Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature | Add new SSO user Juan Manuel Vera for binbash onboarding #625

Merged
merged 2 commits into from
Sep 6, 2024

Conversation

rodriguez-matias
Copy link
Contributor

What?

Adding new sso users

[devops]

Why?

New binbash colaborators onboarding

@rodriguez-matias rodriguez-matias requested a review from a team as a code owner September 6, 2024 19:18
Copy link

github-actions bot commented Sep 6, 2024

💰 Infracost report

Monthly estimate generated

Estimate details (includes details of unsupported resources and skipped projects due to errors)
──────────────────────────────────
131 projects have no cost estimate changes.
Run the following command to see their breakdown: infracost breakdown --path=/path/to/code

──────────────────────────────────
2546 cloud resources were detected:
∙ 615 were estimated
∙ 1828 were free
∙ 103 are not supported yet, see https://infracost.io/requested-resources:
  ∙ 34 x aws_identitystore_group_membership
  ∙ 31 x aws_identitystore_user
  ∙ 10 x aws_guardduty_member
  ∙ 7 x aws_identitystore_group
  ∙ 5 x aws_fms_policy
  ∙ 4 x aws_guardduty_detector
  ∙ 2 x aws_guardduty_organization_admin_account
  ∙ 2 x aws_guardduty_organization_configuration
  ∙ 2 x aws_organizations_delegated_administrator
  ∙ 1 x aws_eks_access_entry
  ∙ 1 x aws_fms_admin_account
  ∙ 1 x aws_organizations_organization
  ∙ 1 x aws_route53_resolver_firewall_domain_list
  ∙ 1 x aws_route53_resolver_firewall_rule
  ∙ 1 x aws_route53_resolver_firewall_rule_group
This comment will be updated when code changes.

@rodriguez-matias
Copy link
Contributor Author

TF apply

╰─❯ leverage tf apply -target=aws_identitystore_user.default -target=aws_identitystore_group_membership.default

Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # aws_identitystore_group_membership.default["juan.vera_devops"] will be created
  + resource "aws_identitystore_group_membership" "default" {
      + group_id          = "64b8e4d8-2021-7077-f761-7e9cb2c9b7ea"
      + id                = (known after apply)
      + identity_store_id = "d-906752b26f"
      + member_id         = (known after apply)
      + membership_id     = (known after apply)
    }

  # aws_identitystore_user.default["juan.vera"] will be created
  + resource "aws_identitystore_user" "default" {
      + display_name      = "Juan Manuel Vera"
      + external_ids      = (known after apply)
      + id                = (known after apply)
      + identity_store_id = "d-906752b26f"
      + user_id           = (known after apply)
      + user_name         = "[email protected]"

      + emails {
          + primary = true
          + value   = "[email protected]"
        }

      + name {
          + family_name = "Vera"
          + given_name  = "Juan Manuel"
        }
    }

Plan: 2 to add, 0 to change, 0 to destroy.
╷
│ Warning: Resource targeting is in effect
│ 
│ You are creating a plan with the -target option, which means that the result of this plan may not represent all of the changes requested by the current configuration.
│ 
│ The -target option is not for routine use, and is provided only for exceptional situations such as recovering from errors or mistakes, or when Terraform specifically suggests to use it as part of an
│ error message.
╵

Do you want to perform these actions?
  Terraform will perform the actions described above.
  Only 'yes' will be accepted to approve.

  Enter a value: yes

aws_identitystore_user.default["juan.vera"]: Creating...
aws_identitystore_user.default["juan.vera"]: Creation complete after 1s [id=d-906752b26f/84289458-e001-7044-ecf4-aac99ca469b2]
aws_identitystore_group_membership.default["juan.vera_devops"]: Creating...
aws_identitystore_group_membership.default["juan.vera_devops"]: Creation complete after 0s [id=d-906752b26f/8408b448-9031-7037-4c78-d5aa79bb69e1]
╷
│ Warning: Applied changes may be incomplete
│ 
│ The plan was created with the -target option in effect, so some changes requested in the configuration may have been ignored and the output values may not be fully updated. Run the following command to
│ verify that no other changes are pending:
│     terraform plan
│ 
│ Note that the -target option is not suitable for routine use, and is provided only for exceptional situations such as recovering from errors or mistakes, or when Terraform specifically suggests to use
│ it as part of an error message.
╵
Releasing state lock. This may take a few moments...

Apply complete! Resources: 2 added, 0 changed, 0 destroyed.

@rodriguez-matias rodriguez-matias merged commit ff26100 into master Sep 6, 2024
7 of 8 checks passed
@rodriguez-matias rodriguez-matias deleted the FEATURE/add-devops-user branch September 6, 2024 19:27
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants