linux/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -99,39 +99,18 @@ resource "azurerm_app_service_virtual_network_swift_connection" "vnet_integratio

# Logging and analytics

data "azurerm_monitor_diagnostic_categories" "diagnostic_categories" {
count = var.log_analytics_workspace_id == null ? 0 : 1
resource_id = azurerm_linux_function_app.function_app.id
}

resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting" {
count = var.log_analytics_workspace_id == null ? 0 : 1
name = "diag-${var.name}"
target_resource_id = azurerm_linux_function_app.function_app.id
log_analytics_workspace_id = var.log_analytics_workspace_id

dynamic "enabled_log" {
for_each = data.azurerm_monitor_diagnostic_categories.diagnostic_categories[0].log_category_types

content {
category = enabled_log.value

retention_policy {
enabled = false
}
}
enabled_log {
category_group = "allLogs"
}

dynamic "metric" {
for_each = data.azurerm_monitor_diagnostic_categories.diagnostic_categories[0].metrics

content {
category = metric.value
enabled = true

retention_policy {
enabled = false
}
}
metric {
category = "AllMetrics"
enabled = true
}
}
35 changes: 7 additions & 28 deletions modules/azure/function_app_linux_managed_identity/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -96,7 +96,7 @@ resource "azurerm_linux_function_app" "function_app" {
}
}

auth_settings_v2 {
auth_settings_v2 {
auth_enabled = true
require_authentication = var.authentication_settings.require_authentication == null ? false : var.authentication_settings.require_authentication
unauthenticated_action = var.authentication_settings.unauthenticated_action == null ? null : var.authentication_settings.unauthenticated_action
Expand Down Expand Up @@ -254,7 +254,7 @@ resource "azuread_group_member" "registered_app_member" {
}

resource "azuread_application_password" "password" {
count = local.should_create_app ? 1 : 0
count = local.should_create_app ? 1 : 0
application_id = azuread_application.application[0].id
}

Expand All @@ -270,39 +270,18 @@ resource "azurerm_app_service_virtual_network_swift_connection" "vnet_integratio

# Logging and analytics

data "azurerm_monitor_diagnostic_categories" "diagnostic_categories" {
count = var.log_analytics_workspace_id == null ? 0 : 1
resource_id = azurerm_linux_function_app.function_app.id
}

resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting" {
count = var.log_analytics_workspace_id == null ? 0 : 1
name = "diag-${var.name}"
target_resource_id = azurerm_linux_function_app.function_app.id
log_analytics_workspace_id = var.log_analytics_workspace_id

dynamic "enabled_log" {
for_each = data.azurerm_monitor_diagnostic_categories.diagnostic_categories[0].log_category_types

content {
category = enabled_log.value

retention_policy {
enabled = false
}
}
enabled_log {
category_group = "allLogs"
}

dynamic "metric" {
for_each = data.azurerm_monitor_diagnostic_categories.diagnostic_categories[0].metrics

content {
category = metric.value
enabled = true

retention_policy {
enabled = false
}
}
metric {
category = "AllMetrics"
enabled = true
}
}
31 changes: 5 additions & 26 deletions modules/azure/function_app_windows/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -111,39 +111,18 @@ resource "azurerm_app_service_virtual_network_swift_connection" "vnet_integratio

# Logging and analytics

data "azurerm_monitor_diagnostic_categories" "diagnostic_categories" {
count = var.log_analytics_workspace_id == null ? 0 : 1
resource_id = azurerm_windows_function_app.function_app.id
}

resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting" {
count = var.log_analytics_workspace_id == null ? 0 : 1
name = "diag-${var.name}"
target_resource_id = azurerm_windows_function_app.function_app.id
log_analytics_workspace_id = var.log_analytics_workspace_id

dynamic "enabled_log" {
for_each = data.azurerm_monitor_diagnostic_categories.diagnostic_categories[0].log_category_types

content {
category = enabled_log.value

retention_policy {
enabled = false
}
}
enabled_log {
category_group = "allLogs"
}

dynamic "metric" {
for_each = data.azurerm_monitor_diagnostic_categories.diagnostic_categories[0].metrics

content {
category = metric.value
enabled = true

retention_policy {
enabled = false
}
}
metric {
category = "AllMetrics"
enabled = true
}
}
2 changes: 1 addition & 1 deletion modules/azure/logic_app_standard/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -285,6 +285,6 @@ resource "azapi_update_resource" "setup_auth_settings" {
}

resource "azuread_application_password" "password" {
count = var.managed_identity_provider != null ? 1 : 0
count = var.managed_identity_provider != null ? 1 : 0
application_id = azuread_application.application[0].id
}
2 changes: 1 addition & 1 deletion modules/azure/mysql_flexible_server/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ resource "azurerm_mysql_flexible_server" "mysql_flexible_server" {
}

lifecycle {
ignore_changes = [zone]
ignore_changes = [zone, version]
}
}

Expand Down
2 changes: 1 addition & 1 deletion modules/cloudflare/dns_records/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ data "cloudflare_zone" "zone" {
name = var.zone_name
}

resource "cloudflare_record" "record" {
resource "cloudflare_record" "record" {
for_each = { for idx, rec in var.records : rec.name => rec }
zone_id = data.cloudflare_zone.zone.id
name = each.value.name
Expand Down