Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: add initial deploy for bootstrap API #19

Merged
merged 3 commits into from
Oct 8, 2024

Conversation

andreasisnes
Copy link
Collaborator

@andreasisnes andreasisnes commented Oct 8, 2024

Verification

  • Your code builds clean without any errors or warnings
  • Manual testing done (required)
  • Relevant automated test added (if you find this hard, leave it and we'll help out)
  • All tests run green

Documentation

  • User documentation is updated with a separate linked PR in altinn-studio-docs. (if applicable)

@andreasisnes andreasisnes requested a review from a team as a code owner October 8, 2024 12:39
@andreasisnes andreasisnes changed the title add initial deploy for bootstrap API chore: add initial deploy for bootstrap API Oct 8, 2024
@andreasisnes andreasisnes force-pushed the chores/add-deploy-for-bootstrap branch from 1b95c7c to 6718dda Compare October 8, 2024 14:40
@andreasisnes andreasisnes merged commit 6bb666f into main Oct 8, 2024
8 checks passed
@andreasisnes andreasisnes deleted the chores/add-deploy-for-bootstrap branch October 8, 2024 14:42
Copy link

github-actions bot commented Oct 8, 2024

Terraform environment at21

Format and Style 🖌success

Initialization ⚙️success

Validation 🤖success

Validation Output

Success! The configuration is valid.


Plan 📖success

Show Plan

[Lines containing Refreshing state removed]
[Maybe further truncated see logs for complete plan output]
Acquiring state lock. This may take a few moments...
module.app.data.azurerm_servicebus_namespace.sb: Reading...
module.app.data.azurerm_key_vault.kv: Reading...
module.app.data.azurerm_container_app_environment.caenv: Reading...
module.app.data.azurerm_app_configuration.appconf: Reading...
module.app.data.azurerm_key_vault.kv: Read complete after 1s [id=/subscriptions/45177a0a-d27e-490f-9f23-b4726de8ccc1/resourceGroups/rgauth001at21/providers/Microsoft.KeyVault/vaults/kvaltinnauth001at21]
module.app.data.azurerm_container_app_environment.caenv: Read complete after 1s [id=/subscriptions/45177a0a-d27e-490f-9f23-b4726de8ccc1/resourceGroups/rgauth001at21/providers/Microsoft.App/managedEnvironments/caenvauth001at21]
module.app.data.azurerm_app_configuration.appconf: Read complete after 2s [id=/subscriptions/45177a0a-d27e-490f-9f23-b4726de8ccc1/resourceGroups/rgauth001at21/providers/Microsoft.AppConfiguration/configurationStores/appconfaltinnauth001at21]
module.app.data.azurerm_servicebus_namespace.sb: Read complete after 2s [id=/subscriptions/45177a0a-d27e-490f-9f23-b4726de8ccc1/resourceGroups/rgauth001at21/providers/Microsoft.ServiceBus/namespaces/sbaltinnauth001at21]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # module.app.azurerm_container_app.app will be updated in-place
  ~ resource "azurerm_container_app" "app" {
        id                            = "/subscriptions/45177a0a-d27e-490f-9f23-b4726de8ccc1/resourceGroups/rgaccesspackages001at21/providers/Microsoft.App/containerApps/caaccesspackages001at21"
        name                          = "caaccesspackages001at21"
        tags                          = {}
        # (9 unchanged attributes hidden)

      ~ identity {
          ~ identity_ids = [
              - "/subscriptions/45177a0a-d27e-490f-9f23-b4726de8ccc1/resourceGroups/rgauth001at21/providers/Microsoft.ManagedIdentity/userAssignedIdentities/mipsqlsrvadminauth001at21",
                # (1 unchanged element hidden)
            ]
            # (1 unchanged attribute hidden)
        }

      ~ template {
            # (2 unchanged attributes hidden)

          ~ container {
              ~ image             = "ghcr.io/altinn/altinn-authorization-tmp/altinn-authorization-access-packages:e0a4def" -> "ghcr.io/altinn/altinn-authorization-tmp/altinn-authorization-access-packages:6bb666f"
                name              = "accesspackages"
                # (5 unchanged attributes hidden)

              ~ env {
                  ~ name  = "EntraId__Identities__PostgresAdmin__ClientId" -> "EntraId__Identities__Service__ClientId"
                  ~ value = "193659bf-b885-4a06-9f01-dbf0e15a0e88" -> "f7842d1b-201d-4dc6-b3a7-686662034d46"
                }
              ~ env {
                  ~ name  = "EntraId__Identities__Service__ClientId" -> "AppConfiguration__Endpoint"
                  ~ value = "f7842d1b-201d-4dc6-b3a7-686662034d46" -> "https://appconfaltinnauth001at21.azconfig.io"
                }
              - env {
                  - name  = "AppConfiguration__Endpoint" -> null
                  - value = "https://appconfaltinnauth001at21.azconfig.io" -> null
                }
            }
        }

        # (1 unchanged block hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Saved the plan to: tfplan.out

To perform exactly these actions, run the following command to apply:
    terraform apply "tfplan.out"
Releasing state lock. This may take a few moments...

Context Values
Pusher @andreasisnes
Action workflow_dispatch
Working Directory src/apps/Altinn.Authorization.AccessPackages/deploy
State File github.com/altinn/altinn-authorization-tmp/environments/at21/altinn.authorization.accesspackages.tfstate
Plan File github.com_altinn_altinn-authorization-tmp_environments_at21_altinn.authorization.accesspackages.tfstate.tfplan

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants