bcgov / moh-keycloak-client-configurations

Apache License 2.0
1 stars 3 forks source link

Promote the HLBC client to PROD. #584

Closed sharpedavid closed 1 month ago

sharpedavid commented 1 month ago

Changes being made

Promote the HLBC client to PROD.

Context

Promotion requested by project team.

Quality Check

github-actions[bot] commented 1 month ago

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan ``` # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.keycloak_openid_user_session_note_protocol_mapper.IDP will be created + resource "keycloak_openid_user_session_note_protocol_mapper" "IDP" { + add_to_access_token = true + add_to_id_token = true + claim_name = "identity_provider" + claim_value_type = "String" + client_id = (known after apply) + id = (known after apply) + name = "IDP" + realm_id = "moh_applications" + session_note = "identity_provider" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["ANONYMOUS_USER"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "ANONYMOUS_USER" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["AUTHENTICATED_USER"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "AUTHENTICATED_USER" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CLINICAL"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "CLINICAL" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CONTENT_ADMINISTRATOR"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "CONTENT_ADMINISTRATOR" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CONTENT_CONTRIBUTOR"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "CONTENT_CONTRIBUTOR" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CONTENT_EDITOR"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "CONTENT_EDITOR" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["DATA_STEWARD"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "DATA_STEWARD" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["DEVELOPER"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "DEVELOPER" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["DIGITAL_ANALYST"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "DIGITAL_ANALYST" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["SITE_ADMINISTRATOR"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "SITE_ADMINISTRATOR" + realm_id = "moh_applications" } Plan: 13 to add, 0 to change, 0 to destroy. ───────────────────────────────────────────────────────────────────────────── Note: You didn't use the -out option to save this plan, so Terraform can't guarantee to take exactly these actions if you run "terraform apply" now. ```

Pushed by: @sharpedavid, Action: pull_request

github-actions[bot] commented 1 month ago

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan ``` # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.keycloak_openid_user_session_note_protocol_mapper.IDP will be created + resource "keycloak_openid_user_session_note_protocol_mapper" "IDP" { + add_to_access_token = true + add_to_id_token = true + claim_name = "identity_provider" + claim_value_type = "String" + client_id = (known after apply) + id = (known after apply) + name = "IDP" + realm_id = "moh_applications" + session_note = "identity_provider" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["ANONYMOUS_USER"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "ANONYMOUS_USER" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["AUTHENTICATED_USER"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "AUTHENTICATED_USER" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CLINICAL"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "CLINICAL" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CONTENT_ADMINISTRATOR"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "CONTENT_ADMINISTRATOR" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CONTENT_CONTRIBUTOR"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "CONTENT_CONTRIBUTOR" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CONTENT_EDITOR"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "CONTENT_EDITOR" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["DATA_STEWARD"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "DATA_STEWARD" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["DEVELOPER"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "DEVELOPER" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["DIGITAL_ANALYST"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "DIGITAL_ANALYST" + realm_id = "moh_applications" } # module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["SITE_ADMINISTRATOR"] will be created + resource "keycloak_role" "ROLES" { + client_id = (known after apply) + id = (known after apply) + name = "SITE_ADMINISTRATOR" + realm_id = "moh_applications" } Plan: 13 to add, 0 to change, 0 to destroy. ───────────────────────────────────────────────────────────────────────────── Note: You didn't use the -out option to save this plan, so Terraform can't guarantee to take exactly these actions if you run "terraform apply" now. ```

Pushed by: @sharpedavid, Action: pull_request