42atomys / stud42

Stud42 official repository since major 3 update (https://s42.app)
https://s42.app
MIT License
858 stars 26 forks source link

fix: twitch credentials invalid cause linking impossible #477

Closed 42atomys closed 1 year ago

42atomys commented 1 year ago

Describe the pull request This pull request addresses an issue where invalid Twitch credentials make it impossible to link accounts. The fix involves resolving the issue with the invalid credentials to ensure successful linking with Twitch accounts.

Checklist

github-actions[bot] commented 1 year ago

Terraform data for pre-cluster stack

Terraform Initialization ⚙️ success

Terraform Validation 🤖 success

Show Validation ``` Success! The configuration is valid. ```

Terraform Plan 📖 success

Show Plan ``` helm_release.rabbitmq_operator: Refreshing state... [id=primary] helm_release.reflector: Refreshing state... [id=reflector] helm_release.sealed_secret: Refreshing state... [id=sealed-secret] helm_release.istio_base: Refreshing state... [id=istio-base] kubernetes_namespace.namespace["staging"]: Refreshing state... [id=staging] kubernetes_namespace.namespace["istio-system"]: Refreshing state... [id=istio-system] kubernetes_namespace.namespace["previews"]: Refreshing state... [id=previews] kubernetes_namespace.namespace["sandbox"]: Refreshing state... [id=sandbox] kubernetes_namespace.namespace["production"]: Refreshing state... [id=production] kubernetes_namespace.namespace["cert-manager"]: Refreshing state... [id=cert-manager] kubernetes_namespace.namespace["monitoring"]: Refreshing state... [id=monitoring] kubernetes_namespace.namespace["permission-manager"]: Refreshing state... [id=permission-manager] helm_release.istiod: Refreshing state... [id=istiod] helm_release.gateway: Refreshing state... [id=istio-ingressgateway] No changes. Your infrastructure matches the configuration. Terraform has compared your real infrastructure against your configuration and found no differences, so no changes are needed. ```
github-actions[bot] commented 1 year ago

Terraform data for cluster stack

Terraform Initialization ⚙️ success

Terraform Validation 🤖 success

Show Validation ``` Success! The configuration is valid. ```

Terraform Plan 📖 success

Show Plan ``` module.cert_manager.null_resource.cert_manager_ovh_source: Refreshing state... [id=6901452211892208863] module.istio.kubectl_manifest.gateways["dev-s42-previews"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/previews/gateways/dev-s42-previews] module.istio.kubectl_manifest.gateways["app-s42"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/production/gateways/app-s42] module.istio.kubectl_manifest.gateways["app-s42-dashboards"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/monitoring/gateways/app-s42-dashboards] module.monitoring_routing.kubectl_manifest.virtual_services["app-s42-dashboards"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/monitoring/virtualservices/app-s42-dashboards] kubernetes_service_account.tempo: Refreshing state... [id=monitoring/tempo] module.istio.kubectl_manifest.gateways["app-s42-next"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/staging/gateways/app-s42-next] module.tempo.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=monitoring/tempo-data] module.tempo.kubernetes_config_map.app["config"]: Refreshing state... [id=monitoring/tempo-config] module.tempo.kubernetes_service.app[0]: Refreshing state... [id=monitoring/tempo] kubernetes_service_account.promtail: Refreshing state... [id=monitoring/promtail] kubernetes_service_account.loki: Refreshing state... [id=monitoring/loki] kubernetes_role.loki: Refreshing state... [id=monitoring/loki] kubernetes_service_account.prometheus: Refreshing state... [id=monitoring/prometheus] kubernetes_cluster_role.prometheus: Refreshing state... [id=prometheus] kubernetes_cluster_role.promtail: Refreshing state... [id=promtail] module.grafana.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=monitoring/grafana-data] module.grafana.kubernetes_deployment.app[0]: Refreshing state... [id=monitoring/grafana] module.grafana.kubernetes_service.app[0]: Refreshing state... [id=monitoring/grafana] module.cert_manager.helm_release.cert_manager: Refreshing state... [id=cert-manager] module.loki.kubernetes_service.app[0]: Refreshing state... [id=monitoring/loki] module.loki.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=monitoring/loki-data] module.loki.kubernetes_config_map.app["config"]: Refreshing state... [id=monitoring/loki-config] module.prometheus.kubernetes_config_map.app["config"]: Refreshing state... [id=monitoring/prometheus-config] module.prometheus.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=monitoring/prometheus-data] module.prometheus.kubernetes_service.app[0]: Refreshing state... [id=monitoring/prometheus] kubernetes_role_binding.loki: Refreshing state... [id=monitoring/loki] module.promtail.kubernetes_config_map.app["config"]: Refreshing state... [id=monitoring/promtail-config] module.tempo.kubernetes_stateful_set.app[0]: Refreshing state... [id=monitoring/tempo] module.promtail.kubernetes_service.app[0]: Refreshing state... [id=monitoring/promtail] module.promtail.kubernetes_daemonset.app[0]: Refreshing state... [id=monitoring/promtail] kubernetes_cluster_role_binding.promtail: Refreshing state... [id=promtail] kubernetes_cluster_role_binding.prometheus: Refreshing state... [id=prometheus] module.loki.kubernetes_stateful_set.app[0]: Refreshing state... [id=monitoring/loki] module.prometheus.kubernetes_stateful_set.app[0]: Refreshing state... [id=monitoring/prometheus] module.secrets.kubernetes_manifest.sealed_secret["ovh-credentials"]: Refreshing state... module.secrets.kubernetes_manifest.sealed_secret["ghcr-creds"]: Refreshing state... module.cert_manager.kubectl_manifest.certificates["app-s42-next"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/app-s42-next] module.cert_manager.kubectl_manifest.certificates["dev-s42-previews"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/dev-s42-previews] module.cert_manager.kubectl_manifest.certificates["app-s42-dashboards"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/app-s42-dashboards] module.cert_manager.kubectl_manifest.certificates["app-s42"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/app-s42] module.cert_manager.kubectl_manifest.certificates["dev-s42-sandbox"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/dev-s42-sandbox] module.cert_manager.kubernetes_role.cert_manager_webhook_ovh_secret_reader: Refreshing state... [id=cert-manager/cert-manager-webhook-ovh:secret-reader] module.cert_manager.kubernetes_role_binding.cert_manager_webhook_ovh_secret_reader: Refreshing state... [id=cert-manager/cert-manager-webhook-ovh:secret-reader] module.cert_manager.helm_release.cert_manager_ovh: Refreshing state... [id=cert-manager-webhook-ovh] module.cert_manager.kubectl_manifest.issuers["ovh-issuer"]: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/ovh-issuer] module.cert_manager.kubectl_manifest.self_signed_issuers["selfsigned-issuer"]: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/selfsigned-issuer] module.cert_manager.kubectl_manifest.issuers["ovh-staging-issuer"]: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/ovh-staging-issuer] No changes. Your infrastructure matches the configuration. Terraform has compared your real infrastructure against your configuration and found no differences, so no changes are needed. Warning: "default_secret_name" is no longer applicable for Kubernetes v1.24.0 and above with kubernetes_service_account.prometheus, on monitoring.tf line 73, in resource "kubernetes_service_account" "prometheus": 73: resource "kubernetes_service_account" "prometheus" { Starting from version 1.24.0 Kubernetes does not automatically generate a token for service accounts, in this case, "default_secret_name" will be empty (and 3 more similar warnings elsewhere) ```
github-actions[bot] commented 1 year ago

Terraform data for apps stack

Terraform Initialization ⚙️ success

Terraform Validation 🤖 success

Show Validation ``` Success! The configuration is valid. ```

Terraform Plan 📖 success

Show Plan ``` module.s42.random_password.postgres: Refreshing state... [id=none] module.webhooked.module.webhooked.kubernetes_service.app[0]: Refreshing state... [id=production/webhooked] module.s42.random_password.dragonfly: Refreshing state... [id=none] module.s42.random_password.next_auth_secret: Refreshing state... [id=none] module.s42.random_password.meilisearch_token: Refreshing state... [id=none] module.s42.kubernetes_config_map.stud42_config: Refreshing state... [id=production/stud42-config] module.webhooked.module.webhooked.kubernetes_config_map.app["config"]: Refreshing state... [id=production/webhooked-config] module.webhooked.module.secrets.kubernetes_manifest.sealed_secret["s42-webhooked-secrets"]: Refreshing state... module.s42.kubernetes_manifest.rabbitmq_queue_webhooks_processing: Refreshing state... module.s42.kubernetes_manifest.rabbitmq_policy_webhooks_dlq: Refreshing state... module.s42.kubernetes_manifest.rabbitmq_binding_webhooks_dlq: Refreshing state... module.s42.module.istio.kubectl_manifest.virtual_services["app-s42"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/production/virtualservices/app-s42] module.s42.module.service-token.kubernetes_manifest.sealed_secret["discord-token"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["sentry-dsns"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["auth-service-certs-jwk"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["github-token"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["s42-service-token"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["ovh-s3-credentials"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["oauth2-providers"]: Refreshing state... module.s42.kubernetes_manifest.rabbitmq_queue_webhooks_dlq: Refreshing state... module.s42.kubernetes_secret.next_auth_secret: Refreshing state... [id=production/next-auth-secret] module.s42.module.meilisearch.kubernetes_service.app[0]: Refreshing state... [id=production/meilisearch] module.s42.module.dragonfly.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=production/dragonfly-data] module.s42.module.dragonfly.kubernetes_service.app[0]: Refreshing state... [id=production/dragonfly] module.s42.kubernetes_manifest.rabbitmq: Refreshing state... module.s42.module.meilisearch.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=production/meilisearch-data] module.s42.module.interface.kubernetes_service.app[0]: Refreshing state... [id=production/interface] module.s42.module.api.kubernetes_service.app[0]: Refreshing state... [id=production/api] module.s42.module.webhooks_processor.kubernetes_deployment.app[0]: Refreshing state... [id=production/webhooks-processor] module.s42.module.api.kubernetes_deployment.app[0]: Refreshing state... [id=production/api] module.s42.module.meilisearch_clean_tasks.kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/meilisearch-clean-tasks] module.s42.module.interface.kubernetes_deployment.app[0]: Refreshing state... [id=production/interface] module.s42.module.crawler_locations.kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations] module.s42.module.auth_service.kubernetes_service.app[0]: Refreshing state... [id=production/auth-service] module.s42.module.auth_service.kubernetes_deployment.app[0]: Refreshing state... [id=production/auth-service] module.s42.module.crawler_campus.kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-campus] module.s42.module.meilisearch.kubernetes_secret.app["token"]: Refreshing state... [id=production/meilisearch-token] module.s42.module.dragonfly.kubernetes_secret.app["credentials"]: Refreshing state... [id=production/dragonfly-credentials] module.s42.module.meilisearch.kubernetes_stateful_set.app[0]: Refreshing state... [id=production/meilisearch] module.s42.module.postgres.kubernetes_secret.app["credentials"]: Refreshing state... [id=production/postgres-credentials] module.s42.module.postgres.kubernetes_service.app[0]: Refreshing state... [id=production/postgres] module.s42.module.postgres.kubernetes_config_map.app["config"]: Refreshing state... [id=production/postgres-config] module.s42.module.postgres.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=production/postgres-data] module.s42.module.dragonfly.kubernetes_stateful_set.app[0]: Refreshing state... [id=production/dragonfly] module.s42.module.interface.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/interface] module.s42.module.api.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/api] module.s42.module.webhooks_processor.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/webhooks-processor] module.webhooked.module.webhooked.kubernetes_deployment.app[0]: Refreshing state... [id=production/webhooked] module.s42.module.auth_service.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/auth-service] module.s42.kubernetes_pod_disruption_budget_v1.rabbitmq: Refreshing state... [id=production/rabbitmq] module.s42.module.postgres.kubernetes_stateful_set.app[0]: Refreshing state... [id=production/postgres] module.webhooked.module.webhooked.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/webhooked] module.s42.kubernetes_manifest.rabbitmq_exchange_webhooks: Refreshing state... Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: ~ update in-place -/+ destroy and then create replacement Terraform will perform the following actions: # module.s42.module.api.kubernetes_deployment.app[0] will be updated in-place ~ resource "kubernetes_deployment" "app" { id = "production/api" # (1 unchanged attribute hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } name = "api" # (5 unchanged attributes hidden) } ~ spec { # (5 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.27.1" -> "latest" # (4 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.27.1" -> "ghcr.io/42atomys/stud42:latest" name = "api" # (8 unchanged attributes hidden) # (24 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } # (2 unchanged blocks hidden) } } # module.s42.module.api.kubernetes_horizontal_pod_autoscaler_v2.app[0] will be updated in-place ~ resource "kubernetes_horizontal_pod_autoscaler_v2" "app" { id = "production/api" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } name = "api" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.api.kubernetes_service.app[0] will be updated in-place ~ resource "kubernetes_service" "app" { id = "production/api" # (2 unchanged attributes hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } name = "api" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.auth_service.kubernetes_deployment.app[0] will be updated in-place ~ resource "kubernetes_deployment" "app" { id = "production/auth-service" # (1 unchanged attribute hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } name = "auth-service" # (5 unchanged attributes hidden) } ~ spec { # (5 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.27.1" -> "latest" # (4 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.27.1" -> "ghcr.io/42atomys/stud42:latest" name = "auth-service" # (8 unchanged attributes hidden) # (8 unchanged blocks hidden) } # (4 unchanged blocks hidden) } } # (2 unchanged blocks hidden) } } # module.s42.module.auth_service.kubernetes_horizontal_pod_autoscaler_v2.app[0] will be updated in-place ~ resource "kubernetes_horizontal_pod_autoscaler_v2" "app" { id = "production/auth-service" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } name = "auth-service" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.auth_service.kubernetes_service.app[0] will be updated in-place ~ resource "kubernetes_service" "app" { id = "production/auth-service" # (2 unchanged attributes hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } name = "auth-service" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.crawler_campus.kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-campus" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-campus" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.27.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-campus" # (8 unchanged attributes hidden) # (12 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations.kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.27.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.interface.kubernetes_deployment.app[0] will be updated in-place ~ resource "kubernetes_deployment" "app" { id = "production/interface" # (1 unchanged attribute hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } name = "interface" # (5 unchanged attributes hidden) } ~ spec { # (5 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.27.1" -> "latest" # (4 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.27.1" -> "ghcr.io/42atomys/stud42:latest" name = "interface" # (8 unchanged attributes hidden) # (32 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } # (2 unchanged blocks hidden) } } # module.s42.module.interface.kubernetes_horizontal_pod_autoscaler_v2.app[0] will be updated in-place ~ resource "kubernetes_horizontal_pod_autoscaler_v2" "app" { id = "production/interface" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } name = "interface" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.interface.kubernetes_service.app[0] will be updated in-place ~ resource "kubernetes_service" "app" { id = "production/interface" # (2 unchanged attributes hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } name = "interface" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.meilisearch_clean_tasks.kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/meilisearch-clean-tasks" ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ spec { # (7 unchanged attributes hidden) ~ template { ~ spec { # (12 unchanged attributes hidden) ~ container { name = "meilisearch-clean-tasks" # (9 unchanged attributes hidden) ~ resources { ~ limits = { + "memory" = "128Mi" } ~ requests = { + "cpu" = "100m" + "memory" = "128Mi" } } # (2 unchanged blocks hidden) } # (2 unchanged blocks hidden) } # (1 unchanged block hidden) } } # (1 unchanged block hidden) } } # (1 unchanged block hidden) } # module.s42.module.service-token.kubernetes_manifest.sealed_secret["oauth2-providers"] must be replaced -/+ resource "kubernetes_manifest" "sealed_secret" { ~ manifest = { ~ spec = { ~ encryptedData = { # forces replacement ~ "TWITCH_ID" = "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" -> "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" ~ "TWITCH_SECRET" = "AgBC6UDmw9gkqOP3w+MQd5yQacjfVrq+/tDpvyuFX79cSKUIoLJBqx2wYmr3O1SuX3T1sZJgdR4MLj9kWd819H9kBx4C7hWb34WjLJkyL4zV+trB+0ssbR3O7PDCLPTJ5o0I1kjvdvHDaadJkdfrtsmGst03DEhXqhv5sxBxXCwCc6yBU864k5QkptQGmMTn+2Itv4xihDu9rahFRvjAb6nWPeYvd/sk78Q9UlMH9W1snqupBqqrtoYzcNbWRY+EStjxDMzpugVuqFXg1nFJieGfM5Ts780WwdnxOm6azb52OtHWOoXBOBCDxb4kR3gBlSEnp7QIXp82fZhSvwuPie8xPs1CrejwbEZ67WPncgrugzoxcmzFTNytnDK9uR/FaE0jHOi51oMCPxZ0/m5DyRnnpRDHhSfPpTmcozo0n/ksz6Ev/h/yUKR10UaBv2G76c7Idvv7mWhyitg8mrJmPbLD0Xpp1bfzdNVcVLoYIzVgHdj+9smZb/uv7S+tYJ0UhZbq+5VJTkO/FQSTJNg55u9BnqEY68cBP9DBES+PweEXy9ghj3cM0zdxG9QySBSqpEC4nDsw64/P7k8xwX1mow2wqXHAJ01abNutbGXRkF05vRezEUSFBs/PqV9/l9rpyqwmVJz5hgyX8fso3EnxS1rkZ7yL753CS00QbuMiSoh/UtB2QwiI60tbhuJNPbDZUKKmmBQMzM6ibTzGBkT09YV5dj83CpWjcgFoHSkcgNVU9pkP6JXIg9LXTBpVIJsr258hDQ==" -> "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" # (18 unchanged elements hidden) } # (1 unchanged element hidden) } # (3 unchanged elements hidden) } ~ object = { ~ metadata = { ~ annotations = { - "sealedsecrets.bitnami.com/cluster-wide" = "false" - "sealedsecrets.bitnami.com/namespace-wide" = "true" } -> (known after apply) ~ creationTimestamp = null -> (known after apply) ~ deletionGracePeriodSeconds = null -> (known after apply) ~ deletionTimestamp = null -> (known after apply) ~ finalizers = null -> (known after apply) ~ generateName = null -> (known after apply) ~ generation = null -> (known after apply) ~ labels = null -> (known after apply) ~ managedFields = null -> (known after apply) name = "oauth2-providers" ~ ownerReferences = null -> (known after apply) ~ resourceVersion = null -> (known after apply) ~ selfLink = null -> (known after apply) ~ uid = null -> (known after apply) # (1 unchanged element hidden) } ~ spec = { ~ data = null -> (known after apply) ~ template = { ~ data = null -> (known after apply) # (2 unchanged elements hidden) } # (1 unchanged element hidden) } # (2 unchanged elements hidden) } } # module.s42.module.webhooks_processor.kubernetes_deployment.app[0] will be updated in-place ~ resource "kubernetes_deployment" "app" { id = "production/webhooks-processor" # (1 unchanged attribute hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } name = "webhooks-processor" # (5 unchanged attributes hidden) } ~ spec { # (5 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.27.1" -> "ghcr.io/42atomys/stud42:latest" name = "webhooks-processor" # (8 unchanged attributes hidden) # (20 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } # (2 unchanged blocks hidden) } } # module.s42.module.webhooks_processor.kubernetes_horizontal_pod_autoscaler_v2.app[0] will be updated in-place ~ resource "kubernetes_horizontal_pod_autoscaler_v2" "app" { id = "production/webhooks-processor" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.27.1" -> "latest" ~ "version" = "v0.27.1" -> "latest" # (5 unchanged elements hidden) } name = "webhooks-processor" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } Plan: 1 to add, 14 to change, 1 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: apps-tfplan To perform exactly these actions, run the following command to apply: terraform apply "apps-tfplan" ```