Skip to content

Conversation

@motatoes
Copy link
Contributor

No description provided.

@motatoes
Copy link
Contributor Author

digger plan

@digger-app-1932760430
Copy link

👷 Digger starting....

@digger-app-1932760430
Copy link

👷 Digger starting....

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status Plan + ~ -
dev failed Plan 0 0 0

@github-actions
Copy link

plan for dev 2025-06-13 02:11:51 (UTC)
Locking successful Project diggerhq/states-test#dev has been locked by PR #8

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status Plan + ~ -
dev succeeded Plan 0 0 0

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status Plan + ~ -
dev succeeded Plan 0 0 1

@github-actions
Copy link

github-actions bot commented Jun 13, 2025

plan for dev 2025-06-13 03:06:50 (UTC)
Locking successful Project diggerhq/states-test#dev has been locked by PR #8
Plan output
Terraform will perform the following actions:

  # aws_ssm_parameter.example_secret must be replaced
-/+ resource "aws_ssm_parameter" "example_secret" {
      ~ arn            = "arn:aws:ssm:us-east-1:739940681129:parameter/dev/example/secret" -> (known after apply)
      ~ data_type      = "text" -> (known after apply)
      ~ id             = "/dev/example/secret" -> (known after apply)
      + insecure_value = (known after apply)
      ~ key_id         = "alias/aws/ssm" -> (known after apply)
      ~ name           = "/dev/example/secret" -> "/dev/example/secret/" # forces replacement
        tags           = {
            "Environment" = "dev"
        }
      ~ tier           = "Standard" -> (known after apply)
      ~ version        = 1 -> (known after apply)
        # (4 unchanged attributes hidden)
    }

Plan: 1 to add, 0 to change, 1 to destroy.

─────────────────────────────────────────────────────────────────────────────
Terraform plan validation check (dev) Terraform plan validation checks succeeded ✅
Plan summary
CHANGE RESOURCE
recreate aws_ssm_parameter.example_secret

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status Plan + ~ -
dev succeeded Plan 0 0 0

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

❌ error setting status for PR: error setting pr status: Post "https://api.github.com/repos/diggerhq/states-test/statuses/71497a6357b2d08a0c36a8d0a77b4ed1fde94869": read tcp 10.9.50.96:63802->140.82.116.5:443: read: operation timed out

@motatoes
Copy link
Contributor Author

digger plan

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status Plan + ~ -
dev succeeded Plan 0 0 0

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status Plan + ~ -
dev succeeded Plan 0 0 1

@github-actions
Copy link

github-actions bot commented Jun 13, 2025

plan for dev 2025-06-13 18:26:29 (UTC)
Locking successful Project diggerhq/states-test#dev has been locked by PR #8
Plan output
Terraform will perform the following actions:

  # aws_ssm_parameter.example_secret must be replaced
-/+ resource "aws_ssm_parameter" "example_secret" {
      ~ arn            = "arn:aws:ssm:us-east-1:739940681129:parameter/dev/example/secret" -> (known after apply)
      ~ data_type      = "text" -> (known after apply)
      ~ id             = "/dev/example/secret" -> (known after apply)
      + insecure_value = (known after apply)
      ~ key_id         = "alias/aws/ssm" -> (known after apply)
      ~ name           = "/dev/example/secret" -> "/dev/example/secret/" # forces replacement
        tags           = {
            "Environment" = "dev"
        }
      ~ tier           = "Standard" -> (known after apply)
      ~ version        = 1 -> (known after apply)
        # (4 unchanged attributes hidden)
    }

Plan: 1 to add, 0 to change, 1 to destroy.

Changes to Outputs:
  + example_secret = "secret: abc123"

─────────────────────────────────────────────────────────────────────────────
Terraform plan validation check (dev) Terraform plan validation checks succeeded ✅
Plan summary
CHANGE RESOURCE
recreate aws_ssm_parameter.example_secret
CHANGE OUTPUT
add example_secret

@motatoes
Copy link
Contributor Author

digger plan

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status Plan + ~ -
dev failed Plan 0 0 0

@github-actions
Copy link

plan for dev 2025-06-13 18:37:49 (UTC)
Locking successful Project diggerhq/states-test#dev has been locked by PR #8

@motatoes
Copy link
Contributor Author

digger plan

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status Plan + ~ -
dev succeeded Plan 0 0 1

@github-actions
Copy link

github-actions bot commented Jun 13, 2025

plan for dev 2025-06-13 18:51:56 (UTC)
Locking successful Project diggerhq/states-test#dev has been locked by PR #8
Plan output
Terraform will perform the following actions:

  # aws_ssm_parameter.example_secret must be replaced
-/+ resource "aws_ssm_parameter" "example_secret" {
      ~ arn            = "arn:aws:ssm:us-east-1:739940681129:parameter/dev/example/secret" -> (known after apply)
      ~ data_type      = "text" -> (known after apply)
      ~ id             = "/dev/example/secret" -> (known after apply)
      + insecure_value = (known after apply)
      ~ key_id         = "alias/aws/ssm" -> (known after apply)
      ~ name           = "/dev/example/secret" -> "/dev/example/secret/" # forces replacement
        tags           = {
            "Environment" = "dev"
        }
      ~ tier           = "Standard" -> (known after apply)
      ~ version        = 1 -> (known after apply)
        # (4 unchanged attributes hidden)
    }

Plan: 1 to add, 0 to change, 1 to destroy.

Changes to Outputs:
  + example_secret = "secret: abc123"

─────────────────────────────────────────────────────────────────────────────
Terraform plan validation check (dev) Terraform plan validation checks succeeded ✅
Plan summary
CHANGE RESOURCE
recreate aws_ssm_parameter.example_secret
CHANGE OUTPUT
add example_secret

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status Plan + ~ -
dev succeeded Plan 0 0 1

@github-actions
Copy link

github-actions bot commented Jun 13, 2025

plan for dev 2025-06-13 22:51:08 (UTC)
Locking successful Project diggerhq/states-test#dev has been locked by PR #8
Plan output
Terraform will perform the following actions:

  # aws_ssm_parameter.example_secret must be replaced
-/+ resource "aws_ssm_parameter" "example_secret" {
      ~ arn            = "arn:aws:ssm:us-east-1:739940681129:parameter/dev/example/secret" -> (known after apply)
      ~ data_type      = "text" -> (known after apply)
      ~ id             = "/dev/example/secret" -> (known after apply)
      + insecure_value = (known after apply)
      ~ key_id         = "alias/aws/ssm" -> (known after apply)
      ~ name           = "/dev/example/secret" -> "/dev/example/secret/" # forces replacement
        tags           = {
            "Environment" = "dev"
        }
      ~ tier           = "Standard" -> (known after apply)
      ~ version        = 1 -> (known after apply)
        # (4 unchanged attributes hidden)
    }

Plan: 1 to add, 0 to change, 1 to destroy.

Changes to Outputs:
  + example_secret = "filterme: abc123"

─────────────────────────────────────────────────────────────────────────────
Terraform plan validation check (dev) Terraform plan validation checks succeeded ✅
Plan summary
CHANGE RESOURCE
recreate aws_ssm_parameter.example_secret
CHANGE OUTPUT
add example_secret

@motatoes
Copy link
Contributor Author

digger plan

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status Plan + ~ -
dev succeeded Plan 0 0 1

@github-actions
Copy link

github-actions bot commented Jun 13, 2025

plan for dev 2025-06-13 23:02:20 (UTC)
Locking successful Project diggerhq/states-test#dev has been locked by PR #8
Plan output
Terraform will perform the following actions:

  # aws_ssm_parameter.example_secret must be replaced
-/+ resource "aws_ssm_parameter" "example_secret" {
      ~ arn            = "arn:aws:ssm:us-east-1:739940681129:parameter/dev/example/secret" -> (known after apply)
      ~ data_type      = "text" -> (known after apply)
      ~ id             = "/dev/example/secret" -> (known after apply)
      + insecure_value = (known after apply)
      ~ key_id         = "alias/aws/ssm" -> (known after apply)
      ~ name           = "/dev/example/secret" -> "/dev/example/secret/" # forces replacement
        tags           = {
            "Environment" = "dev"
        }
      ~ tier           = "Standard" -> (known after apply)
      ~ version        = 1 -> (known after apply)
        # (4 unchanged attributes hidden)
    }

Plan: 1 to add, 0 to change, 1 to destroy.

Changes to Outputs:
  + example_secret = "filterme: abc123"

─────────────────────────────────────────────────────────────────────────────
Terraform plan validation check (dev) Terraform plan validation checks succeeded ✅
Plan summary
CHANGE RESOURCE
recreate aws_ssm_parameter.example_secret
CHANGE OUTPUT
add example_secret

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status Plan + ~ -
dev succeeded Plan 0 0 1

@github-actions
Copy link

github-actions bot commented Jun 13, 2025

plan for dev 2025-06-13 23:10:38 (UTC)
Locking successful Project diggerhq/states-test#dev has been locked by PR #8
Plan output
Terraform will perform the following actions:

  # aws_ssm_parameter.example_secret must be replaced
-/+ resource "aws_ssm_parameter" "example_secret" {
      ~ arn            = "arn:aws:ssm:us-east-1:739940681129:parameter/dev/example/secret" -> (known after apply)
      ~ data_type      = "text" -> (known after apply)
      ~ id             = "/dev/example/secret" -> (known after apply)
      + insecure_value = (known after apply)
      ~ key_id         = "alias/aws/ssm" -> (known after apply)
      ~ name           = "/dev/example/secret" -> "/dev/example/secret/" # forces replacement
        tags           = {
            "Environment" = "dev"
        }
      ~ tier           = "Standard" -> (known after apply)
      ~ version        = 1 -> (known after apply)
        # (4 unchanged attributes hidden)
    }

Plan: 1 to add, 0 to change, 1 to destroy.

Changes to Outputs:
  + example_secret = "filterme: abc123"

─────────────────────────────────────────────────────────────────────────────
Terraform plan validation check (dev) Terraform plan validation checks succeeded ✅
Plan summary
CHANGE RESOURCE
recreate aws_ssm_parameter.example_secret
CHANGE OUTPUT
add example_secret

@motatoes
Copy link
Contributor Author

digger plan

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status Plan + ~ -
dev succeeded Plan 0 0 1

@github-actions
Copy link

github-actions bot commented Jun 13, 2025

plan for dev 2025-06-13 23:33:48 (UTC)
Locking successful Project diggerhq/states-test#dev has been locked by PR #8
Plan output
Terraform will perform the following actions:

  # aws_ssm_parameter.example_secret must be replaced
-/+ resource "aws_ssm_parameter" "example_secret" {
      ~ arn            = "arn:aws:ssm:us-east-1:739940681129:parameter/dev/example/secret" -> (known after apply)
      ~ data_type      = "text" -> (known after apply)
      ~ id             = "/dev/example/secret" -> (known after apply)
      + insecure_value = (known after apply)
      ~ key_id         = "alias/aws/ssm" -> (known after apply)
      ~ name           = "/dev/example/secret" -> "/dev/example/secret/" # forces replacement
        tags           = {
            "Environment" = "dev"
        }
      ~ tier           = "Standard" -> (known after apply)
      ~ version        = 1 -> (known after apply)
        # (4 unchanged attributes hidden)
    }

Plan: 1 to add, 0 to change, 1 to destroy.

Changes to Outputs:
  + example_secret = "filterme: abc123"

─────────────────────────────────────────────────────────────────────────────
Terraform plan validation check (dev) Terraform plan validation checks succeeded ✅
Plan summary
CHANGE RESOURCE
recreate aws_ssm_parameter.example_secret
CHANGE OUTPUT
add example_secret

@motatoes
Copy link
Contributor Author

digger plan

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status
🕚 dev pending...

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status Plan + ~ -
dev succeeded Plan 0 0 1

@github-actions
Copy link

github-actions bot commented Jun 13, 2025

plan for dev 2025-06-13 23:43:29 (UTC)
Locking successful Project diggerhq/states-test#dev has been locked by PR #8
Plan output
Terraform will perform the following actions:

  # aws_ssm_parameter.example_secret must be replaced
-/+ resource "aws_ssm_parameter" "example_secret" {
      ~ arn            = "arn:aws:ssm:us-east-1:739940681129:parameter/dev/example/secret" -> (known after apply)
      ~ data_type      = "text" -> (known after apply)
      ~ id             = "/dev/example/secret" -> (known after apply)
      + insecure_value = (known after apply)
      ~ key_id         = "alias/aws/ssm" -> (known after apply)
      ~ name           = "/dev/example/secret" -> "/dev/example/secret/" # forces replacement
        tags           = {
            "Environment" = "dev"
        }
      ~ tier           = "Standard" -> (known after apply)
      ~ version        = 1 -> (known after apply)
        # (4 unchanged attributes hidden)
    }

Plan: 1 to add, 0 to change, 1 to destroy.

Changes to Outputs:
  + example_secret = "filterme: abc123"

─────────────────────────────────────────────────────────────────────────────
Terraform plan validation check (dev) Terraform plan validation checks succeeded ✅
Plan summary
CHANGE RESOURCE
recreate aws_ssm_parameter.example_secret
CHANGE OUTPUT
add example_secret

@motatoes
Copy link
Contributor Author

digger plan

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 13, 2025

Project Status Plan + ~ -
dev succeeded Plan 0 0 1

@github-actions
Copy link

github-actions bot commented Jun 14, 2025

plan for dev 2025-06-14 00:01:35 (UTC)
Locking successful Project diggerhq/states-test#dev has been locked by PR #8
Plan output
Terraform will perform the following actions:

  # aws_ssm_parameter.example_secret must be replaced
-/+ resource "aws_ssm_parameter" "example_secret" {
      ~ arn            = "arn:aws:ssm:us-east-1:739940681129:parameter/dev/example/secret" -> (known after apply)
      ~ data_type      = "text" -> (known after apply)
      ~ id             = "/dev/example/secret" -> (known after apply)
      + insecure_value = (known after apply)
      ~ key_id         = "alias/aws/ssm" -> (known after apply)
      ~ name           = "/dev/example/secret" -> "/dev/example/secret/" # forces replacement
        tags           = {
            "Environment" = "dev"
        }
      ~ tier           = "Standard" -> (known after apply)
      ~ version        = 1 -> (known after apply)
        # (4 unchanged attributes hidden)
    }

Plan: 1 to add, 0 to change, 1 to destroy.

Changes to Outputs:
  + example_secret = "filterme: abc123"

─────────────────────────────────────────────────────────────────────────────
Terraform plan validation check (dev) Terraform plan validation checks succeeded ✅
Plan summary
CHANGE RESOURCE
recreate aws_ssm_parameter.example_secret
CHANGE OUTPUT
add example_secret

@motatoes
Copy link
Contributor Author

digger plan

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 14, 2025

Project Status Plan + ~ -
dev succeeded Plan 0 0 1

@github-actions
Copy link

github-actions bot commented Jun 14, 2025

plan for dev 2025-06-14 00:21:51 (UTC)
Locking successful Project diggerhq/states-test#dev has been locked by PR #8
Plan output
Terraform will perform the following actions:

  # aws_ssm_parameter.example_secret must be replaced
-/+ resource "aws_ssm_parameter" "example_secret" {
      ~ arn            = "arn:aws:ssm:us-east-1:739940681129:parameter/dev/example/secret" -> (known after apply)
      ~ data_type      = "text" -> (known after apply)
      ~ id             = "/dev/example/secret" -> (known after apply)
      + insecure_value = (known after apply)
      ~ key_id         = "alias/aws/ssm" -> (known after apply)
      ~ name           = "/dev/example/secret" -> "/dev/example/secret/" # forces replacement
        tags           = {
            "Environment" = "dev"
        }
      ~ tier           = "Standard" -> (known after apply)
      ~ version        = 1 -> (known after apply)
        # (4 unchanged attributes hidden)
    }

Plan: 1 to add, 0 to change, 1 to destroy.

Changes to Outputs:
  + example_secret = "<REDACTED>"

─────────────────────────────────────────────────────────────────────────────
Terraform plan validation check (dev) Terraform plan validation checks succeeded ✅
Plan summary
CHANGE RESOURCE
recreate aws_ssm_parameter.example_secret
CHANGE OUTPUT
add example_secret

@motatoes
Copy link
Contributor Author

digger plan

@digger-app-1932760430
Copy link

digger-app-1932760430 bot commented Jun 14, 2025

Project Status Plan + ~ -
dev succeeded Plan 0 0 1

@github-actions
Copy link

github-actions bot commented Jun 14, 2025

plan for dev 2025-06-14 00:57:26 (UTC)
Locking successful Project diggerhq/states-test#dev has been locked by PR #8
Plan output
Terraform will perform the following actions:

  # aws_ssm_parameter.example_secret must be replaced
-/+ resource "aws_ssm_parameter" "example_secret" {
      ~ arn            = "arn:aws:ssm:us-east-1:739940681129:parameter/dev/example/secret" -> (known after apply)
      ~ data_type      = "text" -> (known after apply)
      ~ id             = "/dev/example/secret" -> (known after apply)
      + insecure_value = (known after apply)
      ~ key_id         = "alias/aws/ssm" -> (known after apply)
      ~ name           = "/dev/example/secret" -> "/dev/example/secret/" # forces replacement
        tags           = {
            "Environment" = "dev"
        }
      ~ tier           = "Standard" -> (known after apply)
      ~ version        = 1 -> (known after apply)
        # (4 unchanged attributes hidden)
    }

Plan: 1 to add, 0 to change, 1 to destroy.

Changes to Outputs:
  + example_secret = "<REDACTED>"

─────────────────────────────────────────────────────────────────────────────
Terraform plan validation check (dev) Terraform plan validation checks succeeded ✅
Plan summary
CHANGE RESOURCE
recreate aws_ssm_parameter.example_secret
CHANGE OUTPUT
add example_secret

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants