cds-snc / url-shortener

An API written in Python that shortens URLs
MIT License
4 stars 0 forks source link

release: infrastructure and latest API #391

Closed patheard closed 1 year ago

patheard commented 1 year ago

Summary

Related

github-actions[bot] commented 1 year ago

Production: hosted_zone

✅   Terraform Init: success ✅   Terraform Validate: success ✅   Terraform Format: success ✅   Terraform Plan: success ✅   Conftest: success

⚠️   Warning: resources will be destroyed by this change!

Plan: 0 to add, 0 to change, 1 to destroy
Show summary | CHANGE | NAME | |--------|------------------------------------------------| | delete | `aws_route53_health_check.sre_bot_healthcheck` |
Show plan ```terraform Resource actions are indicated with the following symbols: - destroy Terraform will perform the following actions: # aws_route53_health_check.sre_bot_healthcheck will be destroyed # (because aws_route53_health_check.sre_bot_healthcheck is not in configuration) - resource "aws_route53_health_check" "sre_bot_healthcheck" { - arn = "arn:aws:route53:::healthcheck/46553ba4-165e-4192-a50a-c92618d50025" -> null - child_health_threshold = 0 -> null - child_healthchecks = [] -> null - disabled = false -> null - enable_sni = true -> null - failure_threshold = 3 -> null - fqdn = "o.alpha.canada.ca" -> null - id = "46553ba4-165e-4192-a50a-c92618d50025" -> null - invert_healthcheck = false -> null - measure_latency = false -> null - port = 443 -> null - regions = [] -> null - request_interval = 30 -> null - resource_path = "/version" -> null - tags = { - "CostCentre" = "url-shortener-production" } -> null - tags_all = { - "CostCentre" = "url-shortener-production" } -> null - type = "HTTPS" -> null } Plan: 0 to add, 0 to change, 1 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: plan.tfplan To perform exactly these actions, run the following command to apply: terraform apply "plan.tfplan" Releasing state lock. This may take a few moments... ```
Show Conftest results ```sh 18 tests, 18 passed, 0 warnings, 0 failures, 0 exceptions ```
github-actions[bot] commented 1 year ago

Production: alarms

✅   Terraform Init: success ✅   Terraform Validate: success ✅   Terraform Format: success ✅   Terraform Plan: success ✅   Conftest: success

Plan: 2 to add, 0 to change, 0 to destroy
Show summary | CHANGE | NAME | |--------|-----------------------------------------------------------------| | add | `aws_route53_health_check.url_shortener` | | | `aws_shield_protection_health_check_association.cloudfront_api` |
Show plan ```terraform Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # aws_route53_health_check.url_shortener will be created + resource "aws_route53_health_check" "url_shortener" { + arn = (known after apply) + disabled = false + enable_sni = (known after apply) + failure_threshold = 3 + fqdn = "o.alpha.canada.ca" + id = (known after apply) + measure_latency = false + port = 443 + request_interval = 30 + resource_path = "/version" + tags = { + "CostCentre" = "url-shortener-production" + "Name" = "url-shortener-api" } + tags_all = { + "CostCentre" = "url-shortener-production" + "Name" = "url-shortener-api" } + type = "HTTPS" } # aws_shield_protection_health_check_association.cloudfront_api will be created + resource "aws_shield_protection_health_check_association" "cloudfront_api" { + health_check_arn = (known after apply) + id = (known after apply) + shield_protection_id = "d8656d4c-366f-4f50-8408-cecbab6f81cd" } Plan: 2 to add, 0 to change, 0 to destroy. Warning: Argument is deprecated with module.athena_bucket.aws_s3_bucket.this, on .terraform/modules/athena_bucket/S3/main.tf line 8, in resource "aws_s3_bucket" "this": 8: resource "aws_s3_bucket" "this" { Use the aws_s3_bucket_server_side_encryption_configuration resource instead (and 3 more similar warnings elsewhere) ───────────────────────────────────────────────────────────────────────────── Saved the plan to: plan.tfplan To perform exactly these actions, run the following command to apply: terraform apply "plan.tfplan" Releasing state lock. This may take a few moments... ```
Show Conftest results ```sh WARN - plan.json - main - Cloudwatch log metric pattern is invalid: ["aws_cloudwatch_log_metric_filter.url_shortener_api_error"] WARN - plan.json - main - Cloudwatch log metric pattern is invalid: ["aws_cloudwatch_log_metric_filter.url_shortener_api_warning"] WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_metric_alarm.cloudfront_ddos"] WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_metric_alarm.route53_ddos"] WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_metric_alarm.url_shoretener_api_high_magic_link_sent"] WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_metric_alarm.url_shoretener_api_suspicious"] WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_metric_alarm.url_shoretener_api_warning"] WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_metric_alarm.url_shortener_api_error"] WARN - plan.json - main - Missing Common Tags: ["aws_route53_health_check.url_shortener"] WARN - plan.json - main - Missing Common Tags: ["module.cloudwatch_alarms_slack.aws_cloudwatch_log_group.notify_slack_lambda"] WARN - plan.json - main - Missing Common Tags: ["module.cloudwatch_alarms_slack.aws_iam_policy.notify_slack_lambda"] WARN - plan.json - main - Missing Common Tags: ["module.cloudwatch_alarms_slack.aws_iam_role.notify_slack_lambda"] WARN - plan.json - main - Missing Common Tags: ["module.cloudwatch_alarms_slack.aws_lambda_function.notify_slack"] 29 tests, 16 passed, 13 warnings, 0 failures, 0 exceptions ```