Show Plan
```
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.keycloak_openid_user_session_note_protocol_mapper.IDP will be created
+ resource "keycloak_openid_user_session_note_protocol_mapper" "IDP" {
+ add_to_access_token = true
+ add_to_id_token = true
+ claim_name = "identity_provider"
+ claim_value_type = "String"
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "IDP"
+ realm_id = "moh_applications"
+ session_note = "identity_provider"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["ANONYMOUS_USER"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "ANONYMOUS_USER"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["AUTHENTICATED_USER"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "AUTHENTICATED_USER"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CLINICAL"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "CLINICAL"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CONTENT_ADMINISTRATOR"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "CONTENT_ADMINISTRATOR"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CONTENT_CONTRIBUTOR"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "CONTENT_CONTRIBUTOR"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CONTENT_EDITOR"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "CONTENT_EDITOR"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["DATA_STEWARD"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "DATA_STEWARD"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["DEVELOPER"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "DEVELOPER"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["DIGITAL_ANALYST"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "DIGITAL_ANALYST"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["SITE_ADMINISTRATOR"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "SITE_ADMINISTRATOR"
+ realm_id = "moh_applications"
}
Plan: 13 to add, 0 to change, 0 to destroy.
─────────────────────────────────────────────────────────────────────────────
Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.
```
Show Plan
```
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.keycloak_openid_user_session_note_protocol_mapper.IDP will be created
+ resource "keycloak_openid_user_session_note_protocol_mapper" "IDP" {
+ add_to_access_token = true
+ add_to_id_token = true
+ claim_name = "identity_provider"
+ claim_value_type = "String"
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "IDP"
+ realm_id = "moh_applications"
+ session_note = "identity_provider"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["ANONYMOUS_USER"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "ANONYMOUS_USER"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["AUTHENTICATED_USER"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "AUTHENTICATED_USER"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CLINICAL"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "CLINICAL"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CONTENT_ADMINISTRATOR"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "CONTENT_ADMINISTRATOR"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CONTENT_CONTRIBUTOR"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "CONTENT_CONTRIBUTOR"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["CONTENT_EDITOR"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "CONTENT_EDITOR"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["DATA_STEWARD"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "DATA_STEWARD"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["DEVELOPER"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "DEVELOPER"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["DIGITAL_ANALYST"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "DIGITAL_ANALYST"
+ realm_id = "moh_applications"
}
# module.KEYCLOAK_PROD.module.moh_applications.module.HLBC.module.client-roles.keycloak_role.ROLES["SITE_ADMINISTRATOR"] will be created
+ resource "keycloak_role" "ROLES" {
+ client_id = (known after apply)
+ id = (known after apply)
+ name = "SITE_ADMINISTRATOR"
+ realm_id = "moh_applications"
}
Plan: 13 to add, 0 to change, 0 to destroy.
─────────────────────────────────────────────────────────────────────────────
Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.
```
Changes being made
Promote the HLBC client to PROD.
Context
Promotion requested by project team.
Quality Check
*
(allow all) is provided.+
instead of*
to restrict the CORS origins.