binbashar / le-tf-infra-aws

Terraform code for Leverage Reference Architecture for AWS, designed under optimal configs for the most popular modern web and mobile applications needs.
https://www.binbash.co/leverage
Apache License 2.0
27 stars 8 forks source link

Feature | Add new SSO user Juan Manuel Vera for binbash onboarding #625

Closed rodriguez-matias closed 2 months ago

rodriguez-matias commented 2 months ago

What?

Adding new sso users

[devops]

Why?

New binbash colaborators onboarding

github-actions[bot] commented 2 months ago

💰 Infracost report

Monthly estimate generated

Estimate details (includes details of unsupported resources and skipped projects due to errors) ``` ────────────────────────────────── 131 projects have no cost estimate changes. Run the following command to see their breakdown: infracost breakdown --path=/path/to/code ────────────────────────────────── 2546 cloud resources were detected: ∙ 615 were estimated ∙ 1828 were free ∙ 103 are not supported yet, see https://infracost.io/requested-resources: ∙ 34 x aws_identitystore_group_membership ∙ 31 x aws_identitystore_user ∙ 10 x aws_guardduty_member ∙ 7 x aws_identitystore_group ∙ 5 x aws_fms_policy ∙ 4 x aws_guardduty_detector ∙ 2 x aws_guardduty_organization_admin_account ∙ 2 x aws_guardduty_organization_configuration ∙ 2 x aws_organizations_delegated_administrator ∙ 1 x aws_eks_access_entry ∙ 1 x aws_fms_admin_account ∙ 1 x aws_organizations_organization ∙ 1 x aws_route53_resolver_firewall_domain_list ∙ 1 x aws_route53_resolver_firewall_rule ∙ 1 x aws_route53_resolver_firewall_rule_group ```

This comment will be updated when code changes.

rodriguez-matias commented 2 months ago

TF apply

╰─❯ leverage tf apply -target=aws_identitystore_user.default -target=aws_identitystore_group_membership.default

Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # aws_identitystore_group_membership.default["juan.vera_devops"] will be created
  + resource "aws_identitystore_group_membership" "default" {
      + group_id          = "64b8e4d8-2021-7077-f761-7e9cb2c9b7ea"
      + id                = (known after apply)
      + identity_store_id = "d-906752b26f"
      + member_id         = (known after apply)
      + membership_id     = (known after apply)
    }

  # aws_identitystore_user.default["juan.vera"] will be created
  + resource "aws_identitystore_user" "default" {
      + display_name      = "Juan Manuel Vera"
      + external_ids      = (known after apply)
      + id                = (known after apply)
      + identity_store_id = "d-906752b26f"
      + user_id           = (known after apply)
      + user_name         = "juan.vera@binbash.com.ar"

      + emails {
          + primary = true
          + value   = "juan.vera@binbash.com.ar"
        }

      + name {
          + family_name = "Vera"
          + given_name  = "Juan Manuel"
        }
    }

Plan: 2 to add, 0 to change, 0 to destroy.
╷
│ Warning: Resource targeting is in effect
│ 
│ You are creating a plan with the -target option, which means that the result of this plan may not represent all of the changes requested by the current configuration.
│ 
│ The -target option is not for routine use, and is provided only for exceptional situations such as recovering from errors or mistakes, or when Terraform specifically suggests to use it as part of an
│ error message.
╵

Do you want to perform these actions?
  Terraform will perform the actions described above.
  Only 'yes' will be accepted to approve.

  Enter a value: yes

aws_identitystore_user.default["juan.vera"]: Creating...
aws_identitystore_user.default["juan.vera"]: Creation complete after 1s [id=d-906752b26f/84289458-e001-7044-ecf4-aac99ca469b2]
aws_identitystore_group_membership.default["juan.vera_devops"]: Creating...
aws_identitystore_group_membership.default["juan.vera_devops"]: Creation complete after 0s [id=d-906752b26f/8408b448-9031-7037-4c78-d5aa79bb69e1]
╷
│ Warning: Applied changes may be incomplete
│ 
│ The plan was created with the -target option in effect, so some changes requested in the configuration may have been ignored and the output values may not be fully updated. Run the following command to
│ verify that no other changes are pending:
│     terraform plan
│ 
│ Note that the -target option is not suitable for routine use, and is provided only for exceptional situations such as recovering from errors or mistakes, or when Terraform specifically suggests to use
│ it as part of an error message.
╵
Releasing state lock. This may take a few moments...

Apply complete! Resources: 2 added, 0 changed, 0 destroyed.