Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Demo basic comment #53

Open
wants to merge 2 commits into
base: main
Choose a base branch
from
Open

Demo basic comment #53

wants to merge 2 commits into from

Conversation

motatoes
Copy link
Contributor

@motatoes motatoes commented Mar 5, 2024

No description provided.

Copy link

digger-cloud bot commented Mar 5, 2024

👷 Jobs status:

prod-svc-identity succeeded [Resources: 0 to create, 1 to update, 0 to delete]

prod-svc-messaging succeeded [Resources: 0 to create, 1 to update, 0 to delete]

dev-svc-identity succeeded [Resources: 0 to create, 1 to update, 0 to delete] [drift: #49]

dev-svc-messaging succeeded [Resources: 0 to create, 1 to update, 0 to delete]

Copy link

github-actions bot commented Mar 5, 2024

Digger run report at 2024-03-05 12:13:08 (UTC)
Plan for diggerhq/demo-terragrunt-parallel#dev-svc-messaging
Terraform will perform the following actions:

  # module.iam_role.aws_iam_policy.example_policy will be updated in-place
  ~ resource "aws_iam_policy" "example_policy" {
        id        = "arn:aws:iam::891377204276:policy/s3_bucket_role_messaging-policy"
        name      = "s3_bucket_role_messaging-policy"
      ~ policy    = jsonencode(
          ~ {
              ~ Statement = [
                    {
                        Action   = "s3:*"
                        Effect   = "Allow"
                        Resource = "*"
                    },
                  + {
                      + Action   = [
                          + "rds:*",
                        ]
                      + Effect   = "Allow"
                      + Resource = "*"
                      + Sid      = "RDS"
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags      = {}
        # (4 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (dev-svc-messaging) Terraform plan validation checks succeeded ✅

Copy link

github-actions bot commented Mar 5, 2024

Digger run report at 2024-03-05 12:13:28 (UTC)
Plan for diggerhq/demo-terragrunt-parallel#prod-svc-messaging
Terraform will perform the following actions:

  # module.iam_role.aws_iam_policy.example_policy will be updated in-place
  ~ resource "aws_iam_policy" "example_policy" {
        id        = "arn:aws:iam::891377204276:policy/s3_bucket_role_messaging_prod-policy"
        name      = "s3_bucket_role_messaging_prod-policy"
      ~ policy    = jsonencode(
          ~ {
              ~ Statement = [
                    {
                        Action   = "s3:*"
                        Effect   = "Allow"
                        Resource = "*"
                    },
                  + {
                      + Action   = [
                          + "rds:*",
                        ]
                      + Effect   = "Allow"
                      + Resource = "*"
                      + Sid      = "RDS"
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags      = {}
        # (4 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (prod-svc-messaging) Terraform plan validation checks succeeded ✅

Copy link

github-actions bot commented Mar 5, 2024

Digger run report at 2024-03-05 12:13:29 (UTC)
Plan for diggerhq/demo-terragrunt-parallel#dev-svc-identity
Terraform will perform the following actions:

  # module.iam_role.aws_iam_policy.example_policy will be updated in-place
  ~ resource "aws_iam_policy" "example_policy" {
        id        = "arn:aws:iam::891377204276:policy/s3_bucket_role_identity-policy"
        name      = "s3_bucket_role_identity-policy"
      ~ policy    = jsonencode(
          ~ {
              ~ Statement = [
                    {
                        Action   = "s3:*"
                        Effect   = "Allow"
                        Resource = "*"
                    },
                  ~ {
                      ~ Action   = [
                          - "apigateway:*",
                          + "rds:*",
                        ]
                      ~ Sid      = "Statement1" -> "RDS"
                        # (2 unchanged attributes hidden)
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags      = {}
        # (4 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (dev-svc-identity) Terraform plan validation checks succeeded ✅

Copy link

github-actions bot commented Mar 5, 2024

Digger run report at 2024-03-05 12:13:40 (UTC)
Plan for diggerhq/demo-terragrunt-parallel#prod-svc-identity
Terraform will perform the following actions:

  # module.iam_role.aws_iam_policy.example_policy will be updated in-place
  ~ resource "aws_iam_policy" "example_policy" {
        id        = "arn:aws:iam::891377204276:policy/s3_bucket_role_identity_prod-policy"
        name      = "s3_bucket_role_identity_prod-policy"
      ~ policy    = jsonencode(
          ~ {
              ~ Statement = [
                    {
                        Action   = "s3:*"
                        Effect   = "Allow"
                        Resource = "*"
                    },
                  + {
                      + Action   = [
                          + "rds:*",
                        ]
                      + Effect   = "Allow"
                      + Resource = "*"
                      + Sid      = "RDS"
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags      = {}
        # (4 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (prod-svc-identity) Terraform plan validation checks succeeded ✅

@motatoes motatoes closed this Mar 5, 2024
Copy link

digger-cloud bot commented Mar 5, 2024

👷 Jobs status:

dev-svc-messaging succeeded

prod-svc-identity succeeded

prod-svc-messaging succeeded

dev-svc-identity succeeded [drift: #49]

@ZIJ ZIJ changed the title add RDS for access Demo basic comment Apr 16, 2024
@motatoes
Copy link
Contributor Author

motatoes commented Apr 29, 2024

👷 Jobs status:

module: /modules/roles/iam_role

prod-svc-identity succeeded [Resources: 0 to create, 1 to update, 0 to delete]

Plan for diggerhq/demo-terragrunt-parallel#dev-svc-messaging
Terraform will perform the following actions:

  # module.iam_role.aws_iam_policy.example_policy will be updated in-place
  ~ resource "aws_iam_policy" "example_policy" {
        id        = "arn:aws:iam::891377204276:policy/s3_bucket_role_messaging-policy"
        name      = "s3_bucket_role_messaging-policy"
      ~ policy    = jsonencode(
          ~ {
              ~ Statement = [
                    {
                        Action   = "s3:*"
                        Effect   = "Allow"
                        Resource = "*"
                    },
                  + {
                      + Action   = [
                          + "rds:*",
                        ]
                      + Effect   = "Allow"
                      + Resource = "*"
                      + Sid      = "RDS"
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags      = {}
        # (4 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

prod-svc-messaging succeeded [Resources: 0 to create, 1 to update, 0 to delete]

Plan for diggerhq/demo-terragrunt-parallel#dev-svc-messaging [Similar]
Terraform will perform the following actions:

  # module.iam_role.aws_iam_policy.example_policy will be updated in-place
  ~ resource "aws_iam_policy" "example_policy" {
        id        = "arn:aws:iam::891377204276:policy/s3_bucket_role_messaging-policy"
        name      = "s3_bucket_role_messaging-policy"
      ~ policy    = jsonencode(
          ~ {
              ~ Statement = [
                    {
                        Action   = "s3:*"
                        Effect   = "Allow"
                        Resource = "*"
                    },
                  + {
                      + Action   = [
                          + "rds:*",
                        ]
                      + Effect   = "Allow"
                      + Resource = "*"
                      + Sid      = "RDS"
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags      = {}
        # (4 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

dev-svc-identity succeeded [Resources: 0 to create, 1 to update, 0 to delete]

Plan for diggerhq/demo-terragrunt-parallel#dev-svc-messaging [Similar]
Terraform will perform the following actions:

  # module.iam_role.aws_iam_policy.example_policy will be updated in-place
  ~ resource "aws_iam_policy" "example_policy" {
        id        = "arn:aws:iam::891377204276:policy/s3_bucket_role_messaging-policy"
        name      = "s3_bucket_role_messaging-policy"
      ~ policy    = jsonencode(
          ~ {
              ~ Statement = [
                    {
                        Action   = "s3:*"
                        Effect   = "Allow"
                        Resource = "*"
                    },
                  + {
                      + Action   = [
                          + "rds:*",
                        ]
                      + Effect   = "Allow"
                      + Resource = "*"
                      + Sid      = "RDS"
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags      = {}
        # (4 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

module: /modules/s3_bucket

prod-svc-identity succeeded [Resources: 0 to create, 1 to update, 0 to delete]
prod-svc-messaging succeeded [Resources: 0 to create, 1 to update, 0 to delete]

@ZIJ ZIJ reopened this Apr 30, 2024
Copy link

digger-cloud bot commented Apr 30, 2024

👷 Jobs status:

dev-svc-identity succeeded [Resources: 0 to create, 1 to update, 0 to delete] [drift: #49]

prod-svc-messaging succeeded [Resources: 0 to create, 1 to update, 0 to delete]

dev-svc-messaging succeeded [Resources: 0 to create, 1 to update, 0 to delete]

prod-svc-identity succeeded [Resources: 0 to create, 1 to update, 0 to delete]

Copy link

github-actions bot commented Apr 30, 2024

Digger run report at 2024-04-30 07:58:09 (UTC)
Plan for diggerhq/demo-terragrunt-parallel#prod-svc-identity
Terraform will perform the following actions:

  # module.iam_role.aws_iam_policy.example_policy will be updated in-place
  ~ resource "aws_iam_policy" "example_policy" {
        id          = "arn:aws:iam::891377204276:policy/s3_bucket_role_identity_prod-policy"
        name        = "s3_bucket_role_identity_prod-policy"
      ~ policy      = jsonencode(
          ~ {
              ~ Statement = [
                    {
                        Action   = "s3:*"
                        Effect   = "Allow"
                        Resource = "*"
                    },
                  + {
                      + Action   = [
                          + "rds:*",
                        ]
                      + Effect   = "Allow"
                      + Resource = "*"
                      + Sid      = "RDS"
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags        = {}
        # (6 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (prod-svc-identity) Terraform plan validation checks succeeded ✅

Copy link

github-actions bot commented Apr 30, 2024

Digger run report at 2024-04-30 07:58:10 (UTC)
Plan for diggerhq/demo-terragrunt-parallel#dev-svc-identity
Terraform will perform the following actions:

  # module.iam_role.aws_iam_policy.example_policy will be updated in-place
  ~ resource "aws_iam_policy" "example_policy" {
        id          = "arn:aws:iam::891377204276:policy/s3_bucket_role_identity-policy"
        name        = "s3_bucket_role_identity-policy"
      ~ policy      = jsonencode(
          ~ {
              ~ Statement = [
                    {
                        Action   = "s3:*"
                        Effect   = "Allow"
                        Resource = "*"
                    },
                  ~ {
                      ~ Action   = [
                          ~ "apigateway:*" -> "rds:*",
                        ]
                      ~ Sid      = "Statement1" -> "RDS"
                        # (2 unchanged attributes hidden)
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags        = {}
        # (6 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (dev-svc-identity) Terraform plan validation checks succeeded ✅

Copy link

github-actions bot commented Apr 30, 2024

Digger run report at 2024-04-30 07:58:28 (UTC)
Plan for diggerhq/demo-terragrunt-parallel#prod-svc-messaging
Terraform will perform the following actions:

  # module.iam_role.aws_iam_policy.example_policy will be updated in-place
  ~ resource "aws_iam_policy" "example_policy" {
        id          = "arn:aws:iam::891377204276:policy/s3_bucket_role_messaging_prod-policy"
        name        = "s3_bucket_role_messaging_prod-policy"
      ~ policy      = jsonencode(
          ~ {
              ~ Statement = [
                    {
                        Action   = "s3:*"
                        Effect   = "Allow"
                        Resource = "*"
                    },
                  + {
                      + Action   = [
                          + "rds:*",
                        ]
                      + Effect   = "Allow"
                      + Resource = "*"
                      + Sid      = "RDS"
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags        = {}
        # (6 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (prod-svc-messaging) Terraform plan validation checks succeeded ✅

Copy link

github-actions bot commented Apr 30, 2024

Digger run report at 2024-04-30 07:58:35 (UTC)
Plan for diggerhq/demo-terragrunt-parallel#dev-svc-messaging
Terraform will perform the following actions:

  # module.iam_role.aws_iam_policy.example_policy will be updated in-place
  ~ resource "aws_iam_policy" "example_policy" {
        id          = "arn:aws:iam::891377204276:policy/s3_bucket_role_messaging-policy"
        name        = "s3_bucket_role_messaging-policy"
      ~ policy      = jsonencode(
          ~ {
              ~ Statement = [
                    {
                        Action   = "s3:*"
                        Effect   = "Allow"
                        Resource = "*"
                    },
                  + {
                      + Action   = [
                          + "rds:*",
                        ]
                      + Effect   = "Allow"
                      + Resource = "*"
                      + Sid      = "RDS"
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags        = {}
        # (6 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.
Terraform plan validation check (dev-svc-messaging) Terraform plan validation checks succeeded ✅

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants