spencerr / tf-poc

0 stars 0 forks source link

Manual approval required for workflow run 6329133685: Terraform apply -> company-product (sandbox) #34

Closed github-actions[bot] closed 1 year ago

github-actions[bot] commented 1 year ago

Terraform Format and Style πŸ–Œfailure

Terraform Initialization βš™οΈsuccess

Terraform Validation πŸ€–success

Validation Output ``` Success! The configuration is valid.  ```

Terraform Plan πŸ“–success

Show Plan ```diff module.cluster.module.aks_cluster.azurerm_resource_group.aks: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-cluster] module.cluster.module.aks_cluster.azurerm_kubernetes_cluster.aks: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-cluster/providers/Microsoft.ContainerService/managedClusters/aks-sandbox-tfpoc] module.feature.module.feature.azurerm_resource_group.feature: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature] module.feature.module.feature.module.feature_key_vault.data.azurerm_client_config.current: Reading... module.feature.module.feature.data.azurerm_key_vault_secret.test_secret: Reading... module.feature.module.feature.module.feature_key_vault.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1hNmFlYmEzMS03ODllLTRkZWMtYWEzMi01YmEyMDcyZTMwOWY7b2JqZWN0SWQ9YzU4YzRmNTMtNmViZS00NGQzLTgyMWItZDM3ZGVhYmI0YTFhO3N1YnNjcmlwdGlvbklkPThmMDlmN2Y0LTdiMjUtNGQ2Zi04OGE1LTg0N2IxNzUxYzRjZTt0ZW5hbnRJZD00ODc4ZTBjMS03MDE3LTQ2OGItODVmMy0zNjg2ZTEzMjZlNTM=] module.feature.module.feature.module.feature_key_vault.azurerm_key_vault.vault: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature/providers/Microsoft.KeyVault/vaults/kv-sand-tfpoc-feature] module.feature.module.feature.kubernetes_namespace.secret_namespace: Refreshing state... [id=sandbox] module.feature.module.feature.data.azurerm_key_vault_secret.test_secret: Read complete after 0s [id=https://kv-sand-tfpoc-bootstrap.vault.azure.net/secrets/Test--Secret/faacf97fe9084e87a046b9c769a101e6] Note: Objects have changed outside of Terraform Terraform detected the following changes made outside of Terraform since the last "terraform apply" which may have affected this plan: # module.feature.module.feature.azurerm_resource_group.feature has changed ~ resource "azurerm_resource_group" "feature" { id = "/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature" name = "rg-sandbox-tfpoc-feature" + tags = {} # (1 unchanged attribute hidden) } # module.feature.module.feature.module.feature_key_vault.azurerm_key_vault.vault has changed ~ resource "azurerm_key_vault" "vault" { id = "/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature/providers/Microsoft.KeyVault/vaults/kv-sand-tfpoc-feature" name = "kv-sand-tfpoc-feature" + tags = {} # (13 unchanged attributes hidden) # (1 unchanged block hidden) } Unless you have made equivalent changes to your configuration, or ignored the relevant attributes using ignore_changes, the following plan may include actions to undo or respond to these changes. ───────────────────────────────────────────────────────────────────────────── Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # module.feature.module.feature.azurerm_redis_cache.feature[0] will be created + resource "azurerm_redis_cache" "feature" { + capacity = 2 + enable_non_ssl_port = false + family = "C" + hostname = (known after apply) + id = (known after apply) + location = "eastus" + minimum_tls_version = "1.2" + name = "rc-sandbox-tfpoc-feature" + port = (known after apply) + primary_access_key = (sensitive value) + primary_connection_string = (sensitive value) + private_static_ip_address = (known after apply) + public_network_access_enabled = true + redis_version = (known after apply) + replicas_per_master = (known after apply) + replicas_per_primary = (known after apply) + resource_group_name = "rg-sandbox-tfpoc-feature" + secondary_access_key = (sensitive value) + secondary_connection_string = (sensitive value) + sku_name = "Standard" + ssl_port = (known after apply) + redis_configuration { + enable_authentication = true + maxclients = (known after apply) + maxfragmentationmemory_reserved = (known after apply) + maxmemory_delta = (known after apply) + maxmemory_policy = "volatile-lru" + maxmemory_reserved = (known after apply) } } # module.feature.module.feature.kubernetes_secret.cosmosdb-secret will be created + resource "kubernetes_secret" "cosmosdb-secret" { + data = (sensitive value) + id = (known after apply) + type = "Opaque" + wait_for_service_account_token = true + metadata { + generation = (known after apply) + name = "feature-secrets" + namespace = "sandbox" + resource_version = (known after apply) + uid = (known after apply) } } Plan: 2 to add, 0 to change, 0 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: tf.plan To perform exactly these actions, run the following command to apply: terraform apply "tf.plan" ```

Pusher: @spencerr Action: workflow_dispatch Working Directory: /home/runner/work/tf-poc/tf-poc/company-product/environments/sandbox Workflow: Company:Product -> Terraform

Workflow is pending manual review. URL: https://github.com/spencerr/tf-poc/actions/runs/6329133685

Required approvers: [spencerr]

Respond "approved", "approve", "lgtm", "yes" to continue workflow or "denied", "deny", "no" to cancel.

spencerr commented 1 year ago

yes

github-actions[bot] commented 1 year ago

All approvers have approved, continuing workflow and closing this issue.