-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Demo basic comment #53
base: main
Are you sure you want to change the base?
Conversation
👷 Jobs status: ✅ prod-svc-identity succeeded [Resources: 0 to create, 1 to update, 0 to delete] ✅ prod-svc-messaging succeeded [Resources: 0 to create, 1 to update, 0 to delete] ✅ dev-svc-identity succeeded [Resources: 0 to create, 1 to update, 0 to delete] [drift: #49] ✅ dev-svc-messaging succeeded [Resources: 0 to create, 1 to update, 0 to delete] |
Digger run report at 2024-03-05 12:13:08 (UTC)Plan for diggerhq/demo-terragrunt-parallel#dev-svc-messagingTerraform will perform the following actions:
# module.iam_role.aws_iam_policy.example_policy will be updated in-place
~ resource "aws_iam_policy" "example_policy" {
id = "arn:aws:iam::891377204276:policy/s3_bucket_role_messaging-policy"
name = "s3_bucket_role_messaging-policy"
~ policy = jsonencode(
~ {
~ Statement = [
{
Action = "s3:*"
Effect = "Allow"
Resource = "*"
},
+ {
+ Action = [
+ "rds:*",
]
+ Effect = "Allow"
+ Resource = "*"
+ Sid = "RDS"
},
]
# (1 unchanged attribute hidden)
}
)
tags = {}
# (4 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (dev-svc-messaging)Terraform plan validation checks succeeded ✅ |
Digger run report at 2024-03-05 12:13:28 (UTC)Plan for diggerhq/demo-terragrunt-parallel#prod-svc-messagingTerraform will perform the following actions:
# module.iam_role.aws_iam_policy.example_policy will be updated in-place
~ resource "aws_iam_policy" "example_policy" {
id = "arn:aws:iam::891377204276:policy/s3_bucket_role_messaging_prod-policy"
name = "s3_bucket_role_messaging_prod-policy"
~ policy = jsonencode(
~ {
~ Statement = [
{
Action = "s3:*"
Effect = "Allow"
Resource = "*"
},
+ {
+ Action = [
+ "rds:*",
]
+ Effect = "Allow"
+ Resource = "*"
+ Sid = "RDS"
},
]
# (1 unchanged attribute hidden)
}
)
tags = {}
# (4 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (prod-svc-messaging)Terraform plan validation checks succeeded ✅ |
Digger run report at 2024-03-05 12:13:29 (UTC)Plan for diggerhq/demo-terragrunt-parallel#dev-svc-identityTerraform will perform the following actions:
# module.iam_role.aws_iam_policy.example_policy will be updated in-place
~ resource "aws_iam_policy" "example_policy" {
id = "arn:aws:iam::891377204276:policy/s3_bucket_role_identity-policy"
name = "s3_bucket_role_identity-policy"
~ policy = jsonencode(
~ {
~ Statement = [
{
Action = "s3:*"
Effect = "Allow"
Resource = "*"
},
~ {
~ Action = [
- "apigateway:*",
+ "rds:*",
]
~ Sid = "Statement1" -> "RDS"
# (2 unchanged attributes hidden)
},
]
# (1 unchanged attribute hidden)
}
)
tags = {}
# (4 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (dev-svc-identity)Terraform plan validation checks succeeded ✅ |
Digger run report at 2024-03-05 12:13:40 (UTC)Plan for diggerhq/demo-terragrunt-parallel#prod-svc-identityTerraform will perform the following actions:
# module.iam_role.aws_iam_policy.example_policy will be updated in-place
~ resource "aws_iam_policy" "example_policy" {
id = "arn:aws:iam::891377204276:policy/s3_bucket_role_identity_prod-policy"
name = "s3_bucket_role_identity_prod-policy"
~ policy = jsonencode(
~ {
~ Statement = [
{
Action = "s3:*"
Effect = "Allow"
Resource = "*"
},
+ {
+ Action = [
+ "rds:*",
]
+ Effect = "Allow"
+ Resource = "*"
+ Sid = "RDS"
},
]
# (1 unchanged attribute hidden)
}
)
tags = {}
# (4 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (prod-svc-identity)Terraform plan validation checks succeeded ✅ |
👷 Jobs status: module: /modules/roles/iam_role✅ prod-svc-identity succeeded [Resources: 0 to create, 1 to update, 0 to delete] Plan for diggerhq/demo-terragrunt-parallel#dev-svc-messagingTerraform will perform the following actions:
# module.iam_role.aws_iam_policy.example_policy will be updated in-place
~ resource "aws_iam_policy" "example_policy" {
id = "arn:aws:iam::891377204276:policy/s3_bucket_role_messaging-policy"
name = "s3_bucket_role_messaging-policy"
~ policy = jsonencode(
~ {
~ Statement = [
{
Action = "s3:*"
Effect = "Allow"
Resource = "*"
},
+ {
+ Action = [
+ "rds:*",
]
+ Effect = "Allow"
+ Resource = "*"
+ Sid = "RDS"
},
]
# (1 unchanged attribute hidden)
}
)
tags = {}
# (4 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
✅ prod-svc-messaging succeeded [Resources: 0 to create, 1 to update, 0 to delete] Plan for diggerhq/demo-terragrunt-parallel#dev-svc-messaging [Similar]Terraform will perform the following actions:
# module.iam_role.aws_iam_policy.example_policy will be updated in-place
~ resource "aws_iam_policy" "example_policy" {
id = "arn:aws:iam::891377204276:policy/s3_bucket_role_messaging-policy"
name = "s3_bucket_role_messaging-policy"
~ policy = jsonencode(
~ {
~ Statement = [
{
Action = "s3:*"
Effect = "Allow"
Resource = "*"
},
+ {
+ Action = [
+ "rds:*",
]
+ Effect = "Allow"
+ Resource = "*"
+ Sid = "RDS"
},
]
# (1 unchanged attribute hidden)
}
)
tags = {}
# (4 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
✅ dev-svc-identity succeeded [Resources: 0 to create, 1 to update, 0 to delete] Plan for diggerhq/demo-terragrunt-parallel#dev-svc-messaging [Similar]Terraform will perform the following actions:
# module.iam_role.aws_iam_policy.example_policy will be updated in-place
~ resource "aws_iam_policy" "example_policy" {
id = "arn:aws:iam::891377204276:policy/s3_bucket_role_messaging-policy"
name = "s3_bucket_role_messaging-policy"
~ policy = jsonencode(
~ {
~ Statement = [
{
Action = "s3:*"
Effect = "Allow"
Resource = "*"
},
+ {
+ Action = [
+ "rds:*",
]
+ Effect = "Allow"
+ Resource = "*"
+ Sid = "RDS"
},
]
# (1 unchanged attribute hidden)
}
)
tags = {}
# (4 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
module: /modules/s3_bucket✅ prod-svc-identity succeeded [Resources: 0 to create, 1 to update, 0 to delete] |
👷 Jobs status: ✅ dev-svc-identity succeeded [Resources: 0 to create, 1 to update, 0 to delete] [drift: #49] ✅ prod-svc-messaging succeeded [Resources: 0 to create, 1 to update, 0 to delete] ✅ dev-svc-messaging succeeded [Resources: 0 to create, 1 to update, 0 to delete] ✅ prod-svc-identity succeeded [Resources: 0 to create, 1 to update, 0 to delete] |
Digger run report at 2024-04-30 07:58:09 (UTC)Plan for diggerhq/demo-terragrunt-parallel#prod-svc-identityTerraform will perform the following actions:
# module.iam_role.aws_iam_policy.example_policy will be updated in-place
~ resource "aws_iam_policy" "example_policy" {
id = "arn:aws:iam::891377204276:policy/s3_bucket_role_identity_prod-policy"
name = "s3_bucket_role_identity_prod-policy"
~ policy = jsonencode(
~ {
~ Statement = [
{
Action = "s3:*"
Effect = "Allow"
Resource = "*"
},
+ {
+ Action = [
+ "rds:*",
]
+ Effect = "Allow"
+ Resource = "*"
+ Sid = "RDS"
},
]
# (1 unchanged attribute hidden)
}
)
tags = {}
# (6 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (prod-svc-identity)Terraform plan validation checks succeeded ✅ |
Digger run report at 2024-04-30 07:58:10 (UTC)Plan for diggerhq/demo-terragrunt-parallel#dev-svc-identityTerraform will perform the following actions:
# module.iam_role.aws_iam_policy.example_policy will be updated in-place
~ resource "aws_iam_policy" "example_policy" {
id = "arn:aws:iam::891377204276:policy/s3_bucket_role_identity-policy"
name = "s3_bucket_role_identity-policy"
~ policy = jsonencode(
~ {
~ Statement = [
{
Action = "s3:*"
Effect = "Allow"
Resource = "*"
},
~ {
~ Action = [
~ "apigateway:*" -> "rds:*",
]
~ Sid = "Statement1" -> "RDS"
# (2 unchanged attributes hidden)
},
]
# (1 unchanged attribute hidden)
}
)
tags = {}
# (6 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (dev-svc-identity)Terraform plan validation checks succeeded ✅ |
Digger run report at 2024-04-30 07:58:28 (UTC)Plan for diggerhq/demo-terragrunt-parallel#prod-svc-messagingTerraform will perform the following actions:
# module.iam_role.aws_iam_policy.example_policy will be updated in-place
~ resource "aws_iam_policy" "example_policy" {
id = "arn:aws:iam::891377204276:policy/s3_bucket_role_messaging_prod-policy"
name = "s3_bucket_role_messaging_prod-policy"
~ policy = jsonencode(
~ {
~ Statement = [
{
Action = "s3:*"
Effect = "Allow"
Resource = "*"
},
+ {
+ Action = [
+ "rds:*",
]
+ Effect = "Allow"
+ Resource = "*"
+ Sid = "RDS"
},
]
# (1 unchanged attribute hidden)
}
)
tags = {}
# (6 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (prod-svc-messaging)Terraform plan validation checks succeeded ✅ |
Digger run report at 2024-04-30 07:58:35 (UTC)Plan for diggerhq/demo-terragrunt-parallel#dev-svc-messagingTerraform will perform the following actions:
# module.iam_role.aws_iam_policy.example_policy will be updated in-place
~ resource "aws_iam_policy" "example_policy" {
id = "arn:aws:iam::891377204276:policy/s3_bucket_role_messaging-policy"
name = "s3_bucket_role_messaging-policy"
~ policy = jsonencode(
~ {
~ Statement = [
{
Action = "s3:*"
Effect = "Allow"
Resource = "*"
},
+ {
+ Action = [
+ "rds:*",
]
+ Effect = "Allow"
+ Resource = "*"
+ Sid = "RDS"
},
]
# (1 unchanged attribute hidden)
}
)
tags = {}
# (6 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (dev-svc-messaging)Terraform plan validation checks succeeded ✅ |
No description provided.