Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature | Add new SSO users for binbashers onboarding #624

Merged
merged 2 commits into from
Sep 2, 2024

Conversation

rodriguez-matias
Copy link
Contributor

@rodriguez-matias rodriguez-matias commented Aug 30, 2024

What?

Adding new sso users

[devops]

[off-boarding]

Why?

New binbash colaborators onboarding

@rodriguez-matias rodriguez-matias requested a review from a team as a code owner August 30, 2024 14:10
@rodriguez-matias rodriguez-matias changed the title feat: Add new SSO users for binbashers onboarding Feature | Add new SSO users for binbashers onboarding Aug 30, 2024
Copy link

github-actions bot commented Aug 30, 2024

💰 Infracost report

Monthly estimate generated

Estimate details (includes details of unsupported resources and skipped projects due to errors)
──────────────────────────────────
131 projects have no cost estimate changes.
Run the following command to see their breakdown: infracost breakdown --path=/path/to/code

──────────────────────────────────
2544 cloud resources were detected:
∙ 615 were estimated
∙ 1828 were free
∙ 101 are not supported yet, see https://infracost.io/requested-resources:
  ∙ 33 x aws_identitystore_group_membership
  ∙ 30 x aws_identitystore_user
  ∙ 10 x aws_guardduty_member
  ∙ 7 x aws_identitystore_group
  ∙ 5 x aws_fms_policy
  ∙ 4 x aws_guardduty_detector
  ∙ 2 x aws_guardduty_organization_admin_account
  ∙ 2 x aws_guardduty_organization_configuration
  ∙ 2 x aws_organizations_delegated_administrator
  ∙ 1 x aws_eks_access_entry
  ∙ 1 x aws_fms_admin_account
  ∙ 1 x aws_organizations_organization
  ∙ 1 x aws_route53_resolver_firewall_domain_list
  ∙ 1 x aws_route53_resolver_firewall_rule
  ∙ 1 x aws_route53_resolver_firewall_rule_group
This comment will be updated when code changes.

@rodriguez-matias
Copy link
Contributor Author

rodriguez-matias commented Aug 30, 2024

TF apply

╰─❯ leverage terraform apply


Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # aws_identitystore_group_membership.default["ariel.jalil_devops"] will be created
  + resource "aws_identitystore_group_membership" "default" {
      + group_id          = "64b8e4d8-2021-7077-f761-7e9cb2c9b7ea"
      + id                = (known after apply)
      + identity_store_id = "d-906752b26f"
      + member_id         = (known after apply)
      + membership_id     = (known after apply)
    }

  # aws_identitystore_group_membership.default["federico.losso_devops"] will be created
  + resource "aws_identitystore_group_membership" "default" {
      + group_id          = "64b8e4d8-2021-7077-f761-7e9cb2c9b7ea"
      + id                = (known after apply)
      + identity_store_id = "d-906752b26f"
      + member_id         = (known after apply)
      + membership_id     = (known after apply)
    }

  # aws_identitystore_user.default["ariel.jalil"] will be created
  + resource "aws_identitystore_user" "default" {
      + display_name      = "Ariel Jalil"
      + external_ids      = (known after apply)
      + id                = (known after apply)
      + identity_store_id = "d-906752b26f"
      + user_id           = (known after apply)
      + user_name         = "[email protected]"

      + emails {
          + primary = true
          + value   = "[email protected]"
        }

      + name {
          + family_name = "Jalil"
          + given_name  = "Ariel"
        }
    }

  # aws_identitystore_user.default["federico.losso"] will be created
  + resource "aws_identitystore_user" "default" {
      + display_name      = "Federico Losso"
      + external_ids      = (known after apply)
      + id                = (known after apply)
      + identity_store_id = "d-906752b26f"
      + user_id           = (known after apply)
      + user_name         = "[email protected]"

      + emails {
          + primary = true
          + value   = "[email protected]"
        }

      + name {
          + family_name = "Losso"
          + given_name  = "Federico"
        }
    }

Plan: 4 to add, 0 to change, 0 to destroy.

Do you want to perform these actions?
  Terraform will perform the actions described above.
  Only 'yes' will be accepted to approve.

  Enter a value: yes

aws_identitystore_user.default["ariel.jalil"]: Creating...
aws_identitystore_user.default["federico.losso"]: Creating...
aws_identitystore_user.default["federico.losso"]: Creation complete after 1s [id=d-906752b26f/e4485418-8011-70f3-dd97-1c729d9ed896]
aws_identitystore_user.default["ariel.jalil"]: Creation complete after 1s [id=d-906752b26f/c488e488-a021-70ac-7015-d5418e0a6e24]
aws_identitystore_group_membership.default["federico.losso_devops"]: Creating...
aws_identitystore_group_membership.default["ariel.jalil_devops"]: Creating...
aws_identitystore_group_membership.default["federico.losso_devops"]: Creation complete after 1s [id=d-906752b26f/74686448-f0c1-70e0-72b3-7eb47106ec9f]
aws_identitystore_group_membership.default["ariel.jalil_devops"]: Creation complete after 1s [id=d-906752b26f/2408e408-40f1-70eb-3b29-5761e4654252]
Releasing state lock. This may take a few moments...

Apply complete! Resources: 4 added, 0 changed, 0 destroyed.

@rodriguez-matias
Copy link
Contributor Author

Off-boarding Gonzalo Gasperini

TF apply

Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
  - destroy

Terraform will perform the following actions:

  # aws_identitystore_group_membership.default["gonzalo.gasperini_devops"] will be destroyed
  # (because key ["gonzalo.gasperini_devops"] is not in for_each map)
  - resource "aws_identitystore_group_membership" "default" {
      - group_id          = "64b8e4d8-2021-7077-f761-7e9cb2c9b7ea" -> null
      - id                = "d-906752b26f/f4d8f4e8-c0b1-7027-50e8-6653cca19fa8" -> null
      - identity_store_id = "d-906752b26f" -> null
      - member_id         = "74c8e418-3021-7046-4193-efbfff57952c" -> null
      - membership_id     = "f4d8f4e8-c0b1-7027-50e8-6653cca19fa8" -> null
    }

  # aws_identitystore_user.default["gonzalo.gasperini"] will be destroyed
  # (because key ["gonzalo.gasperini"] is not in for_each map)
  - resource "aws_identitystore_user" "default" {
      - display_name      = "Gonzalo Gasperini" -> null
      - external_ids      = [] -> null
      - id                = "d-906752b26f/74c8e418-3021-7046-4193-efbfff57952c" -> null
      - identity_store_id = "d-906752b26f" -> null
      - user_id           = "74c8e418-3021-7046-4193-efbfff57952c" -> null
      - user_name         = "[email protected]" -> null

      - emails {
          - primary = true -> null
          - value   = "[email protected]" -> null
        }

      - name {
          - family_name = "Gasperini" -> null
          - given_name  = "Gonzalo" -> null
        }
    }

Plan: 0 to add, 0 to change, 2 to destroy.

Do you want to perform these actions?
  Terraform will perform the actions described above.
  Only 'yes' will be accepted to approve.

  Enter a value: yes

aws_identitystore_group_membership.default["gonzalo.gasperini_devops"]: Destroying... [id=d-906752b26f/f4d8f4e8-c0b1-7027-50e8-6653cca19fa8]
aws_identitystore_group_membership.default["gonzalo.gasperini_devops"]: Destruction complete after 2s
aws_identitystore_user.default["gonzalo.gasperini"]: Destroying... [id=d-906752b26f/74c8e418-3021-7046-4193-efbfff57952c]
aws_identitystore_user.default["gonzalo.gasperini"]: Destruction complete after 0s
Releasing state lock. This may take a few moments...

Apply complete! Resources: 0 added, 0 changed, 2 destroyed.

@rodriguez-matias rodriguez-matias merged commit a640cdf into master Sep 2, 2024
6 checks passed
@rodriguez-matias rodriguez-matias deleted the FEATURE/add-new-devops-user branch September 2, 2024 20:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants