issues
search
TMEIT
/
website
A new website created by and for TMEIT
GNU Affero General Public License v3.0
7
stars
2
forks
source link
Fix publish-master pipeline
#151
Closed
JustinLex
closed
2 years ago
github-actions[bot]
commented
2 years ago
Terraform Lint/Plan Results
Terraform Format and Style 🖌
success
Terraform Initialization ⚙️
success
Terraform Plan 📖
success
Terraform Validation 🤖
success
Show Plan
``` terraform hcloud_firewall.myfirewall: Refreshing state... [id=572118] cloudflare_record.mx-2: Refreshing state... [id=7539dc716260bb768658d6b61e54740e] data.cloudflare_api_token_permission_groups.all: Reading... b2_bucket.db-backups: Refreshing state... [id=531125b9d9ad0bd484480d18] cloudflare_record.mx-1: Refreshing state... [id=01b1e5831a61d592bb2a1fb51fc40a47] cloudflare_api_token.dns_validation_token2: Refreshing state... [id=9657156ad127d069d744b9c513de93e3] b2_bucket.terraform-state: Refreshing state... [id=c33185c9297d9b5484380d18] tls_private_key.terraform_access: Refreshing state... [id=2ffac8d1a1e85232461425b441d27bce00a220c3] cloudflare_zone_settings_override.tmeit-se-settings: Refreshing state... [id=6a806c0199e15cdf23bb3017a90bf149] hcloud_server.node1: Refreshing state... [id=24978813] data.cloudflare_api_token_permission_groups.all: Read complete after 1s [id=37f58c2e50041f9eed30c0006b111b44] hcloud_rdns.node1_ipv4: Refreshing state... [id=s-24978813-65.21.188.62] hcloud_rdns.node1_ipv6: Refreshing state... [id=s-24978813-2a01:4f9:c012:6063::1] cloudflare_record.root-aaaa: Refreshing state... [id=eec58a7b6d17f1a40f411efb35d4da22] cloudflare_record.www-aaaa: Refreshing state... [id=9f7b0d63a18b5513abb8db23ce62cd46] b2_application_key.database-backup: Refreshing state... [id=00331599db448d80000000002] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create ~ update in-place - destroy -/+ destroy and then create replacement Terraform will perform the following actions: # b2_application_key.database-backup must be replaced -/+ resource "b2_application_key" "database-backup" { ~ application_key = (sensitive value) ~ application_key_id = "00331599db448d80000000002" -> (known after apply) ~ capabilities = [ # forces replacement + "listBuckets", # (3 unchanged elements hidden) ] ~ id = "00331599db448d80000000002" -> (known after apply) ~ options = [ - "s3", ] -> (known after apply) # (2 unchanged attributes hidden) } # b2_bucket.db-backups will be updated in-place ~ resource "b2_bucket" "db-backups" { id = "531125b9d9ad0bd484480d18" # (7 unchanged attributes hidden) ~ lifecycle_rules { ~ days_from_hiding_to_deleting = 365 -> 14 ~ file_name_prefix = "tmeit-db-backup-daily" -> "tmeit-db-backup-hourly" # (1 unchanged attribute hidden) } ~ lifecycle_rules { ~ days_from_hiding_to_deleting = 14 -> 365 ~ file_name_prefix = "tmeit-db-backup-hourly" -> "tmeit-db-backup-daily" # (1 unchanged attribute hidden) } # (2 unchanged blocks hidden) } # cloudflare_api_token.dns_validation_token will be created + resource "cloudflare_api_token" "dns_validation_token" { + id = (known after apply) + issued_on = (known after apply) + modified_on = (known after apply) + name = "dns_validation_token2" + status = (known after apply) + value = (sensitive value) + condition { + request_ip { + in = [ + "2a01:4f9:c012:6063::1/64", + "65.21.188.62/32", ] } } + policy { + effect = "allow" + permission_groups = [ + "4755a26eedb94da69e1066d98aa820be", ] + resources = { + "com.cloudflare.api.account.zone.6a806c0199e15cdf23bb3017a90bf149" = "*" } } } # cloudflare_api_token.dns_validation_token2 will be destroyed # (because cloudflare_api_token.dns_validation_token2 is not in configuration) - resource "cloudflare_api_token" "dns_validation_token2" { - id = "9657156ad127d069d744b9c513de93e3" -> null - issued_on = "2022-10-24T23:32:46Z" -> null - modified_on = "2022-10-24T23:32:46Z" -> null - name = "dns_validation_token2" -> null - status = "active" -> null - value = (sensitive value) - condition { - request_ip { - in = [ - "2a01:4f9:c012:6063::1/64", - "65.21.188.62/32", ] -> null - not_in = [] -> null } } - policy { - effect = "allow" -> null - permission_groups = [ - "4755a26eedb94da69e1066d98aa820be", ] -> null - resources = { - "com.cloudflare.api.account.zone.6a806c0199e15cdf23bb3017a90bf149" = "*" } -> null } } Plan: 2 to add, 1 to change, 2 to destroy. Changes to Outputs: ~ b2-db-key-id = "00331599db448d80000000002" -> (known after apply) # Warning: this attribute value will be marked as sensitive and will not # display in UI output after applying this change. ~ b2-db-key-secret = (sensitive value) # Warning: this attribute value will be marked as sensitive and will not # display in UI output after applying this change. ~ cloudflare-le-token = (sensitive value) ───────────────────────────────────────────────────────────────────────────── Note: You didn't use the -out option to save this plan, so Terraform can't guarantee to take exactly these actions if you run "terraform apply" now. ```
Pushed by: @JustinLex, Action:
pull_request
Terraform Lint/Plan Results
Terraform Format and Style 🖌
success
Terraform Initialization ⚙️
success
Terraform Plan 📖
success
Terraform Validation 🤖
success
Show Plan
``` terraform hcloud_firewall.myfirewall: Refreshing state... [id=572118] cloudflare_record.mx-2: Refreshing state... [id=7539dc716260bb768658d6b61e54740e] data.cloudflare_api_token_permission_groups.all: Reading... b2_bucket.db-backups: Refreshing state... [id=531125b9d9ad0bd484480d18] cloudflare_record.mx-1: Refreshing state... [id=01b1e5831a61d592bb2a1fb51fc40a47] cloudflare_api_token.dns_validation_token2: Refreshing state... [id=9657156ad127d069d744b9c513de93e3] b2_bucket.terraform-state: Refreshing state... [id=c33185c9297d9b5484380d18] tls_private_key.terraform_access: Refreshing state... [id=2ffac8d1a1e85232461425b441d27bce00a220c3] cloudflare_zone_settings_override.tmeit-se-settings: Refreshing state... [id=6a806c0199e15cdf23bb3017a90bf149] hcloud_server.node1: Refreshing state... [id=24978813] data.cloudflare_api_token_permission_groups.all: Read complete after 1s [id=37f58c2e50041f9eed30c0006b111b44] hcloud_rdns.node1_ipv4: Refreshing state... [id=s-24978813-65.21.188.62] hcloud_rdns.node1_ipv6: Refreshing state... [id=s-24978813-2a01:4f9:c012:6063::1] cloudflare_record.root-aaaa: Refreshing state... [id=eec58a7b6d17f1a40f411efb35d4da22] cloudflare_record.www-aaaa: Refreshing state... [id=9f7b0d63a18b5513abb8db23ce62cd46] b2_application_key.database-backup: Refreshing state... [id=00331599db448d80000000002] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create ~ update in-place - destroy -/+ destroy and then create replacement Terraform will perform the following actions: # b2_application_key.database-backup must be replaced -/+ resource "b2_application_key" "database-backup" { ~ application_key = (sensitive value) ~ application_key_id = "00331599db448d80000000002" -> (known after apply) ~ capabilities = [ # forces replacement + "listBuckets", # (3 unchanged elements hidden) ] ~ id = "00331599db448d80000000002" -> (known after apply) ~ options = [ - "s3", ] -> (known after apply) # (2 unchanged attributes hidden) } # b2_bucket.db-backups will be updated in-place ~ resource "b2_bucket" "db-backups" { id = "531125b9d9ad0bd484480d18" # (7 unchanged attributes hidden) ~ lifecycle_rules { ~ days_from_hiding_to_deleting = 365 -> 14 ~ file_name_prefix = "tmeit-db-backup-daily" -> "tmeit-db-backup-hourly" # (1 unchanged attribute hidden) } ~ lifecycle_rules { ~ days_from_hiding_to_deleting = 14 -> 365 ~ file_name_prefix = "tmeit-db-backup-hourly" -> "tmeit-db-backup-daily" # (1 unchanged attribute hidden) } # (2 unchanged blocks hidden) } # cloudflare_api_token.dns_validation_token will be created + resource "cloudflare_api_token" "dns_validation_token" { + id = (known after apply) + issued_on = (known after apply) + modified_on = (known after apply) + name = "dns_validation_token2" + status = (known after apply) + value = (sensitive value) + condition { + request_ip { + in = [ + "2a01:4f9:c012:6063::1/64", + "65.21.188.62/32", ] } } + policy { + effect = "allow" + permission_groups = [ + "4755a26eedb94da69e1066d98aa820be", ] + resources = { + "com.cloudflare.api.account.zone.6a806c0199e15cdf23bb3017a90bf149" = "*" } } } # cloudflare_api_token.dns_validation_token2 will be destroyed # (because cloudflare_api_token.dns_validation_token2 is not in configuration) - resource "cloudflare_api_token" "dns_validation_token2" { - id = "9657156ad127d069d744b9c513de93e3" -> null - issued_on = "2022-10-24T23:32:46Z" -> null - modified_on = "2022-10-24T23:32:46Z" -> null - name = "dns_validation_token2" -> null - status = "active" -> null - value = (sensitive value) - condition { - request_ip { - in = [ - "2a01:4f9:c012:6063::1/64", - "65.21.188.62/32", ] -> null - not_in = [] -> null } } - policy { - effect = "allow" -> null - permission_groups = [ - "4755a26eedb94da69e1066d98aa820be", ] -> null - resources = { - "com.cloudflare.api.account.zone.6a806c0199e15cdf23bb3017a90bf149" = "*" } -> null } } Plan: 2 to add, 1 to change, 2 to destroy. Changes to Outputs: ~ b2-db-key-id = "00331599db448d80000000002" -> (known after apply) # Warning: this attribute value will be marked as sensitive and will not # display in UI output after applying this change. ~ b2-db-key-secret = (sensitive value) # Warning: this attribute value will be marked as sensitive and will not # display in UI output after applying this change. ~ cloudflare-le-token = (sensitive value) ───────────────────────────────────────────────────────────────────────────── Note: You didn't use the -out option to save this plan, so Terraform can't guarantee to take exactly these actions if you run "terraform apply" now. ```Pushed by: @JustinLex, Action:
pull_request