Skip to content

chore(deps): update all minor dependencies#1114

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/all-minor
Open

chore(deps): update all minor dependencies#1114
renovate[bot] wants to merge 1 commit intomainfrom
renovate/all-minor

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate bot commented Oct 11, 2025

This PR contains the following updates:

Package Type Update Change Age Confidence
python (source) minor 3.123.14 age confidence
random (source) required_provider minor =3.6.03.8.1 age confidence
yarn (source) packageManager minor 4.10.34.13.0 age confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.

Review

  • Updates have been tested and work
  • If updates are AWS related, versions match the infrastructure (e.g. Lambda runtime, database, etc.)

Release Notes

python/cpython (python)

v3.14.4

Compare Source

v3.14.3

Compare Source

v3.14.2

Compare Source

v3.14.1

Compare Source

v3.14.0

Compare Source

v3.13.13

Compare Source

v3.13.12

Compare Source

v3.13.11

Compare Source

v3.13.10

Compare Source

v3.13.9

Compare Source

v3.13.8

Compare Source

v3.13.7

Compare Source

v3.13.6

Compare Source

v3.13.5

Compare Source

v3.13.4

Compare Source

v3.13.3

Compare Source

v3.13.2

Compare Source

v3.13.1

Compare Source

v3.13.0

Compare Source

hashicorp/terraform-provider-random (random)

v3.8.1

Compare Source

NOTES:

  • This release introduces no functional changes but has been signed with a valid certificate for the windows binary. (#​749)

v3.8.0

Compare Source

ENHANCEMENTS:

  • Add uuid4 and uuid7 resources to generate valid random uuids of the appropriate version (#​402)

v3.7.2

Compare Source

NOTES:

v3.7.1

Compare Source

NOTES:

FEATURES:

  • ephemeral/random_password: New ephemeral resource that generates a password string. When used in combination with a managed resource write-only attribute, Terraform will not store the password in the plan or state file. (#​625)

v3.6.3

Compare Source

NOTES:

  • all: This release introduces no functional changes. It does however include dependency updates which address upstream CVEs. (#​604)

v3.6.2

Compare Source

NOTES:

  • resource/random_pet: Results have been updated to the latest upstream petname data (#​581)

v3.6.1

Compare Source

BUG FIXES:

  • all: Prevent keepers from triggering an in-place update following import (#​385)
  • resource/random_shuffle: Prevent inconsistent result after apply when result_count is set to 0 (#​409)
  • provider/random_password: Fix bug which causes panic when special, upper, lower and number/numeric are all false (#​551)
  • provider/random_string: Fix bug which causes panic when special, upper, lower and number/numeric are all false (#​551)
yarnpkg/berry (yarn)

v4.13.0

Compare Source

v4.12.0

Compare Source

v4.11.0

Compare Source


Configuration

📅 Schedule: (in timezone America/Montreal)

  • Branch creation
    • "every weekend"
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/all-minor branch 8 times, most recently from de09a7e to 2294924 Compare October 20, 2025 13:28
@renovate renovate bot force-pushed the renovate/all-minor branch 8 times, most recently from fe85611 to 4b694d8 Compare October 27, 2025 18:15
@renovate renovate bot force-pushed the renovate/all-minor branch 9 times, most recently from 1efc618 to b309212 Compare November 3, 2025 16:06
@renovate renovate bot force-pushed the renovate/all-minor branch from b309212 to c8deb28 Compare November 4, 2025 18:12
@renovate renovate bot force-pushed the renovate/all-minor branch 7 times, most recently from 028d6ba to 7142e52 Compare December 1, 2025 13:06
@renovate renovate bot force-pushed the renovate/all-minor branch 7 times, most recently from 88b3752 to 988dc04 Compare December 8, 2025 03:04
@renovate renovate bot force-pushed the renovate/all-minor branch 7 times, most recently from 559f4c9 to 853a240 Compare December 16, 2025 13:30
@github-actions
Copy link
Copy Markdown

github-actions bot commented Apr 2, 2026

Staging: network

✅   Terraform Init: success
✅   Terraform Validate: success
✅   Terraform Format: success
✅   Terraform Plan: success
✅   Conftest: success

Plan: 1 to move, 19 to add, 6 to change, 0 to destroy
Show summary
CHANGE NAME
add aws_cloudwatch_log_group.forms
aws_networkfirewall_firewall.forms
aws_networkfirewall_firewall_policy.forms
aws_networkfirewall_logging_configuration.forms
aws_networkfirewall_rule_group.general
aws_route.ig[0]
aws_route.ig[1]
aws_route.ig[2]
aws_route_table.firewall
aws_route_table.forms_public_subnet[1]
aws_route_table.forms_public_subnet[2]
aws_route_table.ig
aws_route_table_association.firewall[0]
aws_route_table_association.firewall[1]
aws_route_table_association.firewall[2]
aws_route_table_association.ig
aws_subnet.firewall[0]
aws_subnet.firewall[1]
aws_subnet.firewall[2]
update aws_nat_gateway.forms[0]
aws_nat_gateway.forms[1]
aws_nat_gateway.forms[2]
aws_route_table.forms_public_subnet[0]
aws_route_table_association.forms[1]
aws_route_table_association.forms[2]
Show plan
Resource actions are indicated with the following symbols:
  + create
  ~ update in-place

Terraform will perform the following actions:

  # aws_cloudwatch_log_group.forms will be created
  + resource "aws_cloudwatch_log_group" "forms" {
      + arn                         = (known after apply)
      + deletion_protection_enabled = (known after apply)
      + id                          = (known after apply)
      + kms_key_id                  = "arn:aws:kms:ca-central-1:687401027353:key/c5c2a1c2-c092-4fa1-8daf-3414f3511b1d"
      + log_group_class             = (known after apply)
      + name                        = "Network-Firewall"
      + name_prefix                 = (known after apply)
      + region                      = "ca-central-1"
      + retention_in_days           = 14
      + skip_destroy                = false
      + tags_all                    = {
          + "CostCentre" = "forms-platform-staging"
          + "Terraform"  = "true"
        }
    }

  # aws_nat_gateway.forms[0] will be updated in-place
  ~ resource "aws_nat_gateway" "forms" {
        id                                 = "nat-0bc32e0a102af6307"
      + regional_nat_gateway_address       = (known after apply)
        tags                               = {
            "Name" = "forms NAT GW"
        }
        # (14 unchanged attributes hidden)
    }

  # aws_nat_gateway.forms[1] will be updated in-place
  ~ resource "aws_nat_gateway" "forms" {
        id                                 = "nat-0e15bed048be78449"
      + regional_nat_gateway_address       = (known after apply)
        tags                               = {
            "Name" = "forms NAT GW"
        }
        # (14 unchanged attributes hidden)
    }

  # aws_nat_gateway.forms[2] will be updated in-place
  ~ resource "aws_nat_gateway" "forms" {
        id                                 = "nat-0baf8923e7bdf4142"
      + regional_nat_gateway_address       = (known after apply)
        tags                               = {
            "Name" = "forms NAT GW"
        }
        # (14 unchanged attributes hidden)
    }

  # aws_networkfirewall_firewall.forms will be created
  + resource "aws_networkfirewall_firewall" "forms" {
      + arn                                 = (known after apply)
      + availability_zone_change_protection = false
      + delete_protection                   = true
      + description                         = "Firewall limiting outbound traffic.  WAF handles inbound"
      + firewall_policy_arn                 = (known after apply)
      + firewall_status                     = (known after apply)
      + id                                  = (known after apply)
      + name                                = "GCForms"
      + region                              = "ca-central-1"
      + tags_all                            = {
          + "CostCentre" = "forms-platform-staging"
          + "Terraform"  = "true"
        }
      + transit_gateway_owner_account_id    = (known after apply)
      + update_token                        = (known after apply)
      + vpc_id                              = "vpc-0ad5b3739860129d0"

      + availability_zone_mapping (known after apply)

      + subnet_mapping {
          + ip_address_type = "IPV4"
          + subnet_id       = "subnet-02f5e1518cb9b8687"
        }
      + subnet_mapping {
          + ip_address_type = "IPV4"
          + subnet_id       = "subnet-04d5fe34c570252ad"
        }
      + subnet_mapping {
          + ip_address_type = "IPV4"
          + subnet_id       = "subnet-0db171c9d80cdcc04"
        }
    }

  # aws_networkfirewall_firewall_policy.forms will be created
  + resource "aws_networkfirewall_firewall_policy" "forms" {
      + arn          = (known after apply)
      + id           = (known after apply)
      + name         = "forms"
      + region       = "ca-central-1"
      + tags_all     = {
          + "CostCentre" = "forms-platform-staging"
          + "Terraform"  = "true"
        }
      + update_token = (known after apply)

      + firewall_policy {
          + stateless_default_actions          = [
              + "aws:forward_to_sfe",
            ]
          + stateless_fragment_default_actions = [
              + "aws:forward_to_sfe",
            ]

          + stateful_rule_group_reference {
              + deep_threat_inspection = (known after apply)
              + resource_arn           = (known after apply)
            }
        }
    }

  # aws_networkfirewall_logging_configuration.forms will be created
  + resource "aws_networkfirewall_logging_configuration" "forms" {
      + enable_monitoring_dashboard = true
      + firewall_arn                = (known after apply)
      + id                          = (known after apply)
      + region                      = "ca-central-1"

      + logging_configuration {
          + log_destination_config {
              + log_destination      = {
                  + "logGroup" = "Network-Firewall"
                }
              + log_destination_type = "CloudWatchLogs"
              + log_type             = "ALERT"
            }
        }
    }

  # aws_networkfirewall_rule_group.general will be created
  + resource "aws_networkfirewall_rule_group" "general" {
      + arn          = (known after apply)
      + capacity     = 10
      + description  = "Only allow web traffic and deny everything else"
      + id           = (known after apply)
      + name         = "general"
      + region       = "ca-central-1"
      + tags_all     = {
          + "CostCentre" = "forms-platform-staging"
          + "Terraform"  = "true"
        }
      + type         = "STATEFUL"
      + update_token = (known after apply)

      + rule_group {
          + rules_source {
              + stateful_rule {
                  + action = "PASS"

                  + header {
                      + destination      = "172.16.48.0/20"
                      + destination_port = "ANY"
                      + direction        = "FORWARD"
                      + protocol         = "HTTP"
                      + source           = "ANY"
                      + source_port      = "ANY"
                    }

                  + rule_option {
                      + keyword  = "sid"
                      + settings = [
                          + "1",
                        ]
                    }
                }
              + stateful_rule {
                  + action = "PASS"

                  + header {
                      + destination      = "172.16.64.0/20"
                      + destination_port = "ANY"
                      + direction        = "FORWARD"
                      + protocol         = "HTTP"
                      + source           = "ANY"
                      + source_port      = "ANY"
                    }

                  + rule_option {
                      + keyword  = "sid"
                      + settings = [
                          + "2",
                        ]
                    }
                }
              + stateful_rule {
                  + action = "PASS"

                  + header {
                      + destination      = "172.16.80.0/20"
                      + destination_port = "ANY"
                      + direction        = "FORWARD"
                      + protocol         = "HTTP"
                      + source           = "ANY"
                      + source_port      = "ANY"
                    }

                  + rule_option {
                      + keyword  = "sid"
                      + settings = [
                          + "3",
                        ]
                    }
                }
              + stateful_rule {
                  + action = "ALERT"

                  + header {
                      + destination      = "ANY"
                      + destination_port = "ANY"
                      + direction        = "FORWARD"
                      + protocol         = "IP"
                      + source           = "172.16.48.0/20"
                      + source_port      = "ANY"
                    }

                  + rule_option {
                      + keyword  = "sid"
                      + settings = [
                          + "4",
                        ]
                    }
                }
              + stateful_rule {
                  + action = "ALERT"

                  + header {
                      + destination      = "ANY"
                      + destination_port = "ANY"
                      + direction        = "FORWARD"
                      + protocol         = "IP"
                      + source           = "172.16.64.0/20"
                      + source_port      = "ANY"
                    }

                  + rule_option {
                      + keyword  = "sid"
                      + settings = [
                          + "5",
                        ]
                    }
                }
              + stateful_rule {
                  + action = "ALERT"

                  + header {
                      + destination      = "ANY"
                      + destination_port = "ANY"
                      + direction        = "FORWARD"
                      + protocol         = "IP"
                      + source           = "172.16.80.0/20"
                      + source_port      = "ANY"
                    }

                  + rule_option {
                      + keyword  = "sid"
                      + settings = [
                          + "6",
                        ]
                    }
                }
              + stateful_rule {
                  + action = "DROP"

                  + header {
                      + destination      = "ANY"
                      + destination_port = "ANY"
                      + direction        = "ANY"
                      + protocol         = "IP"
                      + source           = "ANY"
                      + source_port      = "ANY"
                    }

                  + rule_option {
                      + keyword  = "sid"
                      + settings = [
                          + "7",
                        ]
                    }
                }
            }
        }
    }

  # aws_route.ig[0] will be created
  + resource "aws_route" "ig" {
      + destination_cidr_block = "172.16.48.0/20"
      + id                     = (known after apply)
      + instance_id            = (known after apply)
      + instance_owner_id      = (known after apply)
      + network_interface_id   = (known after apply)
      + origin                 = (known after apply)
      + region                 = "ca-central-1"
      + route_table_id         = (known after apply)
      + state                  = (known after apply)
      + vpc_endpoint_id        = (known after apply)
    }

  # aws_route.ig[1] will be created
  + resource "aws_route" "ig" {
      + destination_cidr_block = "172.16.64.0/20"
      + id                     = (known after apply)
      + instance_id            = (known after apply)
      + instance_owner_id      = (known after apply)
      + network_interface_id   = (known after apply)
      + origin                 = (known after apply)
      + region                 = "ca-central-1"
      + route_table_id         = (known after apply)
      + state                  = (known after apply)
      + vpc_endpoint_id        = (known after apply)
    }

  # aws_route.ig[2] will be created
  + resource "aws_route" "ig" {
      + destination_cidr_block = "172.16.80.0/20"
      + id                     = (known after apply)
      + instance_id            = (known after apply)
      + instance_owner_id      = (known after apply)
      + network_interface_id   = (known after apply)
      + origin                 = (known after apply)
      + region                 = "ca-central-1"
      + route_table_id         = (known after apply)
      + state                  = (known after apply)
      + vpc_endpoint_id        = (known after apply)
    }

  # aws_route_table.firewall will be created
  + resource "aws_route_table" "firewall" {
      + arn              = (known after apply)
      + id               = (known after apply)
      + owner_id         = (known after apply)
      + propagating_vgws = (known after apply)
      + region           = "ca-central-1"
      + route            = [
          + {
              + cidr_block                 = "0.0.0.0/0"
              + gateway_id                 = "igw-0aca6f076a25af86f"
                # (11 unchanged attributes hidden)
            },
        ]
      + tags             = {
          + "Name" = "Firewall Inspection Route Table"
        }
      + tags_all         = {
          + "CostCentre" = "forms-platform-staging"
          + "Name"       = "Firewall Inspection Route Table"
          + "Terraform"  = "true"
        }
      + vpc_id           = "vpc-0ad5b3739860129d0"
    }

  # aws_route_table.forms_public_subnet[0] will be updated in-place
  # (moved from aws_route_table.forms_public_subnet)
  ~ resource "aws_route_table" "forms_public_subnet" {
        id               = "rtb-03b4c5e3b272ae847"
      ~ route            = [
          - {
              - cidr_block                 = "0.0.0.0/0"
              - gateway_id                 = "igw-0aca6f076a25af86f"
                # (11 unchanged attributes hidden)
            },
          + {
              + cidr_block                 = "0.0.0.0/0"
              + vpc_endpoint_id            = (known after apply)
                # (11 unchanged attributes hidden)
            },
        ]
      ~ tags             = {
          ~ "Name" = "Public Subnet Route Table" -> "Public Subnet Route Table 0"
        }
      ~ tags_all         = {
          ~ "Name"       = "Public Subnet Route Table" -> "Public Subnet Route Table 0"
            # (2 unchanged elements hidden)
        }
        # (5 unchanged attributes hidden)
    }

  # aws_route_table.forms_public_subnet[1] will be created
  + resource "aws_route_table" "forms_public_subnet" {
      + arn              = (known after apply)
      + id               = (known after apply)
      + owner_id         = (known after apply)
      + propagating_vgws = (known after apply)
      + region           = "ca-central-1"
      + route            = [
          + {
              + cidr_block                 = "0.0.0.0/0"
              + vpc_endpoint_id            = (known after apply)
                # (11 unchanged attributes hidden)
            },
        ]
      + tags             = {
          + "Name" = "Public Subnet Route Table 1"
        }
      + tags_all         = {
          + "CostCentre" = "forms-platform-staging"
          + "Name"       = "Public Subnet Route Table 1"
          + "Terraform"  = "true"
        }
      + vpc_id           = "vpc-0ad5b3739860129d0"
    }

  # aws_route_table.forms_public_subnet[2] will be created
  + resource "aws_route_table" "forms_public_subnet" {
      + arn              = (known after apply)
      + id               = (known after apply)
      + owner_id         = (known after apply)
      + propagating_vgws = (known after apply)
      + region           = "ca-central-1"
      + route            = [
          + {
              + cidr_block                 = "0.0.0.0/0"
              + vpc_endpoint_id            = (known after apply)
                # (11 unchanged attributes hidden)
            },
        ]
      + tags             = {
          + "Name" = "Public Subnet Route Table 2"
        }
      + tags_all         = {
          + "CostCentre" = "forms-platform-staging"
          + "Name"       = "Public Subnet Route Table 2"
          + "Terraform"  = "true"
        }
      + vpc_id           = "vpc-0ad5b3739860129d0"
    }

  # aws_route_table.ig will be created
  + resource "aws_route_table" "ig" {
      + arn              = (known after apply)
      + id               = (known after apply)
      + owner_id         = (known after apply)
      + propagating_vgws = (known after apply)
      + region           = "ca-central-1"
      + route            = (known after apply)
      + tags             = {
          + "Name" = "Internet Gateway Ingress Route Table"
        }
      + tags_all         = {
          + "CostCentre" = "forms-platform-staging"
          + "Name"       = "Internet Gateway Ingress Route Table"
          + "Terraform"  = "true"
        }
      + vpc_id           = "vpc-0ad5b3739860129d0"
    }

  # aws_route_table_association.firewall[0] will be created
  + resource "aws_route_table_association" "firewall" {
      + id             = (known after apply)
      + region         = "ca-central-1"
      + route_table_id = (known after apply)
      + subnet_id      = (known after apply)
    }

  # aws_route_table_association.firewall[1] will be created
  + resource "aws_route_table_association" "firewall" {
      + id             = (known after apply)
      + region         = "ca-central-1"
      + route_table_id = (known after apply)
      + subnet_id      = (known after apply)
    }

  # aws_route_table_association.firewall[2] will be created
  + resource "aws_route_table_association" "firewall" {
      + id             = (known after apply)
      + region         = "ca-central-1"
      + route_table_id = (known after apply)
      + subnet_id      = (known after apply)
    }

  # aws_route_table_association.forms[1] will be updated in-place
  ~ resource "aws_route_table_association" "forms" {
        id             = "rtbassoc-0e5879abdca260c20"
      ~ route_table_id = "rtb-03b4c5e3b272ae847" -> (known after apply)
        # (3 unchanged attributes hidden)
    }

  # aws_route_table_association.forms[2] will be updated in-place
  ~ resource "aws_route_table_association" "forms" {
        id             = "rtbassoc-0a9fdbbde3ccedb67"
      ~ route_table_id = "rtb-03b4c5e3b272ae847" -> (known after apply)
        # (3 unchanged attributes hidden)
    }

  # aws_route_table_association.ig will be created
  + resource "aws_route_table_association" "ig" {
      + gateway_id     = "igw-0aca6f076a25af86f"
      + id             = (known after apply)
      + region         = "ca-central-1"
      + route_table_id = (known after apply)
    }

  # aws_subnet.firewall[0] will be created
  + resource "aws_subnet" "firewall" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "ca-central-1a"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "172.16.112.0/28"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block                                = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = false
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = (known after apply)
      + region                                         = "ca-central-1"
      + tags                                           = {
          + "Access" = "public"
          + "Name"   = "Firewall Subnet"
        }
      + tags_all                                       = {
          + "Access"     = "public"
          + "CostCentre" = "forms-platform-staging"
          + "Name"       = "Firewall Subnet"
          + "Terraform"  = "true"
        }
      + vpc_id                                         = "vpc-0ad5b3739860129d0"
    }

  # aws_subnet.firewall[1] will be created
  + resource "aws_subnet" "firewall" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "ca-central-1b"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "172.16.112.16/28"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block                                = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = false
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = (known after apply)
      + region                                         = "ca-central-1"
      + tags                                           = {
          + "Access" = "public"
          + "Name"   = "Firewall Subnet"
        }
      + tags_all                                       = {
          + "Access"     = "public"
          + "CostCentre" = "forms-platform-staging"
          + "Name"       = "Firewall Subnet"
          + "Terraform"  = "true"
        }
      + vpc_id                                         = "vpc-0ad5b3739860129d0"
    }

  # aws_subnet.firewall[2] will be created
  + resource "aws_subnet" "firewall" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "ca-central-1d"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "172.16.112.32/28"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block                                = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = false
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = (known after apply)
      + region                                         = "ca-central-1"
      + tags                                           = {
          + "Access" = "public"
          + "Name"   = "Firewall Subnet"
        }
      + tags_all                                       = {
          + "Access"     = "public"
          + "CostCentre" = "forms-platform-staging"
          + "Name"       = "Firewall Subnet"
          + "Terraform"  = "true"
        }
      + vpc_id                                         = "vpc-0ad5b3739860129d0"
    }

Plan: 19 to add, 6 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Saved the plan to: plan.tfplan

To perform exactly these actions, run the following command to apply:
    terraform apply "plan.tfplan"
Show Conftest results
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_log_group.forms"]
WARN - plan.json - main - Missing Common Tags: ["aws_default_network_acl.forms"]
WARN - plan.json - main - Missing Common Tags: ["aws_default_security_group.default"]
WARN - plan.json - main - Missing Common Tags: ["aws_eip.forms_natgw[0]"]
WARN - plan.json - main - Missing Common Tags: ["aws_eip.forms_natgw[1]"]
WARN - plan.json - main - Missing Common Tags: ["aws_eip.forms_natgw[2]"]
WARN - plan.json - main - Missing Common Tags: ["aws_flow_log.vpc_flow_logs[0]"]
WARN - plan.json - main - Missing Common Tags: ["aws_internet_gateway.forms"]
WARN - plan.json - main - Missing Common Tags: ["aws_nat_gateway.forms[0]"]
WARN - plan.json - main - Missing Common Tags: ["aws_nat_gateway.forms[1]"]
WARN - plan.json - main - Missing Common Tags: ["aws_nat_gateway.forms[2]"]
WARN - plan.json - main - Missing Common Tags: ["aws_networkfirewall_firewall.forms"]
WARN - plan.json - main - Missing Common Tags: ["aws_networkfirewall_firewall_policy.forms"]
WARN - plan.json - main - Missing Common Tags: ["aws_networkfirewall_rule_group.general"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.firewall"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.forms_private_subnet[0]"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.forms_private_subnet[1]"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.forms_private_subnet[2]"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.forms_public_subnet[0]"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.forms_public_subnet[1]"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.forms_public_subnet[2]"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.ig"]
WARN - plan.json - main - Missing Common Tags: ["aws_security_group.api_ecs"]
WARN - plan.json - main - Missing Common Tags: ["aws_security_group.api_end_to_end_test_lambda"]
WARN -...

@github-actions
Copy link
Copy Markdown

github-actions bot commented Apr 2, 2026

Staging: load_balancer

❌   Terraform Init: failed
❌   Terraform Validate: failed
❌   Terraform Format: failed
❌   Terraform Plan: failed
❌   Conftest: failed

Show Init results
Initializing the backend...

Successfully configured the backend "s3"! Terraform will automatically
use this backend unless the backend configuration changes.
Initializing modules...
Downloading git::https://github.com/cds-snc/terraform-modules.git?ref=v5.1.11 for waf_ip_blocklist...
�[0;90m17:18:13.538�[0m �[0;32mINFO  �[0m Downloading Terraform configurations from ../../../aws into ./.terragrunt-cache/8CJu3E6tls1VOlHT6vQAFFRgrcQ/-syjFrdAaB-6kNXhMmF1nXBOp7o

Error: Failed to expand subdir globs

subdir "waf_ip_blocklist" not found
�[0;90m17:18:15.056�[0m �[0;31mERROR �[0m error occurred:

* Failed to execute "terraform init -no-color" in ./.terragrunt-cache/8CJu3E6tls1VOlHT6vQAFFRgrcQ/-syjFrdAaB-6kNXhMmF1nXBOp7o/load_balancer
  
  Error: Failed to expand subdir globs
  
  subdir "waf_ip_blocklist" not found
  
  exit status 1

Show Validate results
Error: Failed to expand subdir globs

subdir "waf_ip_blocklist" not found
�[0;90m17:18:19.497�[0m �[0;31mERROR �[0m error occurred:

* Failed to execute "terraform init -no-color" in ./.terragrunt-cache/8CJu3E6tls1VOlHT6vQAFFRgrcQ/-syjFrdAaB-6kNXhMmF1nXBOp7o/load_balancer
  
  Error: Failed to expand subdir globs
  
  subdir "waf_ip_blocklist" not found
  
  exit status 1

Show plan
Initializing the backend...
Initializing modules...
Downloading git::https://github.com/cds-snc/terraform-modules.git?ref=v5.1.11 for waf_ip_blocklist...

Error: Failed to expand subdir globs

subdir "waf_ip_blocklist" not found
�[0;90m17:18:28.939�[0m �[0;31mERROR �[0m error occurred:

* Failed to execute "terraform init -no-color" in ./.terragrunt-cache/8CJu3E6tls1VOlHT6vQAFFRgrcQ/-syjFrdAaB-6kNXhMmF1nXBOp7o/load_balancer
  
  Error: Failed to expand subdir globs
  
  subdir "waf_ip_blocklist" not found
  
  exit status 1

@github-actions
Copy link
Copy Markdown

⚠ Terrform update available

Terragrunt: 1.0.1 (using 1.0.0)

@github-actions
Copy link
Copy Markdown

Staging: s3

✅   Terraform Init: success
✅   Terraform Validate: success
✅   Terraform Format: success
✅   Terraform Plan: success
✅   Conftest: success

Plan: 0 to add, 5 to change, 0 to destroy
Show summary
CHANGE NAME
update aws_s3_bucket_server_side_encryption_configuration.archive_storage
aws_s3_bucket_server_side_encryption_configuration.audit_logs_archive_storage
aws_s3_bucket_server_side_encryption_configuration.prisma_migration_storage
aws_s3_bucket_server_side_encryption_configuration.reliability_file_storage
aws_s3_bucket_server_side_encryption_configuration.vault_file_storage
Show plan
Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # aws_s3_bucket_server_side_encryption_configuration.archive_storage will be updated in-place
  ~ resource "aws_s3_bucket_server_side_encryption_configuration" "archive_storage" {
        id                    = "forms-staging-archive-storage"
        # (3 unchanged attributes hidden)

      - rule {
          - blocked_encryption_types = [
              - "NONE",
            ] -> null
          - bucket_key_enabled       = false -> null

          - apply_server_side_encryption_by_default {
              - sse_algorithm     = "AES256" -> null
                # (1 unchanged attribute hidden)
            }
        }
      + rule {
          + blocked_encryption_types = []

          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

  # aws_s3_bucket_server_side_encryption_configuration.audit_logs_archive_storage will be updated in-place
  ~ resource "aws_s3_bucket_server_side_encryption_configuration" "audit_logs_archive_storage" {
        id                    = "forms-staging-audit-logs-archive-storage"
        # (3 unchanged attributes hidden)

      - rule {
          - blocked_encryption_types = [
              - "NONE",
            ] -> null
          - bucket_key_enabled       = false -> null

          - apply_server_side_encryption_by_default {
              - sse_algorithm     = "AES256" -> null
                # (1 unchanged attribute hidden)
            }
        }
      + rule {
          + blocked_encryption_types = []

          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

  # aws_s3_bucket_server_side_encryption_configuration.prisma_migration_storage will be updated in-place
  ~ resource "aws_s3_bucket_server_side_encryption_configuration" "prisma_migration_storage" {
        id                    = "forms-staging-prisma-migration-storage"
        # (3 unchanged attributes hidden)

      - rule {
          - blocked_encryption_types = [
              - "NONE",
            ] -> null
          - bucket_key_enabled       = false -> null

          - apply_server_side_encryption_by_default {
              - sse_algorithm     = "AES256" -> null
                # (1 unchanged attribute hidden)
            }
        }
      + rule {
          + blocked_encryption_types = []

          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

  # aws_s3_bucket_server_side_encryption_configuration.reliability_file_storage will be updated in-place
  ~ resource "aws_s3_bucket_server_side_encryption_configuration" "reliability_file_storage" {
        id                    = "forms-staging-reliability-file-storage"
        # (3 unchanged attributes hidden)

      - rule {
          - blocked_encryption_types = [
              - "NONE",
            ] -> null
          - bucket_key_enabled       = false -> null

          - apply_server_side_encryption_by_default {
              - sse_algorithm     = "AES256" -> null
                # (1 unchanged attribute hidden)
            }
        }
      + rule {
          + blocked_encryption_types = []

          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

  # aws_s3_bucket_server_side_encryption_configuration.vault_file_storage will be updated in-place
  ~ resource "aws_s3_bucket_server_side_encryption_configuration" "vault_file_storage" {
        id                    = "forms-staging-vault-file-storage"
        # (3 unchanged attributes hidden)

      - rule {
          - blocked_encryption_types = [
              - "NONE",
            ] -> null
          - bucket_key_enabled       = false -> null

          - apply_server_side_encryption_by_default {
              - sse_algorithm     = "AES256" -> null
                # (1 unchanged attribute hidden)
            }
        }
      + rule {
          + blocked_encryption_types = []

          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

Plan: 0 to add, 5 to change, 0 to destroy.

Warning: Argument is deprecated

  with module.etl_bucket.aws_s3_bucket.this,
  on .terraform/modules/etl_bucket/S3/main.tf line 8, in resource "aws_s3_bucket" "this":
   8: resource "aws_s3_bucket" "this" {

versioning is deprecated. Use the aws_s3_bucket_versioning resource instead.

(and 11 more similar warnings elsewhere)

─────────────────────────────────────────────────────────────────────────────

Saved the plan to: plan.tfplan

To perform exactly these actions, run the following command to apply:
    terraform apply "plan.tfplan"
Show Conftest results
WARN - plan.json - main - Missing Common Tags: ["aws_s3_bucket.archive_storage"]
WARN - plan.json - main - Missing Common Tags: ["aws_s3_bucket.audit_logs_archive_storage"]
WARN - plan.json - main - Missing Common Tags: ["aws_s3_bucket.prisma_migration_storage"]
WARN - plan.json - main - Missing Common Tags: ["aws_s3_bucket.reliability_file_storage"]
WARN - plan.json - main - Missing Common Tags: ["aws_s3_bucket.vault_file_storage"]

24 tests, 19 passed, 5 warnings, 0 failures, 0 exceptions

@github-actions
Copy link
Copy Markdown

Staging: network

✅   Terraform Init: success
✅   Terraform Validate: success
✅   Terraform Format: success
✅   Terraform Plan: success
✅   Conftest: success

Plan: 0 to add, 1 to change, 0 to destroy
Show summary
CHANGE NAME
update aws_networkfirewall_logging_configuration.forms_flow
Show plan
Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # aws_networkfirewall_logging_configuration.forms_flow will be updated in-place
  ~ resource "aws_networkfirewall_logging_configuration" "forms_flow" {
        id                          = "arn:aws:network-firewall:ca-central-1:687401027353:firewall/GCForms"
        # (3 unchanged attributes hidden)

      ~ logging_configuration {
          - log_destination_config {
              - log_destination      = {
                  - "logGroup" = "Network-Firewall-Alert"
                } -> null
              - log_destination_type = "CloudWatchLogs" -> null
              - log_type             = "ALERT" -> null
            }
          + log_destination_config {
              + log_destination      = {
                  + "logGroup" = "Network-Firewall-Flow"
                }
              + log_destination_type = "CloudWatchLogs"
              + log_type             = "ALERT"
            }
        }
    }

Plan: 0 to add, 1 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Saved the plan to: plan.tfplan

To perform exactly these actions, run the following command to apply:
    terraform apply "plan.tfplan"
Show Conftest results
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_log_group.forms_alert"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_log_group.forms_flow"]
WARN - plan.json - main - Missing Common Tags: ["aws_default_network_acl.forms"]
WARN - plan.json - main - Missing Common Tags: ["aws_default_security_group.default"]
WARN - plan.json - main - Missing Common Tags: ["aws_eip.forms_natgw[0]"]
WARN - plan.json - main - Missing Common Tags: ["aws_eip.forms_natgw[1]"]
WARN - plan.json - main - Missing Common Tags: ["aws_eip.forms_natgw[2]"]
WARN - plan.json - main - Missing Common Tags: ["aws_flow_log.vpc_flow_logs[0]"]
WARN - plan.json - main - Missing Common Tags: ["aws_internet_gateway.forms"]
WARN - plan.json - main - Missing Common Tags: ["aws_nat_gateway.forms[0]"]
WARN - plan.json - main - Missing Common Tags: ["aws_nat_gateway.forms[1]"]
WARN - plan.json - main - Missing Common Tags: ["aws_nat_gateway.forms[2]"]
WARN - plan.json - main - Missing Common Tags: ["aws_networkfirewall_firewall.forms"]
WARN - plan.json - main - Missing Common Tags: ["aws_networkfirewall_firewall_policy.forms"]
WARN - plan.json - main - Missing Common Tags: ["aws_networkfirewall_rule_group.suricata_rules"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.firewall"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.forms_private_subnet[0]"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.forms_private_subnet[1]"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.forms_private_subnet[2]"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.forms_public_subnet[0]"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.forms_public_subnet[1]"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.forms_public_subnet[2]"]
WARN - plan.json - main - Missing Common Tags: ["aws_route_table.ig"]
WARN - plan.json - main - Missing Common Tags: ["aws_security_group.api_ecs"]
WARN -...

@github-actions
Copy link
Copy Markdown

Staging: load_balancer

✅   Terraform Init: success
✅   Terraform Validate: success
✅   Terraform Format: success
✅   Terraform Plan: success
✅   Conftest: success

Plan: 0 to add, 1 to change, 0 to destroy
Show summary
CHANGE NAME
update aws_s3_bucket_server_side_encryption_configuration.maintenance_mode
Show plan
Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # aws_s3_bucket_server_side_encryption_configuration.maintenance_mode will be updated in-place
  ~ resource "aws_s3_bucket_server_side_encryption_configuration" "maintenance_mode" {
        id                    = "gc-forms-staging-application-maintenance-page"
        # (3 unchanged attributes hidden)

      - rule {
          - blocked_encryption_types = [
              - "NONE",
            ] -> null
          - bucket_key_enabled       = false -> null

          - apply_server_side_encryption_by_default {
              - sse_algorithm     = "AES256" -> null
                # (1 unchanged attribute hidden)
            }
        }
      + rule {
          + blocked_encryption_types = []

          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

Plan: 0 to add, 1 to change, 0 to destroy.

Warning: Deprecated attribute

  on .terraform/modules/waf_ip_blocklist/waf_ip_blocklist/data.tf line 6, in locals:
   6:   athena_region = var.athena_region != "" ? var.athena_region : data.aws_region.current.name

The attribute "name" is deprecated. Refer to the provider documentation for
details.

─────────────────────────────────────────────────────────────────────────────

Saved the plan to: plan.tfplan

To perform exactly these actions, run the following command to apply:
    terraform apply "plan.tfplan"
Show Conftest results
WARN - plan.json - main - Missing Common Tags: ["aws_acm_certificate.form_viewer"]
WARN - plan.json - main - Missing Common Tags: ["aws_acm_certificate.form_viewer_maintenance_mode"]
WARN - plan.json - main - Missing Common Tags: ["aws_acm_certificate.forms_api"]
WARN - plan.json - main - Missing Common Tags: ["aws_alb_listener_rule.forms_api"]
WARN - plan.json - main - Missing Common Tags: ["aws_alb_listener_rule.security_txt"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudfront_distribution.maintenance_mode"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_metric_alarm.UnHealthyHostCount-TargetGroup1"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_metric_alarm.UnHealthyHostCount-TargetGroup2"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_role.firehose_waf_logs"]
WARN - plan.json - main - Missing Common Tags: ["aws_kinesis_firehose_delivery_stream.firehose_waf_logs"]
WARN - plan.json - main - Missing Common Tags: ["aws_lb.form_viewer"]
WARN - plan.json - main - Missing Common Tags: ["aws_lb_listener.form_viewer_http"]
WARN - plan.json - main - Missing Common Tags: ["aws_lb_listener.form_viewer_https"]
WARN - plan.json - main - Missing Common Tags: ["aws_lb_target_group.form_viewer_1"]
WARN - plan.json - main - Missing Common Tags: ["aws_lb_target_group.form_viewer_2"]
WARN - plan.json - main - Missing Common Tags: ["aws_lb_target_group.forms_api"]
WARN - plan.json - main - Missing Common Tags: ["aws_route53_health_check.lb_web_app_global_target_group"]
WARN - plan.json - main - Missing Common Tags: ["aws_route53_health_check.lb_web_app_target_group_1"]
WARN - plan.json - main - Missing Common Tags: ["aws_route53_health_check.lb_web_app_target_group_2"]
WARN - plan.json - main - Missing Common Tags: ["aws_s3_bucket.maintenance_mode"]
WARN - plan.json - main - Missing Common Tags: ["aws_s3_object.maintenance_static_page_css_files[\"style.css\"]"]
WARN - plan.json - main - Missing Common Tags:...

@github-actions
Copy link
Copy Markdown

Staging: idp

✅   Terraform Init: success
✅   Terraform Validate: success
✅   Terraform Format: success
✅   Terraform Plan: success
✅   Conftest: success

Plan: 0 to add, 1 to change, 0 to destroy
Show summary
CHANGE NAME
update module.user_portal_code_pipeline[0].aws_s3_bucket_server_side_encryption_configuration.codepipeline_bucket
Show plan
Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # module.user_portal_code_pipeline[0].aws_s3_bucket_server_side_encryption_configuration.codepipeline_bucket will be updated in-place
  ~ resource "aws_s3_bucket_server_side_encryption_configuration" "codepipeline_bucket" {
        id                    = "idp-user-portal-pipeline"
        # (3 unchanged attributes hidden)

      - rule {
          - blocked_encryption_types = [
              - "NONE",
            ] -> null
          - bucket_key_enabled       = false -> null

          - apply_server_side_encryption_by_default {
              - sse_algorithm     = "AES256" -> null
                # (1 unchanged attribute hidden)
            }
        }
      + rule {
          + blocked_encryption_types = []

          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

Plan: 0 to add, 1 to change, 0 to destroy.

Warning: Deprecated attribute

  on .terraform/modules/idp_database/rds/locals.tf line 14, in locals:
  14:   region        = data.aws_region.current.name

The attribute "name" is deprecated. Refer to the provider documentation for
details.

(and 2 more similar warnings elsewhere)

Warning: Argument is deprecated

  with module.idp_ecs.aws_service_discovery_service.this,
  on .terraform/modules/idp_ecs/ecs/service_discovery.tf line 15, in resource "aws_service_discovery_service" "this":
  15:     failure_threshold = 1

failure_threshold is deprecated. The argument is no longer supported by AWS
and the value is always set to 1. The attribute will be removed in a future
major version.

─────────────────────────────────────────────────────────────────────────────

Saved the plan to: plan.tfplan

To perform exactly these actions, run the following command to apply:
    terraform apply "plan.tfplan"
Show Conftest results
WARN - plan.json - main - Missing Common Tags: ["aws_alb_listener_rule.idp_protocol_version"]
WARN - plan.json - main - Missing Common Tags: ["aws_alb_listener_rule.security_txt"]
WARN - plan.json - main - Missing Common Tags: ["aws_alb_listener_rule.user_portal[0]"]
WARN - plan.json - main - Missing Common Tags: ["aws_appautoscaling_target.user_portal[0]"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_log_group.user_portal"]
WARN - plan.json - main - Missing Common Tags: ["aws_ecs_cluster.idp"]
WARN - plan.json - main - Missing Common Tags: ["aws_ecs_service.user_portal[0]"]
WARN - plan.json - main - Missing Common Tags: ["aws_ecs_task_definition.user_portal"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.ecs_xray"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.idp_send_email"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.user_portal_secrets_manager"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.user_portal_ssm"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_role.idp_user_portal"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_user.idp_send_email"]
WARN - plan.json - main - Missing Common Tags: ["aws_shield_protection.idp"]
WARN - plan.json - main - Missing Common Tags: ["module.user_portal_code_pipeline[0].aws_codebuild_project.ecs_render"]
WARN - plan.json - main - Missing Common Tags: ["module.user_portal_code_pipeline[0].aws_codedeploy_app.this"]
WARN - plan.json - main - Missing Common Tags: ["module.user_portal_code_pipeline[0].aws_codedeploy_deployment_group.this"]
WARN - plan.json - main - Missing Common Tags: ["module.user_portal_code_pipeline[0].aws_codepipeline.this"]
WARN - plan.json - main - Missing Common Tags: ["module.user_portal_code_pipeline[0].aws_codestarconnections_connection.this"]
WARN - plan.json - main - Missing Common Tags: ["module.user_portal_code_pipeline[0].aws_iam_role.this"]
WARN - plan.json - main - Missing Common Tags:...

@github-actions
Copy link
Copy Markdown

Staging: app

✅   Terraform Init: success
✅   Terraform Validate: success
✅   Terraform Format: success
✅   Terraform Plan: success
✅   Conftest: success

Plan: 0 to add, 1 to change, 0 to destroy
Show summary
CHANGE NAME
update module.gc_forms_code_pipeline[0].aws_s3_bucket_server_side_encryption_configuration.codepipeline_bucket
Show plan
Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # module.gc_forms_code_pipeline[0].aws_s3_bucket_server_side_encryption_configuration.codepipeline_bucket will be updated in-place
  ~ resource "aws_s3_bucket_server_side_encryption_configuration" "codepipeline_bucket" {
        id                    = "gc-forms-web-app-pipeline"
        # (3 unchanged attributes hidden)

      - rule {
          - blocked_encryption_types = [
              - "NONE",
            ] -> null
          - bucket_key_enabled       = false -> null

          - apply_server_side_encryption_by_default {
              - sse_algorithm     = "AES256" -> null
                # (1 unchanged attribute hidden)
            }
        }
      + rule {
          + blocked_encryption_types = []

          + apply_server_side_encryption_by_default {
              + sse_algorithm     = "AES256"
                # (1 unchanged attribute hidden)
            }
        }
    }

Plan: 0 to add, 1 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Saved the plan to: plan.tfplan

To perform exactly these actions, run the following command to apply:
    terraform apply "plan.tfplan"
Show Conftest results
WARN - plan.json - main - Missing Common Tags: ["aws_appautoscaling_target.forms[0]"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_log_group.forms"]
WARN - plan.json - main - Missing Common Tags: ["aws_ecs_cluster.forms"]
WARN - plan.json - main - Missing Common Tags: ["aws_ecs_service.form_viewer"]
WARN - plan.json - main - Missing Common Tags: ["aws_ecs_task_definition.form_viewer"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.cognito"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.ecs_xray"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.forms_audit_logs"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.forms_dynamodb"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.forms_kms"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.forms_s3"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.forms_secrets_manager"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.forms_sqs"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_role.codedeploy"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_role.forms"]
WARN - plan.json - main - Missing Common Tags: ["module.gc_forms_code_pipeline[0].aws_codebuild_project.ecs_render"]
WARN - plan.json - main - Missing Common Tags: ["module.gc_forms_code_pipeline[0].aws_codedeploy_app.this"]
WARN - plan.json - main - Missing Common Tags: ["module.gc_forms_code_pipeline[0].aws_codedeploy_deployment_group.this"]
WARN - plan.json - main - Missing Common Tags: ["module.gc_forms_code_pipeline[0].aws_codepipeline.this"]
WARN - plan.json - main - Missing Common Tags: ["module.gc_forms_code_pipeline[0].aws_codestarconnections_connection.this"]
WARN - plan.json - main - Missing Common Tags: ["module.gc_forms_code_pipeline[0].aws_iam_role.this"]
WARN - plan.json - main - Missing Common Tags: ["module.gc_forms_code_pipeline[0].aws_s3_bucket.codepipeline_bucket"]

41 tests, 19 passed, 22...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants