Altinn / altinn-platform

Altinn Platform infrastructure
7 stars 1 forks source link

chore: add a grafana env to tf vars #1031

Closed sduranc closed 1 month ago

sduranc commented 1 month ago

Description

Related Issue(s)

Verification

Documentation

github-actions[bot] commented 1 month ago

Terraform environment prod

Format and Style 🖌success

Initialization ⚙️success

Validation 🤖success

Validation Output ``` Success! The configuration is valid. ```

Plan 📖success

Show Plan ``` [Lines containing Refreshing state removed] [Maybe further truncated see logs for complete plan output] Acquiring state lock. This may take a few moments... data.azuread_application_published_app_ids.well_known: Reading... data.azuread_application_published_app_ids.well_known: Read complete after 0s [id=appIds] data.azuread_client_config.current: Reading... data.azuread_client_config.current: Read complete after 0s [id=cd0026d8-283b-4a55-9bfa-d0ef4a8ba21c-f03f7579-5f39-4d7f-bcea-8e5cb6d7aca4-02b17d28-7ec8-4084-92ce-d26051fa4998] data.azurerm_role_definition.contributor: Reading... data.azurerm_subscription.current: Reading... data.azurerm_resource_group.tfstate: Reading... data.azurerm_role_definition.user_access_administrator: Reading... data.azurerm_role_definition.storage_blob_reader_data_access: Reading... data.azurerm_role_definition.reader: Reading... data.azurerm_role_definition.azure_kubernetes_service_cluster_user_role: Reading... data.azurerm_role_definition.storage_blob_data_owner: Reading... data.azurerm_subscription.current: Read complete after 0s [id=/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2] data.azurerm_role_definition.storage_blob_reader_data_access: Read complete after 0s [id=/providers/Microsoft.Authorization/roleDefinitions/c12c1c16-33a1-487b-954d-41c89c60f349] data.azurerm_role_definition.user_access_administrator: Read complete after 0s [id=/providers/Microsoft.Authorization/roleDefinitions/18d7d88d-d35e-4fb5-a5c3-7773c20a72d9] data.azurerm_role_definition.reader: Read complete after 0s [id=/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7] data.azurerm_role_definition.storage_blob_data_owner: Read complete after 0s [id=/providers/Microsoft.Authorization/roleDefinitions/b7e6dc6d-f1e8-4753-8033-0f276bb0955b] data.azurerm_role_definition.azure_kubernetes_service_cluster_user_role: Read complete after 0s [id=/providers/Microsoft.Authorization/roleDefinitions/4abbcc35-e782-43d8-92c5-2d3f1bd2253f] data.azurerm_role_definition.contributor: Read complete after 1s [id=/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c] data.azurerm_resource_group.tfstate: Read complete after 1s [id=/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg] data.azuread_service_principal.msgraph: Reading... data.azuread_directory_object.current: Reading... data.azuread_directory_object.current: Read complete after 1s [id=02b17d28-7ec8-4084-92ce-d26051fa4998] data.azuread_service_principal.msgraph: Read complete after 1s [id=b9d7b3d8-a063-4e34-89d9-15db56e22d42] data.azuread_service_principal.current[0]: Reading... data.azuread_service_principal.current[0]: Read complete after 0s [id=02b17d28-7ec8-4084-92ce-d26051fa4998] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create ~ update in-place -/+ destroy and then create replacement Terraform will perform the following actions: # azuread_application.reader will be updated in-place ~ resource "azuread_application" "reader" { id = "/applications/f2259af8-0975-4e83-925f-3ccdf18da571" tags = [] # (16 unchanged attributes hidden) - required_resource_access { - resource_app_id = "00000003-0000-0000-c000-000000000000" -> null - resource_access { - id = "9a5d68dd-52b0-4cc2-bd40-abcf44ac3a30" -> null - type = "Role" -> null } - resource_access { - id = "5b567255-7703-4780-807c-7be8301ae99b" -> null - type = "Role" -> null } } # (6 unchanged blocks hidden) } # azuread_application_api_access.example_msgraph will be created + resource "azuread_application_api_access" "example_msgraph" { + api_client_id = "00000003-0000-0000-c000-000000000000" + application_id = "/applications/005b1c70-6fa7-4205-9fa1-8b7a53713238" + id = (known after apply) + role_ids = [ + "1bfefb4e-e0b5-418b-a88f-73c46d2cc8e9", + "62a82d76-70ea-41e2-9197-370581804d09", ] } # azuread_application_federated_identity_credential.oidc_environments["app-altinn-app-frontend-react-dev-grafana"] will be created + resource "azuread_application_federated_identity_credential" "oidc_environments" { + application_id = "/applications/8797003c-8745-42c1-b558-391c6a08fa7d" + application_object_id = (known after apply) + audiences = [ + "api://AzureADTokenExchange", ] + credential_id = (known after apply) + description = "Allow GitHub actions run within the context of environment 'grafana' from the repository https://github.com/altinn/app-frontend-react to have access to the app registration" + display_name = "github.altinn.app-frontend-react.environment.grafana" + id = (known after apply) + issuer = "https://token.actions.githubusercontent.com" + subject = "repo:altinn/app-frontend-react:environment:grafana" } # azuread_application_federated_identity_credential.oidc_environments["ddp-digdir-dialogporten-dev-grafana"] will be created + resource "azuread_application_federated_identity_credential" "oidc_environments" { + application_id = "/applications/cfcbc98d-2e76-49af-8ebb-29f286740084" + application_object_id = (known after apply) + audiences = [ + "api://AzureADTokenExchange", ] + credential_id = (known after apply) + description = "Allow GitHub actions run within the context of environment 'grafana' from the repository https://github.com/digdir/dialogporten to have access to the app registration" + display_name = "github.digdir.dialogporten.environment.grafana" + id = (known after apply) + issuer = "https://token.actions.githubusercontent.com" + subject = "repo:digdir/dialogporten:environment:grafana" } # azuread_application_federated_identity_credential.oidc_environments["ddp-digdir-dialogporten-frontend-dev-grafana"] will be created + resource "azuread_application_federated_identity_credential" "oidc_environments" { + application_id = "/applications/82556fa2-e45f-4574-b560-f82171ed3272" + application_object_id = (known after apply) + audiences = [ + "api://AzureADTokenExchange", ] + credential_id = (known after apply) + description = "Allow GitHub actions run within the context of environment 'grafana' from the repository https://github.com/digdir/dialogporten-frontend to have access to the app registration" + display_name = "github.digdir.dialogporten-frontend.environment.grafana" + id = (known after apply) + issuer = "https://token.actions.githubusercontent.com" + subject = "repo:digdir/dialogporten-frontend:environment:grafana" } # azuread_application_federated_identity_credential.oidc_environments["paa-altinn-altinn-access-management-dev-grafana"] will be created + resource "azuread_application_federated_identity_credential" "oidc_environments" { + application_id = "/applications/ffc7d734-7f12-4e59-b557-3e328fba3726" + application_object_id = (known after apply) + audiences = [ + "api://AzureADTokenExchange", ] + credential_id = (known after apply) + description = "Allow GitHub actions run within the context of environment 'grafana' from the repository https://github.com/Altinn/altinn-access-management to have access to the app registration" + display_name = "github.Altinn.altinn-access-management.environment.grafana" + id = (known after apply) + issuer = "https://token.actions.githubusercontent.com" + subject = "repo:Altinn/altinn-access-management:environment:grafana" } # azuread_application_federated_identity_credential.oidc_environments["paa-altinn-altinn-authorization-dev-grafana"] will be created + resource "azuread_application_federated_identity_credential" "oidc_environments" { + application_id = "/applications/b177be4c-4798-4ba7-9b42-bf1ff9cfb160" + application_object_id = (known after apply) + audiences = [ + "api://AzureADTokenExchange", ] + credential_id = (known after apply) + description = "Allow GitHub actions run within the context of environment 'grafana' from the repository https://github.com/Altinn/altinn-authorization to have access to the app registration" + display_name = "github.Altinn.altinn-authorization.environment.grafana" + id = (known after apply) + issuer = "https://token.actions.githubusercontent.com" + subject = "repo:Altinn/altinn-authorization:environment:grafana" } # azuread_application_federated_identity_credential.oidc_environments["paa-altinn-altinn-authorization-tmp-dev-grafana"] will be created + resource "azuread_application_federated_identity_credential" "oidc_environments" { + application_id = "/applications/f0f8f56c-1785-40dd-ac2c-d1bde1a90b9f" + application_object_id = (known after apply) + audiences = [ + "api://AzureADTokenExchange", ] + credential_id = (known after apply) + description = "Allow GitHub actions run within the context of environment 'grafana' from the repository https://github.com/Altinn/altinn-authorization-tmp to have access to the app registration" + display_name = "github.Altinn.altinn-authorization-tmp.environment.grafana" + id = (known after apply) + issuer = "https://token.actions.githubusercontent.com" + subject = "repo:Altinn/altinn-authorization-tmp:environment:grafana" } # azuread_application_federated_identity_credential.oidc_environments["pac-altinn-altinn-receipt-dev-grafana"] will be created + resource "azuread_application_federated_identity_credential" "oidc_environments" { + application_id = "/applications/a9890518-647e-4298-ba54-3aa86ffb0fb5" + application_object_id = (known after apply) + audiences = [ + "api://AzureADTokenExchange", ] + credential_id = (known after apply) + description = "Allow GitHub actions run within the context of environment 'grafana' from the repository https://github.com/altinn/altinn-receipt to have access to the app registration" + display_name = "github.altinn.altinn-receipt.environment.grafana" + id = (known after apply) + issuer = "https://token.actions.githubusercontent.com" + subject = "repo:altinn/altinn-receipt:environment:grafana" } # azuread_application_federated_identity_credential.oidc_environments["pap-altinn-altinn-platform-dev-grafana"] will be created + resource "azuread_application_federated_identity_credential" "oidc_environments" { + application_id = "/applications/22c0f296-2d81-4226-8ad9-751e73d5ec38" + application_object_id = (known after apply) + audiences = [ + "api://AzureADTokenExchange", ] + credential_id = (known after apply) + description = "Allow GitHub actions run within the context of environment 'grafana' from the repository https://github.com/altinn/altinn-platform to have access to the app registration" + display_name = "github.altinn.altinn-platform.environment.grafana" + id = (known after apply) + issuer = "https://token.actions.githubusercontent.com" + subject = "repo:altinn/altinn-platform:environment:grafana" } # azuread_application_federated_identity_credential.oidc_environments["pas-altinn-altinn-studio-dev-grafana"] will be created + resource "azuread_application_federated_identity_credential" "oidc_environments" { + application_id = "/applications/637a66e7-6cb2-43f1-bf43-1dc02efd5a0f" + application_object_id = (known after apply) + audiences = [ + "api://AzureADTokenExchange", ] + credential_id = (known after apply) + description = "Allow GitHub actions run within the context of environment 'grafana' from the repository https://github.com/altinn/altinn-studio to have access to the app registration" + display_name = "github.altinn.altinn-studio.environment.grafana" + id = (known after apply) + issuer = "https://token.actions.githubusercontent.com" + subject = "repo:altinn/altinn-studio:environment:grafana" } # azuread_application_federated_identity_credential.oidc_environments_admin["grafana"] will be created + resource "azuread_application_federated_identity_credential" "oidc_environments_admin" { + application_id = "/applications/005b1c70-6fa7-4205-9fa1-8b7a53713238" + application_object_id = (known after apply) + audiences = [ + "api://AzureADTokenExchange", ] + credential_id = (known after apply) + description = "Allow GitHub actions run within the context of environment 'grafana' from the repository https://github.com/Altinn/altinn-platform to have access to the app registration" + display_name = "github.Altinn.altinn-platform.environment.grafana" + id = (known after apply) + issuer = "https://token.actions.githubusercontent.com" + subject = "repo:Altinn/altinn-platform:environment:grafana" } # azurerm_app_configuration.state will be updated in-place ~ resource "azurerm_app_configuration" "state" { id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg/providers/Microsoft.AppConfiguration/configurationStores/altinnterraformappconf02" name = "altinnterraformappconf02" ~ tags = { - "costcenter" = "altinn3" - "createdAt" = "09-07-2024 09:55:43 UTC" - "createdBy" = "Bengt Rino Fredh" - "modifiedAt" = "21-10-2024 14:08:19 UTC" - "modifiedBy" = "GitHub: Altinn/altinn-platform - Reader" - "repository" = "github.com/Altinn/altinn-platform" - "solution" = "platform" } -> (known after apply) # (11 unchanged attributes hidden) } # azurerm_role_assignment.appregg["app-altinn-app-frontend-react-dev"] must be replaced -/+ resource "azurerm_role_assignment" "appregg" { ~ condition = <<-EOT # forces replacement ( ( !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/deleteBlobVersion/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/immutableStorage/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/move/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/manageOwnership/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/permanentDelete/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/modifyPermissions/action'}) ) OR ( @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/app-frontend-react/environments/dev' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/app-frontend-react/environments/test' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/app-frontend-react/environments/at21' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/app-frontend-react/environments/at22' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/app-frontend-react/environments/at23' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/app-frontend-react/environments/at24' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/app-frontend-react/environments/at25' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/app-frontend-react/environments/yt01' OR + + @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/app-frontend-react/environments/grafana' + OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/~/EOT' ) ) EOT ~ id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg/providers/Microsoft.Storage/storageAccounts/altinnterraformstorage02/blobServices/default/containers/tfstates/providers/Microsoft.Authorization/roleAssignments/30816e70-1b56-c1cf-64de-edb1ed69bfae" -> (known after apply) ~ name = "30816e70-1b56-c1cf-64de-edb1ed69bfae" -> (known after apply) ~ principal_type = "ServicePrincipal" -> (known after apply) ~ role_definition_id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/providers/Microsoft.Authorization/roleDefinitions/b7e6dc6d-f1e8-4753-8033-0f276bb0955b" -> (known after apply) # (5 unchanged attributes hidden) } # azurerm_role_assignment.appregg["ddp-digdir-dialogporten-dev"] must be replaced -/+ resource "azurerm_role_assignment" "appregg" { ~ condition = <<-EOT # forces replacement ( ( !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/deleteBlobVersion/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/immutableStorage/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/move/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/manageOwnership/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/permanentDelete/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/modifyPermissions/action'}) ) OR ( @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten/environments/dev' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten/environments/test' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten/environments/at21' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten/environments/at22' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten/environments/at23' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten/environments/at24' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten/environments/at25' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten/environments/yt01' OR + + @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten/environments/grafana' + OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/~/EOT' ) ) EOT ~ id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg/providers/Microsoft.Storage/storageAccounts/altinnterraformstorage02/blobServices/default/containers/tfstates/providers/Microsoft.Authorization/roleAssignments/939fbbb2-17cc-f786-c2d3-440f9a4030f0" -> (known after apply) ~ name = "939fbbb2-17cc-f786-c2d3-440f9a4030f0" -> (known after apply) ~ principal_type = "ServicePrincipal" -> (known after apply) ~ role_definition_id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/providers/Microsoft.Authorization/roleDefinitions/b7e6dc6d-f1e8-4753-8033-0f276bb0955b" -> (known after apply) # (5 unchanged attributes hidden) } # azurerm_role_assignment.appregg["ddp-digdir-dialogporten-frontend-dev"] must be replaced -/+ resource "azurerm_role_assignment" "appregg" { ~ condition = <<-EOT # forces replacement ( ( !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/deleteBlobVersion/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/immutableStorage/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/move/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/manageOwnership/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/permanentDelete/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/modifyPermissions/action'}) ) OR ( @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten-frontend/environments/dev' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten-frontend/environments/test' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten-frontend/environments/at21' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten-frontend/environments/at22' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten-frontend/environments/at23' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten-frontend/environments/at24' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten-frontend/environments/at25' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten-frontend/environments/yt01' OR + + @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/dialogporten-frontend/environments/grafana' + OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/digdir/~/EOT' ) ) EOT ~ id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg/providers/Microsoft.Storage/storageAccounts/altinnterraformstorage02/blobServices/default/containers/tfstates/providers/Microsoft.Authorization/roleAssignments/f0796951-4f33-05df-3b9b-7e99014e47ff" -> (known after apply) ~ name = "f0796951-4f33-05df-3b9b-7e99014e47ff" -> (known after apply) ~ principal_type = "ServicePrincipal" -> (known after apply) ~ role_definition_id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/providers/Microsoft.Authorization/roleDefinitions/b7e6dc6d-f1e8-4753-8033-0f276bb0955b" -> (known after apply) # (5 unchanged attributes hidden) } # azurerm_role_assignment.appregg["paa-altinn-altinn-access-management-dev"] must be replaced -/+ resource "azurerm_role_assignment" "appregg" { ~ condition = <<-EOT # forces replacement ( ( !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/deleteBlobVersion/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/immutableStorage/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/move/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/manageOwnership/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/permanentDelete/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/modifyPermissions/action'}) ) OR ( @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-access-management/environments/dev' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-access-management/environments/test' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-access-management/environments/at21' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-access-management/environments/at22' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-access-management/environments/at23' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-access-management/environments/at24' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-access-management/environments/at25' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-access-management/environments/yt01' OR + + @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-access-management/environments/grafana' + OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/~/EOT' ) ) EOT ~ id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg/providers/Microsoft.Storage/storageAccounts/altinnterraformstorage02/blobServices/default/containers/tfstates/providers/Microsoft.Authorization/roleAssignments/64b8764a-4ef5-e5e2-3af2-84b46bda9548" -> (known after apply) ~ name = "64b8764a-4ef5-e5e2-3af2-84b46bda9548" -> (known after apply) ~ principal_type = "ServicePrincipal" -> (known after apply) ~ role_definition_id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/providers/Microsoft.Authorization/roleDefinitions/b7e6dc6d-f1e8-4753-8033-0f276bb0955b" -> (known after apply) # (5 unchanged attributes hidden) } # azurerm_role_assignment.appregg["paa-altinn-altinn-authorization-dev"] must be replaced -/+ resource "azurerm_role_assignment" "appregg" { ~ condition = <<-EOT # forces replacement ( ( !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/deleteBlobVersion/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/immutableStorage/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/move/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/manageOwnership/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/permanentDelete/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/modifyPermissions/action'}) ) OR ( @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization/environments/dev' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization/environments/test' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization/environments/at21' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization/environments/at22' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization/environments/at23' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization/environments/at24' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization/environments/at25' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization/environments/yt01' OR + + @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization/environments/grafana' + OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/~/EOT' ) ) EOT ~ id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg/providers/Microsoft.Storage/storageAccounts/altinnterraformstorage02/blobServices/default/containers/tfstates/providers/Microsoft.Authorization/roleAssignments/fe0bfc63-a9d7-442a-6590-6d624b198c8d" -> (known after apply) ~ name = "fe0bfc63-a9d7-442a-6590-6d624b198c8d" -> (known after apply) ~ principal_type = "ServicePrincipal" -> (known after apply) ~ role_definition_id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/providers/Microsoft.Authorization/roleDefinitions/b7e6dc6d-f1e8-4753-8033-0f276bb0955b" -> (known after apply) # (5 unchanged attributes hidden) } # azurerm_role_assignment.appregg["paa-altinn-altinn-authorization-tmp-dev"] must be replaced -/+ resource "azurerm_role_assignment" "appregg" { ~ condition = <<-EOT # forces replacement ( ( !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/deleteBlobVersion/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/immutableStorage/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/move/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/manageOwnership/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/permanentDelete/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/modifyPermissions/action'}) ) OR ( @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization-tmp/environments/dev' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization-tmp/environments/test' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization-tmp/environments/at21' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization-tmp/environments/at22' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization-tmp/environments/at23' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization-tmp/environments/at24' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization-tmp/environments/at25' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization-tmp/environments/yt01' OR + + @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-authorization-tmp/environments/grafana' + OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/~/EOT' ) ) EOT ~ id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg/providers/Microsoft.Storage/storageAccounts/altinnterraformstorage02/blobServices/default/containers/tfstates/providers/Microsoft.Authorization/roleAssignments/984a2a48-2e61-443f-730d-15c482478ed3" -> (known after apply) ~ name = "984a2a48-2e61-443f-730d-15c482478ed3" -> (known after apply) ~ principal_type = "ServicePrincipal" -> (known after apply) ~ role_definition_id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/providers/Microsoft.Authorization/roleDefinitions/b7e6dc6d-f1e8-4753-8033-0f276bb0955b" -> (known after apply) # (5 unchanged attributes hidden) } # azurerm_role_assignment.appregg["pac-altinn-altinn-receipt-dev"] must be replaced -/+ resource "azurerm_role_assignment" "appregg" { ~ condition = <<-EOT # forces replacement ( ( !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/deleteBlobVersion/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/immutableStorage/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/move/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/manageOwnership/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/permanentDelete/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/modifyPermissions/action'}) ) OR ( @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-receipt/environments/dev' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-receipt/environments/test' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-receipt/environments/at21' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-receipt/environments/at22' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-receipt/environments/at23' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-receipt/environments/at24' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-receipt/environments/at25' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-receipt/environments/yt01' OR + + @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-receipt/environments/grafana' + OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/~/EOT' ) ) EOT ~ id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg/providers/Microsoft.Storage/storageAccounts/altinnterraformstorage02/blobServices/default/containers/tfstates/providers/Microsoft.Authorization/roleAssignments/52df22ae-7b88-7308-47bb-e4cecdbbbec2" -> (known after apply) ~ name = "52df22ae-7b88-7308-47bb-e4cecdbbbec2" -> (known after apply) ~ principal_type = "ServicePrincipal" -> (known after apply) ~ role_definition_id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/providers/Microsoft.Authorization/roleDefinitions/b7e6dc6d-f1e8-4753-8033-0f276bb0955b" -> (known after apply) # (5 unchanged attributes hidden) } # azurerm_role_assignment.appregg["pap-altinn-altinn-platform-dev"] must be replaced -/+ resource "azurerm_role_assignment" "appregg" { ~ condition = <<-EOT # forces replacement ( ( !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/deleteBlobVersion/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/immutableStorage/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/move/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/manageOwnership/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/permanentDelete/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/modifyPermissions/action'}) ) OR ( @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-platform/environments/dev' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-platform/environments/test' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-platform/environments/at21' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-platform/environments/at22' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-platform/environments/at23' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-platform/environments/at24' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-platform/environments/at25' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-platform/environments/yt01' OR + + @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-platform/environments/grafana' + OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/~/EOT' ) ) EOT ~ id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg/providers/Microsoft.Storage/storageAccounts/altinnterraformstorage02/blobServices/default/containers/tfstates/providers/Microsoft.Authorization/roleAssignments/895ce092-f274-7058-d91f-2a0bf2214f0d" -> (known after apply) ~ name = "895ce092-f274-7058-d91f-2a0bf2214f0d" -> (known after apply) ~ principal_type = "ServicePrincipal" -> (known after apply) ~ role_definition_id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/providers/Microsoft.Authorization/roleDefinitions/b7e6dc6d-f1e8-4753-8033-0f276bb0955b" -> (known after apply) # (5 unchanged attributes hidden) } # azurerm_role_assignment.appregg["pas-altinn-altinn-studio-dev"] must be replaced -/+ resource "azurerm_role_assignment" "appregg" { ~ condition = <<-EOT # forces replacement ( ( !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/tags/write'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/deleteBlobVersion/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/immutableStorage/runAsSuperUser/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/move/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/manageOwnership/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/permanentDelete/action'}) AND !(ActionMatches{'Microsoft.Storage/storageAccounts/blobServices/containers/blobs/modifyPermissions/action'}) ) OR ( @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-studio/environments/dev' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-studio/environments/test' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-studio/environments/at21' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-studio/environments/at22' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-studio/environments/at23' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-studio/environments/at24' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-studio/environments/at25' OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-studio/environments/yt01' OR + + @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/altinn-studio/environments/grafana' + OR @Resource[Microsoft.Storage/storageAccounts/blobServices/containers/blobs:path] StringStartsWith 'github.com/altinn/~/EOT' ) ) EOT ~ id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg/providers/Microsoft.Storage/storageAccounts/altinnterraformstorage02/blobServices/default/containers/tfstates/providers/Microsoft.Authorization/roleAssignments/7dd33826-75a4-40be-6577-d0012cdba531" -> (known after apply) ~ name = "7dd33826-75a4-40be-6577-d0012cdba531" -> (known after apply) ~ principal_type = "ServicePrincipal" -> (known after apply) ~ role_definition_id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/providers/Microsoft.Authorization/roleDefinitions/b7e6dc6d-f1e8-4753-8033-0f276bb0955b" -> (known after apply) # (5 unchanged attributes hidden) } # azurerm_storage_account.backend will be updated in-place ~ resource "azurerm_storage_account" "backend" { id = "/subscriptions/d43d5057-8389-40d5-88c4-04db9275cbf2/resourceGroups/terraform-rg/providers/Microsoft.Storage/storageAccounts/altinnterraformstorage02" name = "altinnterraformstorage02" ~ tags = { - "costcenter" = "altinn3" - "createdAt" = "09-07-2024 09:55:43 UTC" - "createdBy" = "Bengt Rino Fredh" - "modifiedAt" = "21-10-2024 14:08:19 UTC" - "modifiedBy" = "GitHub: Altinn/altinn-platform - Reader" - "repository" = "github.com/Altinn/altinn-platform" - "solution" = "platform" } -> (known after apply) # (35 unchanged attributes hidden) # (1 unchanged block hidden) } Plan: 20 to add, 3 to change, 9 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: tfplan.out To perform exactly these actions, run the following command to apply: terraform apply "tfplan.out" Releasing state lock. This may take a few moments... ```
Context Values
Pusher @sduranc
Action pull_request
Working Directory ./infrastructure/products
State File github.com/altinn/altinn-platform/environments/prod/products.tfstate
Plan File github.com_altinn_altinn-platform_environments_prod_products.tfstate.tfplan