near / mpc

37 stars 11 forks source link

Make sure signing works after resharing #572

Closed volovyks closed 4 months ago

github-actions[bot] commented 5 months ago

Terraform Feature Environment (dev-572)

Terraform Initialization ⚙️success

Terraform Apply success

Show Apply Plan ``` data.external.git_checkout: Reading... data.external.git_checkout: Read complete after 0s [id=-] data.google_compute_network.dev_network: Reading... data.google_compute_subnetwork.dev_subnetwork: Reading... data.google_compute_network.prod_network: Reading... data.google_compute_subnetwork.prod_subnetwork: Reading... data.google_compute_subnetwork.prod_subnetwork: Read complete after 0s [id=projects/pagoda-shared-infrastructure/regions/us-east1/subnetworks/cloudrun-main-prod-us-east1] data.google_compute_subnetwork.dev_subnetwork: Read complete after 0s [id=projects/pagoda-shared-infrastructure/regions/us-east1/subnetworks/cloudrun-main-dev-us-east1] data.google_compute_network.prod_network: Read complete after 0s [id=projects/pagoda-shared-infrastructure/global/networks/prod] data.google_compute_network.dev_network: Read complete after 0s [id=projects/pagoda-shared-infrastructure/global/networks/dev] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # google_project_iam_member.service-account-datastore-user will be created + resource "google_project_iam_member" "service-account-datastore-user" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = "pagoda-discovery-platform-dev" + role = "roles/datastore.user" } # google_secret_manager_secret_iam_member.account_creator_secret_access will be created + resource "google_secret_manager_secret_iam_member" "account_creator_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-recovery-account-creator-sk-dev" } # google_secret_manager_secret_iam_member.cipher_key_secret_access[0] will be created + resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-cipher-0-dev" } # google_secret_manager_secret_iam_member.cipher_key_secret_access[1] will be created + resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-cipher-1-dev" } # google_secret_manager_secret_iam_member.cipher_key_secret_access[2] will be created + resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-cipher-2-dev" } # google_secret_manager_secret_iam_member.fast_auth_partners_secret_access will be created + resource "google_secret_manager_secret_iam_member" "fast_auth_partners_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-fast-auth-partners-dev" } # google_secret_manager_secret_iam_member.secret_share_secret_access[0] will be created + resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-sk-share-0-dev" } # google_secret_manager_secret_iam_member.secret_share_secret_access[1] will be created + resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-sk-share-1-dev" } # google_secret_manager_secret_iam_member.secret_share_secret_access[2] will be created + resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { + etag = (known after apply) + id = (known after apply) + member = (known after apply) + project = (known after apply) + role = "roles/secretmanager.secretAccessor" + secret_id = "mpc-sk-share-2-dev" } # google_service_account.service_account will be created + resource "google_service_account" "service_account" { + account_id = "mpc-recovery-dev-572" + disabled = false + display_name = "MPC Recovery dev-572 Account" + email = (known after apply) + id = (known after apply) + member = (known after apply) + name = (known after apply) + project = (known after apply) + unique_id = (known after apply) } # google_service_account_iam_binding.serivce-account-iam will be created + resource "google_service_account_iam_binding" "serivce-account-iam" { + etag = (known after apply) + id = (known after apply) + members = [ + "serviceAccount:mpc-recovery@pagoda-discovery-platform-dev.iam.gserviceaccount.com", ] + role = "roles/iam.serviceAccountUser" + service_account_id = (known after apply) } # module.leader.google_cloud_run_v2_service.leader will be created + resource "google_cloud_run_v2_service" "leader" { + conditions = (known after apply) + etag = (known after apply) + generation = (known after apply) + id = (known after apply) + ingress = "INGRESS_TRAFFIC_ALL" + latest_created_revision = (known after apply) + latest_ready_revision = (known after apply) + launch_stage = (known after apply) + location = "us-east1" + name = "mpc-recovery-leader-dev-572" + observed_generation = (known after apply) + project = (known after apply) + reconciling = (known after apply) + terminal_condition = (known after apply) + traffic_statuses = (known after apply) + uid = (known after apply) + uri = (known after apply) + template { + max_instance_request_concurrency = (known after apply) + service_account = (known after apply) + timeout = (known after apply) + containers { + args = [ + "start-leader", ] + image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:1521aebbc0a2a81c072cb99f427a64ca489cbaa6" + env { + name = "MPC_RECOVERY_WEB_PORT" + value = "3000" } + env { + name = "MPC_RECOVERY_SIGN_NODES" + value = (known after apply) } + env { + name = "MPC_RECOVERY_NEAR_RPC" + value = "https://rpc.testnet.near.org" } + env { + name = "MPC_RECOVERY_NEAR_ROOT_ACCOUNT" + value = "testnet" } + env { + name = "MPC_RECOVERY_ACCOUNT_CREATOR_ID" + value = "mpc-recovery-dev-creator.testnet" } + env { + name = "MPC_RECOVERY_GCP_PROJECT_ID" + value = "pagoda-discovery-platform-dev" } + env { + name = "MPC_RECOVERY_ENV" + value = "dev-572" } + env { + name = "MPC_RECOVERY_ACCOUNT_CREATOR_SK" + value_source { + secret_key_ref { + secret = "mpc-recovery-account-creator-sk-dev" + version = "latest" } } } + env { + name = "FAST_AUTH_PARTNERS" + value_source { + secret_key_ref { + secret = "mpc-fast-auth-partners-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" + value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" } + env { + name = "MPC_RECOVERY_OTLP_ENDPOINT" + value = "https://otel.dev.api.pagoda.co:443/v1/traces" } + env { + name = "MPC_RECOVERY_OPENTELEMETRY_LEVEL" + value = "debug" } + env { + name = "RUST_LOG" + value = "mpc_recovery=debug" } + ports { + container_port = 3000 + name = (known after apply) } + resources { + cpu_idle = false + limits = { + "cpu" = "2" + "memory" = "2Gi" } } } + scaling { + max_instance_count = 1 + min_instance_count = 1 } + vpc_access { + connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" + egress = "PRIVATE_RANGES_ONLY" } } } # module.leader.google_cloud_run_v2_service_iam_member.allow_all will be created + resource "google_cloud_run_v2_service_iam_member" "allow_all" { + etag = (known after apply) + id = (known after apply) + location = "us-east1" + member = "allUsers" + name = "mpc-recovery-leader-dev-572" + project = (known after apply) + role = "roles/run.invoker" } # module.signer[0].google_cloud_run_v2_service.signer will be created + resource "google_cloud_run_v2_service" "signer" { + conditions = (known after apply) + etag = (known after apply) + generation = (known after apply) + id = (known after apply) + ingress = "INGRESS_TRAFFIC_ALL" + latest_created_revision = (known after apply) + latest_ready_revision = (known after apply) + launch_stage = (known after apply) + location = "us-east1" + name = "mpc-recovery-signer-0-dev-572" + observed_generation = (known after apply) + project = (known after apply) + reconciling = (known after apply) + terminal_condition = (known after apply) + traffic_statuses = (known after apply) + uid = (known after apply) + uri = (known after apply) + template { + max_instance_request_concurrency = (known after apply) + service_account = (known after apply) + timeout = (known after apply) + containers { + args = [ + "start-sign", ] + image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:1521aebbc0a2a81c072cb99f427a64ca489cbaa6" + env { + name = "MPC_RECOVERY_WEB_PORT" + value = "3000" } + env { + name = "MPC_RECOVERY_NODE_ID" + value = "0" } + env { + name = "MPC_RECOVERY_GCP_PROJECT_ID" + value = "pagoda-discovery-platform-dev" } + env { + name = "MPC_RECOVERY_ENV" + value = "dev-572" } + env { + name = "MPC_RECOVERY_CIPHER_KEY" + value_source { + secret_key_ref { + secret = "mpc-cipher-0-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_SK_SHARE" + value_source { + secret_key_ref { + secret = "mpc-sk-share-0-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" + value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" } + env { + name = "RUST_LOG" + value = "mpc_recovery=debug" } + ports { + container_port = 3000 + name = (known after apply) } + resources { + cpu_idle = false + limits = { + "cpu" = "2" + "memory" = "2Gi" } } } + scaling { + max_instance_count = 1 + min_instance_count = 1 } + vpc_access { + connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" + egress = "PRIVATE_RANGES_ONLY" } } } # module.signer[0].google_cloud_run_v2_service_iam_member.allow_all will be created + resource "google_cloud_run_v2_service_iam_member" "allow_all" { + etag = (known after apply) + id = (known after apply) + location = "us-east1" + member = "allUsers" + name = "mpc-recovery-signer-0-dev-572" + project = (known after apply) + role = "roles/run.invoker" } # module.signer[1].google_cloud_run_v2_service.signer will be created + resource "google_cloud_run_v2_service" "signer" { + conditions = (known after apply) + etag = (known after apply) + generation = (known after apply) + id = (known after apply) + ingress = "INGRESS_TRAFFIC_ALL" + latest_created_revision = (known after apply) + latest_ready_revision = (known after apply) + launch_stage = (known after apply) + location = "us-east1" + name = "mpc-recovery-signer-1-dev-572" + observed_generation = (known after apply) + project = (known after apply) + reconciling = (known after apply) + terminal_condition = (known after apply) + traffic_statuses = (known after apply) + uid = (known after apply) + uri = (known after apply) + template { + max_instance_request_concurrency = (known after apply) + service_account = (known after apply) + timeout = (known after apply) + containers { + args = [ + "start-sign", ] + image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:1521aebbc0a2a81c072cb99f427a64ca489cbaa6" + env { + name = "MPC_RECOVERY_WEB_PORT" + value = "3000" } + env { + name = "MPC_RECOVERY_NODE_ID" + value = "1" } + env { + name = "MPC_RECOVERY_GCP_PROJECT_ID" + value = "pagoda-discovery-platform-dev" } + env { + name = "MPC_RECOVERY_ENV" + value = "dev-572" } + env { + name = "MPC_RECOVERY_CIPHER_KEY" + value_source { + secret_key_ref { + secret = "mpc-cipher-1-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_SK_SHARE" + value_source { + secret_key_ref { + secret = "mpc-sk-share-1-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" + value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" } + env { + name = "RUST_LOG" + value = "mpc_recovery=debug" } + ports { + container_port = 3000 + name = (known after apply) } + resources { + cpu_idle = false + limits = { + "cpu" = "2" + "memory" = "2Gi" } } } + scaling { + max_instance_count = 1 + min_instance_count = 1 } + vpc_access { + connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" + egress = "PRIVATE_RANGES_ONLY" } } } # module.signer[1].google_cloud_run_v2_service_iam_member.allow_all will be created + resource "google_cloud_run_v2_service_iam_member" "allow_all" { + etag = (known after apply) + id = (known after apply) + location = "us-east1" + member = "allUsers" + name = "mpc-recovery-signer-1-dev-572" + project = (known after apply) + role = "roles/run.invoker" } # module.signer[2].google_cloud_run_v2_service.signer will be created + resource "google_cloud_run_v2_service" "signer" { + conditions = (known after apply) + etag = (known after apply) + generation = (known after apply) + id = (known after apply) + ingress = "INGRESS_TRAFFIC_ALL" + latest_created_revision = (known after apply) + latest_ready_revision = (known after apply) + launch_stage = (known after apply) + location = "us-east1" + name = "mpc-recovery-signer-2-dev-572" + observed_generation = (known after apply) + project = (known after apply) + reconciling = (known after apply) + terminal_condition = (known after apply) + traffic_statuses = (known after apply) + uid = (known after apply) + uri = (known after apply) + template { + max_instance_request_concurrency = (known after apply) + service_account = (known after apply) + timeout = (known after apply) + containers { + args = [ + "start-sign", ] + image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:1521aebbc0a2a81c072cb99f427a64ca489cbaa6" + env { + name = "MPC_RECOVERY_WEB_PORT" + value = "3000" } + env { + name = "MPC_RECOVERY_NODE_ID" + value = "2" } + env { + name = "MPC_RECOVERY_GCP_PROJECT_ID" + value = "pagoda-discovery-platform-dev" } + env { + name = "MPC_RECOVERY_ENV" + value = "dev-572" } + env { + name = "MPC_RECOVERY_CIPHER_KEY" + value_source { + secret_key_ref { + secret = "mpc-cipher-2-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_SK_SHARE" + value_source { + secret_key_ref { + secret = "mpc-sk-share-2-dev" + version = "latest" } } } + env { + name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" + value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" } + env { + name = "RUST_LOG" + value = "mpc_recovery=debug" } + ports { + container_port = 3000 + name = (known after apply) } + resources { + cpu_idle = false + limits = { + "cpu" = "2" + "memory" = "2Gi" } } } + scaling { + max_instance_count = 1 + min_instance_count = 1 } + vpc_access { + connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" + egress = "PRIVATE_RANGES_ONLY" } } } # module.signer[2].google_cloud_run_v2_service_iam_member.allow_all will be created + resource "google_cloud_run_v2_service_iam_member" "allow_all" { + etag = (known after apply) + id = (known after apply) + location = "us-east1" + member = "allUsers" + name = "mpc-recovery-signer-2-dev-572" + project = (known after apply) + role = "roles/run.invoker" } Plan: 19 to add, 0 to change, 0 to destroy. Changes to Outputs: + leader_node = (known after apply) google_service_account.service_account: Creating... google_service_account.service_account: Creation complete after 1s [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.account_creator_secret_access: Creating... google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Creating... google_service_account_iam_binding.serivce-account-iam: Creating... google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Creating... google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Creating... google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Creating... google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Creating... google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Creating... google_project_iam_member.service-account-datastore-user: Creating... google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Creating... google_service_account_iam_binding.serivce-account-iam: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com/roles/iam.serviceAccountUser] google_secret_manager_secret_iam_member.account_creator_secret_access: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] module.signer[1].google_cloud_run_v2_service.signer: Creating... module.signer[2].google_cloud_run_v2_service.signer: Creating... module.signer[0].google_cloud_run_v2_service.signer: Creating... google_project_iam_member.service-account-datastore-user: Creation complete after 8s [id=pagoda-discovery-platform-dev/roles/datastore.user/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] module.signer[1].google_cloud_run_v2_service.signer: Still creating... [10s elapsed] module.signer[2].google_cloud_run_v2_service.signer: Still creating... [10s elapsed] module.signer[0].google_cloud_run_v2_service.signer: Still creating... [10s elapsed] module.signer[1].google_cloud_run_v2_service.signer: Still creating... [20s elapsed] module.signer[2].google_cloud_run_v2_service.signer: Still creating... [20s elapsed] module.signer[0].google_cloud_run_v2_service.signer: Still creating... [20s elapsed] module.signer[1].google_cloud_run_v2_service.signer: Creation complete after 21s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-572] module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Creating... module.signer[2].google_cloud_run_v2_service.signer: Creation complete after 21s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-572] module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Creating... module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-572/roles/run.invoker/allUsers] module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-572/roles/run.invoker/allUsers] module.signer[0].google_cloud_run_v2_service.signer: Still creating... [30s elapsed] module.signer[0].google_cloud_run_v2_service.signer: Creation complete after 31s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-572] module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Creating... module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-572/roles/run.invoker/allUsers] module.leader.google_cloud_run_v2_service.leader: Creating... module.leader.google_cloud_run_v2_service.leader: Still creating... [10s elapsed] module.leader.google_cloud_run_v2_service.leader: Still creating... [20s elapsed] module.leader.google_cloud_run_v2_service.leader: Creation complete after 21s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-572] module.leader.google_cloud_run_v2_service_iam_member.allow_all: Creating... module.leader.google_cloud_run_v2_service_iam_member.allow_all: Creation complete after 4s [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-572/roles/run.invoker/allUsers] Apply complete! Resources: 19 added, 0 changed, 0 destroyed. Outputs: leader_node = "https://mpc-recovery-leader-dev-572-7tk2cmmtcq-ue.a.run.app" ```

Pusher: @volovyks, Action: pull_request, Working Directory: `, Workflow:Terraform Feature Env`

URL: https://mpc-recovery-leader-dev-572-7tk2cmmtcq-ue.a.run.app

github-actions[bot] commented 4 months ago

Terraform Feature Environment Destroy (dev-572)

Terraform Initialization ⚙️success

Terraform Destroy success

Show Destroy Plan ``` data.external.git_checkout: Reading... data.external.git_checkout: Read complete after 0s [id=-] data.google_compute_subnetwork.dev_subnetwork: Reading... data.google_compute_network.dev_network: Reading... data.google_compute_network.prod_network: Reading... google_service_account.service_account: Refreshing state... [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_subnetwork.prod_subnetwork: Reading... google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_service_account_iam_binding.serivce-account-iam: Refreshing state... [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com/roles/iam.serviceAccountUser] google_project_iam_member.service-account-datastore-user: Refreshing state... [id=pagoda-discovery-platform-dev/roles/datastore.user/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_network.dev_network: Read complete after 0s [id=projects/pagoda-shared-infrastructure/global/networks/dev] google_secret_manager_secret_iam_member.account_creator_secret_access: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_network.prod_network: Read complete after 0s [id=projects/pagoda-shared-infrastructure/global/networks/prod] google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_subnetwork.prod_subnetwork: Read complete after 0s [id=projects/pagoda-shared-infrastructure/regions/us-east1/subnetworks/cloudrun-main-prod-us-east1] google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Refreshing state... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] data.google_compute_subnetwork.dev_subnetwork: Read complete after 0s [id=projects/pagoda-shared-infrastructure/regions/us-east1/subnetworks/cloudrun-main-dev-us-east1] module.signer[0].google_cloud_run_v2_service.signer: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-572] module.signer[1].google_cloud_run_v2_service.signer: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-572] module.signer[2].google_cloud_run_v2_service.signer: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-572] module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-572/roles/run.invoker/allUsers] module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-572/roles/run.invoker/allUsers] module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-572/roles/run.invoker/allUsers] module.leader.google_cloud_run_v2_service.leader: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-572] module.leader.google_cloud_run_v2_service_iam_member.allow_all: Refreshing state... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-572/roles/run.invoker/allUsers] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: - destroy Terraform will perform the following actions: # google_project_iam_member.service-account-datastore-user will be destroyed - resource "google_project_iam_member" "service-account-datastore-user" { - etag = "BwYX85Saxcg=" -> null - id = "pagoda-discovery-platform-dev/roles/datastore.user/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/datastore.user" -> null } # google_secret_manager_secret_iam_member.account_creator_secret_access will be destroyed - resource "google_secret_manager_secret_iam_member" "account_creator_secret_access" { - etag = "BwYX85RqLKY=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev" -> null } # google_secret_manager_secret_iam_member.cipher_key_secret_access[0] will be destroyed - resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { - etag = "BwYX85RqMIE=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev" -> null } # google_secret_manager_secret_iam_member.cipher_key_secret_access[1] will be destroyed - resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { - etag = "BwYX85RqJPo=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev" -> null } # google_secret_manager_secret_iam_member.cipher_key_secret_access[2] will be destroyed - resource "google_secret_manager_secret_iam_member" "cipher_key_secret_access" { - etag = "BwYX85RqJLE=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev" -> null } # google_secret_manager_secret_iam_member.fast_auth_partners_secret_access will be destroyed - resource "google_secret_manager_secret_iam_member" "fast_auth_partners_secret_access" { - etag = "BwYX85RqQEQ=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev" -> null } # google_secret_manager_secret_iam_member.secret_share_secret_access[0] will be destroyed - resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { - etag = "BwYX85RoulI=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev" -> null } # google_secret_manager_secret_iam_member.secret_share_secret_access[1] will be destroyed - resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { - etag = "BwYX85RqReo=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev" -> null } # google_secret_manager_secret_iam_member.secret_share_secret_access[2] will be destroyed - resource "google_secret_manager_secret_iam_member" "secret_share_secret_access" { - etag = "BwYX85RqPSw=" -> null - id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/secretmanager.secretAccessor" -> null - secret_id = "projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev" -> null } # google_service_account.service_account will be destroyed - resource "google_service_account" "service_account" { - account_id = "mpc-recovery-dev-572" -> null - disabled = false -> null - display_name = "MPC Recovery dev-572 Account" -> null - email = "mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - id = "projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - member = "serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - name = "projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - project = "pagoda-discovery-platform-dev" -> null - unique_id = "108107911499505890706" -> null } # google_service_account_iam_binding.serivce-account-iam will be destroyed - resource "google_service_account_iam_binding" "serivce-account-iam" { - etag = "BwYWOF8lLyo=" -> null - id = "projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com/roles/iam.serviceAccountUser" -> null - members = [ - "serviceAccount:mpc-recovery@pagoda-discovery-platform-dev.iam.gserviceaccount.com", ] -> null - role = "roles/iam.serviceAccountUser" -> null - service_account_id = "projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null } # module.leader.google_cloud_run_v2_service.leader will be destroyed - resource "google_cloud_run_v2_service" "leader" { - annotations = {} -> null - conditions = [ - { - execution_reason = "" - last_transition_time = "2024-04-16T15:28:01.072369Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "RoutesReady" }, - { - execution_reason = "" - last_transition_time = "2024-04-16T15:27:49.377692Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "ConfigurationsReady" }, ] -> null - etag = "\"CPWx-rAGELi4_nk/cHJvamVjdHMvcGFnb2RhLWRpc2NvdmVyeS1wbGF0Zm9ybS1kZXYvbG9jYXRpb25zL3VzLWVhc3QxL3NlcnZpY2VzL21wYy1yZWNvdmVyeS1sZWFkZXItZGV2LTU3Mg\"" -> null - generation = "1" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-572" -> null - ingress = "INGRESS_TRAFFIC_ALL" -> null - labels = {} -> null - latest_created_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-572/revisions/mpc-recovery-leader-dev-572-00001-5g9" -> null - latest_ready_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-572/revisions/mpc-recovery-leader-dev-572-00001-5g9" -> null - launch_stage = "GA" -> null - location = "us-east1" -> null - name = "mpc-recovery-leader-dev-572" -> null - observed_generation = "1" -> null - project = "pagoda-discovery-platform-dev" -> null - reconciling = false -> null - terminal_condition = [ - { - execution_reason = "" - last_transition_time = "2024-04-16T15:28:01.120192Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "Ready" }, ] -> null - traffic_statuses = [ - { - percent = 100 - revision = "" - tag = "" - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" - uri = "" }, ] -> null - uid = "66ddc393-12fc-478d-8287-84e6766d98ec" -> null - uri = "https://mpc-recovery-leader-dev-572-7tk2cmmtcq-ue.a.run.app" -> null - template { - annotations = {} -> null - labels = {} -> null - max_instance_request_concurrency = 80 -> null - service_account = "mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - session_affinity = false -> null - timeout = "300s" -> null - containers { - args = [ - "start-leader", ] -> null - command = [] -> null - image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:1521aebbc0a2a81c072cb99f427a64ca489cbaa6" -> null - env { - name = "MPC_RECOVERY_WEB_PORT" -> null - value = "3000" -> null } - env { - name = "MPC_RECOVERY_SIGN_NODES" -> null - value = "https://mpc-recovery-signer-0-dev-572-7tk2cmmtcq-ue.a.run.app,https://mpc-recovery-signer-1-dev-572-7tk2cmmtcq-ue.a.run.app,https://mpc-recovery-signer-2-dev-572-7tk2cmmtcq-ue.a.run.app" -> null } - env { - name = "MPC_RECOVERY_NEAR_RPC" -> null - value = "https://rpc.testnet.near.org" -> null } - env { - name = "MPC_RECOVERY_NEAR_ROOT_ACCOUNT" -> null - value = "testnet" -> null } - env { - name = "MPC_RECOVERY_ACCOUNT_CREATOR_ID" -> null - value = "mpc-recovery-dev-creator.testnet" -> null } - env { - name = "MPC_RECOVERY_GCP_PROJECT_ID" -> null - value = "pagoda-discovery-platform-dev" -> null } - env { - name = "MPC_RECOVERY_ENV" -> null - value = "dev-572" -> null } - env { - name = "MPC_RECOVERY_ACCOUNT_CREATOR_SK" -> null - value_source { - secret_key_ref { - secret = "mpc-recovery-account-creator-sk-dev" -> null - version = "latest" -> null } } } - env { - name = "FAST_AUTH_PARTNERS" -> null - value_source { - secret_key_ref { - secret = "mpc-fast-auth-partners-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" -> null - value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" -> null } - env { - name = "MPC_RECOVERY_OTLP_ENDPOINT" -> null - value = "https://otel.dev.api.pagoda.co:443/v1/traces" -> null } - env { - name = "MPC_RECOVERY_OPENTELEMETRY_LEVEL" -> null - value = "debug" -> null } - env { - name = "RUST_LOG" -> null - value = "mpc_recovery=debug" -> null } - ports { - container_port = 3000 -> null - name = "http1" -> null } - resources { - cpu_idle = false -> null - limits = { - "cpu" = "2" - "memory" = "2Gi" } -> null - startup_cpu_boost = false -> null } - startup_probe { - failure_threshold = 1 -> null - initial_delay_seconds = 0 -> null - period_seconds = 240 -> null - timeout_seconds = 240 -> null - tcp_socket { - port = 3000 -> null } } } - scaling { - max_instance_count = 1 -> null - min_instance_count = 1 -> null } - vpc_access { - connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" -> null - egress = "PRIVATE_RANGES_ONLY" -> null } } - traffic { - percent = 100 -> null - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" -> null } } # module.leader.google_cloud_run_v2_service_iam_member.allow_all will be destroyed - resource "google_cloud_run_v2_service_iam_member" "allow_all" { - etag = "BwYWOGKzEoI=" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-572/roles/run.invoker/allUsers" -> null - location = "us-east1" -> null - member = "allUsers" -> null - name = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-572" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/run.invoker" -> null } # module.signer[0].google_cloud_run_v2_service.signer will be destroyed - resource "google_cloud_run_v2_service" "signer" { - annotations = {} -> null - conditions = [ - { - execution_reason = "" - last_transition_time = "2024-04-16T15:27:41.801451Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "RoutesReady" }, - { - execution_reason = "" - last_transition_time = "2024-04-16T15:27:14.655257Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "ConfigurationsReady" }, ] -> null - etag = "\"CNKx-rAGEKiU3akB/cHJvamVjdHMvcGFnb2RhLWRpc2NvdmVyeS1wbGF0Zm9ybS1kZXYvbG9jYXRpb25zL3VzLWVhc3QxL3NlcnZpY2VzL21wYy1yZWNvdmVyeS1zaWduZXItMC1kZXYtNTcy\"" -> null - generation = "1" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-572" -> null - ingress = "INGRESS_TRAFFIC_ALL" -> null - labels = {} -> null - latest_created_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-572/revisions/mpc-recovery-signer-0-dev-572-00001-pct" -> null - latest_ready_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-572/revisions/mpc-recovery-signer-0-dev-572-00001-pct" -> null - launch_stage = "GA" -> null - location = "us-east1" -> null - name = "mpc-recovery-signer-0-dev-572" -> null - observed_generation = "1" -> null - project = "pagoda-discovery-platform-dev" -> null - reconciling = false -> null - terminal_condition = [ - { - execution_reason = "" - last_transition_time = "2024-04-16T15:27:41.874984Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "Ready" }, ] -> null - traffic_statuses = [ - { - percent = 100 - revision = "" - tag = "" - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" - uri = "" }, ] -> null - uid = "bcc3b16d-e931-4334-a312-1ab5cbdd4475" -> null - uri = "https://mpc-recovery-signer-0-dev-572-7tk2cmmtcq-ue.a.run.app" -> null - template { - annotations = {} -> null - labels = {} -> null - max_instance_request_concurrency = 80 -> null - service_account = "mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - session_affinity = false -> null - timeout = "300s" -> null - containers { - args = [ - "start-sign", ] -> null - command = [] -> null - image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:1521aebbc0a2a81c072cb99f427a64ca489cbaa6" -> null - env { - name = "MPC_RECOVERY_WEB_PORT" -> null - value = "3000" -> null } - env { - name = "MPC_RECOVERY_NODE_ID" -> null - value = "0" -> null } - env { - name = "MPC_RECOVERY_GCP_PROJECT_ID" -> null - value = "pagoda-discovery-platform-dev" -> null } - env { - name = "MPC_RECOVERY_ENV" -> null - value = "dev-572" -> null } - env { - name = "MPC_RECOVERY_CIPHER_KEY" -> null - value_source { - secret_key_ref { - secret = "mpc-cipher-0-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_SK_SHARE" -> null - value_source { - secret_key_ref { - secret = "mpc-sk-share-0-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" -> null - value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" -> null } - env { - name = "RUST_LOG" -> null - value = "mpc_recovery=debug" -> null } - ports { - container_port = 3000 -> null - name = "http1" -> null } - resources { - cpu_idle = false -> null - limits = { - "cpu" = "2" - "memory" = "2Gi" } -> null - startup_cpu_boost = false -> null } - startup_probe { - failure_threshold = 1 -> null - initial_delay_seconds = 0 -> null - period_seconds = 240 -> null - timeout_seconds = 240 -> null - tcp_socket { - port = 3000 -> null } } } - scaling { - max_instance_count = 1 -> null - min_instance_count = 1 -> null } - vpc_access { - connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" -> null - egress = "PRIVATE_RANGES_ONLY" -> null } } - traffic { - percent = 100 -> null - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" -> null } } # module.signer[0].google_cloud_run_v2_service_iam_member.allow_all will be destroyed - resource "google_cloud_run_v2_service_iam_member" "allow_all" { - etag = "BwYWOGE6SXw=" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-572/roles/run.invoker/allUsers" -> null - location = "us-east1" -> null - member = "allUsers" -> null - name = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-572" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/run.invoker" -> null } # module.signer[1].google_cloud_run_v2_service.signer will be destroyed - resource "google_cloud_run_v2_service" "signer" { - annotations = {} -> null - conditions = [ - { - execution_reason = "" - last_transition_time = "2024-04-16T15:27:26.939206Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "RoutesReady" }, - { - execution_reason = "" - last_transition_time = "2024-04-16T15:27:14.623495Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "ConfigurationsReady" }, ] -> null - etag = "\"CNKx-rAGEJDg7aoB/cHJvamVjdHMvcGFnb2RhLWRpc2NvdmVyeS1wbGF0Zm9ybS1kZXYvbG9jYXRpb25zL3VzLWVhc3QxL3NlcnZpY2VzL21wYy1yZWNvdmVyeS1zaWduZXItMS1kZXYtNTcy\"" -> null - generation = "1" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-572" -> null - ingress = "INGRESS_TRAFFIC_ALL" -> null - labels = {} -> null - latest_created_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-572/revisions/mpc-recovery-signer-1-dev-572-00001-gg5" -> null - latest_ready_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-572/revisions/mpc-recovery-signer-1-dev-572-00001-gg5" -> null - launch_stage = "GA" -> null - location = "us-east1" -> null - name = "mpc-recovery-signer-1-dev-572" -> null - observed_generation = "1" -> null - project = "pagoda-discovery-platform-dev" -> null - reconciling = false -> null - terminal_condition = [ - { - execution_reason = "" - last_transition_time = "2024-04-16T15:27:26.978644Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "Ready" }, ] -> null - traffic_statuses = [ - { - percent = 100 - revision = "" - tag = "" - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" - uri = "" }, ] -> null - uid = "6e38c218-e8df-4931-a291-36860eca1f2d" -> null - uri = "https://mpc-recovery-signer-1-dev-572-7tk2cmmtcq-ue.a.run.app" -> null - template { - annotations = {} -> null - labels = {} -> null - max_instance_request_concurrency = 80 -> null - service_account = "mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - session_affinity = false -> null - timeout = "300s" -> null - containers { - args = [ - "start-sign", ] -> null - command = [] -> null - image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:1521aebbc0a2a81c072cb99f427a64ca489cbaa6" -> null - env { - name = "MPC_RECOVERY_WEB_PORT" -> null - value = "3000" -> null } - env { - name = "MPC_RECOVERY_NODE_ID" -> null - value = "1" -> null } - env { - name = "MPC_RECOVERY_GCP_PROJECT_ID" -> null - value = "pagoda-discovery-platform-dev" -> null } - env { - name = "MPC_RECOVERY_ENV" -> null - value = "dev-572" -> null } - env { - name = "MPC_RECOVERY_CIPHER_KEY" -> null - value_source { - secret_key_ref { - secret = "mpc-cipher-1-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_SK_SHARE" -> null - value_source { - secret_key_ref { - secret = "mpc-sk-share-1-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" -> null - value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" -> null } - env { - name = "RUST_LOG" -> null - value = "mpc_recovery=debug" -> null } - ports { - container_port = 3000 -> null - name = "http1" -> null } - resources { - cpu_idle = false -> null - limits = { - "cpu" = "2" - "memory" = "2Gi" } -> null - startup_cpu_boost = false -> null } - startup_probe { - failure_threshold = 1 -> null - initial_delay_seconds = 0 -> null - period_seconds = 240 -> null - timeout_seconds = 240 -> null - tcp_socket { - port = 3000 -> null } } } - scaling { - max_instance_count = 1 -> null - min_instance_count = 1 -> null } - vpc_access { - connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" -> null - egress = "PRIVATE_RANGES_ONLY" -> null } } - traffic { - percent = 100 -> null - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" -> null } } # module.signer[1].google_cloud_run_v2_service_iam_member.allow_all will be destroyed - resource "google_cloud_run_v2_service_iam_member" "allow_all" { - etag = "BwYWOGCeeyE=" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-572/roles/run.invoker/allUsers" -> null - location = "us-east1" -> null - member = "allUsers" -> null - name = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-572" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/run.invoker" -> null } # module.signer[2].google_cloud_run_v2_service.signer will be destroyed - resource "google_cloud_run_v2_service" "signer" { - annotations = {} -> null - conditions = [ - { - execution_reason = "" - last_transition_time = "2024-04-16T15:27:26.398039Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "RoutesReady" }, - { - execution_reason = "" - last_transition_time = "2024-04-16T15:27:14.554624Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "ConfigurationsReady" }, ] -> null - etag = "\"CNKx-rAGEJjU_qoB/cHJvamVjdHMvcGFnb2RhLWRpc2NvdmVyeS1wbGF0Zm9ybS1kZXYvbG9jYXRpb25zL3VzLWVhc3QxL3NlcnZpY2VzL21wYy1yZWNvdmVyeS1zaWduZXItMi1kZXYtNTcy\"" -> null - generation = "1" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-572" -> null - ingress = "INGRESS_TRAFFIC_ALL" -> null - labels = {} -> null - latest_created_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-572/revisions/mpc-recovery-signer-2-dev-572-00001-7xm" -> null - latest_ready_revision = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-572/revisions/mpc-recovery-signer-2-dev-572-00001-7xm" -> null - launch_stage = "GA" -> null - location = "us-east1" -> null - name = "mpc-recovery-signer-2-dev-572" -> null - observed_generation = "1" -> null - project = "pagoda-discovery-platform-dev" -> null - reconciling = false -> null - terminal_condition = [ - { - execution_reason = "" - last_transition_time = "2024-04-16T15:27:26.441928Z" - message = "" - reason = "" - revision_reason = "" - severity = "" - state = "CONDITION_SUCCEEDED" - type = "Ready" }, ] -> null - traffic_statuses = [ - { - percent = 100 - revision = "" - tag = "" - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" - uri = "" }, ] -> null - uid = "3ac20e28-3bfa-42d7-a3e7-8dca82a66d53" -> null - uri = "https://mpc-recovery-signer-2-dev-572-7tk2cmmtcq-ue.a.run.app" -> null - template { - annotations = {} -> null - labels = {} -> null - max_instance_request_concurrency = 80 -> null - service_account = "mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com" -> null - session_affinity = false -> null - timeout = "300s" -> null - containers { - args = [ - "start-sign", ] -> null - command = [] -> null - image = "us-east1-docker.pkg.dev/pagoda-discovery-platform-dev/mpc-recovery/mpc-recovery-dev:1521aebbc0a2a81c072cb99f427a64ca489cbaa6" -> null - env { - name = "MPC_RECOVERY_WEB_PORT" -> null - value = "3000" -> null } - env { - name = "MPC_RECOVERY_NODE_ID" -> null - value = "2" -> null } - env { - name = "MPC_RECOVERY_GCP_PROJECT_ID" -> null - value = "pagoda-discovery-platform-dev" -> null } - env { - name = "MPC_RECOVERY_ENV" -> null - value = "dev-572" -> null } - env { - name = "MPC_RECOVERY_CIPHER_KEY" -> null - value_source { - secret_key_ref { - secret = "mpc-cipher-2-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_SK_SHARE" -> null - value_source { - secret_key_ref { - secret = "mpc-sk-share-2-dev" -> null - version = "latest" -> null } } } - env { - name = "MPC_RECOVERY_JWT_SIGNATURE_PK_URL" -> null - value = "https://www.googleapis.com/robot/v1/metadata/x509/securetoken@system.gserviceaccount.com" -> null } - env { - name = "RUST_LOG" -> null - value = "mpc_recovery=debug" -> null } - ports { - container_port = 3000 -> null - name = "http1" -> null } - resources { - cpu_idle = false -> null - limits = { - "cpu" = "2" - "memory" = "2Gi" } -> null - startup_cpu_boost = false -> null } - startup_probe { - failure_threshold = 1 -> null - initial_delay_seconds = 0 -> null - period_seconds = 240 -> null - timeout_seconds = 240 -> null - tcp_socket { - port = 3000 -> null } } } - scaling { - max_instance_count = 1 -> null - min_instance_count = 1 -> null } - vpc_access { - connector = "projects/pagoda-shared-infrastructure/locations/us-east1/connectors/dev-connector1" -> null - egress = "PRIVATE_RANGES_ONLY" -> null } } - traffic { - percent = 100 -> null - type = "TRAFFIC_TARGET_ALLOCATION_TYPE_LATEST" -> null } } # module.signer[2].google_cloud_run_v2_service_iam_member.allow_all will be destroyed - resource "google_cloud_run_v2_service_iam_member" "allow_all" { - etag = "BwYWOGCgFkI=" -> null - id = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-572/roles/run.invoker/allUsers" -> null - location = "us-east1" -> null - member = "allUsers" -> null - name = "projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-572" -> null - project = "pagoda-discovery-platform-dev" -> null - role = "roles/run.invoker" -> null } Plan: 0 to add, 0 to change, 19 to destroy. Changes to Outputs: - leader_node = "https://mpc-recovery-leader-dev-572-7tk2cmmtcq-ue.a.run.app" -> null google_project_iam_member.service-account-datastore-user: Destroying... [id=pagoda-discovery-platform-dev/roles/datastore.user/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_service_account_iam_binding.serivce-account-iam: Destroying... [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com/roles/iam.serviceAccountUser] module.leader.google_cloud_run_v2_service_iam_member.allow_all: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-572/roles/run.invoker/allUsers] google_service_account_iam_binding.serivce-account-iam: Destruction complete after 4s module.leader.google_cloud_run_v2_service_iam_member.allow_all: Destruction complete after 5s module.leader.google_cloud_run_v2_service.leader: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-leader-dev-572] google_project_iam_member.service-account-datastore-user: Destruction complete after 7s module.leader.google_cloud_run_v2_service.leader: Still destroying... [id=projects/pagoda-discovery-platform-dev/...1/services/mpc-recovery-leader-dev-572, 10s elapsed] module.leader.google_cloud_run_v2_service.leader: Destruction complete after 10s google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-fast-auth-partners-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.account_creator_secret_access: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-recovery-account-creator-sk-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-572/roles/run.invoker/allUsers] module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-572/roles/run.invoker/allUsers] module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-572/roles/run.invoker/allUsers] google_secret_manager_secret_iam_member.account_creator_secret_access: Destruction complete after 4s google_secret_manager_secret_iam_member.fast_auth_partners_secret_access: Destruction complete after 4s module.signer[2].google_cloud_run_v2_service_iam_member.allow_all: Destruction complete after 5s module.signer[2].google_cloud_run_v2_service.signer: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-2-dev-572] module.signer[0].google_cloud_run_v2_service_iam_member.allow_all: Destruction complete after 5s module.signer[0].google_cloud_run_v2_service.signer: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-0-dev-572] module.signer[1].google_cloud_run_v2_service_iam_member.allow_all: Destruction complete after 5s module.signer[1].google_cloud_run_v2_service.signer: Destroying... [id=projects/pagoda-discovery-platform-dev/locations/us-east1/services/mpc-recovery-signer-1-dev-572] module.signer[2].google_cloud_run_v2_service.signer: Still destroying... [id=projects/pagoda-discovery-platform-dev/...services/mpc-recovery-signer-2-dev-572, 10s elapsed] module.signer[0].google_cloud_run_v2_service.signer: Still destroying... [id=projects/pagoda-discovery-platform-dev/...services/mpc-recovery-signer-0-dev-572, 10s elapsed] module.signer[1].google_cloud_run_v2_service.signer: Still destroying... [id=projects/pagoda-discovery-platform-dev/...services/mpc-recovery-signer-1-dev-572, 10s elapsed] module.signer[2].google_cloud_run_v2_service.signer: Destruction complete after 10s module.signer[1].google_cloud_run_v2_service.signer: Destruction complete after 10s module.signer[0].google_cloud_run_v2_service.signer: Destruction complete after 10s google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-2-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-0-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-sk-share-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Destroying... [id=projects/pagoda-discovery-platform-dev/secrets/mpc-cipher-1-dev/roles/secretmanager.secretAccessor/serviceAccount:mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_secret_manager_secret_iam_member.secret_share_secret_access[2]: Destruction complete after 4s google_secret_manager_secret_iam_member.secret_share_secret_access[1]: Destruction complete after 4s google_secret_manager_secret_iam_member.cipher_key_secret_access[1]: Destruction complete after 4s google_secret_manager_secret_iam_member.secret_share_secret_access[0]: Destruction complete after 4s google_secret_manager_secret_iam_member.cipher_key_secret_access[2]: Destruction complete after 4s google_secret_manager_secret_iam_member.cipher_key_secret_access[0]: Destruction complete after 4s google_service_account.service_account: Destroying... [id=projects/pagoda-discovery-platform-dev/serviceAccounts/mpc-recovery-dev-572@pagoda-discovery-platform-dev.iam.gserviceaccount.com] google_service_account.service_account: Destruction complete after 0s Destroy complete! Resources: 19 destroyed. ```

Pusher: @ChaoticTempest, Action: pull_request, Working Directory: `, Workflow:Terraform Feature Env (Destroy)`