cds-snc / simplify-privacy-statements-V2

starter-app repo based version of privacy app.
https://simplify-privacy-statements.alpha.canada.ca
MIT License
5 stars 1 forks source link

WIP state file #231

Closed omartehsin1 closed 1 year ago

omartehsin1 commented 1 year ago

Summary | Résumé

We were running into the problem of the ECR being created every time we ran terragrunt plan so we created a TF state file for remote state storage.

github-actions[bot] commented 1 year ago

Production: ecr

✅   Terraform Format: success ✅   Terraform Plan: success ✅   Conftest: success

Plan: 2 to add, 0 to change, 0 to destroy
Show plan ```terraform Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # aws_ecr_lifecycle_policy.privacy_statement_untagged will be created + resource "aws_ecr_lifecycle_policy" "privacy_statement_untagged" { + id = (known after apply) + policy = jsonencode( { + rules = [ + { + action = { + type = "expire" } + description = "Expire untagged images older than 14 days" + rulePriority = 1 + selection = { + countNumber = 14 + countType = "sinceImagePushed" + countUnit = "days" + tagStatus = "untagged" } }, + { + action = { + type = "expire" } + description = "Keep last 20 tagged images" + rulePriority = 2 + selection = { + countNumber = 20 + countType = "imageCountMoreThan" + tagPrefixList = [ + "latest", ] + tagStatus = "tagged" } }, ] } ) + registry_id = (known after apply) + repository = "privacy-statement-container" } # aws_ecr_repository.privacy_statement_container will be created + resource "aws_ecr_repository" "privacy_statement_container" { + arn = (known after apply) + id = (known after apply) + image_tag_mutability = "MUTABLE" + name = "privacy-statement-container" + registry_id = (known after apply) + repository_url = (known after apply) + tags_all = (known after apply) + image_scanning_configuration { + scan_on_push = true } } Plan: 2 to add, 0 to change, 0 to destroy. Changes to Outputs: + ecr_url = (known after apply) ───────────────────────────────────────────────────────────────────────────── Saved the plan to: plan.tfplan To perform exactly these actions, run the following command to apply: terraform apply "plan.tfplan" Releasing state lock. This may take a few moments... ```
Show Conftest results ```sh WARN - plan.json - main - Missing Common Tags: ["aws_ecr_repository.privacy_statement_container"] 18 tests, 17 passed, 1 warning, 0 failures, 0 exceptions ```