issues
search
bcgov
/
sso_cognito_terraform
A repository for the modules and definitions that manage the Cognito instance that provides SSO features to government
Apache License 2.0
0
stars
0
forks
source link
feat: add a new demo client
#8
Open
junminahn
opened
3 years ago
github-actions[bot]
commented
3 years ago
Terraform Format and Style 🖌
success
Terraform Initialization ⚙️
success
Terraform Plan 📖
success
Show Plan
```terraform Running plan in the remote backend. Output will stream here. Pressing Ctrl-C will stop streaming the logs, but will not stop the plan running remotely. Preparing the remote plan... To view this run in a browser, visit: https://app.terraform.io/app/bcgov/xgr00q-dev-sso-cognito/runs/run-pdg6tmMTPRKKoHMA Waiting for the plan to start... Terraform v1.0.0 on linux_amd64 Configuring remote state backend... Initializing Terraform configuration... module.user_pool_test.aws_cognito_user_pool.this: Refreshing state... [id=ca-central-1_f5NgbSRC6] module.user_pool_prod.aws_cognito_user_pool.this: Refreshing state... [id=ca-central-1_TTDdFcmAZ] module.user_pool_dev.aws_cognito_user_pool.this: Refreshing state... [id=ca-central-1_wpK8g3taN] module.user_pool_test.aws_cognito_user_pool_domain.this: Refreshing state... [id=test-user-pool] module.user_pool_prod.aws_cognito_user_pool_domain.this: Refreshing state... [id=prod-user-pool] module.user_pool_dev.aws_cognito_user_pool_domain.this: Refreshing state... [id=dev-user-pool] aws_cognito_identity_provider.dev-idp1: Refreshing state... [id=ca-central-1_wpK8g3taN:keycloak-dev] Note: Objects have changed outside of Terraform Terraform detected the following changes made outside of Terraform since the last "terraform apply": # module.user_pool_prod.aws_cognito_user_pool.this has been changed ~ resource "aws_cognito_user_pool" "this" { + auto_verified_attributes = [] + domain = "prod-user-pool" id = "ca-central-1_TTDdFcmAZ" name = "prod-user-pool" tags = { "created-by" = "Terraform" } # (7 unchanged attributes hidden) # (5 unchanged blocks hidden) } # module.user_pool_test.aws_cognito_user_pool.this has been changed ~ resource "aws_cognito_user_pool" "this" { + auto_verified_attributes = [] + domain = "test-user-pool" id = "ca-central-1_f5NgbSRC6" name = "test-user-pool" tags = { "created-by" = "Terraform" } # (7 unchanged attributes hidden) # (5 unchanged blocks hidden) } # aws_cognito_identity_provider.dev-idp1 has been changed ~ resource "aws_cognito_identity_provider" "dev-idp1" { id = "ca-central-1_wpK8g3taN:keycloak-dev" + idp_identifiers = [] # (5 unchanged attributes hidden) } # module.user_pool_dev.aws_cognito_user_pool.this has been changed ~ resource "aws_cognito_user_pool" "this" { + auto_verified_attributes = [] + domain = "dev-user-pool" id = "ca-central-1_wpK8g3taN" name = "dev-user-pool" tags = { "created-by" = "Terraform" } # (7 unchanged attributes hidden) # (5 unchanged blocks hidden) } Unless you have made equivalent changes to your configuration, or ignored the relevant attributes using ignore_changes, the following plan may include actions to undo or respond to these changes. ───────────────────────────────────────────────────────────────────────────── Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # module.teams.module.app-client-dev.aws_cognito_user_pool_client.this will be created + resource "aws_cognito_user_pool_client" "this" { + access_token_validity = 60 + allowed_oauth_flows = [ + "code", ] + allowed_oauth_flows_user_pool_client = true + allowed_oauth_scopes = [ + "email", + "openid", + "profile", ] + callback_urls = [ + "http://localhost:3000", ] + client_secret = (sensitive value) + explicit_auth_flows = [ + "ALLOW_CUSTOM_AUTH", + "ALLOW_REFRESH_TOKEN_AUTH", + "ALLOW_USER_SRP_AUTH", ] + generate_secret = true + id = (known after apply) + id_token_validity = 60 + name = "client-blue" + prevent_user_existence_errors = "ENABLED" + read_attributes = [ + "address", + "birthdate", + "email", + "email_verified", + "family_name", + "gender", + "given_name", + "locale", + "middle_name", + "name", + "nickname", + "phone_number", + "phone_number_verified", + "picture", + "preferred_username", + "profile", + "updated_at", + "website", + "zoneinfo", ] + refresh_token_validity = 30 + supported_identity_providers = [ + "github", ] + user_pool_id = "ca-central-1_wpK8g3taN" + token_validity_units { + access_token = "minutes" + id_token = "minutes" + refresh_token = "days" } } Plan: 1 to add, 0 to change, 0 to destroy. ------------------------------------------------------------------------ Cost estimation: Waiting for cost estimate to complete... Cost estimation: Resources: 0 of 0 estimated $0.0/mo +$0.0 ```
Pusher: @junminahn, Action:
pull_request
Terraform Format and Style 🖌
success
Terraform Initialization ⚙️
success
Terraform Plan 📖
success
Show Plan
```terraform Running plan in the remote backend. Output will stream here. Pressing Ctrl-C will stop streaming the logs, but will not stop the plan running remotely. Preparing the remote plan... To view this run in a browser, visit: https://app.terraform.io/app/bcgov/xgr00q-dev-sso-cognito/runs/run-pdg6tmMTPRKKoHMA Waiting for the plan to start... Terraform v1.0.0 on linux_amd64 Configuring remote state backend... Initializing Terraform configuration... module.user_pool_test.aws_cognito_user_pool.this: Refreshing state... [id=ca-central-1_f5NgbSRC6] module.user_pool_prod.aws_cognito_user_pool.this: Refreshing state... [id=ca-central-1_TTDdFcmAZ] module.user_pool_dev.aws_cognito_user_pool.this: Refreshing state... [id=ca-central-1_wpK8g3taN] module.user_pool_test.aws_cognito_user_pool_domain.this: Refreshing state... [id=test-user-pool] module.user_pool_prod.aws_cognito_user_pool_domain.this: Refreshing state... [id=prod-user-pool] module.user_pool_dev.aws_cognito_user_pool_domain.this: Refreshing state... [id=dev-user-pool] aws_cognito_identity_provider.dev-idp1: Refreshing state... [id=ca-central-1_wpK8g3taN:keycloak-dev] Note: Objects have changed outside of Terraform Terraform detected the following changes made outside of Terraform since the last "terraform apply": # module.user_pool_prod.aws_cognito_user_pool.this has been changed ~ resource "aws_cognito_user_pool" "this" { + auto_verified_attributes = [] + domain = "prod-user-pool" id = "ca-central-1_TTDdFcmAZ" name = "prod-user-pool" tags = { "created-by" = "Terraform" } # (7 unchanged attributes hidden) # (5 unchanged blocks hidden) } # module.user_pool_test.aws_cognito_user_pool.this has been changed ~ resource "aws_cognito_user_pool" "this" { + auto_verified_attributes = [] + domain = "test-user-pool" id = "ca-central-1_f5NgbSRC6" name = "test-user-pool" tags = { "created-by" = "Terraform" } # (7 unchanged attributes hidden) # (5 unchanged blocks hidden) } # aws_cognito_identity_provider.dev-idp1 has been changed ~ resource "aws_cognito_identity_provider" "dev-idp1" { id = "ca-central-1_wpK8g3taN:keycloak-dev" + idp_identifiers = [] # (5 unchanged attributes hidden) } # module.user_pool_dev.aws_cognito_user_pool.this has been changed ~ resource "aws_cognito_user_pool" "this" { + auto_verified_attributes = [] + domain = "dev-user-pool" id = "ca-central-1_wpK8g3taN" name = "dev-user-pool" tags = { "created-by" = "Terraform" } # (7 unchanged attributes hidden) # (5 unchanged blocks hidden) } Unless you have made equivalent changes to your configuration, or ignored the relevant attributes using ignore_changes, the following plan may include actions to undo or respond to these changes. ───────────────────────────────────────────────────────────────────────────── Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # module.teams.module.app-client-dev.aws_cognito_user_pool_client.this will be created + resource "aws_cognito_user_pool_client" "this" { + access_token_validity = 60 + allowed_oauth_flows = [ + "code", ] + allowed_oauth_flows_user_pool_client = true + allowed_oauth_scopes = [ + "email", + "openid", + "profile", ] + callback_urls = [ + "http://localhost:3000", ] + client_secret = (sensitive value) + explicit_auth_flows = [ + "ALLOW_CUSTOM_AUTH", + "ALLOW_REFRESH_TOKEN_AUTH", + "ALLOW_USER_SRP_AUTH", ] + generate_secret = true + id = (known after apply) + id_token_validity = 60 + name = "client-blue" + prevent_user_existence_errors = "ENABLED" + read_attributes = [ + "address", + "birthdate", + "email", + "email_verified", + "family_name", + "gender", + "given_name", + "locale", + "middle_name", + "name", + "nickname", + "phone_number", + "phone_number_verified", + "picture", + "preferred_username", + "profile", + "updated_at", + "website", + "zoneinfo", ] + refresh_token_validity = 30 + supported_identity_providers = [ + "github", ] + user_pool_id = "ca-central-1_wpK8g3taN" + token_validity_units { + access_token = "minutes" + id_token = "minutes" + refresh_token = "days" } } Plan: 1 to add, 0 to change, 0 to destroy. ------------------------------------------------------------------------ Cost estimation: Waiting for cost estimate to complete... Cost estimation: Resources: 0 of 0 estimated $0.0/mo +$0.0 ```Pusher: @junminahn, Action:
pull_request