@m-a.schenk && @joett.ocasio,
Thank you for your input. Building on what you were suggesting I came out with the text below.
Same temps as before with an Inject Restart Text this time of Next Instruction#
I fed it the lines below to start
Using Microsoft Azure and Microsoft Visual Studio Code create an application with Azure Logic Apps and Azure Blob Storage. Develop using Powershell when possible otherwise develop using Python.
Please create the the Azure Blob Storage and randomly generate all necessary names. Please create a new Azure Logic App and title it MyNewLogicApp. Follow the instructions below.
Next Instruction# Create a new Azure Blob storage
Next Instruction# Create a new Azure Logic App and title it MyNewLogicApp
Next Instruction# MyNewLogicApp will begin with an HTTP Request Trigger. Label this trigger as inHTTP
Next Instruction# Check and verify that the content-type is JSON
Next Instruction# Check and verify that the API KEY has a value of HammerTime
Next Instruction# MyNewLogicApp will create a new condition and label it Check4Key
Next Instruction# IF inHTTP does not contain the API KEY
Next Instruction# THEN return a 403 not authorized message to the requestor and TERMINATE the flow
#Create a new Azure Blob storage
$storageAccount = New-AzStorageAccount -ResourceGroupName myResourceGroup -Name myStorageAccount -SkuName Standard_LRS -Location westus
#Create a new Azure Logic App
$logicApp = New-AzLogicApp -ResourceGroupName myResourceGroup -Name MyNewLogicApp -Location westus -Sku S1
Codex spat out the text below. I had one stop and restart and I forgot which layer of text I copy/pasted! This what codex generated below.
#MyNewLogicApp will begin with an HTTP Request Trigger. Label this trigger as inHTTP
$inHttp = New-AzLogicAppTriggerHttpRequest -Name inHTTP -LogicApp $logicApp -Uri https://www.google.com -Method POST -Body ""
#Check and verify that the content-type is JSON
$inHttp.ContentType = "application/json"
#Check and verify that the API KEY has a value of HammerTime
$inHttp.Headers.Add("x-api-key", "HammerTime")
#MyNewLogicApp will create a new condition and label it Check4Key
$check4Key = New-AzLogicAppCondition -Name Check4Key -LogicApp $logicApp -ConditionType "All"
#IF inHTTP does not contain the API KEY then terminate the flow and a 403 Not Authorized message will be returned
$check4Key.Conditions.Add($inHttp)
$check4Key.ConditionType = "Not"
$check4Key.Properties.Add("statusCode", "403")
$check4Key.Properties.Add("body", "Not Authorized")
$check4Key.Properties.Add("bodyType", "Text")
$check4Key.Properties.Add("statusDescription", "Not Authorized")
$check4Key.Properties.Add("isBodyHtml", $false)
$check4Key.Properties.Add("contentType", "text/html")
$check4Key.Properties.Add("contentEncoding", "utf-8")
$check4Key.Properties.Add("contentLanguage", "en-US")
$check4Key.Properties.Add("contentDisposition", "inline")
$check4Key.Properties.Add("cacheControl", "no-cache")
$check4Key.Properties.Add("allow", "GET,HEAD,OPTIONS")
$check4Key.Properties.Add("expires", "0")
$check4Key.Properties.Add("pragma", "no-cache")
$check4Key.Properties.Add("x-ms-blob-type", "BlockBlob")
$check4Key.Properties.Add("x-ms-meta-name", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-value", "HammerTime")
$check4Key.Properties.Add("x-ms-version", "2018-11-09")
$check4Key.Properties.Add("x-ms-blob-content-type", "text/html")
$check4Key.Properties.Add("x-ms-blob-content-encoding", "utf-8")
$check4Key.Properties.Add("x-ms-blob-content-language", "en-US")
$check4Key.Properties.Add("x-ms-blob-content-disposition", "inline")
$check4Key.Properties.Add("x-ms-blob-cache-control", "no-cache")
$check4Key.Properties.Add("x-ms-blob-content-length", "0")
$check4Key.Properties.Add("x-ms-blob-sequence-number", "0")
$check4Key.Properties.Add("x-ms-blob-content-md5", "Q2hlY2sgSW50ZWdyaXR5IQ==")
$check4Key.Properties.Add("x-ms-meta-target-name", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-target-value", "HammerTime")
Though I think the properties.add is a bit much, all of the above makes sense. Now below is the weird part. I don’t understand what prompted codex to think this was the next best line to match my intent.
$check4Key.Properties.Add("x-ms-meta-abc", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-bcd", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-efg", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-hij", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-klm", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-nop", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-qrs", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-tuv", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-wxy", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-yza", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-asd", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-fgh", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-jkl", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-pqr", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-stu", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-vwx", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-yza", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-zab", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-asd", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-fgh", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-jkl", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-pqr", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-stu", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-vwx", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-yza", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-zab", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-asd", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-fgh", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-jkl", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-pqr", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-stu", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-vwx", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-yza", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-zab", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-asd", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-fgh", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-jkl", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-pqr", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-stu", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-vwx", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-yza", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-zab", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-asd", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-fgh", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-jkl", "HammerTime")
$check4Key.Properties.Add("x-ms-meta-pqr", "HammerTime
Next Instruction#
Now it didn’t trail off into the sunset. Rather, it ran through some letter combo cycle, called them each HammerTime and then gave it back to the user for the Next Instruction#
Clearly some narrative work to do.
Thanks again for the input
Cheers mates,
~CC