-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Authorize GitHub Actions SSH in cloud-init #54
Conversation
Terraform Format and Style 🖌``Terraform Initialization ⚙️
|
8fa7dee
to
2d63c2c
Compare
Terraform Format and Style 🖌``Terraform Initialization ⚙️
|
Ran Plan for dir: Plan Error Show Output
|
Terraform Format and Style 🖌``Terraform Initialization ⚙️
|
Ran Plan for dir: Plan Error Show Output
|
Terraform Format and Style 🖌``Terraform Initialization ⚙️
|
Deferring merge and |
fa77298
to
912bcda
Compare
Ran Plan for dir: Plan Error Show Output
|
atlantis plan -dir . |
|
atlantis plan --dir . |
atlantis plan --dir . |
Ran Plan for dir: Show OutputTerraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
- destroy
Terraform will perform the following actions:
# module.production_env.aws_route53_record.mailu-server will be destroyed
# (because aws_route53_record.mailu-server is not in configuration)
- resource "aws_route53_record" "mailu-server" {
- fqdn = "mail.seagl.org" -> null
- id = "Z0173878287JIU5M4KB8R_mail.seagl.org_CNAME" -> null
- name = "mail.seagl.org" -> null
- records = [
- "mailu.host.seagl.org",
] -> null
- ttl = 300 -> null
- type = "CNAME" -> null
- zone_id = "Z0173878287JIU5M4KB8R" -> null
}
Plan: 0 to add, 0 to change, 1 to destroy.
╷
│ Warning: Argument is deprecated
│
│ with aws_s3_bucket.state,
│ on s3.tf line 1, in resource "aws_s3_bucket" "state":
│ 1: resource "aws_s3_bucket" "state" {
│
│ Use the aws_s3_bucket_versioning resource instead
│
│ (and 3 more similar warnings elsewhere)
╵
|
This lets Ansible runs work out of the box, without manual bootstrapping.
Co-authored-by: Andrew <[email protected]>
912bcda
to
98f0c34
Compare
atlantis plan --dir . |
Ran Plan for dir: Plan Error Show Output
|
Ran Plan for dir: Show OutputNo changes. Your infrastructure matches the configuration.
Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.
╷
│ Warning: Argument is deprecated
│
│ with aws_s3_bucket.state,
│ on s3.tf line 1, in resource "aws_s3_bucket" "state":
│ 1: resource "aws_s3_bucket" "state" {
│
│ Use the aws_s3_bucket_lifecycle_configuration resource instead
│
│ (and 3 more similar warnings elsewhere)
╵
|
atlantis apply |
Ran Apply for dir: Apply complete! Resources: 0 added, 0 changed, 0 destroyed. |
atlantis help |
atlantis
Terraform Pull Request Automation
Usage:
atlantis <command> [options] -- [terraform options]
Examples:
# show atlantis help
atlantis help
# run plan in the root directory passing the -target flag to terraform
atlantis plan -d . -- -target=resource
# apply all unapplied plans from this pull request
atlantis apply
# apply the plan for the root directory and staging workspace
atlantis apply -d . -w staging
Commands:
plan Runs 'terraform plan' for the changes in this pull request.
To plan a specific project, use the -d, -w and -p flags.
apply Runs 'terraform apply' on all unapplied plans from this pull request.
To only apply a specific plan, use the -d, -w and -p flags.
unlock Removes all atlantis locks and discards all plans for this PR.
To unlock a specific plan you can use the Atlantis UI.
approve_policies
Approves all current policy checking failures for the PR.
version Print the output of 'terraform version'
help View help.
Flags:
-h, --help help for atlantis
Use "atlantis [command] --help" for more information about a command. |
atlantis unlock |
Failed to delete PR locks |
This lets Ansible runs work out of the box, without manual bootstrapping.