Skip to content
This repository has been archived by the owner on Oct 6, 2024. It is now read-only.

Remove environment from CI workflow #65

Merged
merged 1 commit into from
Nov 21, 2022
Merged

Remove environment from CI workflow #65

merged 1 commit into from
Nov 21, 2022

Conversation

ch3ck
Copy link
Owner

@ch3ck ch3ck commented Nov 21, 2022

Proposed changes

Describe the big picture reason for your PR.

Checklist

Please review the following checklist before submitting a PR:

  • CONSIDER adding a unit test to demonstrate your PR resolves an issue
  • DO keep PRs small for easy review
  • DO make sure unit tests pass
  • DO ensure no compiler warnings are triggered
  • AVOID breaking the CI builds

Other comments

Any other comments you might have.

Reviewers

@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Validation Output

Success! The configuration is valid.


Terraform Plan 📖success

Show Plan

terraform
Running plan in the remote backend. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

To view this run in a browser, visit:
https://app.terraform.io/app/nyahdev/nyah-dot-dev-workspace/runs/run-xj9DNHi2Zt4VQcQ6

Waiting for the plan to start...

Terraform v1.1.2
on linux_amd64
Initializing plugins and modules...
aws_iam_policy.cloudwatch_lambda_logs: Refreshing state... [id=arn:aws:iam::465582702155:policy/cloudwatch_lambda_logs]
aws_cloudwatch_log_group.lambda_log_group: Refreshing state... [id=/aws/lambda/ses-forward-emails-lambda-nyah]
aws_ses_receipt_rule_set.ses_rule: Refreshing state... [id=ses-forward-rule-set-nyah]
aws_s3_bucket.ses-bucket: Refreshing state... [id=nyah-ses-emails]
aws_sns_topic.ses-email-topic: Refreshing state... [id=arn:aws:sns:us-east-1:465582702155:ses-email-forward-sns-topic-nyah]
aws_iam_policy.ses-email-policy: Refreshing state... [id=arn:aws:iam::465582702155:policy/ses-forward-email-policy]
aws_ses_active_receipt_rule_set.ses_rule: Refreshing state... [id=ses-forward-rule-set-nyah]
aws_iam_role.ses-email-role: Refreshing state... [id=ses-email-forward-lambda-invoke-role]
aws_s3_bucket_policy.ses-bucket: Refreshing state... [id=nyah-ses-emails]
aws_s3_bucket_versioning.ses-bucket-versioning: Refreshing state... [id=nyah-ses-emails]
aws_iam_role_policy_attachment.lambda_logs_policy: Refreshing state... [id=ses-email-forward-lambda-invoke-role-20211227234456481900000001]
aws_lambda_function.ses-email-forward-lambda: Refreshing state... [id=ses-forward-emails-lambda-nyah]
aws_sns_topic_subscription.lambda_subscription: Refreshing state... [id=arn:aws:sns:us-east-1:465582702155:ses-email-forward-sns-topic-nyah:12dbad5b-3220-4e27-add4-87b1d080d1e3]
aws_lambda_permission.allow_sns_trigger: Refreshing state... [id=AllowExecutionFromSNS]
aws_ses_receipt_rule.ses_rule: Refreshing state... [id=ses-forward-rule-nyah]

Note: Objects have changed outside of Terraform

Terraform detected the following changes made outside of Terraform since the
last "terraform apply":

  # aws_cloudwatch_log_group.lambda_log_group has changed
  ~ resource "aws_cloudwatch_log_group" "lambda_log_group" {
        id                = "/aws/lambda/ses-forward-emails-lambda-nyah"
        name              = "/aws/lambda/ses-forward-emails-lambda-nyah"
      ~ retention_in_days = 0 -> 30
        tags              = {}
        # (2 unchanged attributes hidden)
    }

  # aws_iam_role_policy_attachment.lambda_logs_policy has been deleted
  - resource "aws_iam_role_policy_attachment" "lambda_logs_policy" {
      - id         = "ses-email-forward-lambda-invoke-role-20211227234456481900000001" -> null
      - policy_arn = "arn:aws:iam::465582702155:policy/cloudwatch_lambda_logs" -> null
      - role       = "ses-email-forward-lambda-invoke-role" -> null
    }

  # aws_ses_active_receipt_rule_set.ses_rule has changed
  ~ resource "aws_ses_active_receipt_rule_set" "ses_rule" {
        id            = "ses-forward-rule-set-nyah"
      ~ rule_set_name = "ses-forward-rule-set-nyah" -> "ses-akhn-emails-rule-set-01"
        # (1 unchanged attribute hidden)
    }

  # aws_sns_topic.ses-email-topic has changed
  ~ resource "aws_sns_topic" "ses-email-topic" {
      + display_name                             = "ses-forward-sns-logs-nyah"
        id                                       = "arn:aws:sns:us-east-1:465582702155:ses-email-forward-sns-topic-nyah"
      + lambda_failure_feedback_role_arn         = "arn:aws:iam::465582702155:role/SNSFailureFeedback"
      + lambda_success_feedback_role_arn         = "arn:aws:iam::465582702155:role/SNSSuccessFeedback"
        name                                     = "ses-email-forward-sns-topic-nyah"
        tags                                     = {}
        # (12 unchanged attributes hidden)
    }


Unless you have made equivalent changes to your configuration, or ignored the
relevant attributes using ignore_changes, the following plan may include
actions to undo or respond to these changes.

─────────────────────────────────────────────────────────────────────────────

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
  ~ update in-place

Terraform will perform the following actions:

  # aws_cloudwatch_log_group.lambda_log_group will be updated in-place
  ~ resource "aws_cloudwatch_log_group" "lambda_log_group" {
        id                = "/aws/lambda/ses-forward-emails-lambda-nyah"
        name              = "/aws/lambda/ses-forward-emails-lambda-nyah"
      ~ retention_in_days = 30 -> 0
        tags              = {}
        # (2 unchanged attributes hidden)
    }

  # aws_iam_role_policy_attachment.lambda_logs_policy will be created
  + resource "aws_iam_role_policy_attachment" "lambda_logs_policy" {
      + id         = (known after apply)
      + policy_arn = "arn:aws:iam::465582702155:policy/cloudwatch_lambda_logs"
      + role       = "ses-email-forward-lambda-invoke-role"
    }

  # aws_lambda_function.ses-email-forward-lambda will be updated in-place
  ~ resource "aws_lambda_function" "ses-email-forward-lambda" {
        id                             = "ses-forward-emails-lambda-nyah"
      ~ last_modified                  = "2022-06-25T07:44:16.000+0000" -> (known after apply)
      ~ source_code_hash               = "dWO86eOhDL1RzCdStDjnNSHgbKnxUl5vDkd3ELqIYLY=" -> "47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU="
        tags                           = {}
        # (18 unchanged attributes hidden)


        # (2 unchanged blocks hidden)
    }

  # aws_ses_active_receipt_rule_set.ses_rule will be updated in-place
  ~ resource "aws_ses_active_receipt_rule_set" "ses_rule" {
        id            = "ses-forward-rule-set-nyah"
      ~ rule_set_name = "ses-akhn-emails-rule-set-01" -> "ses-forward-rule-set-nyah"
        # (1 unchanged attribute hidden)
    }

  # aws_sns_topic.ses-email-topic will be updated in-place
  ~ resource "aws_sns_topic" "ses-email-topic" {
      - display_name                             = "ses-forward-sns-logs-nyah" -> null
        id                                       = "arn:aws:sns:us-east-1:465582702155:ses-email-forward-sns-topic-nyah"
      - lambda_failure_feedback_role_arn         = "arn:aws:iam::465582702155:role/SNSFailureFeedback" -> null
      - lambda_success_feedback_role_arn         = "arn:aws:iam::465582702155:role/SNSSuccessFeedback" -> null
        name                                     = "ses-email-forward-sns-topic-nyah"
        tags                                     = {}
        # (12 unchanged attributes hidden)
    }

Plan: 1 to add, 4 to change, 0 to destroy.
╷
│ Warning: Value for undeclared variable
│ 
│ The root module does not declare a variable named "AWS_ACCESS_KEY_ID" but a
│ value was found in file
│ "/home/tfc-agent/.tfc-agent/component/terraform/runs/run-xj9DNHi2Zt4VQcQ6/terraform.tfvars".
│ If you meant to use this value, add a "variable" block to the
│ configuration.
│ 
│ To silence these warnings, use TF_VAR_... environment variables to provide
│ certain "global" settings to all configurations in your organization. To
│ reduce the verbosity of these warnings, use the -compact-warnings option.
╵
╷
│ Warning: Value for undeclared variable
│ 
│ The root module does not declare a variable named "AWS_SECRET_ACCESS_KEY"
│ but a value was found in file
│ "/home/tfc-agent/.tfc-agent/component/terraform/runs/run-xj9DNHi2Zt4VQcQ6/terraform.tfvars".
│ If you meant to use this value, add a "variable" block to the
│ configuration.
│ 
│ To silence these warnings, use TF_VAR_... environment variables to provide
│ certain "global" settings to all configurations in your organization. To
│ reduce the verbosity of these warnings, use the -compact-warnings option.
╵

Pusher: @ch3ck, Action: pull_request, Working Directory: ``, Workflow: Build & Run Tests

@ch3ck ch3ck enabled auto-merge November 21, 2022 03:20
@ch3ck ch3ck disabled auto-merge November 21, 2022 03:42
@ch3ck ch3ck merged commit 0a60d9a into master Nov 21, 2022
@ch3ck ch3ck deleted the ch3ck-patch-2 branch November 21, 2022 03:42
ch3ck added a commit that referenced this pull request Oct 6, 2024
Remove environment from CI workflow
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant