Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make changes #1

Merged
merged 3 commits into from
Dec 14, 2024
Merged

Make changes #1

merged 3 commits into from
Dec 14, 2024

Conversation

abborg
Copy link
Owner

@abborg abborg commented Nov 25, 2024

No description provided.

@abborg abborg closed this Nov 25, 2024
@abborg abborg reopened this Nov 25, 2024
@abborg abborg closed this Nov 25, 2024
@abborg abborg reopened this Nov 25, 2024
@abborg abborg closed this Nov 25, 2024
@abborg abborg reopened this Nov 25, 2024
@abborg abborg closed this Nov 25, 2024
@abborg abborg reopened this Nov 25, 2024
@abborg abborg closed this Nov 25, 2024
@abborg abborg reopened this Nov 25, 2024
@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Plan Error

parsing atlantis.yaml: yaml: unmarshal errors:
  line 16: field terraform_distribution not found in type raw.Project
  line 20: field terraform_distribution not found in type raw.Project

@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Plan Error

parsing atlantis.yaml: yaml: unmarshal errors:
  line 16: field terraform_distribution not found in type raw.Project
  line 20: field terraform_distribution not found in type raw.Project

@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Plan Error

parsing atlantis.yaml: yaml: unmarshal errors:
  line 16: field terraform_distribution not found in type raw.Project
  line 20: field terraform_distribution not found in type raw.Project

@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Plan Error

parsing atlantis.yaml: yaml: unmarshal errors:
  line 16: field terraform_distribution not found in type raw.Project
  line 20: field terraform_distribution not found in type raw.Project

@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Plan Error

parsing atlantis.yaml: yaml: unmarshal errors:
  line 16: field terraform_distribution not found in type raw.Project
  line 20: field terraform_distribution not found in type raw.Project

@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Plan Error

parsing atlantis.yaml: yaml: unmarshal errors:
  line 16: field terraform_distribution not found in type raw.Project
  line 20: field terraform_distribution not found in type raw.Project

@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Error: goroutine panic. This is a bug.

interface conversion: interface {} is *string, not string
/opt/homebrew/Cellar/go/1.23.3/libexec/src/runtime/iface.go:275 (0x40dfa4)
/Users/andrew/code/atlantis/server/core/config/raw/project.go:212 (0xb34554)
/Users/andrew/go/pkg/mod/github.com/go-ozzo/[email protected]+incompatible/validation.go:127 (0xb2b785)
/Users/andrew/go/pkg/mod/github.com/go-ozzo/[email protected]+incompatible/validation.go:53 (0xb2afbd)
/Users/andrew/go/pkg/mod/github.com/go-ozzo/[email protected]+incompatible/struct.go:84 (0xb29c88)
/Users/andrew/code/atlantis/server/core/config/raw/project.go:85 (0xb33ab1)
/Users/andrew/go/pkg/mod/github.com/go-ozzo/[email protected]+incompatible/validation.go:105 (0xb2b6b0)
/Users/andrew/go/pkg/mod/github.com/go-ozzo/[email protected]+incompatible/validation.go:74 (0xb2b219)
/Users/andrew/go/pkg/mod/github.com/go-ozzo/[email protected]+incompatible/struct.go:84 (0xb29c88)
/Users/andrew/code/atlantis/server/core/config/raw/repo_cfg.go:45 (0xb3483e)
/Users/andrew/code/atlantis/server/core/config/parser_validator.go:74 (0xb3d15b)
/Users/andrew/code/atlantis/server/core/config/parser_validator.go:58 (0xb3cd48)
/Users/andrew/code/atlantis/server/events/project_command_builder.go:418 (0x116ee56)
/Users/andrew/code/atlantis/server/events/project_command_builder.go:276 (0x116d485)
/Users/andrew/code/atlantis/server/events/instrumented_project_command_builder.go:38 (0x115da26)
/Users/andrew/code/atlantis/server/events/instrumented_project_command_builder.go:71 (0x115dd7b)
/Users/andrew/code/atlantis/server/events/instrumented_project_command_builder.go:35 (0x115d9be)
/Users/andrew/code/atlantis/server/events/plan_command_runner.go:195 (0x1166261)
/Users/andrew/code/atlantis/server/events/plan_command_runner.go:307 (0x1167a04)
/Users/andrew/code/atlantis/server/events/command_runner.go:389 (0x1149cec)
/opt/homebrew/Cellar/go/1.23.3/libexec/src/runtime/asm_amd64.s:1700 (0x478900)

@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Error: goroutine panic. This is a bug.

runtime error: invalid memory address or nil pointer dereference
/opt/homebrew/Cellar/go/1.23.3/libexec/src/runtime/panic.go:262 (0x472a38)
/opt/homebrew/Cellar/go/1.23.3/libexec/src/runtime/signal_unix.go:917 (0x472a08)
/Users/andrew/code/atlantis/server/core/config/raw/project.go:213 (0xb3448c)
/Users/andrew/go/pkg/mod/github.com/go-ozzo/[email protected]+incompatible/validation.go:127 (0xb2b785)
/Users/andrew/go/pkg/mod/github.com/go-ozzo/[email protected]+incompatible/validation.go:53 (0xb2afbd)
/Users/andrew/go/pkg/mod/github.com/go-ozzo/[email protected]+incompatible/struct.go:84 (0xb29c88)
/Users/andrew/code/atlantis/server/core/config/raw/project.go:85 (0xb33ab1)
/Users/andrew/go/pkg/mod/github.com/go-ozzo/[email protected]+incompatible/validation.go:105 (0xb2b6b0)
/Users/andrew/go/pkg/mod/github.com/go-ozzo/[email protected]+incompatible/validation.go:74 (0xb2b219)
/Users/andrew/go/pkg/mod/github.com/go-ozzo/[email protected]+incompatible/struct.go:84 (0xb29c88)
/Users/andrew/code/atlantis/server/core/config/raw/repo_cfg.go:45 (0xb3483e)
/Users/andrew/code/atlantis/server/core/config/parser_validator.go:74 (0xb3d15b)
/Users/andrew/code/atlantis/server/core/config/parser_validator.go:58 (0xb3cd48)
/Users/andrew/code/atlantis/server/events/project_command_builder.go:418 (0x116ee56)
/Users/andrew/code/atlantis/server/events/project_command_builder.go:276 (0x116d485)
/Users/andrew/code/atlantis/server/events/instrumented_project_command_builder.go:38 (0x115da26)
/Users/andrew/code/atlantis/server/events/instrumented_project_command_builder.go:71 (0x115dd7b)
/Users/andrew/code/atlantis/server/events/instrumented_project_command_builder.go:35 (0x115d9be)
/Users/andrew/code/atlantis/server/events/plan_command_runner.go:195 (0x1166261)
/Users/andrew/code/atlantis/server/events/plan_command_runner.go:307 (0x1167a04)
/Users/andrew/code/atlantis/server/events/command_runner.go:389 (0x1149cec)
/opt/homebrew/Cellar/go/1.23.3/libexec/src/runtime/asm_amd64.s:1700 (0x478900)

@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Ran Plan for 2 projects:

  1. project: stacks-terraform dir: stacks/terraform workspace: default
  2. project: stacks-opentofu dir: stacks/opentofu workspace: default

1. project: stacks-terraform dir: stacks/terraform workspace: default

Plan Error

Show Output
running 'sh -c "/home/atlantis/.atlantis/bin/terraform1.9.8 plan -input=false -refresh -out \"/home/atlantis/.atlantis/repos/abborg/infra/1/default/stacks/terraform/stacks-terraform-default.tfplan\""' in '/home/atlantis/.atlantis/repos/abborg/infra/1/default/stacks/terraform': exit status 1

Planning failed. Terraform encountered an error while generating this plan.

╷
│ Error: error impersonating credentials
│ 
│   with provider["registry.terraform.io/hashicorp/google"],
│   on providers.tf line 1, in provider "google":
│    1: provider "google" {
│ 
│ google: could not find default credentials. See
│ https://cloud.google.com/docs/authentication/external/set-up-adc for more
│ information
╵



2. project: stacks-opentofu dir: stacks/opentofu workspace: default

Plan Error

Show Output
running 'sh -c "/home/atlantis/.atlantis/bin/terraform1.8.0 plan -input=false -refresh -out \"/home/atlantis/.atlantis/repos/abborg/infra/1/default/stacks/opentofu/stacks-opentofu-default.tfplan\""' in '/home/atlantis/.atlantis/repos/abborg/infra/1/default/stacks/opentofu': exit status 1

Planning failed. Terraform encountered an error while generating this plan.

╷
│ Error: error impersonating credentials
│ 
│   with provider["registry.terraform.io/hashicorp/google"],
│   on providers.tf line 1, in provider "google":
│    1: provider "google" {
│ 
│ google: could not find default credentials. See
│ https://cloud.google.com/docs/authentication/external/set-up-adc for more
│ information
╵



Plan Summary

2 projects, 0 with changes, 0 with no changes, 2 failed

@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Ran Plan for 2 projects:

  1. project: stacks-terraform dir: stacks/terraform workspace: default
  2. project: stacks-opentofu dir: stacks/opentofu workspace: default

1. project: stacks-terraform dir: stacks/terraform workspace: default

Plan Error

Show Output
running 'sh -c "/home/atlantis/.atlantis/bin/terraform1.9.8 plan -input=false -refresh -out \"/home/atlantis/.atlantis/repos/abborg/infra/1/default/stacks/terraform/stacks-terraform-default.tfplan\""' in '/home/atlantis/.atlantis/repos/abborg/infra/1/default/stacks/terraform': exit status 1

Planning failed. Terraform encountered an error while generating this plan.

╷
│ Error: error impersonating credentials
│ 
│   with provider["registry.terraform.io/hashicorp/google"],
│   on providers.tf line 1, in provider "google":
│    1: provider "google" {
│ 
│ google: could not find default credentials. See
│ https://cloud.google.com/docs/authentication/external/set-up-adc for more
│ information
╵



2. project: stacks-opentofu dir: stacks/opentofu workspace: default

Plan Error

Show Output
running 'sh -c "/home/atlantis/.atlantis/bin/terraform1.8.0 plan -input=false -refresh -out \"/home/atlantis/.atlantis/repos/abborg/infra/1/default/stacks/opentofu/stacks-opentofu-default.tfplan\""' in '/home/atlantis/.atlantis/repos/abborg/infra/1/default/stacks/opentofu': exit status 1

Planning failed. Terraform encountered an error while generating this plan.

╷
│ Error: error impersonating credentials
│ 
│   with provider["registry.terraform.io/hashicorp/google"],
│   on providers.tf line 1, in provider "google":
│    1: provider "google" {
│ 
│ google: could not find default credentials. See
│ https://cloud.google.com/docs/authentication/external/set-up-adc for more
│ information
╵



Plan Summary

2 projects, 0 with changes, 0 with no changes, 2 failed

@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Ran Plan for 2 projects:

  1. project: stacks-terraform dir: stacks/terraform workspace: default
  2. project: stacks-opentofu dir: stacks/opentofu workspace: default

1. project: stacks-terraform dir: stacks/terraform workspace: default

Show Output
data.google_project.borghaus: Reading...
data.google_project.borghaus: Read complete after 1s [id=projects/borghaus]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create

Terraform will perform the following actions:

  # google_storage_bucket.terraform-bucket will be created
+ resource "google_storage_bucket" "terraform-bucket" {
      + effective_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + force_destroy               = true
      + id                          = (known after apply)
      + location                    = "US-EAST1"
      + name                        = "borghaus-terraform-bucket"
      + project                     = "borghaus"
      + project_number              = (known after apply)
      + public_access_prevention    = "enforced"
      + rpo                         = (known after apply)
      + self_link                   = (known after apply)
      + storage_class               = "STANDARD"
      + terraform_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + uniform_bucket_level_access = (known after apply)
      + url                         = (known after apply)

      + soft_delete_policy (known after apply)

      + versioning (known after apply)

      + website (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -p stacks-terraform
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -p stacks-terraform

Plan: 1 to add, 0 to change, 0 to destroy.


2. project: stacks-opentofu dir: stacks/opentofu workspace: default

Show Output
data.google_project.borghaus: Reading...
data.google_project.borghaus: Read complete after 1s [id=projects/borghaus]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create

Terraform will perform the following actions:

  # google_storage_bucket.opentofu-bucket will be created
+ resource "google_storage_bucket" "opentofu-bucket" {
      + effective_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + force_destroy               = true
      + id                          = (known after apply)
      + location                    = "US-EAST1"
      + name                        = "borghaus-opentofou-bucket"
      + project                     = "borghaus"
      + project_number              = (known after apply)
      + public_access_prevention    = "enforced"
      + rpo                         = (known after apply)
      + self_link                   = (known after apply)
      + storage_class               = "STANDARD"
      + terraform_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + uniform_bucket_level_access = (known after apply)
      + url                         = (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -p stacks-opentofu
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -p stacks-opentofu

Plan: 1 to add, 0 to change, 0 to destroy.


Plan Summary

2 projects, 2 with changes, 0 with no changes, 0 failed

  • ⏩ To apply all unapplied plans from this Pull Request, comment:
    atlantis apply
  • 🚮 To delete all plans and locks from this Pull Request, comment:
    atlantis unlock

@abborg-atlantis
Copy link
Contributor

Plan Error

parsing atlantis.yaml: projects: (4: (terraform_distribution: "opentofus" is not a valid terraform_distribution, only "terraform" and "opentofu" are supported.).).

@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Plan Error

parsing atlantis.yaml: projects: (4: (terraform_distribution: "opentofus" is not a valid terraform_distribution, only "terraform" and "opentofu" are supported.).).

@abborg-atlantis
Copy link
Contributor

Ran Plan for 2 projects:

  1. project: stacks-terraform dir: stacks/terraform workspace: default
  2. project: stacks-opentofu dir: stacks/opentofu workspace: default

1. project: stacks-terraform dir: stacks/terraform workspace: default

Show Output
data.google_project.borghaus: Reading...
data.google_project.borghaus: Read complete after 0s [id=projects/borghaus]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create

Terraform will perform the following actions:

  # google_storage_bucket.terraform-bucket will be created
+ resource "google_storage_bucket" "terraform-bucket" {
      + effective_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + force_destroy               = true
      + id                          = (known after apply)
      + location                    = "US-EAST1"
      + name                        = "borghaus-terraform-bucket"
      + project                     = "borghaus"
      + project_number              = (known after apply)
      + public_access_prevention    = "enforced"
      + rpo                         = (known after apply)
      + self_link                   = (known after apply)
      + storage_class               = "STANDARD"
      + terraform_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + uniform_bucket_level_access = (known after apply)
      + url                         = (known after apply)

      + soft_delete_policy (known after apply)

      + versioning (known after apply)

      + website (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -p stacks-terraform
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -p stacks-terraform

Plan: 1 to add, 0 to change, 0 to destroy.


2. project: stacks-opentofu dir: stacks/opentofu workspace: default

Show Output
data.google_project.borghaus: Reading...
data.google_project.borghaus: Read complete after 1s [id=projects/borghaus]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create

Terraform will perform the following actions:

  # google_storage_bucket.opentofu-bucket will be created
+ resource "google_storage_bucket" "opentofu-bucket" {
      + effective_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + force_destroy               = true
      + id                          = (known after apply)
      + location                    = "US-EAST1"
      + name                        = "borghaus-opentofou-bucket"
      + project                     = "borghaus"
      + project_number              = (known after apply)
      + public_access_prevention    = "enforced"
      + rpo                         = (known after apply)
      + self_link                   = (known after apply)
      + storage_class               = "STANDARD"
      + terraform_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + uniform_bucket_level_access = (known after apply)
      + url                         = (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -p stacks-opentofu
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -p stacks-opentofu

Plan: 1 to add, 0 to change, 0 to destroy.


Plan Summary

2 projects, 2 with changes, 0 with no changes, 0 failed

  • ⏩ To apply all unapplied plans from this Pull Request, comment:
    atlantis apply
  • 🚮 To delete all plans and locks from this Pull Request, comment:
    atlantis unlock

@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Ran Plan for 2 projects:

  1. project: stacks-terraform dir: stacks/terraform workspace: default
  2. project: stacks-opentofu dir: stacks/opentofu workspace: default

1. project: stacks-terraform dir: stacks/terraform workspace: default

Show Output
data.google_project.borghaus: Reading...
data.google_project.borghaus: Read complete after 0s [id=projects/borghaus]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create

Terraform will perform the following actions:

  # google_storage_bucket.terraform-bucket will be created
+ resource "google_storage_bucket" "terraform-bucket" {
      + effective_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + force_destroy               = true
      + id                          = (known after apply)
      + location                    = "US-EAST1"
      + name                        = "borghaus-terraform-bucket"
      + project                     = "borghaus"
      + project_number              = (known after apply)
      + public_access_prevention    = "enforced"
      + rpo                         = (known after apply)
      + self_link                   = (known after apply)
      + storage_class               = "STANDARD"
      + terraform_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + uniform_bucket_level_access = (known after apply)
      + url                         = (known after apply)

      + soft_delete_policy (known after apply)

      + versioning (known after apply)

      + website (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -p stacks-terraform
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -p stacks-terraform

Plan: 1 to add, 0 to change, 0 to destroy.


2. project: stacks-opentofu dir: stacks/opentofu workspace: default

Show Output
data.google_project.borghaus: Reading...
data.google_project.borghaus: Read complete after 0s [id=projects/borghaus]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create

Terraform will perform the following actions:

  # google_storage_bucket.opentofu-bucket will be created
+ resource "google_storage_bucket" "opentofu-bucket" {
      + effective_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + force_destroy               = true
      + id                          = (known after apply)
      + location                    = "US-EAST1"
      + name                        = "borghaus-opentofou-bucket"
      + project                     = "borghaus"
      + project_number              = (known after apply)
      + public_access_prevention    = "enforced"
      + rpo                         = (known after apply)
      + self_link                   = (known after apply)
      + storage_class               = "STANDARD"
      + terraform_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + uniform_bucket_level_access = (known after apply)
      + url                         = (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -p stacks-opentofu
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -p stacks-opentofu

Plan: 1 to add, 0 to change, 0 to destroy.


Plan Summary

2 projects, 2 with changes, 0 with no changes, 0 failed

  • ⏩ To apply all unapplied plans from this Pull Request, comment:
    atlantis apply
  • 🚮 To delete all plans and locks from this Pull Request, comment:
    atlantis unlock

@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Ran Plan for 2 projects:

  1. project: stacks-terraform dir: stacks/terraform workspace: default
  2. project: stacks-opentofu dir: stacks/opentofu workspace: default

1. project: stacks-terraform dir: stacks/terraform workspace: default

Show Output
data.google_project.borghaus: Reading...
data.google_project.borghaus: Read complete after 1s [id=projects/borghaus]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create

Terraform will perform the following actions:

  # google_storage_bucket.terraform-bucket will be created
+ resource "google_storage_bucket" "terraform-bucket" {
      + effective_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + force_destroy               = true
      + id                          = (known after apply)
      + location                    = "US-EAST1"
      + name                        = "borghaus-terraform-bucket"
      + project                     = "borghaus"
      + project_number              = (known after apply)
      + public_access_prevention    = "enforced"
      + rpo                         = (known after apply)
      + self_link                   = (known after apply)
      + storage_class               = "STANDARD"
      + terraform_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + uniform_bucket_level_access = (known after apply)
      + url                         = (known after apply)

      + soft_delete_policy (known after apply)

      + versioning (known after apply)

      + website (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -p stacks-terraform
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -p stacks-terraform

Plan: 1 to add, 0 to change, 0 to destroy.


2. project: stacks-opentofu dir: stacks/opentofu workspace: default

Show Output
data.google_project.borghaus: Reading...
data.google_project.borghaus: Read complete after 1s [id=projects/borghaus]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create

Terraform will perform the following actions:

  # google_storage_bucket.opentofu-bucket will be created
+ resource "google_storage_bucket" "opentofu-bucket" {
      + effective_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + force_destroy               = true
      + id                          = (known after apply)
      + location                    = "US-EAST1"
      + name                        = "borghaus-opentofou-bucket"
      + project                     = "borghaus"
      + project_number              = (known after apply)
      + public_access_prevention    = "enforced"
      + rpo                         = (known after apply)
      + self_link                   = (known after apply)
      + storage_class               = "STANDARD"
      + terraform_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + uniform_bucket_level_access = (known after apply)
      + url                         = (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -p stacks-opentofu
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -p stacks-opentofu

Plan: 1 to add, 0 to change, 0 to destroy.


Plan Summary

2 projects, 2 with changes, 0 with no changes, 0 failed

  • ⏩ To apply all unapplied plans from this Pull Request, comment:
    atlantis apply
  • 🚮 To delete all plans and locks from this Pull Request, comment:
    atlantis unlock

@abborg
Copy link
Owner Author

abborg commented Nov 25, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Ran Plan for 2 projects:

  1. project: stacks-terraform dir: stacks/terraform workspace: default
  2. project: stacks-opentofu dir: stacks/opentofu workspace: default

1. project: stacks-terraform dir: stacks/terraform workspace: default

Show Output
data.google_project.borghaus: Reading...
data.google_project.borghaus: Read complete after 1s [id=projects/borghaus]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create

Terraform will perform the following actions:

  # google_storage_bucket.terraform-bucket will be created
+ resource "google_storage_bucket" "terraform-bucket" {
      + effective_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + force_destroy               = true
      + id                          = (known after apply)
      + location                    = "US-EAST1"
      + name                        = "borghaus-terraform-bucket"
      + project                     = "borghaus"
      + project_number              = (known after apply)
      + public_access_prevention    = "enforced"
      + rpo                         = (known after apply)
      + self_link                   = (known after apply)
      + storage_class               = "STANDARD"
      + terraform_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + uniform_bucket_level_access = (known after apply)
      + url                         = (known after apply)

      + soft_delete_policy (known after apply)

      + versioning (known after apply)

      + website (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -p stacks-terraform
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -p stacks-terraform

Plan: 1 to add, 0 to change, 0 to destroy.


2. project: stacks-opentofu dir: stacks/opentofu workspace: default

Show Output
data.google_project.borghaus: Reading...
data.google_project.borghaus: Read complete after 1s [id=projects/borghaus]

OpenTofu used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create

OpenTofu will perform the following actions:

  # google_storage_bucket.opentofu-bucket will be created
+ resource "google_storage_bucket" "opentofu-bucket" {
      + effective_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + force_destroy               = true
      + id                          = (known after apply)
      + location                    = "US-EAST1"
      + name                        = "borghaus-opentofou-bucket"
      + project                     = "borghaus"
      + project_number              = (known after apply)
      + public_access_prevention    = "enforced"
      + rpo                         = (known after apply)
      + self_link                   = (known after apply)
      + storage_class               = "STANDARD"
      + terraform_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + uniform_bucket_level_access = (known after apply)
      + url                         = (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -p stacks-opentofu
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -p stacks-opentofu

Plan: 1 to add, 0 to change, 0 to destroy.


Plan Summary

2 projects, 2 with changes, 0 with no changes, 0 failed

  • ⏩ To apply all unapplied plans from this Pull Request, comment:
    atlantis apply
  • 🚮 To delete all plans and locks from this Pull Request, comment:
    atlantis unlock

@abborg
Copy link
Owner Author

abborg commented Dec 14, 2024

atlantis plan

@abborg-atlantis
Copy link
Contributor

Ran Plan for 2 projects:

  1. project: stacks-terraform dir: stacks/terraform workspace: default
  2. project: stacks-opentofu dir: stacks/opentofu workspace: default

1. project: stacks-terraform dir: stacks/terraform workspace: default

Show Output
data.google_project.borghaus: Reading...
data.google_project.borghaus: Read complete after 1s [id=projects/borghaus]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create

Terraform will perform the following actions:

  # google_storage_bucket.terraform-bucket will be created
+ resource "google_storage_bucket" "terraform-bucket" {
      + effective_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + force_destroy               = true
      + id                          = (known after apply)
      + location                    = "US-EAST1"
      + name                        = "borghaus-terraform-bucket"
      + project                     = "borghaus"
      + project_number              = (known after apply)
      + public_access_prevention    = "enforced"
      + rpo                         = (known after apply)
      + self_link                   = (known after apply)
      + storage_class               = "STANDARD"
      + terraform_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + uniform_bucket_level_access = (known after apply)
      + url                         = (known after apply)

      + soft_delete_policy (known after apply)

      + versioning (known after apply)

      + website (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -p stacks-terraform
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -p stacks-terraform

Plan: 1 to add, 0 to change, 0 to destroy.


2. project: stacks-opentofu dir: stacks/opentofu workspace: default

Show Output
data.google_project.borghaus: Reading...
data.google_project.borghaus: Read complete after 1s [id=projects/borghaus]

OpenTofu used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create

OpenTofu will perform the following actions:

  # google_storage_bucket.opentofu-bucket will be created
+ resource "google_storage_bucket" "opentofu-bucket" {
      + effective_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + force_destroy               = true
      + id                          = (known after apply)
      + location                    = "US-EAST1"
      + name                        = "borghaus-opentofou-bucket"
      + project                     = "borghaus"
      + project_number              = (known after apply)
      + public_access_prevention    = "enforced"
      + rpo                         = (known after apply)
      + self_link                   = (known after apply)
      + storage_class               = "STANDARD"
      + terraform_labels            = {
          + "goog-terraform-provisioned" = "true"
        }
      + uniform_bucket_level_access = (known after apply)
      + url                         = (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -p stacks-opentofu
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -p stacks-opentofu

Plan: 1 to add, 0 to change, 0 to destroy.


Plan Summary

2 projects, 2 with changes, 0 with no changes, 0 failed

  • ⏩ To apply all unapplied plans from this Pull Request, comment:
    atlantis apply
  • 🚮 To delete all plans and locks from this Pull Request, comment:
    atlantis unlock

@abborg
Copy link
Owner Author

abborg commented Dec 14, 2024

atlantis apply

@abborg-atlantis
Copy link
Contributor

Ran Apply for 2 projects:

  1. project: stacks-opentofu dir: stacks/opentofu workspace: default
  2. project: stacks-terraform dir: stacks/terraform workspace: default

1. project: stacks-opentofu dir: stacks/opentofu workspace: default

google_storage_bucket.opentofu-bucket: Creating...
google_storage_bucket.opentofu-bucket: Creation complete after 1s [id=borghaus-opentofou-bucket]

Apply complete! Resources: 1 added, 0 changed, 0 destroyed.

2. project: stacks-terraform dir: stacks/terraform workspace: default

google_storage_bucket.terraform-bucket: Creating...
google_storage_bucket.terraform-bucket: Creation complete after 1s [id=borghaus-terraform-bucket]

Apply complete! Resources: 1 added, 0 changed, 0 destroyed.

Apply Summary

2 projects, 2 successful, 0 failed, 0 errored

@abborg-atlantis
Copy link
Contributor

Automatically merging because all plans have been successfully applied.

@abborg-atlantis abborg-atlantis bot merged commit 9c0f745 into master Dec 14, 2024
7 checks passed
@abborg-atlantis
Copy link
Contributor

Locks and plans deleted for the projects and workspaces modified in this pull request:

  • dir: stacks/opentofu workspace: default
  • dir: stacks/terraform workspace: default

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant