Releases: Azure/terraform-azurerm-avm-res-web-site
Releases · Azure/terraform-azurerm-avm-res-web-site
v0.12.0
Breaking Change(s)
PLEASE READ! Includes VERY IMPORTANT Breaking Changes
v0.12.0
will no longer supportazurerm
3.x
but will now supportazurerm
4.x
Feature(s)
azurerm
4.x
support addressing Issue #122- enabling tls
1.3
support throughazurerm
4.8
support (Issue #136)
Update(s)
- bug fixes to unmanaged private endpoints with deployment slots as highlighted in PR #129
- arguments removed as no longer supported by
azurerm
4.x
docker_container_name
(as part ofapplication_stack
)docker_container_tag
(as part ofapplication_stack
)path
(as part ofslow_request
. Please youslow_request_with_path
if needed.)auto_heal_enabled
login
map made optional by module (still required by provider forauth_settings_v2
) so that a defaultlogin
map can be automatically set forauth_settings_v2
addressing Issue #130
v0.11.0
Breaking Change(s)
PLEASE READ! Includes VERY IMPORTANT Breaking Changes
- module no longer supports the creation and management of
App Service Plan
- removed the following variables:
create_service_plan
new_service_plan
- removed related outputs:
service_plan
service_plan_id
service_plan_name
- removed the following variables:
Users will need to reference an app service plan using
service_plan_resource_id
, thus making it arequired
input.
- module no longer supports the creation and management of
Storage Account
forFunction App
- removed the following variables:
function_app_create_storage_account
function_app_storage_account
function_app_storage_account_access_key
function_app_storage_account_inherit_lock
function_app_storage_account_name
function_app_storage_uses_managed_identity
- removed related outputs:
storage_account
storage_account_lock
- removed the following variables:
Users can still supply an existing storage account using
storage_account_access_key
(orstorage_uses_managed_identity
) andstorage_account_name
.
Terraform
minimum required version raised to1.9
Feature(s)
None
Update(s)
fix
: addressing Issue #120 whereazurerm_windows_function_app
site config
was missingip_restriction_default_action
andscm_ip_restriction_default_action
- improvements variable documentation
v0.10.0
Breaking Change(s)
- migration to version
0.1.0
ofavm-res-web-serverfarm
fromazurerm_service_plan
- removed certain outputs regarding
service_plan
Feature(s)
- added addtitional support for
avm-res-storage-storageaccount
inputs - added additional support for
new_service_plan
variable
Update(s)
- module now uses version
0.2.4
ofavm-res-storage-storageaccount
x_fd_health_probe
to properly work when usingip_restriction
/scm_ip_restriction
and Azure Front Door- module is now configured to zone redundant by default
worker_count
defaults to3
zone_balancing_enabled
defaults totrue
sku_name
defaults toP1v2
v0.9.1
Breaking Change(s)
None
Feature(s)
None
Update(s)
- updates for github policies and workflows
- removed providers from yml templates and markdown documentation
- removed examples for:
linux_function_app
linux_web_app
windows_function_app
windows_web_app
- created examples for:
function_app
web_app
v0.9.0
v0.8.1
Breaking Change(s)
None
Feature(s)
azurerm_app_service_slot_custom_hostname_binding
now supportsazurerm_[windows|linux]_web_app_slot
Previous Logic:
app_service_slot_id = var.os_type == "Windows" ? azurerm_windows_function_app_slot.this[each.value.app_service_slot_key].id : azurerm_linux_function_app_slot.this[each.value.app_service_slot_key].id
Current Logic:
app_service_slot_id = var.kind == "functionapp" ? (var.os_type == "Windows" ? azurerm_windows_function_app_slot.this[each.value.app_service_slot_key].id : azurerm_linux_function_app_slot.this[each.value.app_service_slot_key].id) : (var.os_type == "Windows" ? azurerm_windows_web_app_slot.this[each.value.app_service_slot_key].id : azurerm_linux_web_app_slot.this[each.value.app_service_slot_key].id)
thumbprint
can now reference existing thumbprint value withthumbprint_value
Previous Logic:
thumbprint = azurerm_app_service_certificate.this[each.value.thumbprint_key].thumbprint
Current Logic:
thumbprint = each.value.thumbprint_key != null ? azurerm_app_service_certificate.this[each.value.thumbprint_key].thumbprint : each.value.thumbprint_value
Update(s)
thumbprints
as newoutput
- cleaning
exmples
/cusom_domain
/main.tf
file
v0.8.0
Breaking Change(s)
- new mapping for
azurerm_app_service_custom_hostname_binding
will likely affect any configurations with existing custom domains managed by terraform
Feature(s)
- functionality for custom domains for deployment slots using
azurerm_app_service_slot_custom_hostname_binding
resource via Issue #101.
uses
slot_as_target
incustom_domains
as toggle to differentiate betweenazurerm_app_service_custom_hostname_binding
andazurerm_app_service_slot_custom_hostname_binding
azurerm_app_service_certificate
to acceptkey_vault_id
argument via Issue #102
Update(s)
- additional outputs added for:
function_app_active_slot
function_app_deployment_slots
kind
os_type
v0.7.3
Breaking Change(s):
None
Feature(s):
- new telemetry
- transition to use of
modtm
provider (view here) - removed
locals.telemetry.tf
- removed
locals.telemetry.tf.json
- transition to use of
Update(s):
- added
examples
/storage_uses_managed_identity
- fixed logic for
storage_uses_managed_identity
forazurerm_(windows | linux)_function_app
via Issue #96
Previous:
storage_uses_managed_identity = var.function_app_storage_uses_managed_identity == true && var.function_app_storage_account_access_key == null && var.function_app_storage_account == null ? var.function_app_storage_uses_managed_identity : null
Current:
storage_uses_managed_identity = var.function_app_storage_uses_managed_identity == true && var.function_app_storage_account_access_key == null ? var.function_app_storage_uses_managed_identity : null
- updated logic for
azurerm_linux_function_app
andazurerm_linux_function_app_slot
to account for created storage account's access key
storage_account_access_key = var.function_app_storage_account_access_key != null && var.function_app_storage_uses_managed_identity != true && var.function_app_create_storage_account != true ? var.function_app_storage_account_access_key : var.function_app_storage_account_access_key == null && var.function_app_storage_uses_managed_identity != true && var.function_app_create_storage_account ? module.avm_res_storage_storageaccount[0].resource.primary_access_key : null
v0.7.2
Breaking Change(s)
None
Feature(s)
lock
functionality forfunction_app_storage_account
lock
functionality fordeployment_slots
deployment_slots_inherit_lock
defaults totrue
function_app_storage_account_inherit_lock
defaults totrue
Update(s)
output
for the following:deployment_slot_locks
private_endpoint_locks
resource_lock
storage_account_lock
v0.7.1
Breaking Change(s)
None
Feature(s)
- output for
system_assigned_mi_principal_id
via RMFR7 private_endpoints
functionality withdeployment_slots
via Issue #88role_assignments
functionality withdeployment_slots
lock
functionality withfunction_app_storage_account
Update(s)
- added
examples
/deployment_slot
- added
examples
/deployment_slot_with_interfaces
- added
examples
/ip_restriction
via Issue #85