networkthor / cicd-lesson1

1 stars 0 forks source link

Manual approval required for workflow run 10098107644: deploying network module to staging #4

Closed github-actions[bot] closed 3 months ago

github-actions[bot] commented 3 months ago

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
  ~ update in-place

Terraform will perform the following actions:

  # module.network.aws_nat_gateway.nat_gw2 will be created
  + resource "aws_nat_gateway" "nat_gw2" {
      + allocation_id                      = "eipalloc-0be22ad45d6abe742"
      + association_id                     = (known after apply)
      + connectivity_type                  = "public"
      + id                                 = (known after apply)
      + network_interface_id               = (known after apply)
      + private_ip                         = (known after apply)
      + public_ip                          = (known after apply)
      + secondary_private_ip_address_count = (known after apply)
      + secondary_private_ip_addresses     = (known after apply)
      + subnet_id                          = (known after apply)
      + tags                               = {
          + "Environment" = "staging"
          + "Git_branch"  = "main"
          + "Git_repo"    = "terraform-resources"
          + "Name"        = "staging-nat-gw2"
          + "Squad"       = "DevOps"
          + "Terraform"   = "true"
        }
      + tags_all                           = {
          + "Environment" = "staging"
          + "Git_branch"  = "main"
          + "Git_repo"    = "terraform-resources"
          + "Name"        = "staging-nat-gw2"
          + "Squad"       = "DevOps"
          + "Terraform"   = "true"
        }
    }

  # module.network.aws_route_table.private_route_table will be updated in-place
  ~ resource "aws_route_table" "private_route_table" {
        id               = "rtb-050c6b17a03e5b963"
      ~ route            = [
          - {
              - carrier_gateway_id         = ""
              - cidr_block                 = "0.0.0.0/0"
              - core_network_arn           = ""
              - destination_prefix_list_id = ""
              - egress_only_gateway_id     = ""
              - gateway_id                 = ""
              - ipv6_cidr_block            = ""
              - local_gateway_id           = ""
              - nat_gateway_id             = "nat-0cb3da366f63689a2"
              - network_interface_id       = ""
              - transit_gateway_id         = ""
              - vpc_endpoint_id            = ""
              - vpc_peering_connection_id  = ""
            },
          + {
              + carrier_gateway_id         = ""
              + cidr_block                 = "0.0.0.0/0"
              + core_network_arn           = ""
              + destination_prefix_list_id = ""
              + egress_only_gateway_id     = ""
              + gateway_id                 = "nat-0cb3da366f63689a2"
              + ipv6_cidr_block            = ""
              + local_gateway_id           = ""
              + nat_gateway_id             = ""
              + network_interface_id       = ""
              + transit_gateway_id         = ""
              + vpc_endpoint_id            = ""
              + vpc_peering_connection_id  = ""
            },
        ]
        tags             = {
            "Environment" = "staging"
            "Git_branch"  = "main"
            "Git_repo"    = "terraform-resources"
            "Name"        = "staging-private-rt"
            "Squad"       = "DevOps"
            "Terraform"   = "true"
        }
        # (5 unchanged attributes hidden)
    }

  # module.network.aws_route_table_association.rt_ass_priv[0] will be created
  + resource "aws_route_table_association" "rt_ass_priv" {
      + id             = (known after apply)
      + route_table_id = "rtb-050c6b17a03e5b963"
      + subnet_id      = "subnet-032d207d76b6f6713"
    }

  # module.network.aws_route_table_association.rt_ass_priv[1] will be created
  + resource "aws_route_table_association" "rt_ass_priv" {
      + id             = (known after apply)
      + route_table_id = "rtb-050c6b17a03e5b963"
      + subnet_id      = (known after apply)
    }

  # module.network.aws_route_table_association.rt_ass_pub[0] will be created
  + resource "aws_route_table_association" "rt_ass_pub" {
      + id             = (known after apply)
      + route_table_id = "rtb-0da85063319d398d4"
      + subnet_id      = "subnet-0fc04399430bed56f"
    }

  # module.network.aws_route_table_association.rt_ass_pub[1] will be created
  + resource "aws_route_table_association" "rt_ass_pub" {
      + id             = (known after apply)
      + route_table_id = "rtb-0da85063319d398d4"
      + subnet_id      = (known after apply)
    }

  # module.network.aws_subnet.private_subnet[1] will be created
  + resource "aws_subnet" "private_subnet" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "eu-west-1b"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "172.18.35.0/24"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = false
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = (known after apply)
      + tags                                           = {
          + "Environment" = "staging"
          + "Git_branch"  = "main"
          + "Git_repo"    = "terraform-resources"
          + "Name"        = "staging-private_subnet-1"
          + "Squad"       = "DevOps"
          + "Terraform"   = "true"
        }
      + tags_all                                       = {
          + "Environment" = "staging"
          + "Git_branch"  = "main"
          + "Git_repo"    = "terraform-resources"
          + "Name"        = "staging-private_subnet-1"
          + "Squad"       = "DevOps"
          + "Terraform"   = "true"
        }
      + vpc_id                                         = "vpc-0cf85985e41958bbf"
    }

  # module.network.aws_subnet.public_subnet[1] will be created
  + resource "aws_subnet" "public_subnet" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "eu-west-1b"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "172.18.34.0/24"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = false
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = (known after apply)
      + tags                                           = {
          + "Environment" = "staging"
          + "Git_branch"  = "main"
          + "Git_repo"    = "terraform-resources"
          + "Name"        = "staging-public_subnet-1"
          + "Squad"       = "DevOps"
          + "Terraform"   = "true"
        }
      + tags_all                                       = {
          + "Environment" = "staging"
          + "Git_branch"  = "main"
          + "Git_repo"    = "terraform-resources"
          + "Name"        = "staging-public_subnet-1"
          + "Squad"       = "DevOps"
          + "Terraform"   = "true"
        }
      + vpc_id                                         = "vpc-0cf85985e41958bbf"
    }

Plan: 7 to add, 1 to change, 0 to destroy.

Workflow is pending manual review. URL: https://github.com/networkthor/cicd-lesson1/actions/runs/10098107644

Required approvers: [networkthor]

Respond "approved", "approve", "lgtm", "yes" to continue workflow or "denied", "deny", "no" to cancel.

networkthor commented 3 months ago

approved

github-actions[bot] commented 3 months ago

All approvers have approved, continuing workflow and closing this issue.