near / mpc

37 stars 11 forks source link

feat: /msg endpoint now takes vectorized encrypted messages #549

Closed ChaoticTempest closed 6 months ago

ChaoticTempest commented 6 months ago

This optimizes the number of messages outflowing from a node, such that the network doesn't get used as much. This bundles up multiple messages into at most 256kb payloads. Reduces the latency quite a bit and increases the success rate of triples generated in time

github-actions[bot] commented 6 months ago

Terraform Feature Environment (dev-549)

Terraform Initialization ⚙️success

Terraform Apply success

Show Apply Plan ``` data.external.git_checkout: Reading... data.external.git_checkout: Read complete after 0s [id=-] data.google_compute_network.prod_network: Reading... data.google_compute_subnetwork.prod_subnetwork: Reading... data.google_compute_subnetwork.dev_subnetwork: Reading... data.google_compute_network.dev_network: Reading... data.google_compute_subnetwork.dev_subnetwork: Read complete after 0s [id=projects/pagoda-shared-infrastructure/regions/us-east1/subnetworks/cloudrun-main-dev-us-east1] data.google_compute_subnetwork.prod_subnetwork: Read complete after 0s [id=projects/pagoda-shared-infrastructure/regions/us-east1/subnetworks/cloudrun-main-prod-us-east1] data.google_compute_network.dev_network: Read complete after 0s [id=projects/pagoda-shared-infrastructure/global/networks/dev] data.google_compute_network.prod_network: Read complete after 0s [id=projects/pagoda-shared-infrastructure/global/networks/prod] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # google_project_iam_member.service-account-datastore-user will be created + resource "google_project_iam_member" "service-account-datastore-user" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = "pagoda-discovery-platform-dev" + role = "roles/datastore.user" } # google_secret_manager_secret_iam_member.account_creator_secret_access will be created + resource "google_secret_manager_secret_iam_member" "account_creator_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-recovery-account-creator-sk-dev" } # google_secret_manager_secret_iam_member.cipher_key_secret_access[0] will be created + resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-cipher-0-dev" } # google_secret_manager_secret_iam_member.cipher_key_secret_access[1] will be created + resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-cipher-1-dev" } # google_secret_manager_secret_iam_member.cipher_key_secret_access[2] will be created + resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-cipher-2-dev" } # google_secret_manager_secret_iam_member.fast_auth_partners_secret_access will be created + resource "google_secret_manager_secret_iam_member" "fast_auth_partners_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-fast-auth-partners-dev" } # google_secret_manager_secret_iam_member.secret_share_secret_access[0] will be created + resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-sk-share-0-dev" } # google_secret_manager_secret_iam_member.secret_share_secret_access[1] will be created + resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-sk-share-1-dev" } # google_secret_manager_secret_iam_member.secret_share_secret_access[2] will be created + resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-sk-share-2-dev" } # google_service_account.service_account will be created + resource "google_service_account" "service_account" { + account_id = "mpc-recovery-dev-549" + disabled = false + display_name = "MPC Recovery dev-549 Account" + email = (known after apply) + id = (known after apply) + member = (known after apply) + name = (known after apply) + project = (known after apply) + unique_id = (known after apply) } # google_service_account_iam_binding.serivce-account-iam will be created + resource "google_service_account_iam_binding" "serivce-account-iam" { + etag = (known after apply) + id = (known after apply) + members = [ + "serviceAccount:mpc-recovery@pagoda-discovery-platform-dev.iam.gserviceaccount.com", ] + role = "roles/iam.serviceAccountUser" + service_account_id = (known after apply) } # module.leader.google_cloud_run_v2_service.leader will be created + resource "google_cloud_run_v2_service" "leader" { + conditions = (known after apply) + etag = (known after apply) + generation = (known after apply) + id = (known after apply) + ingress = "INGRESS_TRAFFIC_ALL" + latest_created_revision = (known after apply) + latest_ready_revision = (known after apply) + launch_stage = (known after apply) + location = "us-east1" + name = "mpc-recovery-leader-dev-549" + observed_generation = (known after apply) + project = (known after apply) + reconciling = (known after apply) + terminal_condition = (known after apply) + traffic_statuses = (known after apply) + uid = (known after apply) + uri = (known after apply) + template { + max_instance_request_concurrency = (known after apply) + service_account = (known after apply) + timeout = (known after apply) + containers { + args = [ + "start-leader", ] + image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:c679e7dfba3168cd3a434d3a0120098b4dfafb14" + env { + name = "MPC_RECOVERY_WEB_PORT" + value = "3000" } + env { + name = "MPC_RECOVERY_SIGN_NODES" + value = (known after apply) } + env { + name = "MPC_RECOVERY_NEAR_RPC" + value = "https://rpc.testnet.near.org" } + env { + name = "MPC_RECOVERY_NEAR_ROOT_ACCOUNT" + value = "testnet" } + env { + name = "MPC_RECOVERY_ACCOUNT_CREATOR_ID" + value = "mpc-recovery-dev-creator.testnet" } + env { + name = "MPC_RECOVERY_GCP_PROJECT_ID" + value = "pagoda-discovery-platform-dev" } + env { + name = "MPC_RECOVERY_ENV" + value = "dev-549" } + env { + name = "MPC_RECOVERY_ACCOUNT_CREATOR_SK" + value_source { + secret_key_ref { + secret = "mpc-recovery-account-creator-sk-dev" + version = "latest" } } } + env { + name = "FAST_AUTH_PARTNERS" + value_source { + secret_key_ref { + secret = "mpc-fast-auth-partners-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" + value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" } + env { + name = "MPC_RECOVERY_OTLP_ENDPOINT" + value = "https://otel.dev.api.pagoda.co:443/v1/traces" } + env { + name = "MPC_RECOVERY_OPENTELEMETRY_LEVEL" + value = "debug" } + env { + name = "RUST_LOG" + value = "mpc_recovery=debug" } + ports { + container_port = 3000 + name = (known after apply) } + resources { + cpu_idle = false + limits = { + "cpu" = "2" + "memory" = "2Gi" } } } + scaling { + max_instance_count = 1 + min_instance_count = 1 } + vpc_access { + connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" + egress = "PRIVATE_RANGES_ONLY" } } } # module.leader.google_cloud_run_v2_service_iam_member.allow_all will be created + resource "google_cloud_run_v2_service_iam_member" "allow_all" { + etag = (known after apply) + id = (known after apply) + location = "us-east1" + member = "allUsers" + name = "mpc-recovery-leader-dev-549" + project = (known after apply) + role = "roles/run.invoker" } # module.signer[0].google_cloud_run_v2_service.signer will be created + resource "google_cloud_run_v2_service" "signer" { + conditions = (known after apply) + etag = (known after apply) + generation = (known after apply) + id = (known after apply) + ingress = "INGRESS_TRAFFIC_ALL" + latest_created_revision = (known after apply) + latest_ready_revision = (known after apply) + launch_stage = (known after apply) + location = "us-east1" + name = "mpc-recovery-signer-0-dev-549" + observed_generation = (known after apply) + project = (known after apply) + reconciling = (known after apply) + terminal_condition = (known after apply) + traffic_statuses = (known after apply) + uid = (known after apply) + uri = (known after apply) + template { + max_instance_request_concurrency = (known after apply) + service_account = (known after apply) + timeout = (known after apply) + containers { + args = [ + "start-sign", ] + image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:c679e7dfba3168cd3a434d3a0120098b4dfafb14" + env { + name = "MPC_RECOVERY_WEB_PORT" + value = "3000" } + env { + name = "MPC_RECOVERY_NODE_ID" + value = "0" } + env { + name = "MPC_RECOVERY_GCP_PROJECT_ID" + value = "pagoda-discovery-platform-dev" } + env { + name = "MPC_RECOVERY_ENV" + value = "dev-549" } + env { + name = "MPC_RECOVERY_CIPHER_KEY" + value_source { + secret_key_ref { + secret = "mpc-cipher-0-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_SK_SHARE" + value_source { + secret_key_ref { + secret = "mpc-sk-share-0-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" + value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" } + env { + name = "RUST_LOG" + value = "mpc_recovery=debug" } + ports { + container_port = 3000 + name = (known after apply) } + resources { + cpu_idle = false + limits = { + "cpu" = "2" + "memory" = "2Gi" } } } + scaling { + max_instance_count = 1 + min_instance_count = 1 } + vpc_access { + connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" + egress = "PRIVATE_RANGES_ONLY" } } } # module.signer[0].google_cloud_run_v2_service_iam_member.allow_all will be created + resource "google_cloud_run_v2_service_iam_member" "allow_all" { + etag = (known after apply) + id = (known after apply) + location = "us-east1" + member = "allUsers" + name = "mpc-recovery-signer-0-dev-549" + project = (known after apply) + role = "roles/run.invoker" } # module.signer[1].google_cloud_run_v2_service.signer will be created + resource "google_cloud_run_v2_service" "signer" { + conditions = (known after apply) + etag = (known after apply) + generation = (known after apply) + id = (known after apply) + ingress = "INGRESS_TRAFFIC_ALL" + latest_created_revision = (known after apply) + latest_ready_revision = (known after apply) + launch_stage = (known after apply) + location = "us-east1" + name = "mpc-recovery-signer-1-dev-549" + observed_generation = (known after apply) + project = (known after apply) + reconciling = (known after apply) + terminal_condition = (known after apply) + traffic_statuses = (known after apply) + uid = (known after apply) + uri = (known after apply) + template { + max_instance_request_concurrency = (known after apply) + service_account = (known after apply) + timeout = (known after apply) + containers { + args = [ + "start-sign", ] + image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:c679e7dfba3168cd3a434d3a0120098b4dfafb14" + env { + name = "MPC_RECOVERY_WEB_PORT" + value = "3000" } + env { + name = "MPC_RECOVERY_NODE_ID" + value = "1" } + env { + name = "MPC_RECOVERY_GCP_PROJECT_ID" + value = "pagoda-discovery-platform-dev" } + env { + name = "MPC_RECOVERY_ENV" + value = "dev-549" } + env { + name = "MPC_RECOVERY_CIPHER_KEY" + value_source { + secret_key_ref { + secret = "mpc-cipher-1-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_SK_SHARE" + value_source { + secret_key_ref { + secret = "mpc-sk-share-1-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" + value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" } + env { + name = "RUST_LOG" + value = "mpc_recovery=debug" } + ports { + container_port = 3000 + name = (known after apply) } + resources { + cpu_idle = false + limits = { + "cpu" = "2" + "memory" = "2Gi" } } } + scaling { + max_instance_count = 1 + min_instance_count = 1 } + vpc_access { + connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" + egress = "PRIVATE_RANGES_ONLY" } } } # module.signer[1].google_cloud_run_v2_service_iam_member.allow_all will be created + resource "google_cloud_run_v2_service_iam_member" "allow_all" { + etag = (known after apply) + id = (known after apply) + location = "us-east1" + member = "allUsers" + name = "mpc-recovery-signer-1-dev-549" + project = (known after apply) + role = "roles/run.invoker" } # module.signer[2].google_cloud_run_v2_service.signer will be created + resource "google_cloud_run_v2_service" "signer" { + conditions = (known after apply) + etag = (known after apply) + generation = (known after apply) + id = (known after apply) + ingress = "INGRESS_TRAFFIC_ALL" + latest_created_revision = (known after apply) + latest_ready_revision = (known after apply) + launch_stage = (known after apply) + location = "us-east1" + name = "mpc-recovery-signer-2-dev-549" + observed_generation = (known after apply) + project = (known after apply) + reconciling = (known after apply) + terminal_condition = (known after apply) + traffic_statuses = (known after apply) + uid = (known after apply) + uri = (known after apply) + template { + max_instance_request_concurrency = (known after apply) + service_account = (known after apply) + timeout = (known after apply) + containers { + args = [ + "start-sign", ] + image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:c679e7dfba3168cd3a434d3a0120098b4dfafb14" + env { + name = "MPC_RECOVERY_WEB_PORT" + value = "3000" } + env { + name = "MPC_RECOVERY_NODE_ID" + value = "2" } + env { + name = "MPC_RECOVERY_GCP_PROJECT_ID" + value = "pagoda-discovery-platform-dev" } + env { + name = "MPC_RECOVERY_ENV" + value = "dev-549" } + env { + name = "MPC_RECOVERY_CIPHER_KEY" + value_source { + secret_key_ref { + secret = "mpc-cipher-2-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_SK_SHARE" + value_source { + secret_key_ref { + secret = "mpc-sk-share-2-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" + value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" } + env { + name = "RUST_LOG" + value = "mpc_recovery=debug" } + ports { + container_port = 3000 + name = (known after apply) } + resources { + cpu_idle = false + limits = { + "cpu" = "2" + "memory" = "2Gi" } } } + scaling { + max_instance_count = 1 + min_instance_count = 1 } + vpc_access { + connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" + egress = "PRIVATE_RANGES_ONLY" } } } # module.signer[2].google_cloud_run_v2_service_iam_member.allow_all will be created + resource "google_cloud_run_v2_service_iam_member" "allow_all" { + etag = (known after apply) + id = (known after apply) + location = "us-east1" + member = "allUsers" + name = "mpc-recovery-signer-2-dev-549" + project = (known after apply) + role = "roles/run.invoker" } Plan: 19 to add, 0 to change, 0 to destroy. Changes to Outputs: + leader_node = (known after apply) google_service_account.service_account: Creating... google_service_account.service_account: Creation complete after 0s [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Creating... google_secret_manager_secret_iam_member.account_creator_secret_access: Creating... google_service_account_iam_binding.serivce-account-iam: Creating... google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Creating... google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Creating... google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Creating... google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Creating... google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Creating... google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Creating... google_project_iam_member.service-account-datastore-user: Creating... google_service_account_iam_binding.serivce-account-iam: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com/roles/iam.serviceAccountUser] google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Creation complete after 5s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Creation complete after 5s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Creation complete after 5s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Creation complete after 5s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Creation complete after 5s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.account_creator_secret_access: Creation complete after 5s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Creation complete after 5s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Creation complete after 5s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] module.signer[0].google_cloud_run_v2_service.signer: Creating... module.signer[1].google_cloud_run_v2_service.signer: Creating... module.signer[2].google_cloud_run_v2_service.signer: Creating... google_project_iam_member.service-account-datastore-user: Creation complete after 8s [id=pagoda-discovery-platform-dev/roles/datastore.user/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] module.signer[0].google_cloud_run_v2_service.signer: Still creating... [10s elapsed] module.signer[1].google_cloud_run_v2_service.signer: Still creating... [10s elapsed] module.signer[2].google_cloud_run_v2_service.signer: Still creating... [10s elapsed] module.signer[0].google_cloud_run_v2_service.signer: Still creating... [20s elapsed] module.signer[1].google_cloud_run_v2_service.signer: Still creating... [20s elapsed] module.signer[2].google_cloud_run_v2_service.signer: Still creating... [20s elapsed] module.signer[1].google_cloud_run_v2_service.signer: Creation complete after 21s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-549] module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Creating... module.signer[0].google_cloud_run_v2_service.signer: Creation complete after 21s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-549] module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Creating... module.signer[2].google_cloud_run_v2_service.signer: Creation complete after 21s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-549] module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Creating... module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Creation complete after 5s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-549/roles/run.invoker/allUsers] module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Creation complete after 5s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-549/roles/run.invoker/allUsers] module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Creation complete after 5s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-549/roles/run.invoker/allUsers] module.leader.google_cloud_run_v2_service.leader: Creating... module.leader.google_cloud_run_v2_service.leader: Still creating... [10s elapsed] module.leader.google_cloud_run_v2_service.leader: Still creating... [20s elapsed] module.leader.google_cloud_run_v2_service.leader: Creation complete after 20s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-549] module.leader.google_cloud_run_v2_service_iam_member.allow_all: Creating... module.leader.google_cloud_run_v2_service_iam_member.allow_all: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-549/roles/run.invoker/allUsers] Apply complete! Resources: 19 added, 0 changed, 0 destroyed. Outputs: leader_node = "https://mpc-recovery-leader-dev-549-7tk2cmmtcq-ue.a.run.app" ```

Pusher: @ChaoticTempest, Action: pull_request, Working Directory: `, Workflow:Terraform Feature Env`

URL: https://mpc-recovery-leader-dev-549-7tk2cmmtcq-ue.a.run.app

ChaoticTempest commented 6 months ago

256kb was arbitrary and seemed small enough payloads. Also, 1mb payloads were erroring out with the default accepted payload size, so went with 256kb for now since it was good enough and reduced the number of requests by like 90% according to our metrics

github-actions[bot] commented 6 months ago

Terraform Feature Environment Destroy (dev-549)

Terraform Initialization ⚙️success

Terraform Destroy success

Show Destroy Plan ``` data.external.git_checkout: Reading... data.external.git_checkout: Read complete after 0s [id=-] data.google_compute_network.prod_network: Reading... data.google_compute_subnetwork.dev_subnetwork: Reading... data.google_compute_subnetwork.prod_subnetwork: Reading... google_service_account.service_account: Refreshing state... [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_network.dev_network: Reading... google_project_iam_member.service-account-datastore-user: Refreshing state... [id=pagoda-discovery-platform-dev/roles/datastore.user/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_service_account_iam_binding.serivce-account-iam: Refreshing state... [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com/roles/iam.serviceAccountUser] google_secret_manager_secret_iam_member.account_creator_secret_access: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_subnetwork.dev_subnetwork: Read complete after 0s [id=projects/pagoda-shared-infrastructure/regions/us-east1/subnetworks/cloudrun-main-dev-us-east1] google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_subnetwork.prod_subnetwork: Read complete after 0s [id=projects/pagoda-shared-infrastructure/regions/us-east1/subnetworks/cloudrun-main-prod-us-east1] google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_network.prod_network: Read complete after 0s [id=projects/pagoda-shared-infrastructure/global/networks/prod] google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_network.dev_network: Read complete after 0s [id=projects/pagoda-shared-infrastructure/global/networks/dev] google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] module.signer[0].google_cloud_run_v2_service.signer: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-549] module.signer[1].google_cloud_run_v2_service.signer: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-549] module.signer[2].google_cloud_run_v2_service.signer: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-549] module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-549/roles/run.invoker/allUsers] module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-549/roles/run.invoker/allUsers] module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-549/roles/run.invoker/allUsers] module.leader.google_cloud_run_v2_service.leader: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-549] module.leader.google_cloud_run_v2_service_iam_member.allow_all: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-549/roles/run.invoker/allUsers] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: - destroy Terraform will perform the following actions: # google_project_iam_member.service-account-datastore-user will be destroyed - resource "google_project_iam_member" "service-account-datastore-user" { - etag = "BwYVC3xKSn0=" -> null - id = "pagoda-discovery-platform-dev/roles/datastore.user/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/datastore.user" -> null } # google_secret_manager_secret_iam_member.account_creator_secret_access will be destroyed - resource "google_secret_manager_secret_iam_member" "account_creator_secret_access" { - etag = "BwYVC3wYY3E=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev" -> null } # google_secret_manager_secret_iam_member.cipher_key_secret_access[0] will be destroyed - resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { - etag = "BwYVC3wYMP0=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev" -> null } # google_secret_manager_secret_iam_member.cipher_key_secret_access[1] will be destroyed - resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { - etag = "BwYVC3wYNJo=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev" -> null } # google_secret_manager_secret_iam_member.cipher_key_secret_access[2] will be destroyed - resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { - etag = "BwYVC3wXvT4=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev" -> null } # google_secret_manager_secret_iam_member.fast_auth_partners_secret_access will be destroyed - resource "google_secret_manager_secret_iam_member" "fast_auth_partners_secret_access" { - etag = "BwYVC3wYQGA=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev" -> null } # google_secret_manager_secret_iam_member.secret_share_secret_access[0] will be destroyed - resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { - etag = "BwYVC3wXxZk=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev" -> null } # google_secret_manager_secret_iam_member.secret_share_secret_access[1] will be destroyed - resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { - etag = "BwYVC3wbdqc=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev" -> null } # google_secret_manager_secret_iam_member.secret_share_secret_access[2] will be destroyed - resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { - etag = "BwYVC3wX9NA=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev" -> null } # google_service_account.service_account will be destroyed - resource "google_service_account" "service_account" { - account_id = "mpc-recovery-dev-549" -> null - disabled = false -> null - display_name = "MPC Recovery dev-549 Account" -> null - email = "mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - id = "projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - name = "projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - unique_id = "115522583467516841376" -> null } # google_service_account_iam_binding.serivce-account-iam will be destroyed - resource "google_service_account_iam_binding" "serivce-account-iam" { - etag = "BwYU2FgIY84=" -> null - id = "projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com/roles/iam.serviceAccountUser" -> null - members = [ - "serviceAccount:mpc-recovery@pagoda-discovery-platform-dev.iam.gserviceaccount.com", ] -> null - role = "roles/iam.serviceAccountUser" -> null - service_account_id = "projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null } # module.leader.google_cloud_run_v2_service.leader will be destroyed - resource "google_cloud_run_v2_service" "leader" { - annotations = {} -> null - conditions = [ - { - execution_reason = "" - last_transition_time = "2024-03-30T03:28:45.100946Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "RoutesReady" }, - { - execution_reason = "" - last_transition_time = "2024-03-30T03:28:32.922098Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "ConfigurationsReady" }, ] -> null - etag = "\"COCNnrAGENDU9fIC/cHJvamVjdHMvcGFnb2RhLWRpc2NvdmVyeS1wbGF0Zm9ybS1kZXYvbG9jYXRpb25zL3VzLWVhc3QxL3NlcnZpY2VzL21wYy1yZWNvdmVyeS1sZWFkZXItZGV2LTU0OQ\"" -> null - generation = "1" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-549" -> null - ingress = "INGRESS_TRAFFIC_ALL" -> null - labels = {} -> null - latest_created_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-549/revisions/mpc-recovery-leader-dev-549-00001-n5v" -> null - latest_ready_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-549/revisions/mpc-recovery-leader-dev-549-00001-n5v" -> null - launch_stage = "GA" -> null - location = "us-east1" -> null - name = "mpc-recovery-leader-dev-549" -> null - observed_generation = "1" -> null - project = "pagoda-discovery-platform-dev" -> null - reconciling = false -> null - terminal_condition = [ - { - execution_reason = "" - last_transition_time = "2024-03-30T03:28:45.144266Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "Ready" }, ] -> null - traffic_statuses = [ - { - percent = 100 - revision = "" - tag = "" - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" - uri = "" }, ] -> null - uid = "7a41384d-4ae3-44f1-8ed9-49a1f48fdca9" -> null - uri = "https://mpc-recovery-leader-dev-549-7tk2cmmtcq-ue.a.run.app" -> null - template { - annotations = {} -> null - labels = {} -> null - max_instance_request_concurrency = 80 -> null - service_account = "mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - session_affinity = false -> null - timeout = "300s" -> null - containers { - args = [ - "start-leader", ] -> null - command = [] -> null - image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:c679e7dfba3168cd3a434d3a0120098b4dfafb14" -> null - env { - name = "MPC_RECOVERY_WEB_PORT" -> null - value = "3000" -> null } - env { - name = "MPC_RECOVERY_SIGN_NODES" -> null - value = "https://mpc-recovery-signer-0-dev-549-7tk2cmmtcq-ue.a.run.app,https://mpc-recovery-signer-1-dev-549-7tk2cmmtcq-ue.a.run.app,https://mpc-recovery-signer-2-dev-549-7tk2cmmtcq-ue.a.run.app" -> null } - env { - name = "MPC_RECOVERY_NEAR_RPC" -> null - value = "https://rpc.testnet.near.org" -> null } - env { - name = "MPC_RECOVERY_NEAR_ROOT_ACCOUNT" -> null - value = "testnet" -> null } - env { - name = "MPC_RECOVERY_ACCOUNT_CREATOR_ID" -> null - value = "mpc-recovery-dev-creator.testnet" -> null } - env { - name = "MPC_RECOVERY_GCP_PROJECT_ID" -> null - value = "pagoda-discovery-platform-dev" -> null } - env { - name = "MPC_RECOVERY_ENV" -> null - value = "dev-549" -> null } - env { - name = "MPC_RECOVERY_ACCOUNT_CREATOR_SK" -> null - value_source { - secret_key_ref { - secret = "mpc-recovery-account-creator-sk-dev" -> null - version = "latest" -> null } } } - env { - name = "FAST_AUTH_PARTNERS" -> null - value_source { - secret_key_ref { - secret = "mpc-fast-auth-partners-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" -> null - value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" -> null } - env { - name = "MPC_RECOVERY_OTLP_ENDPOINT" -> null - value = "https://otel.dev.api.pagoda.co:443/v1/traces" -> null } - env { - name = "MPC_RECOVERY_OPENTELEMETRY_LEVEL" -> null - value = "debug" -> null } - env { - name = "RUST_LOG" -> null - value = "mpc_recovery=debug" -> null } - ports { - container_port = 3000 -> null - name = "http1" -> null } - resources { - cpu_idle = false -> null - limits = { - "cpu" = "2" - "memory" = "2Gi" } -> null - startup_cpu_boost = false -> null } - startup_probe { - failure_threshold = 1 -> null - initial_delay_seconds = 0 -> null - period_seconds = 240 -> null - timeout_seconds = 240 -> null - tcp_socket { - port = 3000 -> null } } } - scaling { - max_instance_count = 1 -> null - min_instance_count = 1 -> null } - vpc_access { - connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" -> null - egress = "PRIVATE_RANGES_ONLY" -> null } } - traffic { - percent = 100 -> null - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" -> null } } # module.leader.google_cloud_run_v2_service_iam_member.allow_all will be destroyed - resource "google_cloud_run_v2_service_iam_member" "allow_all" { - etag = "BwYU2FsSQ6o=" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-549/roles/run.invoker/allUsers" -> null - location = "us-east1" -> null - member = "allUsers" -> null - name = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-549" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/run.invoker" -> null } # module.signer[0].google_cloud_run_v2_service.signer will be destroyed - resource "google_cloud_run_v2_service" "signer" { - annotations = {} -> null - conditions = [ - { - execution_reason = "" - last_transition_time = "2024-03-30T03:28:21.041296Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "RoutesReady" }, - { - execution_reason = "" - last_transition_time = "2024-03-30T03:28:07.728807Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "ConfigurationsReady" }, ] -> null - etag = "\"CMeNnrAGELDQwNoB/cHJvamVjdHMvcGFnb2RhLWRpc2NvdmVyeS1wbGF0Zm9ybS1kZXYvbG9jYXRpb25zL3VzLWVhc3QxL3NlcnZpY2VzL21wYy1yZWNvdmVyeS1zaWduZXItMC1kZXYtNTQ5\"" -> null - generation = "1" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-549" -> null - ingress = "INGRESS_TRAFFIC_ALL" -> null - labels = {} -> null - latest_created_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-549/revisions/mpc-recovery-signer-0-dev-549-00001-v6f" -> null - latest_ready_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-549/revisions/mpc-recovery-signer-0-dev-549-00001-v6f" -> null - launch_stage = "GA" -> null - location = "us-east1" -> null - name = "mpc-recovery-signer-0-dev-549" -> null - observed_generation = "1" -> null - project = "pagoda-discovery-platform-dev" -> null - reconciling = false -> null - terminal_condition = [ - { - execution_reason = "" - last_transition_time = "2024-03-30T03:28:21.089982Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "Ready" }, ] -> null - traffic_statuses = [ - { - percent = 100 - revision = "" - tag = "" - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" - uri = "" }, ] -> null - uid = "11c150f5-d99c-4c60-be3d-1634479f8310" -> null - uri = "https://mpc-recovery-signer-0-dev-549-7tk2cmmtcq-ue.a.run.app" -> null - template { - annotations = {} -> null - labels = {} -> null - max_instance_request_concurrency = 80 -> null - service_account = "mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - session_affinity = false -> null - timeout = "300s" -> null - containers { - args = [ - "start-sign", ] -> null - command = [] -> null - image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:c679e7dfba3168cd3a434d3a0120098b4dfafb14" -> null - env { - name = "MPC_RECOVERY_WEB_PORT" -> null - value = "3000" -> null } - env { - name = "MPC_RECOVERY_NODE_ID" -> null - value = "0" -> null } - env { - name = "MPC_RECOVERY_GCP_PROJECT_ID" -> null - value = "pagoda-discovery-platform-dev" -> null } - env { - name = "MPC_RECOVERY_ENV" -> null - value = "dev-549" -> null } - env { - name = "MPC_RECOVERY_CIPHER_KEY" -> null - value_source { - secret_key_ref { - secret = "mpc-cipher-0-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_SK_SHARE" -> null - value_source { - secret_key_ref { - secret = "mpc-sk-share-0-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" -> null - value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" -> null } - env { - name = "RUST_LOG" -> null - value = "mpc_recovery=debug" -> null } - ports { - container_port = 3000 -> null - name = "http1" -> null } - resources { - cpu_idle = false -> null - limits = { - "cpu" = "2" - "memory" = "2Gi" } -> null - startup_cpu_boost = false -> null } - startup_probe { - failure_threshold = 1 -> null - initial_delay_seconds = 0 -> null - period_seconds = 240 -> null - timeout_seconds = 240 -> null - tcp_socket { - port = 3000 -> null } } } - scaling { - max_instance_count = 1 -> null - min_instance_count = 1 -> null } - vpc_access { - connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" -> null - egress = "PRIVATE_RANGES_ONLY" -> null } } - traffic { - percent = 100 -> null - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" -> null } } # module.signer[0].google_cloud_run_v2_service_iam_member.allow_all will be destroyed - resource "google_cloud_run_v2_service_iam_member" "allow_all" { - etag = "BwYU2FmVqOw=" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-549/roles/run.invoker/allUsers" -> null - location = "us-east1" -> null - member = "allUsers" -> null - name = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-549" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/run.invoker" -> null } # module.signer[1].google_cloud_run_v2_service.signer will be destroyed - resource "google_cloud_run_v2_service" "signer" { - annotations = {} -> null - conditions = [ - { - execution_reason = "" - last_transition_time = "2024-03-30T03:28:20.137722Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "RoutesReady" }, - { - execution_reason = "" - last_transition_time = "2024-03-30T03:28:07.731302Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "ConfigurationsReady" }, ] -> null - etag = "\"CMeNnrAGEMDO7PAB/cHJvamVjdHMvcGFnb2RhLWRpc2NvdmVyeS1wbGF0Zm9ybS1kZXYvbG9jYXRpb25zL3VzLWVhc3QxL3NlcnZpY2VzL21wYy1yZWNvdmVyeS1zaWduZXItMS1kZXYtNTQ5\"" -> null - generation = "1" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-549" -> null - ingress = "INGRESS_TRAFFIC_ALL" -> null - labels = {} -> null - latest_created_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-549/revisions/mpc-recovery-signer-1-dev-549-00001-79q" -> null - latest_ready_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-549/revisions/mpc-recovery-signer-1-dev-549-00001-79q" -> null - launch_stage = "GA" -> null - location = "us-east1" -> null - name = "mpc-recovery-signer-1-dev-549" -> null - observed_generation = "1" -> null - project = "pagoda-discovery-platform-dev" -> null - reconciling = false -> null - terminal_condition = [ - { - execution_reason = "" - last_transition_time = "2024-03-30T03:28:20.176061Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "Ready" }, ] -> null - traffic_statuses = [ - { - percent = 100 - revision = "" - tag = "" - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" - uri = "" }, ] -> null - uid = "14225bc7-59e2-4b29-b4c3-dcc1057fe28b" -> null - uri = "https://mpc-recovery-signer-1-dev-549-7tk2cmmtcq-ue.a.run.app" -> null - template { - annotations = {} -> null - labels = {} -> null - max_instance_request_concurrency = 80 -> null - service_account = "mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - session_affinity = false -> null - timeout = "300s" -> null - containers { - args = [ - "start-sign", ] -> null - command = [] -> null - image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:c679e7dfba3168cd3a434d3a0120098b4dfafb14" -> null - env { - name = "MPC_RECOVERY_WEB_PORT" -> null - value = "3000" -> null } - env { - name = "MPC_RECOVERY_NODE_ID" -> null - value = "1" -> null } - env { - name = "MPC_RECOVERY_GCP_PROJECT_ID" -> null - value = "pagoda-discovery-platform-dev" -> null } - env { - name = "MPC_RECOVERY_ENV" -> null - value = "dev-549" -> null } - env { - name = "MPC_RECOVERY_CIPHER_KEY" -> null - value_source { - secret_key_ref { - secret = "mpc-cipher-1-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_SK_SHARE" -> null - value_source { - secret_key_ref { - secret = "mpc-sk-share-1-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" -> null - value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" -> null } - env { - name = "RUST_LOG" -> null - value = "mpc_recovery=debug" -> null } - ports { - container_port = 3000 -> null - name = "http1" -> null } - resources { - cpu_idle = false -> null - limits = { - "cpu" = "2" - "memory" = "2Gi" } -> null - startup_cpu_boost = false -> null } - startup_probe { - failure_threshold = 1 -> null - initial_delay_seconds = 0 -> null - period_seconds = 240 -> null - timeout_seconds = 240 -> null - tcp_socket { - port = 3000 -> null } } } - scaling { - max_instance_count = 1 -> null - min_instance_count = 1 -> null } - vpc_access { - connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" -> null - egress = "PRIVATE_RANGES_ONLY" -> null } } - traffic { - percent = 100 -> null - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" -> null } } # module.signer[1].google_cloud_run_v2_service_iam_member.allow_all will be destroyed - resource "google_cloud_run_v2_service_iam_member" "allow_all" { - etag = "BwYU2FmU9qk=" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-549/roles/run.invoker/allUsers" -> null - location = "us-east1" -> null - member = "allUsers" -> null - name = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-549" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/run.invoker" -> null } # module.signer[2].google_cloud_run_v2_service.signer will be destroyed - resource "google_cloud_run_v2_service" "signer" { - annotations = {} -> null - conditions = [ - { - execution_reason = "" - last_transition_time = "2024-03-30T03:28:20.659362Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "RoutesReady" }, - { - execution_reason = "" - last_transition_time = "2024-03-30T03:28:07.747968Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "ConfigurationsReady" }, ] -> null - etag = "\"CMeNnrAGENDazdgB/cHJvamVjdHMvcGFnb2RhLWRpc2NvdmVyeS1wbGF0Zm9ybS1kZXYvbG9jYXRpb25zL3VzLWVhc3QxL3NlcnZpY2VzL21wYy1yZWNvdmVyeS1zaWduZXItMi1kZXYtNTQ5\"" -> null - generation = "1" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-549" -> null - ingress = "INGRESS_TRAFFIC_ALL" -> null - labels = {} -> null - latest_created_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-549/revisions/mpc-recovery-signer-2-dev-549-00001-bgt" -> null - latest_ready_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-549/revisions/mpc-recovery-signer-2-dev-549-00001-bgt" -> null - launch_stage = "GA" -> null - location = "us-east1" -> null - name = "mpc-recovery-signer-2-dev-549" -> null - observed_generation = "1" -> null - project = "pagoda-discovery-platform-dev" -> null - reconciling = false -> null - terminal_condition = [ - { - execution_reason = "" - last_transition_time = "2024-03-30T03:28:20.702750Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "Ready" }, ] -> null - traffic_statuses = [ - { - percent = 100 - revision = "" - tag = "" - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" - uri = "" }, ] -> null - uid = "3e9b8dae-83a8-4f69-a241-43c471e016ff" -> null - uri = "https://mpc-recovery-signer-2-dev-549-7tk2cmmtcq-ue.a.run.app" -> null - template { - annotations = {} -> null - labels = {} -> null - max_instance_request_concurrency = 80 -> null - service_account = "mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - session_affinity = false -> null - timeout = "300s" -> null - containers { - args = [ - "start-sign", ] -> null - command = [] -> null - image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:c679e7dfba3168cd3a434d3a0120098b4dfafb14" -> null - env { - name = "MPC_RECOVERY_WEB_PORT" -> null - value = "3000" -> null } - env { - name = "MPC_RECOVERY_NODE_ID" -> null - value = "2" -> null } - env { - name = "MPC_RECOVERY_GCP_PROJECT_ID" -> null - value = "pagoda-discovery-platform-dev" -> null } - env { - name = "MPC_RECOVERY_ENV" -> null - value = "dev-549" -> null } - env { - name = "MPC_RECOVERY_CIPHER_KEY" -> null - value_source { - secret_key_ref { - secret = "mpc-cipher-2-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_SK_SHARE" -> null - value_source { - secret_key_ref { - secret = "mpc-sk-share-2-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" -> null - value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" -> null } - env { - name = "RUST_LOG" -> null - value = "mpc_recovery=debug" -> null } - ports { - container_port = 3000 -> null - name = "http1" -> null } - resources { - cpu_idle = false -> null - limits = { - "cpu" = "2" - "memory" = "2Gi" } -> null - startup_cpu_boost = false -> null } - startup_probe { - failure_threshold = 1 -> null - initial_delay_seconds = 0 -> null - period_seconds = 240 -> null - timeout_seconds = 240 -> null - tcp_socket { - port = 3000 -> null } } } - scaling { - max_instance_count = 1 -> null - min_instance_count = 1 -> null } - vpc_access { - connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" -> null - egress = "PRIVATE_RANGES_ONLY" -> null } } - traffic { - percent = 100 -> null - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" -> null } } # module.signer[2].google_cloud_run_v2_service_iam_member.allow_all will be destroyed - resource "google_cloud_run_v2_service_iam_member" "allow_all" { - etag = "BwYU2FmW8F0=" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-549/roles/run.invoker/allUsers" -> null - location = "us-east1" -> null - member = "allUsers" -> null - name = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-549" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/run.invoker" -> null } Plan: 0 to add, 0 to change, 19 to destroy. Changes to Outputs: - leader_node = "https://mpc-recovery-leader-dev-549-7tk2cmmtcq-ue.a.run.app" -> null google_project_iam_member.service-account-datastore-user: Destroying... [id=pagoda-discovery-platform-dev/roles/datastore.user/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] module.leader.google_cloud_run_v2_service_iam_member.allow_all: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-549/roles/run.invoker/allUsers] google_service_account_iam_binding.serivce-account-iam: Destroying... [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com/roles/iam.serviceAccountUser] google_service_account_iam_binding.serivce-account-iam: Destruction complete after 4s module.leader.google_cloud_run_v2_service_iam_member.allow_all: Destruction complete after 4s module.leader.google_cloud_run_v2_service.leader: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-549] google_project_iam_member.service-account-datastore-user: Destruction complete after 8s module.leader.google_cloud_run_v2_service.leader: Still destroying... [id=projects/pagoda-discovery-platform-dev/...1/services/mpc-recovery-leader-dev-549, 10s elapsed] module.leader.google_cloud_run_v2_service.leader: Destruction complete after 11s google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-549/roles/run.invoker/allUsers] google_secret_manager_secret_iam_member.account_creator_secret_access: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-549/roles/run.invoker/allUsers] module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-549/roles/run.invoker/allUsers] google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Destruction complete after 4s module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Destruction complete after 4s module.signer[0].google_cloud_run_v2_service.signer: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-549] google_secret_manager_secret_iam_member.account_creator_secret_access: Destruction complete after 4s module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Destruction complete after 4s module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Destruction complete after 4s module.signer[1].google_cloud_run_v2_service.signer: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-549] module.signer[2].google_cloud_run_v2_service.signer: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-549] module.signer[0].google_cloud_run_v2_service.signer: Still destroying... [id=projects/pagoda-discovery-platform-dev/...services/mpc-recovery-signer-0-dev-549, 10s elapsed] module.signer[1].google_cloud_run_v2_service.signer: Still destroying... [id=projects/pagoda-discovery-platform-dev/...services/mpc-recovery-signer-1-dev-549, 10s elapsed] module.signer[2].google_cloud_run_v2_service.signer: Still destroying... [id=projects/pagoda-discovery-platform-dev/...services/mpc-recovery-signer-2-dev-549, 10s elapsed] module.signer[0].google_cloud_run_v2_service.signer: Destruction complete after 10s module.signer[1].google_cloud_run_v2_service.signer: Destruction complete after 10s module.signer[2].google_cloud_run_v2_service.signer: Destruction complete after 11s google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Destruction complete after 4s google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Destruction complete after 4s google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Destruction complete after 4s google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Destruction complete after 4s google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Destruction complete after 4s google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Destruction complete after 4s google_service_account.service_account: Destroying... [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-549@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_service_account.service_account: Destruction complete after 0s Destroy complete! Resources: 19 destroyed. ```

Pusher: @ChaoticTempest, Action: pull_request, Working Directory: `, Workflow:Terraform Feature Env (Destroy)`