Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GHA test2 #2

Merged
merged 66 commits into from
Dec 15, 2024
Merged

GHA test2 #2

merged 66 commits into from
Dec 15, 2024

Conversation

Fumi-Mura
Copy link
Owner

No description provided.

Copy link

github-actions bot commented Nov 3, 2024

Terraform fmt 🖌failure

Show fmt
terraform/aws/environments/mng/oidc/main.tf

Copy link

github-actions bot commented Nov 3, 2024

Terraform plan 📖success

Show plan
module.oidc_provider.aws_iam_openid_connect_provider.this: Refreshing state... [id=arn:aws:iam::313744126666:oidc-provider/token.actions.githubusercontent.com]
module.oidc_iam_policy.data.aws_iam_policy_document.this: Read complete after 0s [id=1789900679]
module.oidc_iam_policy.aws_iam_policy.this: Refreshing state... [id=arn:aws:iam::313744126666:policy/mng-fumis-portfolio-oidc-iam-policy]
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Reading...
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Read complete after 0s [id=3401382464]
module.oidc_iam_role.aws_iam_role.this: Refreshing state... [id=mng-fumis-portfolio-oidc-iam-role]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # module.s3_bucket_test.aws_s3_bucket.this will be created
  + resource "aws_s3_bucket" "this" {
      + acceleration_status         = (known after apply)
      + acl                         = (known after apply)
      + arn                         = (known after apply)
      + bucket                      = "mng-fumis-portfolio-test-s3-bucket"
      + bucket_domain_name          = (known after apply)
      + bucket_prefix               = (known after apply)
      + bucket_regional_domain_name = (known after apply)
      + force_destroy               = false
      + hosted_zone_id              = (known after apply)
      + id                          = (known after apply)
      + object_lock_enabled         = (known after apply)
      + policy                      = (known after apply)
      + region                      = (known after apply)
      + request_payer               = (known after apply)
      + tags                        = {
          + "Name" = "mng-fumis-portfolio-test-s3-bucket"
        }
      + tags_all                    = {
          + "Environment"        = "mng"
          + "ManagedByTerraform" = "true"
          + "Name"               = "mng-fumis-portfolio-test-s3-bucket"
          + "ServiceName"        = "fumis-portfolio"
        }
      + website_domain              = (known after apply)
      + website_endpoint            = (known after apply)

      + cors_rule (known after apply)

      + grant (known after apply)

      + lifecycle_rule (known after apply)

      + logging (known after apply)

      + object_lock_configuration (known after apply)

      + replication_configuration (known after apply)

      + server_side_encryption_configuration (known after apply)

      + versioning (known after apply)

      + website (known after apply)
    }

  # module.s3_bucket_test.aws_s3_bucket_public_access_block.this will be created
  + resource "aws_s3_bucket_public_access_block" "this" {
      + block_public_acls       = true
      + block_public_policy     = true
      + bucket                  = (known after apply)
      + id                      = (known after apply)
      + ignore_public_acls      = true
      + restrict_public_buckets = true
    }

  # module.s3_bucket_test.aws_s3_bucket_server_side_encryption_configuration.this will be created
  + resource "aws_s3_bucket_server_side_encryption_configuration" "this" {
      + bucket = "mng-fumis-portfolio-test-s3-bucket"
      + id     = (known after apply)

      + rule {
          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

  # module.s3_bucket_test.aws_s3_bucket_versioning.this will be created
  + resource "aws_s3_bucket_versioning" "this" {
      + bucket = (known after apply)
      + id     = (known after apply)

      + versioning_configuration {
          + mfa_delete = (known after apply)
          + status     = "Enabled"
        }
    }

Plan: 4 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Copy link

github-actions bot commented Nov 3, 2024

Terraform fmt 🖌failure

Show fmt
terraform/aws/environments/mng/oidc/locals.tf
terraform/aws/environments/mng/oidc/main.tf

Copy link

github-actions bot commented Nov 3, 2024

Terraform plan 📖success

Show plan
module.oidc_provider.aws_iam_openid_connect_provider.this: Refreshing state... [id=arn:aws:iam::313744126666:oidc-provider/token.actions.githubusercontent.com]
module.oidc_iam_policy.data.aws_iam_policy_document.this: Read complete after 0s [id=1789900679]
module.oidc_iam_policy.aws_iam_policy.this: Refreshing state... [id=arn:aws:iam::313744126666:policy/mng-fumis-portfolio-oidc-iam-policy]
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Reading...
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Read complete after 0s [id=3401382464]
module.oidc_iam_role.aws_iam_role.this: Refreshing state... [id=mng-fumis-portfolio-oidc-iam-role]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # module.s3_bucket_test.aws_s3_bucket.this will be created
  + resource "aws_s3_bucket" "this" {
      + acceleration_status         = (known after apply)
      + acl                         = (known after apply)
      + arn                         = (known after apply)
      + bucket                      = "mng-fumis-portfolio-test-s3-bucket"
      + bucket_domain_name          = (known after apply)
      + bucket_prefix               = (known after apply)
      + bucket_regional_domain_name = (known after apply)
      + force_destroy               = false
      + hosted_zone_id              = (known after apply)
      + id                          = (known after apply)
      + object_lock_enabled         = (known after apply)
      + policy                      = (known after apply)
      + region                      = (known after apply)
      + request_payer               = (known after apply)
      + tags                        = {
          + "Name" = "mng-fumis-portfolio-test-s3-bucket"
        }
      + tags_all                    = {
          + "Environment"        = "mng"
          + "ManagedByTerraform" = "true"
          + "Name"               = "mng-fumis-portfolio-test-s3-bucket"
          + "ServiceName"        = "fumis-portfolio"
        }
      + website_domain              = (known after apply)
      + website_endpoint            = (known after apply)

      + cors_rule (known after apply)

      + grant (known after apply)

      + lifecycle_rule (known after apply)

      + logging (known after apply)

      + object_lock_configuration (known after apply)

      + replication_configuration (known after apply)

      + server_side_encryption_configuration (known after apply)

      + versioning (known after apply)

      + website (known after apply)
    }

  # module.s3_bucket_test.aws_s3_bucket_public_access_block.this will be created
  + resource "aws_s3_bucket_public_access_block" "this" {
      + block_public_acls       = true
      + block_public_policy     = true
      + bucket                  = (known after apply)
      + id                      = (known after apply)
      + ignore_public_acls      = true
      + restrict_public_buckets = true
    }

  # module.s3_bucket_test.aws_s3_bucket_server_side_encryption_configuration.this will be created
  + resource "aws_s3_bucket_server_side_encryption_configuration" "this" {
      + bucket = "mng-fumis-portfolio-test-s3-bucket"
      + id     = (known after apply)

      + rule {
          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

  # module.s3_bucket_test.aws_s3_bucket_versioning.this will be created
  + resource "aws_s3_bucket_versioning" "this" {
      + bucket = (known after apply)
      + id     = (known after apply)

      + versioning_configuration {
          + mfa_delete = (known after apply)
          + status     = "Enabled"
        }
    }

Plan: 4 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Copy link

github-actions bot commented Nov 3, 2024

Terraform fmt 🖌failure

Show fmt
terraform/aws/environments/mng/oidc/locals.tf
terraform/aws/environments/mng/oidc/main.tf

Copy link

github-actions bot commented Nov 3, 2024

Terraform plan 📖success

Show plan
�[0m�[1mmodule.oidc_provider.aws_iam_openid_connect_provider.this: Refreshing state... [id=arn:aws:iam::313744126666:oidc-provider/token.actions.githubusercontent.com]�[0m
�[0m�[1mmodule.oidc_iam_policy.data.aws_iam_policy_document.this: Read complete after 0s [id=1789900679]�[0m
�[0m�[1mmodule.oidc_iam_policy.aws_iam_policy.this: Refreshing state... [id=arn:aws:iam::313744126666:policy/mng-fumis-portfolio-oidc-iam-policy]�[0m
�[0m�[1mmodule.oidc_iam_role.data.aws_iam_policy_document.assume_role: Reading...�[0m�[0m
�[0m�[1mmodule.oidc_iam_role.data.aws_iam_policy_document.assume_role: Read complete after 0s [id=3401382464]�[0m
�[0m�[1mmodule.oidc_iam_role.aws_iam_role.this: Refreshing state... [id=mng-fumis-portfolio-oidc-iam-role]�[0m

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  �[32m+�[0m create�[0m

Terraform will perform the following actions:

�[1m  # module.s3_bucket_test.aws_s3_bucket.this�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_s3_bucket" "this" {
      �[32m+�[0m�[0m acceleration_status         = (known after apply)
      �[32m+�[0m�[0m acl                         = (known after apply)
      �[32m+�[0m�[0m arn                         = (known after apply)
      �[32m+�[0m�[0m bucket                      = "mng-fumis-portfolio-test-s3-bucket"
      �[32m+�[0m�[0m bucket_domain_name          = (known after apply)
      �[32m+�[0m�[0m bucket_prefix               = (known after apply)
      �[32m+�[0m�[0m bucket_regional_domain_name = (known after apply)
      �[32m+�[0m�[0m force_destroy               = false
      �[32m+�[0m�[0m hosted_zone_id              = (known after apply)
      �[32m+�[0m�[0m id                          = (known after apply)
      �[32m+�[0m�[0m object_lock_enabled         = (known after apply)
      �[32m+�[0m�[0m policy                      = (known after apply)
      �[32m+�[0m�[0m region                      = (known after apply)
      �[32m+�[0m�[0m request_payer               = (known after apply)
      �[32m+�[0m�[0m tags                        = {
          �[32m+�[0m�[0m "Name" = "mng-fumis-portfolio-test-s3-bucket"
        }
      �[32m+�[0m�[0m tags_all                    = {
          �[32m+�[0m�[0m "Environment"        = "mng"
          �[32m+�[0m�[0m "ManagedByTerraform" = "true"
          �[32m+�[0m�[0m "Name"               = "mng-fumis-portfolio-test-s3-bucket"
          �[32m+�[0m�[0m "ServiceName"        = "fumis-portfolio"
        }
      �[32m+�[0m�[0m website_domain              = (known after apply)
      �[32m+�[0m�[0m website_endpoint            = (known after apply)

      �[32m+�[0m�[0m cors_rule (known after apply)

      �[32m+�[0m�[0m grant (known after apply)

      �[32m+�[0m�[0m lifecycle_rule (known after apply)

      �[32m+�[0m�[0m logging (known after apply)

      �[32m+�[0m�[0m object_lock_configuration (known after apply)

      �[32m+�[0m�[0m replication_configuration (known after apply)

      �[32m+�[0m�[0m server_side_encryption_configuration (known after apply)

      �[32m+�[0m�[0m versioning (known after apply)

      �[32m+�[0m�[0m website (known after apply)
    }

�[1m  # module.s3_bucket_test.aws_s3_bucket_public_access_block.this�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_s3_bucket_public_access_block" "this" {
      �[32m+�[0m�[0m block_public_acls       = true
      �[32m+�[0m�[0m block_public_policy     = true
      �[32m+�[0m�[0m bucket                  = (known after apply)
      �[32m+�[0m�[0m id                      = (known after apply)
      �[32m+�[0m�[0m ignore_public_acls      = true
      �[32m+�[0m�[0m restrict_public_buckets = true
    }

�[1m  # module.s3_bucket_test.aws_s3_bucket_server_side_encryption_configuration.this�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_s3_bucket_server_side_encryption_configuration" "this" {
      �[32m+�[0m�[0m bucket = "mng-fumis-portfolio-test-s3-bucket"
      �[32m+�[0m�[0m id     = (known after apply)

      �[32m+�[0m�[0m rule {
          �[32m+�[0m�[0m apply_server_side_encryption_by_default {
              �[32m+�[0m�[0m sse_algorithm     = "AES256"
                �[90m# (1 unchanged attribute hidden)�[0m�[0m
            }
        }
    }

�[1m  # module.s3_bucket_test.aws_s3_bucket_versioning.this�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_s3_bucket_versioning" "this" {
      �[32m+�[0m�[0m bucket = (known after apply)
      �[32m+�[0m�[0m id     = (known after apply)

      �[32m+�[0m�[0m versioning_configuration {
          �[32m+�[0m�[0m mfa_delete = (known after apply)
          �[32m+�[0m�[0m status     = "Enabled"
        }
    }

�[1mPlan:�[0m 4 to add, 0 to change, 0 to destroy.
�[0m�[90m
─────────────────────────────────────────────────────────────────────────────�[0m

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Copy link

github-actions bot commented Nov 3, 2024

Terraform fmt 🖌failure

Show fmt
terraform/aws/environments/mng/oidc/locals.tf
terraform/aws/environments/mng/oidc/main.tf

Copy link

github-actions bot commented Nov 3, 2024

Terraform plan 📖success

Show plan
module.oidc_provider.aws_iam_openid_connect_provider.this: Refreshing state... [id=arn:aws:iam::313744126666:oidc-provider/token.actions.githubusercontent.com]
module.oidc_iam_policy.data.aws_iam_policy_document.this: Read complete after 0s [id=1789900679]
module.oidc_iam_policy.aws_iam_policy.this: Refreshing state... [id=arn:aws:iam::313744126666:policy/mng-fumis-portfolio-oidc-iam-policy]
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Reading...
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Read complete after 0s [id=3401382464]
module.oidc_iam_role.aws_iam_role.this: Refreshing state... [id=mng-fumis-portfolio-oidc-iam-role]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # module.s3_bucket_test.aws_s3_bucket.this will be created
  + resource "aws_s3_bucket" "this" {
      + acceleration_status         = (known after apply)
      + acl                         = (known after apply)
      + arn                         = (known after apply)
      + bucket                      = "mng-fumis-portfolio-test-s3-bucket"
      + bucket_domain_name          = (known after apply)
      + bucket_prefix               = (known after apply)
      + bucket_regional_domain_name = (known after apply)
      + force_destroy               = false
      + hosted_zone_id              = (known after apply)
      + id                          = (known after apply)
      + object_lock_enabled         = (known after apply)
      + policy                      = (known after apply)
      + region                      = (known after apply)
      + request_payer               = (known after apply)
      + tags                        = {
          + "Name" = "mng-fumis-portfolio-test-s3-bucket"
        }
      + tags_all                    = {
          + "Environment"        = "mng"
          + "ManagedByTerraform" = "true"
          + "Name"               = "mng-fumis-portfolio-test-s3-bucket"
          + "ServiceName"        = "fumis-portfolio"
        }
      + website_domain              = (known after apply)
      + website_endpoint            = (known after apply)

      + cors_rule (known after apply)

      + grant (known after apply)

      + lifecycle_rule (known after apply)

      + logging (known after apply)

      + object_lock_configuration (known after apply)

      + replication_configuration (known after apply)

      + server_side_encryption_configuration (known after apply)

      + versioning (known after apply)

      + website (known after apply)
    }

  # module.s3_bucket_test.aws_s3_bucket_public_access_block.this will be created
  + resource "aws_s3_bucket_public_access_block" "this" {
      + block_public_acls       = true
      + block_public_policy     = true
      + bucket                  = (known after apply)
      + id                      = (known after apply)
      + ignore_public_acls      = true
      + restrict_public_buckets = true
    }

  # module.s3_bucket_test.aws_s3_bucket_server_side_encryption_configuration.this will be created
  + resource "aws_s3_bucket_server_side_encryption_configuration" "this" {
      + bucket = "mng-fumis-portfolio-test-s3-bucket"
      + id     = (known after apply)

      + rule {
          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

  # module.s3_bucket_test.aws_s3_bucket_versioning.this will be created
  + resource "aws_s3_bucket_versioning" "this" {
      + bucket = (known after apply)
      + id     = (known after apply)

      + versioning_configuration {
          + mfa_delete = (known after apply)
          + status     = "Enabled"
        }
    }

Plan: 4 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Copy link

github-actions bot commented Nov 3, 2024

Terraform tflint 📖failure

Show tflint
</details>

Copy link

github-actions bot commented Nov 3, 2024

Terraform fmt 🖌failure

Show fmt
terraform/aws/environments/mng/oidc/locals.tf
terraform/aws/environments/mng/oidc/main.tf

Copy link

github-actions bot commented Nov 3, 2024

Terraform plan 📖success

Show plan
module.oidc_provider.aws_iam_openid_connect_provider.this: Refreshing state... [id=arn:aws:iam::313744126666:oidc-provider/token.actions.githubusercontent.com]
module.oidc_iam_policy.data.aws_iam_policy_document.this: Read complete after 0s [id=1789900679]
module.oidc_iam_policy.aws_iam_policy.this: Refreshing state... [id=arn:aws:iam::313744126666:policy/mng-fumis-portfolio-oidc-iam-policy]
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Reading...
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Read complete after 0s [id=3401382464]
module.oidc_iam_role.aws_iam_role.this: Refreshing state... [id=mng-fumis-portfolio-oidc-iam-role]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # module.s3_bucket_test.aws_s3_bucket.this will be created
  + resource "aws_s3_bucket" "this" {
      + acceleration_status         = (known after apply)
      + acl                         = (known after apply)
      + arn                         = (known after apply)
      + bucket                      = "mng-fumis-portfolio-test-s3-bucket"
      + bucket_domain_name          = (known after apply)
      + bucket_prefix               = (known after apply)
      + bucket_regional_domain_name = (known after apply)
      + force_destroy               = false
      + hosted_zone_id              = (known after apply)
      + id                          = (known after apply)
      + object_lock_enabled         = (known after apply)
      + policy                      = (known after apply)
      + region                      = (known after apply)
      + request_payer               = (known after apply)
      + tags                        = {
          + "Name" = "mng-fumis-portfolio-test-s3-bucket"
        }
      + tags_all                    = {
          + "Environment"        = "mng"
          + "ManagedByTerraform" = "true"
          + "Name"               = "mng-fumis-portfolio-test-s3-bucket"
          + "ServiceName"        = "fumis-portfolio"
        }
      + website_domain              = (known after apply)
      + website_endpoint            = (known after apply)

      + cors_rule (known after apply)

      + grant (known after apply)

      + lifecycle_rule (known after apply)

      + logging (known after apply)

      + object_lock_configuration (known after apply)

      + replication_configuration (known after apply)

      + server_side_encryption_configuration (known after apply)

      + versioning (known after apply)

      + website (known after apply)
    }

  # module.s3_bucket_test.aws_s3_bucket_public_access_block.this will be created
  + resource "aws_s3_bucket_public_access_block" "this" {
      + block_public_acls       = true
      + block_public_policy     = true
      + bucket                  = (known after apply)
      + id                      = (known after apply)
      + ignore_public_acls      = true
      + restrict_public_buckets = true
    }

  # module.s3_bucket_test.aws_s3_bucket_server_side_encryption_configuration.this will be created
  + resource "aws_s3_bucket_server_side_encryption_configuration" "this" {
      + bucket = "mng-fumis-portfolio-test-s3-bucket"
      + id     = (known after apply)

      + rule {
          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

  # module.s3_bucket_test.aws_s3_bucket_versioning.this will be created
  + resource "aws_s3_bucket_versioning" "this" {
      + bucket = (known after apply)
      + id     = (known after apply)

      + versioning_configuration {
          + mfa_delete = (known after apply)
          + status     = "Enabled"
        }
    }

Plan: 4 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Copy link

github-actions bot commented Nov 3, 2024

Terraform fmt 🖌failure

Show fmt
terraform/aws/environments/mng/oidc/locals.tf
terraform/aws/environments/mng/oidc/main.tf

Copy link

github-actions bot commented Nov 3, 2024

Terraform plan 📖success

Show plan
module.oidc_provider.aws_iam_openid_connect_provider.this: Refreshing state... [id=arn:aws:iam::313744126666:oidc-provider/token.actions.githubusercontent.com]
module.oidc_iam_policy.data.aws_iam_policy_document.this: Read complete after 0s [id=1789900679]
module.oidc_iam_policy.aws_iam_policy.this: Refreshing state... [id=arn:aws:iam::313744126666:policy/mng-fumis-portfolio-oidc-iam-policy]
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Reading...
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Read complete after 0s [id=3401382464]
module.oidc_iam_role.aws_iam_role.this: Refreshing state... [id=mng-fumis-portfolio-oidc-iam-role]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # module.s3_bucket_test.aws_s3_bucket.this will be created
  + resource "aws_s3_bucket" "this" {
      + acceleration_status         = (known after apply)
      + acl                         = (known after apply)
      + arn                         = (known after apply)
      + bucket                      = "mng-fumis-portfolio-test-s3-bucket"
      + bucket_domain_name          = (known after apply)
      + bucket_prefix               = (known after apply)
      + bucket_regional_domain_name = (known after apply)
      + force_destroy               = false
      + hosted_zone_id              = (known after apply)
      + id                          = (known after apply)
      + object_lock_enabled         = (known after apply)
      + policy                      = (known after apply)
      + region                      = (known after apply)
      + request_payer               = (known after apply)
      + tags                        = {
          + "Name" = "mng-fumis-portfolio-test-s3-bucket"
        }
      + tags_all                    = {
          + "Environment"        = "mng"
          + "ManagedByTerraform" = "true"
          + "Name"               = "mng-fumis-portfolio-test-s3-bucket"
          + "ServiceName"        = "fumis-portfolio"
        }
      + website_domain              = (known after apply)
      + website_endpoint            = (known after apply)

      + cors_rule (known after apply)

      + grant (known after apply)

      + lifecycle_rule (known after apply)

      + logging (known after apply)

      + object_lock_configuration (known after apply)

      + replication_configuration (known after apply)

      + server_side_encryption_configuration (known after apply)

      + versioning (known after apply)

      + website (known after apply)
    }

  # module.s3_bucket_test.aws_s3_bucket_public_access_block.this will be created
  + resource "aws_s3_bucket_public_access_block" "this" {
      + block_public_acls       = true
      + block_public_policy     = true
      + bucket                  = (known after apply)
      + id                      = (known after apply)
      + ignore_public_acls      = true
      + restrict_public_buckets = true
    }

  # module.s3_bucket_test.aws_s3_bucket_server_side_encryption_configuration.this will be created
  + resource "aws_s3_bucket_server_side_encryption_configuration" "this" {
      + bucket = "mng-fumis-portfolio-test-s3-bucket"
      + id     = (known after apply)

      + rule {
          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

  # module.s3_bucket_test.aws_s3_bucket_versioning.this will be created
  + resource "aws_s3_bucket_versioning" "this" {
      + bucket = (known after apply)
      + id     = (known after apply)

      + versioning_configuration {
          + mfa_delete = (known after apply)
          + status     = "Enabled"
        }
    }

Plan: 4 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Copy link

github-actions bot commented Nov 3, 2024

Terraform fmt 🖌failure

Show fmt
terraform/aws/environments/mng/oidc/locals.tf
terraform/aws/environments/mng/oidc/main.tf

Copy link

github-actions bot commented Nov 3, 2024

Terraform plan 📖success

Show plan
module.oidc_provider.aws_iam_openid_connect_provider.this: Refreshing state... [id=arn:aws:iam::313744126666:oidc-provider/token.actions.githubusercontent.com]
module.oidc_iam_policy.data.aws_iam_policy_document.this: Read complete after 0s [id=1789900679]
module.oidc_iam_policy.aws_iam_policy.this: Refreshing state... [id=arn:aws:iam::313744126666:policy/mng-fumis-portfolio-oidc-iam-policy]
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Reading...
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Read complete after 0s [id=3401382464]
module.oidc_iam_role.aws_iam_role.this: Refreshing state... [id=mng-fumis-portfolio-oidc-iam-role]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # module.s3_bucket_test.aws_s3_bucket.this will be created
  + resource "aws_s3_bucket" "this" {
      + acceleration_status         = (known after apply)
      + acl                         = (known after apply)
      + arn                         = (known after apply)
      + bucket                      = "mng-fumis-portfolio-test-s3-bucket"
      + bucket_domain_name          = (known after apply)
      + bucket_prefix               = (known after apply)
      + bucket_regional_domain_name = (known after apply)
      + force_destroy               = false
      + hosted_zone_id              = (known after apply)
      + id                          = (known after apply)
      + object_lock_enabled         = (known after apply)
      + policy                      = (known after apply)
      + region                      = (known after apply)
      + request_payer               = (known after apply)
      + tags                        = {
          + "Name" = "mng-fumis-portfolio-test-s3-bucket"
        }
      + tags_all                    = {
          + "Environment"        = "mng"
          + "ManagedByTerraform" = "true"
          + "Name"               = "mng-fumis-portfolio-test-s3-bucket"
          + "ServiceName"        = "fumis-portfolio"
        }
      + website_domain              = (known after apply)
      + website_endpoint            = (known after apply)

      + cors_rule (known after apply)

      + grant (known after apply)

      + lifecycle_rule (known after apply)

      + logging (known after apply)

      + object_lock_configuration (known after apply)

      + replication_configuration (known after apply)

      + server_side_encryption_configuration (known after apply)

      + versioning (known after apply)

      + website (known after apply)
    }

  # module.s3_bucket_test.aws_s3_bucket_public_access_block.this will be created
  + resource "aws_s3_bucket_public_access_block" "this" {
      + block_public_acls       = true
      + block_public_policy     = true
      + bucket                  = (known after apply)
      + id                      = (known after apply)
      + ignore_public_acls      = true
      + restrict_public_buckets = true
    }

  # module.s3_bucket_test.aws_s3_bucket_server_side_encryption_configuration.this will be created
  + resource "aws_s3_bucket_server_side_encryption_configuration" "this" {
      + bucket = "mng-fumis-portfolio-test-s3-bucket"
      + id     = (known after apply)

      + rule {
          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

  # module.s3_bucket_test.aws_s3_bucket_versioning.this will be created
  + resource "aws_s3_bucket_versioning" "this" {
      + bucket = (known after apply)
      + id     = (known after apply)

      + versioning_configuration {
          + mfa_delete = (known after apply)
          + status     = "Enabled"
        }
    }

Plan: 4 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Copy link

github-actions bot commented Nov 3, 2024

Terraform fmt 🖌failure

Show fmt
terraform/aws/environments/mng/oidc/locals.tf
terraform/aws/environments/mng/oidc/main.tf

Copy link

Terraform fmt 🖌failure

Show fmt
terraform/aws/environments/mng/oidc/locals.tf
terraform/aws/environments/mng/oidc/main.tf
terraform/aws/modules/sg/main.tf

Copy link

Terraform plan 📖failure

Commit sha 6927f33

Show plan
</details>

Copy link

Terraform fmt 🖌failure

Show fmt
terraform/aws/environments/mng/oidc/locals.tf
terraform/aws/environments/mng/oidc/main.tf
terraform/aws/modules/sg/main.tf

Copy link

Terraform plan 📖failure

Commit sha 76ea787

Show plan
</details>

Copy link

Terraform fmt 🖌failure

Show fmt
terraform/aws/environments/mng/oidc/locals.tf
terraform/aws/environments/mng/oidc/main.tf
terraform/aws/modules/sg/main.tf

Copy link

Terraform plan 📖failure

Commit sha 5b0d839

Show plan
</details>

Copy link

Terraform fmt 🖌failure

Show fmt
terraform/aws/environments/mng/oidc/locals.tf
terraform/aws/environments/mng/oidc/main.tf
terraform/aws/modules/sg/main.tf

Copy link

Terraform plan 📖failure

Commit sha e8b8448

Show plan
</details>

Copy link

Terraform fmt 🖌failure

Show fmt
terraform/aws/environments/mng/oidc/locals.tf
terraform/aws/environments/mng/oidc/main.tf
terraform/aws/modules/sg/main.tf

Copy link

Terraform plan 📖success

Commit sha b96e736

Show plan
module.oidc_provider.aws_iam_openid_connect_provider.this: Refreshing state... [id=arn:aws:iam::313744126666:oidc-provider/token.actions.githubusercontent.com]
module.oidc_iam_policy.data.aws_iam_policy_document.this: Read complete after 0s [id=1789900679]
module.oidc_iam_policy.aws_iam_policy.this: Refreshing state... [id=arn:aws:iam::313744126666:policy/mng-fumis-portfolio-oidc-iam-policy]
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Reading...
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Read complete after 0s [id=3401382464]
module.oidc_iam_role.aws_iam_role.this: Refreshing state... [id=mng-fumis-portfolio-oidc-iam-role]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # module.s3_bucket_test.aws_s3_bucket.this will be created
  + resource "aws_s3_bucket" "this" {
      + acceleration_status         = (known after apply)
      + acl                         = (known after apply)
      + arn                         = (known after apply)
      + bucket                      = "mng-fumis-portfolio-test-s3-bucket"
      + bucket_domain_name          = (known after apply)
      + bucket_prefix               = (known after apply)
      + bucket_regional_domain_name = (known after apply)
      + force_destroy               = false
      + hosted_zone_id              = (known after apply)
      + id                          = (known after apply)
      + object_lock_enabled         = (known after apply)
      + policy                      = (known after apply)
      + region                      = (known after apply)
      + request_payer               = (known after apply)
      + tags                        = {
          + "Name" = "mng-fumis-portfolio-test-s3-bucket"
        }
      + tags_all                    = {
          + "Environment"        = "mng"
          + "ManagedByTerraform" = "true"
          + "Name"               = "mng-fumis-portfolio-test-s3-bucket"
          + "ServiceName"        = "fumis-portfolio"
        }
      + website_domain              = (known after apply)
      + website_endpoint            = (known after apply)

      + cors_rule (known after apply)

      + grant (known after apply)

      + lifecycle_rule (known after apply)

      + logging (known after apply)

      + object_lock_configuration (known after apply)

      + replication_configuration (known after apply)

      + server_side_encryption_configuration (known after apply)

      + versioning (known after apply)

      + website (known after apply)
    }

  # module.s3_bucket_test.aws_s3_bucket_public_access_block.this will be created
  + resource "aws_s3_bucket_public_access_block" "this" {
      + block_public_acls       = true
      + block_public_policy     = true
      + bucket                  = (known after apply)
      + id                      = (known after apply)
      + ignore_public_acls      = true
      + restrict_public_buckets = true
    }

  # module.s3_bucket_test.aws_s3_bucket_server_side_encryption_configuration.this will be created
  + resource "aws_s3_bucket_server_side_encryption_configuration" "this" {
      + bucket = "mng-fumis-portfolio-test-s3-bucket"
      + id     = (known after apply)

      + rule {
          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

  # module.s3_bucket_test.aws_s3_bucket_versioning.this will be created
  + resource "aws_s3_bucket_versioning" "this" {
      + bucket = (known after apply)
      + id     = (known after apply)

      + versioning_configuration {
          + mfa_delete = (known after apply)
          + status     = "Enabled"
        }
    }

Plan: 4 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Copy link

Terraform fmt 🖌failure

Show fmt

Copy link

Terraform plan 📖success

Commit sha 39e08bf

Show plan
</details>

Copy link

Terraform fmt 🖌failure

Show fmt
terraform/aws/environments/mng/oidc/locals.tf
terraform/aws/environments/mng/oidc/main.tf
terraform/aws/modules/sg/main.tf

Copy link

Terraform plan 📖success

Commit sha 2d0c941

Show plan
module.oidc_provider.aws_iam_openid_connect_provider.this: Refreshing state... [id=arn:aws:iam::313744126666:oidc-provider/token.actions.githubusercontent.com]
module.oidc_iam_policy.data.aws_iam_policy_document.this: Read complete after 0s [id=1789900679]
module.oidc_iam_policy.aws_iam_policy.this: Refreshing state... [id=arn:aws:iam::313744126666:policy/mng-fumis-portfolio-oidc-iam-policy]
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Reading...
module.oidc_iam_role.data.aws_iam_policy_document.assume_role: Read complete after 0s [id=3401382464]
module.oidc_iam_role.aws_iam_role.this: Refreshing state... [id=mng-fumis-portfolio-oidc-iam-role]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # module.s3_bucket_test.aws_s3_bucket.this will be created
  + resource "aws_s3_bucket" "this" {
      + acceleration_status         = (known after apply)
      + acl                         = (known after apply)
      + arn                         = (known after apply)
      + bucket                      = "mng-fumis-portfolio-test-s3-bucket"
      + bucket_domain_name          = (known after apply)
      + bucket_prefix               = (known after apply)
      + bucket_regional_domain_name = (known after apply)
      + force_destroy               = false
      + hosted_zone_id              = (known after apply)
      + id                          = (known after apply)
      + object_lock_enabled         = (known after apply)
      + policy                      = (known after apply)
      + region                      = (known after apply)
      + request_payer               = (known after apply)
      + tags                        = {
          + "Name" = "mng-fumis-portfolio-test-s3-bucket"
        }
      + tags_all                    = {
          + "Environment"        = "mng"
          + "ManagedByTerraform" = "true"
          + "Name"               = "mng-fumis-portfolio-test-s3-bucket"
          + "ServiceName"        = "fumis-portfolio"
        }
      + website_domain              = (known after apply)
      + website_endpoint            = (known after apply)

      + cors_rule (known after apply)

      + grant (known after apply)

      + lifecycle_rule (known after apply)

      + logging (known after apply)

      + object_lock_configuration (known after apply)

      + replication_configuration (known after apply)

      + server_side_encryption_configuration (known after apply)

      + versioning (known after apply)

      + website (known after apply)
    }

  # module.s3_bucket_test.aws_s3_bucket_public_access_block.this will be created
  + resource "aws_s3_bucket_public_access_block" "this" {
      + block_public_acls       = true
      + block_public_policy     = true
      + bucket                  = (known after apply)
      + id                      = (known after apply)
      + ignore_public_acls      = true
      + restrict_public_buckets = true
    }

  # module.s3_bucket_test.aws_s3_bucket_server_side_encryption_configuration.this will be created
  + resource "aws_s3_bucket_server_side_encryption_configuration" "this" {
      + bucket = "mng-fumis-portfolio-test-s3-bucket"
      + id     = (known after apply)

      + rule {
          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

  # module.s3_bucket_test.aws_s3_bucket_versioning.this will be created
  + resource "aws_s3_bucket_versioning" "this" {
      + bucket = (known after apply)
      + id     = (known after apply)

      + versioning_configuration {
          + mfa_delete = (known after apply)
          + status     = "Enabled"
        }
    }

Plan: 4 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

@Fumi-Mura Fumi-Mura merged commit 960ac8b into main Dec 15, 2024
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant