-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Revised Auditee & Auditor Certification Workflow #1680
Conversation
Terraform plan for management Plan: 0 to add, 4 to change, 0 to destroy.Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
~ update in-place
Terraform will perform the following actions:
# cloudfoundry_space_users.space_permissions["dev"] will be updated in-place
~ resource "cloudfoundry_space_users" "space_permissions" {
id = "e805bda0-6e7a-37a7-ab43-ccbb47801a6e"
~ managers = [
+ "cfdaac5d-4bb5-4655-98c2-e074374e4347",
# (3 unchanged elements hidden)
]
# (4 unchanged attributes hidden)
}
# cloudfoundry_space_users.space_permissions["management"] will be updated in-place
~ resource "cloudfoundry_space_users" "space_permissions" {
id = "27970728-5de5-c34c-de28-4c98f30a4d5d"
~ managers = [
+ "cfdaac5d-4bb5-4655-98c2-e074374e4347",
# (3 unchanged elements hidden)
]
# (4 unchanged attributes hidden)
}
# cloudfoundry_space_users.space_permissions["production"] will be updated in-place
~ resource "cloudfoundry_space_users" "space_permissions" {
id = "19114309-930e-d683-01fd-754bc9e54c1a"
~ managers = [
+ "cfdaac5d-4bb5-4655-98c2-e074374e4347",
# (3 unchanged elements hidden)
]
# (4 unchanged attributes hidden)
}
# cloudfoundry_space_users.space_permissions["staging"] will be updated in-place
~ resource "cloudfoundry_space_users" "space_permissions" {
id = "722d2418-98f6-10f4-4265-1217fb5f17f2"
~ managers = [
+ "cfdaac5d-4bb5-4655-98c2-e074374e4347",
# (3 unchanged elements hidden)
]
# (4 unchanged attributes hidden)
}
Plan: 0 to add, 4 to change, 0 to destroy. 📝 Plan generated in Pull Request Checks #239 |
Terraform plan for dev No changes. Your infrastructure matches the configuration.
✅ Plan applied in Deploy to Development and Management Environment #95 |
Terraform plan for meta Plan: 4 to add, 0 to change, 0 to destroy.Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
# module.environments["dev"].local_file.cf_org will be created
+ resource "local_file" "cf_org" {
+ content = <<-EOT
cf_org_name = "gsa-tts-oros-fac"
EOT
+ content_base64sha256 = (known after apply)
+ content_base64sha512 = (known after apply)
+ content_md5 = (known after apply)
+ content_sha1 = (known after apply)
+ content_sha256 = (known after apply)
+ content_sha512 = (known after apply)
+ directory_permission = "0777"
+ file_permission = "0644"
+ filename = "./../dev/orgname.auto.tfvars"
+ id = (known after apply)
}
# module.environments["preview"].local_file.cf_org will be created
+ resource "local_file" "cf_org" {
+ content = <<-EOT
cf_org_name = "gsa-tts-oros-fac"
EOT
+ content_base64sha256 = (known after apply)
+ content_base64sha512 = (known after apply)
+ content_md5 = (known after apply)
+ content_sha1 = (known after apply)
+ content_sha256 = (known after apply)
+ content_sha512 = (known after apply)
+ directory_permission = "0777"
+ file_permission = "0644"
+ filename = "./../preview/orgname.auto.tfvars"
+ id = (known after apply)
}
# module.environments["production"].local_file.cf_org will be created
+ resource "local_file" "cf_org" {
+ content = <<-EOT
cf_org_name = "gsa-tts-oros-fac"
EOT
+ content_base64sha256 = (known after apply)
+ content_base64sha512 = (known after apply)
+ content_md5 = (known after apply)
+ content_sha1 = (known after apply)
+ content_sha256 = (known after apply)
+ content_sha512 = (known after apply)
+ directory_permission = "0777"
+ file_permission = "0644"
+ filename = "./../production/orgname.auto.tfvars"
+ id = (known after apply)
}
# module.environments["staging"].local_file.cf_org will be created
+ resource "local_file" "cf_org" {
+ content = <<-EOT
cf_org_name = "gsa-tts-oros-fac"
EOT
+ content_base64sha256 = (known after apply)
+ content_base64sha512 = (known after apply)
+ content_md5 = (known after apply)
+ content_sha1 = (known after apply)
+ content_sha256 = (known after apply)
+ content_sha512 = (known after apply)
+ directory_permission = "0777"
+ file_permission = "0644"
+ filename = "./../staging/orgname.auto.tfvars"
+ id = (known after apply)
}
Plan: 4 to add, 0 to change, 0 to destroy. ✅ Plan applied in Deploy to Development and Management Environment #95 |
Merge conflicts resolved. Needs a run-through to ensure all checklist elements display correctly (certification enables when you get to it, etc). |
…m/GSA-TTS/FAC into jp/auditor-certification-frontend
This should now be good to go. I've unrequired some sections to ensure the pre-submission validation is enabled when the mandatory uploads are complete. |
Auditee & Auditor Certification Workflow
Issue: #1495
Figma: Auditor Cert Link
Changes:
How to test:
make docker-clean
andmake docker-first-run
./audit/auditor-certification/{reportId}
. This can be done by completing the SF-SAC, or by manually setting thesubmission_status
toready_for_certification
in the DB. During development, I cheated it by moving the dispatch up so that the role validation didn't kick me out. Good for local dev, bad for prod.Screenshots: