bcgov / social-access-portal

access portal POC for social sector apps
Apache License 2.0
0 stars 0 forks source link

updated module refs to latest changes #43

Closed roy-sagar11 closed 2 years ago

roy-sagar11 commented 2 years ago

Summary

updated module refs to latest changes

Changes

Screenshots (if applicable)

Notes

github-actions[bot] commented 2 years ago

Terraform plan in terraform/demo-app

Plan: 2 to add, 2 to change, 0 to destroy. ```hcl Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create ~ update in-place Terraform will perform the following actions: # module.demo_app_1.kubernetes_deployment.app_deployment will be updated in-place ~ resource "kubernetes_deployment" "app_deployment" { id = "b0f542-dev/ssag-demo-app-1" # (1 unchanged attribute hidden) ~ spec { # (5 unchanged attributes hidden) ~ template { ~ spec { # (11 unchanged attributes hidden) ~ container { ~ image = "roysagar11/ssag:v0.0.4" -> "roysagar11/ssag" name = "ssag-demo-app-1" # (8 unchanged attributes hidden) # (2 unchanged blocks hidden) } # (1 unchanged block hidden) } # (1 unchanged block hidden) } # (2 unchanged blocks hidden) } # (1 unchanged block hidden) } # module.demo_app_1.kubernetes_ingress.app_ingress will be created + resource "kubernetes_ingress" "app_ingress" { + id = (known after apply) + status = (known after apply) + metadata { + annotations = { + "route.openshift.io/termination" = "edge" } + generation = (known after apply) + name = "ssag-demo-app-1" + namespace = "b0f542-dev" + resource_version = (known after apply) + uid = (known after apply) } + spec { + backend { + service_name = "ssag-demo-app-1" + service_port = "80" } + rule { + host = "demo-app-1.apps.silver.devops.gov.bc.ca" + http { + path { + path = "/" + backend { + service_name = "ssag-demo-app-1" + service_port = "80" } } } } } } # module.demo_app_2.kubernetes_deployment.app_deployment will be updated in-place ~ resource "kubernetes_deployment" "app_deployment" { id = "b0f542-dev/ssag-demo-app-2" # (1 unchanged attribute hidden) ~ spec { # (5 unchanged attributes hidden) ~ template { ~ spec { # (11 unchanged attributes hidden) ~ container { ~ image = "roysagar11/ssag:v0.0.4" -> "roysagar11/ssag" name = "ssag-demo-app-2" # (8 unchanged attributes hidden) # (2 unchanged blocks hidden) } # (1 unchanged block hidden) } # (1 unchanged block hidden) } # (2 unchanged blocks hidden) } # (1 unchanged block hidden) } # module.demo_app_2.kubernetes_ingress.app_ingress will be created + resource "kubernetes_ingress" "app_ingress" { + id = (known after apply) + status = (known after apply) + metadata { + annotations = { + "route.openshift.io/termination" = "edge" } + generation = (known after apply) + name = "ssag-demo-app-2" + namespace = "b0f542-dev" + resource_version = (known after apply) + uid = (known after apply) } + spec { + backend { + service_name = "ssag-demo-app-2" + service_port = "80" } + rule { + host = "demo-app-2.apps.silver.devops.gov.bc.ca" + http { + path { + path = "/" + backend { + service_name = "ssag-demo-app-2" + service_port = "80" } } } } } } Plan: 2 to add, 2 to change, 0 to destroy. ```

:memo: Plan generated in Runs Demo applications terraform plan #53

github-actions[bot] commented 2 years ago

Terraform plan in terraform/keycloak

Plan: 30 to add, 4 to change, 0 to destroy. ```hcl Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create ~ update in-place Terraform will perform the following actions: # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["address"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "address" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "address" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "address" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["age"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "age" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "age" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "age" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["age19OrOver"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "age19OrOver" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "age19OrOver" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "age19OrOver" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["bcsc_user_id"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "bcsc_user_id" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "bcsc_user_id" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "bcsc_user_id" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["birthDate"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "birthDate" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "birthDate" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "birthDate" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["country"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "country" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "country" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "country" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["display_name"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "display_name" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "display_name" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "display_name" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["email"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "email" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "email" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "email" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["firstName"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "firstName" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "firstName" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "firstName" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["gender"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "gender" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "gender" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "gender" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["lastName"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "lastName" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "lastName" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "lastName" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["locality"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "locality" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "locality" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "locality" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["postalCode"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "postalCode" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "postalCode" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "postalCode" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["region"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "region" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "region" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "region" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["streetAddress"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "*******************" + config = { + "access.token.claim" = "****" + "claim.name" = "streetAddress" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "streetAddress" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "streetAddress" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["address"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "address" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "address" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "address" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["age"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "age" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "age" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "age" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["age19OrOver"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "age19OrOver" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "age19OrOver" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "age19OrOver" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["bcsc_user_id"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "bcsc_user_id" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "bcsc_user_id" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "bcsc_user_id" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["birthDate"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "birthDate" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "birthDate" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "birthDate" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["country"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "country" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "country" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "country" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["display_name"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "display_name" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "display_name" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "display_name" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["email"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "email" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "email" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "email" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["firstName"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "firstName" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "firstName" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "firstName" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["gender"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "gender" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "gender" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "gender" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["lastName"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "lastName" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "lastName" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "lastName" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["locality"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "locality" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "locality" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "locality" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["postalCode"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "postalCode" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "postalCode" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "postalCode" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["region"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "region" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "region" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "region" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].keycloak_generic_client_protocol_mapper.bcsc_idp_client_attribute_mappers["streetAddress"] will be created + resource "keycloak_generic_client_protocol_mapper" "bcsc_idp_client_attribute_mappers" { + client_id = "********************" + config = { + "access.token.claim" = "****" + "claim.name" = "streetAddress" + "id.token.claim" = "****" + "jsonType.label" = "String" + "user.attribute" = "streetAddress" + "userinfo.token.claim" = "****" } + id = (known after apply) + name = "streetAddress" + protocol = "openid-connect" + protocol_mapper = "oidc-usermodel-attribute-mapper" + realm_id = "********" } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].module.bcsc_idp.keycloak_oidc_identity_provider.this will be updated in-place ~ resource "keycloak_oidc_identity_provider" "this" { ~ display_name = "BCSC" -> "bcsc" id = "bcsc" # (30 unchanged attributes hidden) } # module.keycloak_dev.module.standard_clients.module.demo-app-1-5-31-2477.module.bcsc-idp[0].module.bcsc_idp_standard.keycloak_oidc_identity_provider.this will be updated in-place ~ resource "keycloak_oidc_identity_provider" "this" { ~ display_name = "bcsc" -> "BCSC" id = "bcsc" # (30 unchanged attributes hidden) } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].module.bcsc_idp.keycloak_oidc_identity_provider.this will be updated in-place ~ resource "keycloak_oidc_identity_provider" "this" { ~ display_name = "BCSC" -> "bcsc2" id = "bcsc2" # (30 unchanged attributes hidden) } # module.keycloak_dev.module.standard_clients.module.demo-app-2-6-01-2477.module.bcsc-idp[0].module.bcsc_idp_standard.keycloak_oidc_identity_provider.this will be updated in-place ~ resource "keycloak_oidc_identity_provider" "this" { ~ display_name = "bcsc2" -> "BCSC" id = "bcsc2" # (30 unchanged attributes hidden) } Plan: 30 to add, 4 to change, 0 to destroy. ```

:memo: Plan generated in Runs KeyCloak terraform plan #71

github-actions[bot] commented 2 years ago

Terraform plan in terraform/infrastructure

No changes. Your infrastructure matches the configuration. ``` No changes. Your infrastructure matches the configuration. Terraform has compared your real infrastructure against your configuration and found no differences, so no changes are needed. ```

:memo: Plan generated in Runs infrastructure terraform plan #119