Skip to content

Conversation

@myronchen-git
Copy link
Member

Fixes #121

What changes did you make?

  • Added a new AWS provider for the backend, with default tag managed-by = terraform-incubator.

Why did you make the changes (we will use this info to test)?

  • To determine what resources are managed by the current version of incubator.

Testing

  • The Terraform plan created from backend.tf does show that the default tag will be applied.

@github-actions
Copy link
Contributor

github-actions bot commented Nov 6, 2025

Terraform plan in terraform
With backend config files: terraform/prod.backend.tfvars

Plan: 0 to add, 148 to change, 0 to destroy.
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
!~  update in-place
 <= read (data resources)

Terraform will perform the following actions:

  # aws_db_instance.default will be updated in-place
!~  resource "aws_db_instance" "default" {
        id                                    = "db-WEFHC5MZIA5NX5PBTQZPC2STZQ"
        tags                                  = {
            "Name"              = "incubator-prod-database"
            "terraform_managed" = "true"
        }
!~      tags_all                              = {
+           "managed-by"        = "terraform-incubator"
#            (2 unchanged elements hidden)
        }
#        (71 unchanged attributes hidden)
    }

  # aws_iam_policy.incubator_builder will be updated in-place
!~  resource "aws_iam_policy" "incubator_builder" {
        id               = "arn:aws:iam::035866691871:policy/incubator_builder"
        name             = "incubator_builder"
        tags             = {}
!~      tags_all         = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.home-unite-us.data.aws_secretsmanager_secret_version.google_client_id will be read during apply
  # (depends on a resource or a module with changes pending)
 <= data "aws_secretsmanager_secret_version" "google_client_id" {
+       arn            = (known after apply)
+       created_date   = (known after apply)
+       id             = (known after apply)
+       region         = (known after apply)
+       secret_binary  = (sensitive value)
+       secret_id      = "*****************************************************************************************"
+       secret_string  = (sensitive value)
+       version_id     = (known after apply)
+       version_stages = (known after apply)
    }

  # module.home-unite-us.data.aws_secretsmanager_secret_version.google_secret will be read during apply
  # (depends on a resource or a module with changes pending)
 <= data "aws_secretsmanager_secret_version" "google_secret" {
+       arn            = (known after apply)
+       created_date   = (known after apply)
+       id             = (known after apply)
+       region         = (known after apply)
+       secret_binary  = (sensitive value)
+       secret_id      = "***************************************************************************************"
+       secret_string  = (sensitive value)
+       version_id     = (known after apply)
+       version_stages = (known after apply)
    }

  # module.home-unite-us.aws_cognito_identity_provider.google_client will be updated in-place
!~  resource "aws_cognito_identity_provider" "google_client" {
        id                = "us-west-2_rWxdMKVzy:Google"
!~      provider_details  = {
-           "attributes_url"                = "https://people.googleapis.com/v1/people/me?personFields="
-           "attributes_url_add_attributes" = "true"
-           "authorize_scopes"              = "email profile openid"
-           "authorize_url"                 = "https://accounts.google.com/o/oauth2/v2/auth"
-           "client_id"                     = (sensitive value)
-           "client_secret"                 = (sensitive value)
-           "oidc_issuer"                   = "https://accounts.google.com"
-           "token_request_method"          = "****"
-           "token_url"                     = "******************************************"
        } -> (known after apply)
#        (6 unchanged attributes hidden)
    }

  # module.home-unite-us.aws_cognito_user_pool.homeuniteus will be updated in-place
!~  resource "aws_cognito_user_pool" "homeuniteus" {
        id                         = "us-west-2_rWxdMKVzy"
        name                       = "home-unite-us"
        tags                       = {}
!~      tags_all                   = {
+           "managed-by" = "terraform-incubator"
        }
#        (17 unchanged attributes hidden)

#        (11 unchanged blocks hidden)
    }

  # module.home-unite-us.aws_iam_role.cognito_idp will be updated in-place
!~  resource "aws_iam_role" "cognito_idp" {
        id                    = "home-unite-us-cognito-idp"
        name                  = "home-unite-us-cognito-idp"
        tags                  = {}
!~      tags_all              = {
+           "managed-by" = "terraform-incubator"
        }
#        (11 unchanged attributes hidden)

#        (1 unchanged block hidden)
    }

  # module.home-unite-us.aws_iam_role.lambda will be updated in-place
!~  resource "aws_iam_role" "lambda" {
        id                    = "home-unite-us-lambda"
        name                  = "home-unite-us-lambda"
        tags                  = {}
!~      tags_all              = {
+           "managed-by" = "terraform-incubator"
        }
#        (11 unchanged attributes hidden)
    }

  # module.home-unite-us.aws_lambda_function.cognito_custom_message will be updated in-place
!~  resource "aws_lambda_function" "cognito_custom_message" {
        id                             = "home-unite-us-customMessage"
        tags                           = {}
!~      tags_all                       = {
+           "managed-by" = "terraform-incubator"
        }
#        (30 unchanged attributes hidden)

#        (3 unchanged blocks hidden)
    }

  # module.home-unite-us.aws_lambda_function.cognito_merge_users will be updated in-place
!~  resource "aws_lambda_function" "cognito_merge_users" {
        id                             = "home-unite-us-mergeUsers"
        tags                           = {}
!~      tags_all                       = {
+           "managed-by" = "terraform-incubator"
        }
#        (30 unchanged attributes hidden)

#        (3 unchanged blocks hidden)
    }

  # module.home-unite-us.aws_secretsmanager_secret.cognito_client will be updated in-place
!~  resource "aws_secretsmanager_secret" "cognito_client" {
        id                             = "arn:aws:secretsmanager:us-west-2:035866691871:secret:home-unite-us-cognito-client-582eNI"
        name                           = "home-unite-us-cognito-client"
        tags                           = {}
!~      tags_all                       = {
+           "managed-by" = "terraform-incubator"
        }
#        (8 unchanged attributes hidden)
    }

  # module.home-unite-us.aws_secretsmanager_secret.google_client_id will be updated in-place
!~  resource "aws_secretsmanager_secret" "google_client_id" {
        id                             = "arn:aws:secretsmanager:us-west-2:035866691871:secret:home-unite-us-google-clientid-YNNI2x"
        name                           = "home-unite-us-google-clientid"
        tags                           = {}
!~      tags_all                       = {
+           "managed-by" = "terraform-incubator"
        }
#        (8 unchanged attributes hidden)
    }

  # module.home-unite-us.aws_secretsmanager_secret.google_secret will be updated in-place
!~  resource "aws_secretsmanager_secret" "google_secret" {
        id                             = "arn:aws:secretsmanager:us-west-2:035866691871:secret:home-unite-us-google-secret-g8XskJ"
        name                           = "home-unite-us-google-secret"
        tags                           = {}
!~      tags_all                       = {
+           "managed-by" = "terraform-incubator"
        }
#        (8 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.backend_prod_service.aws_cloudwatch_log_group.this will be updated in-place
!~  resource "aws_cloudwatch_log_group" "this" {
        id                = "/ecs/cti-backend-prod"
        name              = "/ecs/cti-backend-prod"
        tags              = {}
!~      tags_all          = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.backend_prod_service.aws_ecs_service.fargate[0] will be updated in-place
!~  resource "aws_ecs_service" "fargate" {
        id                                 = "arn:aws:ecs:us-west-2:035866691871:service/incubator-prod/cti-backend-prod"
        name                               = "cti-backend-prod"
        tags                               = {}
!~      tags_all                           = {
+           "managed-by" = "terraform-incubator"
        }
#        (18 unchanged attributes hidden)

#        (5 unchanged blocks hidden)
    }

  # module.civic-tech-index.module.backend_prod_service.aws_ecs_task_definition.task will be updated in-place
!~  resource "aws_ecs_task_definition" "task" {
        id                       = "cti-backend-prod"
        tags                     = {}
!~      tags_all                 = {
+           "managed-by" = "terraform-incubator"
        }
#        (17 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.backend_prod_service.aws_iam_policy.container_policy will be updated in-place
!~  resource "aws_iam_policy" "container_policy" {
        id               = "arn:aws:iam::035866691871:policy/cti-backend-prod-task-policy"
        name             = "cti-backend-prod-task-policy"
        tags             = {}
!~      tags_all         = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.backend_prod_service.aws_iam_role.instance will be updated in-place
!~  resource "aws_iam_role" "instance" {
        id                    = "ecs-container-cti-backend-prod"
        name                  = "ecs-container-cti-backend-prod"
        tags                  = {
            "tag-key" = "*********"
        }
!~      tags_all              = {
+           "managed-by" = "terraform-incubator"
#            (1 unchanged element hidden)
        }
#        (11 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.backend_prod_service.aws_lb_listener_rule.static will be updated in-place
!~  resource "aws_lb_listener_rule" "static" {
        id           = "arn:aws:elasticloadbalancing:us-west-2:035866691871:listener-rule/app/incubator-prod-lb/7451adf77133ef36/390a225766a4daf3/287ccfaaa2c5b13a"
        tags         = {}
!~      tags_all     = {
+           "managed-by" = "terraform-incubator"
        }
#        (4 unchanged attributes hidden)

#        (3 unchanged blocks hidden)
    }

  # module.civic-tech-index.module.backend_prod_service.aws_lb_target_group.this will be updated in-place
!~  resource "aws_lb_target_group" "this" {
        id                                 = "arn:aws:elasticloadbalancing:us-west-2:035866691871:targetgroup/cti-backend-prod-tg/184311716f9786d3"
        name                               = "cti-backend-prod-tg"
        tags                               = {}
!~      tags_all                           = {
+           "managed-by" = "terraform-incubator"
        }
#        (18 unchanged attributes hidden)

!~      target_health_state {
+           enable_unhealthy_connection_termination = false
+           unhealthy_draining_interval             = 0
        }

#        (4 unchanged blocks hidden)
    }

  # module.civic-tech-index.module.backend_prod_service.aws_security_group.container will be updated in-place
!~  resource "aws_security_group" "container" {
        id                     = "sg-02b6104ac5b62a7ae"
        name                   = "ecs-container-cti-backend-prod"
        tags                   = {
            "Name" = "ecs-container-cti-backend-prod"
        }
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
#            (1 unchanged element hidden)
        }
#        (9 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.backend_prod_service.aws_vpc_security_group_egress_rule.allow_all_traffic will be updated in-place
!~  resource "aws_vpc_security_group_egress_rule" "allow_all_traffic" {
        id                     = "sgr-0a7be90127626b13d"
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
        }
#        (6 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.backend_prod_service.aws_vpc_security_group_ingress_rule.container_ingress_port will be updated in-place
!~  resource "aws_vpc_security_group_ingress_rule" "container_ingress_port" {
        id                     = "sgr-02e02994d3eb24573"
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
        }
#        (8 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.backend_stage_service.aws_cloudwatch_log_group.this will be updated in-place
!~  resource "aws_cloudwatch_log_group" "this" {
        id                = "/ecs/cti-backend-stage"
        name              = "/ecs/cti-backend-stage"
        tags              = {}
!~      tags_all          = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.backend_stage_service.aws_ecs_service.fargate[0] will be updated in-place
!~  resource "aws_ecs_service" "fargate" {
        id                                 = "arn:aws:ecs:us-west-2:035866691871:service/incubator-prod/cti-backend-stage"
        name                               = "cti-backend-stage"
        tags                               = {}
!~      tags_all                           = {
+           "managed-by" = "terraform-incubator"
        }
#        (18 unchanged attributes hidden)

#        (5 unchanged blocks hidden)
    }

  # module.civic-tech-index.module.backend_stage_service.aws_ecs_task_definition.task will be updated in-place
!~  resource "aws_ecs_task_definition" "task" {
        id                       = "cti-backend-stage"
        tags                     = {}
!~      tags_all                 = {
+           "managed-by" = "terraform-incubator"
        }
#        (17 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.backend_stage_service.aws_iam_policy.container_policy will be updated in-place
!~  resource "aws_iam_policy" "container_policy" {
        id               = "arn:aws:iam::035866691871:policy/cti-backend-stage-task-policy"
        name             = "cti-backend-stage-task-policy"
        tags             = {}
!~      tags_all         = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.backend_stage_service.aws_iam_role.instance will be updated in-place
!~  resource "aws_iam_role" "instance" {
        id                    = "ecs-container-cti-backend-stage"
        name                  = "ecs-container-cti-backend-stage"
        tags                  = {
            "tag-key" = "*********"
        }
!~      tags_all              = {
+           "managed-by" = "terraform-incubator"
#            (1 unchanged element hidden)
        }
#        (11 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.backend_stage_service.aws_lb_listener_rule.static will be updated in-place
!~  resource "aws_lb_listener_rule" "static" {
        id           = "arn:aws:elasticloadbalancing:us-west-2:035866691871:listener-rule/app/incubator-prod-lb/7451adf77133ef36/390a225766a4daf3/6c6bd28e830d0f4a"
        tags         = {}
!~      tags_all     = {
+           "managed-by" = "terraform-incubator"
        }
#        (4 unchanged attributes hidden)

#        (3 unchanged blocks hidden)
    }

  # module.civic-tech-index.module.backend_stage_service.aws_lb_target_group.this will be updated in-place
!~  resource "aws_lb_target_group" "this" {
        id                                 = "arn:aws:elasticloadbalancing:us-west-2:035866691871:targetgroup/cti-backend-stage-tg/149d7efc6af3d362"
        name                               = "cti-backend-stage-tg"
        tags                               = {}
!~      tags_all                           = {
+           "managed-by" = "terraform-incubator"
        }
#        (18 unchanged attributes hidden)

!~      target_health_state {
+           enable_unhealthy_connection_termination = false
+           unhealthy_draining_interval             = 0
        }

#        (4 unchanged blocks hidden)
    }

  # module.civic-tech-index.module.backend_stage_service.aws_security_group.container will be updated in-place
!~  resource "aws_security_group" "container" {
        id                     = "sg-07ad35834489710b0"
        name                   = "ecs-container-cti-backend-stage"
        tags                   = {
            "Name" = "ecs-container-cti-backend-stage"
        }
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
#            (1 unchanged element hidden)
        }
#        (9 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.backend_stage_service.aws_vpc_security_group_egress_rule.allow_all_traffic will be updated in-place
!~  resource "aws_vpc_security_group_egress_rule" "allow_all_traffic" {
        id                     = "sgr-09b0d2c24982410ba"
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
        }
#        (6 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.backend_stage_service.aws_vpc_security_group_ingress_rule.container_ingress_port will be updated in-place
!~  resource "aws_vpc_security_group_ingress_rule" "container_ingress_port" {
        id                     = "sgr-07436f908ddebc818"
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
        }
#        (8 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.prod_database_password_secret.aws_ssm_parameter.this will be updated in-place
!~  resource "aws_ssm_parameter" "this" {
        id              = "/civic-tech-index/backend-prod-database-password"
        name            = "/civic-tech-index/backend-prod-database-password"
        tags            = {}
!~      tags_all        = {
+           "managed-by" = "terraform-incubator"
        }
#        (12 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.prod_database_username_secret.aws_ssm_parameter.this will be updated in-place
!~  resource "aws_ssm_parameter" "this" {
        id              = "/civic-tech-index/backend-prod-database-username"
        name            = "/civic-tech-index/backend-prod-database-username"
        tags            = {}
!~      tags_all        = {
+           "managed-by" = "terraform-incubator"
        }
#        (12 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.stage_database_password_secret.aws_ssm_parameter.this will be updated in-place
!~  resource "aws_ssm_parameter" "this" {
        id              = "/civic-tech-index/backend-stage-database-password"
        name            = "/civic-tech-index/backend-stage-database-password"
        tags            = {}
!~      tags_all        = {
+           "managed-by" = "terraform-incubator"
        }
#        (12 unchanged attributes hidden)
    }

  # module.civic-tech-index.module.stage_database_username_secret.aws_ssm_parameter.this will be updated in-place
!~  resource "aws_ssm_parameter" "this" {
        id              = "/civic-tech-index/backend-stage-database-username"
        name            = "/civic-tech-index/backend-stage-database-username"
        tags            = {}
!~      tags_all        = {
+           "managed-by" = "terraform-incubator"
        }
#        (12 unchanged attributes hidden)
    }

  # module.civic-tech-jobs.module.civic_tech_jobs_cicd.aws_iam_role.builder will be updated in-place
!~  resource "aws_iam_role" "builder" {
        id                    = "incubator-cicd-civic-tech-jobs"
        name                  = "incubator-cicd-civic-tech-jobs"
        tags                  = {}
!~      tags_all              = {
+           "managed-by" = "terraform-incubator"
        }
#        (11 unchanged attributes hidden)
    }

  # module.civic-tech-jobs.module.civic_tech_jobs_ecr_fullstack.aws_ecr_repository.this will be updated in-place
!~  resource "aws_ecr_repository" "this" {
        id                   = "civic-tech-jobs-fullstack"
        name                 = "civic-tech-jobs-fullstack"
        tags                 = {}
!~      tags_all             = {
+           "managed-by" = "terraform-incubator"
        }
#        (5 unchanged attributes hidden)

#        (2 unchanged blocks hidden)
    }

  # module.civic-tech-jobs.module.civic_tech_jobs_fullstack_stage_service.aws_cloudwatch_log_group.this will be updated in-place
!~  resource "aws_cloudwatch_log_group" "this" {
        id                = "/ecs/civic-tech-jobs-fs-stage"
        name              = "/ecs/civic-tech-jobs-fs-stage"
        tags              = {}
!~      tags_all          = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.civic-tech-jobs.module.civic_tech_jobs_fullstack_stage_service.aws_ecs_service.fargate[0] will be updated in-place
!~  resource "aws_ecs_service" "fargate" {
        id                                 = "arn:aws:ecs:us-west-2:035866691871:service/incubator-prod/civic-tech-jobs-fs-stage"
        name                               = "civic-tech-jobs-fs-stage"
        tags                               = {}
!~      tags_all                           = {
+           "managed-by" = "terraform-incubator"
        }
#        (18 unchanged attributes hidden)

#        (5 unchanged blocks hidden)
    }

  # module.civic-tech-jobs.module.civic_tech_jobs_fullstack_stage_service.aws_ecs_task_definition.task will be updated in-place
!~  resource "aws_ecs_task_definition" "task" {
        id                       = "civic-tech-jobs-fs-stage"
        tags                     = {}
!~      tags_all                 = {
+           "managed-by" = "terraform-incubator"
        }
#        (17 unchanged attributes hidden)
    }

  # module.civic-tech-jobs.module.civic_tech_jobs_fullstack_stage_service.aws_iam_policy.container_policy will be updated in-place
!~  resource "aws_iam_policy" "container_policy" {
        id               = "arn:aws:iam::035866691871:policy/civic-tech-jobs-fs-stage-task-policy"
        name             = "civic-tech-jobs-fs-stage-task-policy"
        tags             = {}
!~      tags_all         = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.civic-tech-jobs.module.civic_tech_jobs_fullstack_stage_service.aws_iam_role.instance will be updated in-place
!~  resource "aws_iam_role" "instance" {
        id                    = "ecs-container-civic-tech-jobs-fs-stage"
        name                  = "ecs-container-civic-tech-jobs-fs-stage"
        tags                  = {
            "tag-key" = "*********"
        }
!~      tags_all              = {
+           "managed-by" = "terraform-incubator"
#            (1 unchanged element hidden)
        }
#        (11 unchanged attributes hidden)
    }

  # module.civic-tech-jobs.module.civic_tech_jobs_fullstack_stage_service.aws_lb_listener_rule.static will be updated in-place
!~  resource "aws_lb_listener_rule" "static" {
        id           = "arn:aws:elasticloadbalancing:us-west-2:035866691871:listener-rule/app/incubator-prod-lb/7451adf77133ef36/390a225766a4daf3/8b944647d0d45e1e"
        tags         = {}
!~      tags_all     = {
+           "managed-by" = "terraform-incubator"
        }
#        (4 unchanged attributes hidden)

#        (3 unchanged blocks hidden)
    }

  # module.civic-tech-jobs.module.civic_tech_jobs_fullstack_stage_service.aws_lb_target_group.this will be updated in-place
!~  resource "aws_lb_target_group" "this" {
        id                                 = "arn:aws:elasticloadbalancing:us-west-2:035866691871:targetgroup/civic-tech-jobs-fs-stage-tg/6b36f05863de6128"
        name                               = "civic-tech-jobs-fs-stage-tg"
        tags                               = {}
!~      tags_all                           = {
+           "managed-by" = "terraform-incubator"
        }
#        (18 unchanged attributes hidden)

!~      target_health_state {
+           enable_unhealthy_connection_termination = false
+           unhealthy_draining_interval             = 0
        }

#        (4 unchanged blocks hidden)
    }

  # module.civic-tech-jobs.module.civic_tech_jobs_fullstack_stage_service.aws_security_group.container will be updated in-place
!~  resource "aws_security_group" "container" {
        id                     = "sg-0d384beaea3ec08be"
        name                   = "ecs-container-civic-tech-jobs-fs-stage"
        tags                   = {
            "Name" = "ecs-container-civic-tech-jobs-fs-stage"
        }
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
#            (1 unchanged element hidden)
        }
#        (9 unchanged attributes hidden)
    }

  # module.civic-tech-jobs.module.civic_tech_jobs_fullstack_stage_service.aws_vpc_security_group_egress_rule.allow_all_traffic will be updated in-place
!~  resource "aws_vpc_security_group_egress_rule" "allow_all_traffic" {
        id                     = "sgr-00d0ac63ba7740037"
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
        }
#        (6 unchanged attributes hidden)
    }

  # module.civic-tech-jobs.module.civic_tech_jobs_fullstack_stage_service.aws_vpc_security_group_ingress_rule.container_ingress_port will be updated in-place
!~  resource "aws_vpc_security_group_ingress_rule" "container_ingress_port" {
        id                     = "sgr-0397513833cd8b8af"
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
        }
#        (8 unchanged attributes hidden)
    }

  # module.home-unite-us.module.cicd_integration.aws_iam_role.builder will be updated in-place
!~  resource "aws_iam_role" "builder" {
        id                    = "incubator-cicd-home-unite-us"
        name                  = "incubator-cicd-home-unite-us"
        tags                  = {}
!~      tags_all              = {
+           "managed-by" = "terraform-incubator"
        }
#        (11 unchanged attributes hidden)
    }

  # module.home-unite-us.module.db_url_qa.aws_ssm_parameter.this will be updated in-place
!~  resource "aws_ssm_parameter" "this" {
        id              = "/home-unite-us/fullstack-qa-database_url"
        name            = "/home-unite-us/fullstack-qa-database_url"
        tags            = {}
!~      tags_all        = {
+           "managed-by" = "terraform-incubator"
        }
#        (11 unchanged attributes hidden)
    }

  # module.home-unite-us.module.ecr_fullstack.aws_ecr_repository.this will be updated in-place
!~  resource "aws_ecr_repository" "this" {
        id                   = "home-unite-us-fullstack"
        name                 = "home-unite-us-fullstack"
        tags                 = {}
!~      tags_all             = {
+           "managed-by" = "terraform-incubator"
        }
#        (5 unchanged attributes hidden)

#        (2 unchanged blocks hidden)
    }

  # module.home-unite-us.module.qa_service.aws_cloudwatch_log_group.this will be updated in-place
!~  resource "aws_cloudwatch_log_group" "this" {
        id                = "/ecs/home-unite-us-fullstack-qa"
        name              = "/ecs/home-unite-us-fullstack-qa"
        tags              = {}
!~      tags_all          = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.home-unite-us.module.qa_service.aws_ecs_service.fargate[0] will be updated in-place
!~  resource "aws_ecs_service" "fargate" {
        id                                 = "arn:aws:ecs:us-west-2:035866691871:service/incubator-prod/home-unite-us-fullstack-qa"
        name                               = "home-unite-us-fullstack-qa"
        tags                               = {}
!~      tags_all                           = {
+           "managed-by" = "terraform-incubator"
        }
#        (18 unchanged attributes hidden)

#        (5 unchanged blocks hidden)
    }

  # module.home-unite-us.module.qa_service.aws_ecs_task_definition.task will be updated in-place
!~  resource "aws_ecs_task_definition" "task" {
        id                       = "home-unite-us-fullstack-qa"
        tags                     = {}
!~      tags_all                 = {
+           "managed-by" = "terraform-incubator"
        }
#        (17 unchanged attributes hidden)
    }

  # module.home-unite-us.module.qa_service.aws_iam_policy.container_policy will be updated in-place
!~  resource "aws_iam_policy" "container_policy" {
        id               = "arn:aws:iam::035866691871:policy/home-unite-us-fullstack-qa-task-policy"
        name             = "home-unite-us-fullstack-qa-task-policy"
        tags             = {}
!~      tags_all         = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.home-unite-us.module.qa_service.aws_iam_role.instance will be updated in-place
!~  resource "aws_iam_role" "instance" {
        id                    = "ecs-container-home-unite-us-fullstack-qa"
        name                  = "ecs-container-home-unite-us-fullstack-qa"
        tags                  = {
            "tag-key" = "*********"
        }
!~      tags_all              = {
+           "managed-by" = "terraform-incubator"
#            (1 unchanged element hidden)
        }
#        (11 unchanged attributes hidden)
    }

  # module.home-unite-us.module.qa_service.aws_lb_listener_rule.static will be updated in-place
!~  resource "aws_lb_listener_rule" "static" {
        id           = "arn:aws:elasticloadbalancing:us-west-2:035866691871:listener-rule/app/incubator-prod-lb/7451adf77133ef36/390a225766a4daf3/5cdadacb9adf43d3"
        tags         = {}
!~      tags_all     = {
+           "managed-by" = "terraform-incubator"
        }
#        (4 unchanged attributes hidden)

#        (3 unchanged blocks hidden)
    }

  # module.home-unite-us.module.qa_service.aws_lb_target_group.this will be updated in-place
!~  resource "aws_lb_target_group" "this" {
        id                                 = "arn:aws:elasticloadbalancing:us-west-2:035866691871:targetgroup/home-unite-us-fullstack-qa-tg/40d03a61936e267f"
        name                               = "home-unite-us-fullstack-qa-tg"
        tags                               = {}
!~      tags_all                           = {
+           "managed-by" = "terraform-incubator"
        }
#        (18 unchanged attributes hidden)

!~      target_health_state {
+           enable_unhealthy_connection_termination = false
+           unhealthy_draining_interval             = 0
        }

#        (4 unchanged blocks hidden)
    }

  # module.home-unite-us.module.qa_service.aws_security_group.container will be updated in-place
!~  resource "aws_security_group" "container" {
        id                     = "sg-03ab99034c6209504"
        name                   = "ecs-container-home-unite-us-fullstack-qa"
        tags                   = {
            "Name" = "ecs-container-home-unite-us-fullstack-qa"
        }
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
#            (1 unchanged element hidden)
        }
#        (9 unchanged attributes hidden)
    }

  # module.home-unite-us.module.qa_service.aws_vpc_security_group_egress_rule.allow_all_traffic will be updated in-place
!~  resource "aws_vpc_security_group_egress_rule" "allow_all_traffic" {
        id                     = "sgr-01d4cc8411407108c"
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
        }
#        (6 unchanged attributes hidden)
    }

  # module.home-unite-us.module.qa_service.aws_vpc_security_group_ingress_rule.container_ingress_port will be updated in-place
!~  resource "aws_vpc_security_group_ingress_rule" "container_ingress_port" {
        id                     = "sgr-0171086766886d951"
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
        }
#        (8 unchanged attributes hidden)
    }

  # module.people-depot.module.backend_dev_api_secret.aws_ssm_parameter.this will be updated in-place
!~  resource "aws_ssm_parameter" "this" {
        id              = "/people-depot/backend-dev-api-secret"
        name            = "/people-depot/backend-dev-api-secret"
        tags            = {}
!~      tags_all        = {
+           "managed-by" = "terraform-incubator"
        }
#        (11 unchanged attributes hidden)
    }

  # module.people-depot.module.backend_dev_service.aws_cloudwatch_log_group.this will be updated in-place
!~  resource "aws_cloudwatch_log_group" "this" {
        id                = "/ecs/people-depot-backend-dev"
        name              = "/ecs/people-depot-backend-dev"
        tags              = {}
!~      tags_all          = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.people-depot.module.backend_dev_service.aws_ecs_service.fargate[0] will be updated in-place
!~  resource "aws_ecs_service" "fargate" {
        id                                 = "arn:aws:ecs:us-west-2:035866691871:service/incubator-prod/people-depot-backend-dev"
        name                               = "people-depot-backend-dev"
        tags                               = {}
!~      tags_all                           = {
+           "managed-by" = "terraform-incubator"
        }
#        (18 unchanged attributes hidden)

#        (5 unchanged blocks hidden)
    }

  # module.people-depot.module.backend_dev_service.aws_ecs_task_definition.task will be updated in-place
!~  resource "aws_ecs_task_definition" "task" {
        id                       = "people-depot-backend-dev"
        tags                     = {}
!~      tags_all                 = {
+           "managed-by" = "terraform-incubator"
        }
#        (17 unchanged attributes hidden)
    }

  # module.people-depot.module.backend_dev_service.aws_iam_policy.container_policy will be updated in-place
!~  resource "aws_iam_policy" "container_policy" {
        id               = "arn:aws:iam::035866691871:policy/people-depot-backend-dev-task-policy"
        name             = "people-depot-backend-dev-task-policy"
        tags             = {}
!~      tags_all         = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.people-depot.module.backend_dev_service.aws_iam_role.instance will be updated in-place
!~  resource "aws_iam_role" "instance" {
        id                    = "ecs-container-people-depot-backend-dev"
        name                  = "ecs-container-people-depot-backend-dev"
        tags                  = {
            "tag-key" = "*********"
        }
!~      tags_all              = {
+           "managed-by" = "terraform-incubator"
#            (1 unchanged element hidden)
        }
#        (11 unchanged attributes hidden)
    }

  # module.people-depot.module.backend_dev_service.aws_lb_listener_rule.static will be updated in-place
!~  resource "aws_lb_listener_rule" "static" {
        id           = "arn:aws:elasticloadbalancing:us-west-2:035866691871:listener-rule/app/incubator-prod-lb/7451adf77133ef36/390a225766a4daf3/bb0f094e084455bb"
        tags         = {}
!~      tags_all     = {
+           "managed-by" = "terraform-incubator"
        }
#        (4 unchanged attributes hidden)

#        (3 unchanged blocks hidden)
    }

  # module.people-depot.module.backend_dev_service.aws_lb_target_group.this will be updated in-place
!~  resource "aws_lb_target_group" "this" {
        id                                 = "arn:aws:elasticloadbalancing:us-west-2:035866691871:targetgroup/people-depot-backend-dev-tg/61ab9915748f8706"
        name                               = "people-depot-backend-dev-tg"
        tags                               = {}
!~      tags_all                           = {
+           "managed-by" = "terraform-incubator"
        }
#        (18 unchanged attributes hidden)

!~      target_health_state {
+           enable_unhealthy_connection_termination = false
+           unhealthy_draining_interval             = 0
        }

#        (4 unchanged blocks hidden)
    }

  # module.people-depot.module.backend_dev_service.aws_security_group.container will be updated in-place
!~  resource "aws_security_group" "container" {
        id                     = "sg-02ea7fea37446badd"
        name                   = "ecs-container-people-depot-backend-dev"
        tags                   = {
            "Name" = "ecs-container-people-depot-backend-dev"
        }
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
#            (1 unchanged element hidden)
        }
#        (9 unchanged attributes hidden)
    }

  # module.people-depot.module.backend_dev_service.aws_vpc_security_group_egress_rule.allow_all_traffic will be updated in-place
!~  resource "aws_vpc_security_group_egress_rule" "allow_all_traffic" {
        id                     = "sgr-03d942deb0807cc0f"
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
        }
#        (6 unchanged attributes hidden)
    }

  # module.people-depot.module.backend_dev_service.aws_vpc_security_group_ingress_rule.container_ingress_port will be updated in-place
!~  resource "aws_vpc_security_group_ingress_rule" "container_ingress_port" {
        id                     = "sgr-05275a0fabb94fbe3"
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
        }
#        (8 unchanged attributes hidden)
    }

  # module.people-depot.module.dev_database.postgresql_grant.user will be updated in-place
!~  resource "postgresql_grant" "user" {
        id                = "people-depot_backend_dev_user_people-depot_backend_dev_public_table"
!~      privileges        = [
+           "DELETE",
+           "INSERT",
+           "SELECT",
+           "UPDATE",
        ]
#        (5 unchanged attributes hidden)
    }

  # module.people-depot.module.dev_database.postgresql_grant.viewer will be updated in-place
!~  resource "postgresql_grant" "viewer" {
        id                = "people-depot_backend_dev_viewer_people-depot_backend_dev_public_table"
!~      privileges        = [
+           "SELECT",
        ]
#        (5 unchanged attributes hidden)
    }

  # module.people-depot.module.people_depot_cicd.aws_iam_role.builder will be updated in-place
!~  resource "aws_iam_role" "builder" {
        id                    = "incubator-cicd-people-depot"
        name                  = "incubator-cicd-people-depot"
        tags                  = {}
!~      tags_all              = {
+           "managed-by" = "terraform-incubator"
        }
#        (11 unchanged attributes hidden)
    }

  # module.people-depot.module.people_depot_ecr_backend.aws_ecr_repository.this will be updated in-place
!~  resource "aws_ecr_repository" "this" {
        id                   = "people-depot-backend"
        name                 = "people-depot-backend"
        tags                 = {}
!~      tags_all             = {
+           "managed-by" = "terraform-incubator"
        }
#        (5 unchanged attributes hidden)

#        (2 unchanged blocks hidden)
    }

  # module.vrms.module.backend_dev_service.aws_cloudwatch_log_group.this will be updated in-place
!~  resource "aws_cloudwatch_log_group" "this" {
        id                = "/ecs/vrms-backend-dev"
        name              = "/ecs/vrms-backend-dev"
        tags              = {}
!~      tags_all          = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.vrms.module.backend_dev_service.aws_ecs_service.fargate[0] will be updated in-place
!~  resource "aws_ecs_service" "fargate" {
        id                                 = "arn:aws:ecs:us-west-2:035866691871:service/incubator-prod/vrms-backend-dev"
        name                               = "vrms-backend-dev"
        tags                               = {}
!~      tags_all                           = {
+           "managed-by" = "terraform-incubator"
        }
#        (18 unchanged attributes hidden)

#        (5 unchanged blocks hidden)
    }

  # module.vrms.module.backend_dev_service.aws_ecs_task_definition.task will be updated in-place
!~  resource "aws_ecs_task_definition" "task" {
        id                       = "vrms-backend-dev"
        tags                     = {}
!~      tags_all                 = {
+           "managed-by" = "terraform-incubator"
        }
#        (17 unchanged attributes hidden)
    }

  # module.vrms.module.backend_dev_service.aws_iam_policy.container_policy will be updated in-place
!~  resource "aws_iam_policy" "container_policy" {
        id               = "arn:aws:iam::035866691871:policy/vrms-backend-dev-task-policy"
        name             = "vrms-backend-dev-task-policy"
        tags             = {}
!~      tags_all         = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.vrms.module.backend_dev_service.aws_iam_role.instance will be updated in-place
!~  resource "aws_iam_role" "instance" {
        id                    = "ecs-container-vrms-backend-dev"
        name                  = "ecs-container-vrms-backend-dev"
        tags                  = {
            "tag-key" = "*********"
        }
!~      tags_all              = {
+           "managed-by" = "terraform-incubator"
#            (1 unchanged element hidden)
        }
#        (11 unchanged attributes hidden)
    }

  # module.vrms.module.backend_dev_service.aws_lb_listener_rule.static will be updated in-place
!~  resource "aws_lb_listener_rule" "static" {
        id           = "arn:aws:elasticloadbalancing:us-west-2:035866691871:listener-rule/app/incubator-prod-lb/7451adf77133ef36/390a225766a4daf3/9b4edb4dc5907c4b"
        tags         = {}
!~      tags_all     = {
+           "managed-by" = "terraform-incubator"
        }
#        (4 unchanged attributes hidden)

#        (3 unchanged blocks hidden)
    }

  # module.vrms.module.backend_dev_service.aws_lb_target_group.this will be updated in-place
!~  resource "aws_lb_target_group" "this" {
        id                                 = "arn:aws:elasticloadbalancing:us-west-2:035866691871:targetgroup/vrms-backend-dev-tg/dea669763f9a8f0d"
        name                               = "vrms-backend-dev-tg"
        tags                               = {}
!~      tags_all                           = {
+           "managed-by" = "terraform-incubator"
        }
#        (18 unchanged attributes hidden)

!~      target_health_state {
+           enable_unhealthy_connection_termination = false
+           unhealthy_draining_interval             = 0
        }

#        (4 unchanged blocks hidden)
    }

  # module.vrms.module.backend_dev_service.aws_security_group.container will be updated in-place
!~  resource "aws_security_group" "container" {
        id                     = "sg-04cad03d0c2311bf9"
        name                   = "ecs-container-vrms-backend-dev"
        tags                   = {
            "Name" = "ecs-container-vrms-backend-dev"
        }
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
#            (1 unchanged element hidden)
        }
#        (9 unchanged attributes hidden)
    }

  # module.vrms.module.backend_dev_service.aws_vpc_security_group_egress_rule.allow_all_traffic will be updated in-place
!~  resource "aws_vpc_security_group_egress_rule" "allow_all_traffic" {
        id                     = "sgr-080396281203e7734"
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
        }
#        (6 unchanged attributes hidden)
    }

  # module.vrms.module.backend_dev_service.aws_vpc_security_group_ingress_rule.container_ingress_port will be updated in-place
!~  resource "aws_vpc_security_group_ingress_rule" "container_ingress_port" {
        id                     = "sgr-0b860d4c6902e23ab"
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
        }
#        (8 unchanged attributes hidden)
    }

  # module.vrms.module.backend_prod_service.aws_cloudwatch_log_group.this will be updated in-place
!~  resource "aws_cloudwatch_log_group" "this" {
        id                = "/ecs/vrms-backend-prod"
        name              = "/ecs/vrms-backend-prod"
        tags              = {}
!~      tags_all          = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.vrms.module.backend_prod_service.aws_ecs_service.fargate[0] will be updated in-place
!~  resource "aws_ecs_service" "fargate" {
        id                                 = "arn:aws:ecs:us-west-2:035866691871:service/incubator-prod/vrms-backend-prod"
        name                               = "vrms-backend-prod"
        tags                               = {}
!~      tags_all                           = {
+           "managed-by" = "terraform-incubator"
        }
#        (18 unchanged attributes hidden)

#        (5 unchanged blocks hidden)
    }

  # module.vrms.module.backend_prod_service.aws_ecs_task_definition.task will be updated in-place
!~  resource "aws_ecs_task_definition" "task" {
        id                       = "vrms-backend-prod"
        tags                     = {}
!~      tags_all                 = {
+           "managed-by" = "terraform-incubator"
        }
#        (17 unchanged attributes hidden)
    }

  # module.vrms.module.backend_prod_service.aws_iam_policy.container_policy will be updated in-place
!~  resource "aws_iam_policy" "container_policy" {
        id               = "arn:aws:iam::035866691871:policy/vrms-backend-prod-task-policy"
        name             = "vrms-backend-prod-task-policy"
        tags             = {}
!~      tags_all         = {
+           "managed-by" = "terraform-incubator"
        }
#        (7 unchanged attributes hidden)
    }

  # module.vrms.module.backend_prod_service.aws_iam_role.instance will be updated in-place
!~  resource "aws_iam_role" "instance" {
        id                    = "ecs-container-vrms-backend-prod"
        name                  = "ecs-container-vrms-backend-prod"
        tags                  = {
            "tag-key" = "*********"
        }
!~      tags_all              = {
+           "managed-by" = "terraform-incubator"
#            (1 unchanged element hidden)
        }
#        (11 unchanged attributes hidden)
    }

  # module.vrms.module.backend_prod_service.aws_lb_listener_rule.static will be updated in-place
!~  resource "aws_lb_listener_rule" "static" {
        id           = "arn:aws:elasticloadbalancing:us-west-2:035866691871:listener-rule/app/incubator-prod-lb/7451adf77133ef36/390a225766a4daf3/9ad82830165ad44f"
        tags         = {}
!~      tags_all     = {
+           "managed-by" = "terraform-incubator"
        }
#        (4 unchanged attributes hidden)

#        (3 unchanged blocks hidden)
    }

  # module.vrms.module.backend_prod_service.aws_lb_target_group.this will be updated in-place
!~  resource "aws_lb_target_group" "this" {
        id                                 = "arn:aws:elasticloadbalancing:us-west-2:035866691871:targetgroup/vrms-backend-prod-tg/18b0330f4c11c7cb"
        name                               = "vrms-backend-prod-tg"
        tags                               = {}
!~      tags_all                           = {
+           "managed-by" = "terraform-incubator"
        }
#        (18 unchanged attributes hidden)

!~      target_health_state {
+           enable_unhealthy_connection_termination = false
+           unhealthy_draining_interval             = 0
        }

#        (4 unchanged blocks hidden)
    }

  # module.vrms.module.backend_prod_service.aws_security_group.container will be updated in-place
!~  resource "aws_security_group" "container" {
        id                     = "sg-065702ded1faa664f"
        name                   = "ecs-container-vrms-backend-prod"
        tags                   = {
            "Name" = "ecs-container-vrms-backend-prod"
        }
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
#            (1 unchanged element hidden)
        }
#        (9 unchanged attributes hidden)
    }

  # module.vrms.module.backend_prod_service.aws_vpc_security_group_egress_rule.allow_all_traffic will be updated in-place
!~  resource "aws_vpc_security_group_egress_rule" "allow_all_traffic" {
        id                     = "sgr-0f14574928a2330b2"
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
        }
#        (6 unchanged attributes hidden)
    }

  # module.vrms.module.backend_prod_service.aws_vpc_security_group_ingress_rule.container_ingress_port will be updated in-place
!~  resource "aws_vpc_security_group_ingress_rule" "container_ingress_port" {
        id                     = "sgr-0829cd1da41497afe"
!~      tags_all               = {
+           "managed-by" = "terraform-incubator"
        }
#        (8 unchanged attributes hidden)
    }

  # module.vrms.module.cicd.aws_iam_role.builder will be updated in-place
!~  resource "aws_iam_role" "builder" {
        id                    = "incubator-cicd-vrms"
        name                  = "incubator-cicd-vrms"
        tags                  = {}
!~      tags_all              = {
+           "managed-by" = "terraform-incubator"
        }
#        (11 unchanged attributes hidden)
    }

  # module.vrms.module.custom_request_header_secret.aws_ssm_parameter.this will be updated in-place
Plan is too large to fit in a PR comment. See the full plan in the workflow log.

📝 Plan generated in Terraform plan (OIDC) #59

@myronchen-git myronchen-git added this to the 01 - Compliance milestone Nov 6, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Add default tags to AWS resources

2 participants