Closed naruse666 closed 4 weeks ago
CI link
This plan contains resource delete operation. Please check the plan result very carefully!
Plan: 0 to add, 0 to change, 3 to destroy.
Apply complete! Resources: 0 added, 0 changed, 3 destroyed.
Plan Result (terraform/shared)
CI link
:warning: Resource Deletion will happen :warning:
This plan contains resource delete operation. Please check the plan result very carefully!
Change Result (Click me)
```hcl # aws_iam_policy.ecr will be destroyed # (because aws_iam_policy.ecr is not in configuration) - resource "aws_iam_policy" "ecr" { - arn = "arn:aws:iam::451153100141:policy/All_In_Backend_API_CI_Policy" -> null - attachment_count = 1 -> null - id = "arn:aws:iam::451153100141:policy/All_In_Backend_API_CI_Policy" -> null - name = "All_In_Backend_API_CI_Policy" -> null - path = "/" -> null - policy = jsonencode( { - Statement = [ - { - Action = "ecr:GetAuthorizationToken" - Effect = "Allow" - Resource = "*" }, - { - Action = [ - "ssm:PutParameter", - "ssm:GetParameter", - "ssm:DescribeParameters", - "ecr:UploadLayerPart", - "ecr:PutImage", - "ecr:InitiateLayerUpload", - "ecr:CompleteLayerUpload", - "ecr:BatchCheckLayerAvailability", - "apprunner:StartDeployment", ] - Effect = "Allow" - Resource = [ - "arn:aws:ssm:ap-northeast-1:451153100141:parameter/slack_refresh_token", - "arn:aws:ssm:ap-northeast-1:451153100141:parameter/slack_bot_token", - "arn:aws:ecr:ap-northeast-1:451153100141:repository/all_in_api_slack", - "arn:aws:ecr:ap-northeast-1:451153100141:repository/all_in_api_discord", - "arn:aws:ecr:ap-northeast-1:451153100141:repository/all_in_api", - "arn:aws:apprunner:ap-northeast-1:451153100141:service/all_in_slack/a1d29e5b95024ae9bd54357249909875", ] }, ] - Version = "2012-10-17" } ) -> null - policy_id = "ANPAWSCWR7VWXBFZIG6NG" -> null - tags = {} -> null - tags_all = {} -> null } # aws_iam_role.ecr will be destroyed # (because aws_iam_role.ecr is not in configuration) - resource "aws_iam_role" "ecr" { - arn = "arn:aws:iam::451153100141:role/All_In_Backend_API_CI" -> null - assume_role_policy = jsonencode( { - Statement = [ - { - Action = "sts:AssumeRoleWithWebIdentity" - Condition = { - StringEquals = { - "token.actions.githubusercontent.com:aud" = "sts.amazonaws.com" } - StringLike = { - "token.actions.githubusercontent.com:sub" = "repo:team-all-in/all-in:*" } } - Effect = "Allow" - Principal = { - Federated = "arn:aws:iam::451153100141:oidc-provider/token.actions.githubusercontent.com" } }, ] - Version = "2012-10-17" } ) -> null - create_date = "2024-09-14T05:55:44Z" -> null - force_detach_policies = false -> null - id = "All_In_Backend_API_CI" -> null - managed_policy_arns = [ - "arn:aws:iam::451153100141:policy/All_In_Backend_API_CI_Policy", ] -> null - max_session_duration = 3600 -> null - name = "All_In_Backend_API_CI" -> null - path = "/" -> null - tags = {} -> null - tags_all = {} -> null - unique_id = "AROAWSCWR7VWUVETCSZ7P" -> null } # aws_iam_role_policy_attachment.ecr will be destroyed # (because aws_iam_role_policy_attachment.ecr is not in configuration) - resource "aws_iam_role_policy_attachment" "ecr" { - id = "All_In_Backend_API_CI-20240914055544635300000001" -> null - policy_arn = "arn:aws:iam::451153100141:policy/All_In_Backend_API_CI_Policy" -> null - role = "All_In_Backend_API_CI" -> null } Plan: 0 to add, 0 to change, 3 to destroy. ```