GradientFlow-ai / terraform

IaC for GradientFlow
MIT License
0 stars 0 forks source link

Edit readme #28

Closed coyotespike closed 1 year ago

github-actions[bot] commented 1 year ago

Terraform plan in .

With variables

TF_VAR_AWS_ACCESS_KEY_ID     = ""
TF_VAR_AWS_SECRET_ACCESS_KEY = ""
TF_VAR_VERCEL_API_TOKEN      = "hbk84kOG3lWDysRodIjnV3Mb"

Plan: 0 to add, 7 to change, 0 to destroy. ```hcl Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: ~ update in-place Terraform will perform the following actions: # module.repos.github_branch_protection.eaas will be updated in-place ~ resource "github_branch_protection" "eaas" { id = "BPR_kwDOI7EyTc4CIwZR" # (11 unchanged attributes hidden) ~ required_pull_request_reviews { ~ pull_request_bypassers = [ - "MDQ6VXNlcjMxMTg5NjQ=", # (1 unchanged element hidden) ] # (6 unchanged attributes hidden) } } # module.repos.github_branch_protection.embeddings_api will be updated in-place ~ resource "github_branch_protection" "embeddings_api" { id = "BPR_kwDOI-ZWE84CIwg4" # (11 unchanged attributes hidden) ~ required_pull_request_reviews { ~ pull_request_bypassers = [ - "MDQ6VXNlcjMxMTg5NjQ=", # (1 unchanged element hidden) ] # (6 unchanged attributes hidden) } } # module.repos.github_branch_protection.fast-api-ocean will be updated in-place ~ resource "github_branch_protection" "fast-api-ocean" { id = "BPR_kwDOI96H_s4CIwg3" # (11 unchanged attributes hidden) ~ required_pull_request_reviews { ~ pull_request_bypassers = [ - "MDQ6VXNlcjMxMTg5NjQ=", # (1 unchanged element hidden) ] # (6 unchanged attributes hidden) } } # module.repos.github_branch_protection.terraform will be updated in-place ~ resource "github_branch_protection" "terraform" { id = "BPR_kwDOJOQLq84CJzKa" # (11 unchanged attributes hidden) ~ required_pull_request_reviews { ~ pull_request_bypassers = [ - "MDQ6VXNlcjMxMTg5NjQ=", # (1 unchanged element hidden) ] # (6 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.roles.aws_iam_user_policy.gh_runner_policy will be updated in-place ~ resource "aws_iam_user_policy" "gh_runner_policy" { id = "gh_runner:gh_runner_policy" name = "gh_runner_policy" ~ policy = jsonencode( ~ { ~ Statement = [ ~ { ~ Resource = "arn:aws:iam::207932680283:role/create_roles" -> "arn:aws:iam::207932680283:role/secrets_manager_role" # (2 unchanged attributes hidden) }, ] # (1 unchanged attribute hidden) } ) # (1 unchanged attribute hidden) } # module.vercel.vercel_project_environment_variable.aws_access_key_id will be updated in-place ~ resource "vercel_project_environment_variable" "aws_access_key_id" { id = "yReP7AMiiIyX4535" - value = (sensitive value) -> null # (4 unchanged attributes hidden) } # module.vercel.vercel_project_environment_variable.aws_secret_access_key will be updated in-place ~ resource "vercel_project_environment_variable" "aws_secret_access_key" { id = "JoR94vjf6HUUFUgd" - value = (sensitive value) -> null # (4 unchanged attributes hidden) } Plan: 0 to add, 7 to change, 0 to destroy. ```

:memo: Plan generated in .github/workflows/terraform-plan.yml #53