Skip to content

Conversation

pcbarreto
Copy link
Contributor

Why

  • Add Prod Infra Hackaton

Pull request type

  • New resource
  • Update resource
  • Bugfix
  • Other (please describe):

Rollback plan

  • Revert this PR
  • Other (please, specify):

Copy link
Contributor

📝 Terraform Plan

→ Resource Changes: 11 to create, 0 to update, 0 to re-create, 0 to delete.

✨ Create

module.s3_bucket.aws_s3_bucket.this[0]
+ acceleration_status         = (known after apply)
+ acl                         = (known after apply)
+ arn                         = (known after apply)
+ bucket                      = "prod-thumb-processor-hackaton"
+ bucket_domain_name          = (known after apply)
+ bucket_prefix               = (known after apply)
+ bucket_regional_domain_name = (known after apply)
+ force_destroy               = false
+ hosted_zone_id              = (known after apply)
+ id                          = (known after apply)
+ object_lock_enabled         = false
+ policy                      = (known after apply)
+ region                      = (known after apply)
+ request_payer               = (known after apply)
+ tags                        = {
+     "ManagedBy" = "Terraform"
  }
+ tags_all                    = {
+     "ManagedBy" = "Terraform"
  }
+ website_domain              = (known after apply)
+ website_endpoint            = (known after apply)

+ cors_rule (known after apply)

+ grant (known after apply)

+ lifecycle_rule (known after apply)

+ logging (known after apply)

+ object_lock_configuration (known after apply)

+ replication_configuration (known after apply)

+ server_side_encryption_configuration (known after apply)

+ versioning (known after apply)

+ website (known after apply)
module.s3_bucket.aws_s3_bucket_acl.this[0]
+ acl    = "private"
+ bucket = (known after apply)
+ id     = (known after apply)

+ access_control_policy (known after apply)
module.s3_bucket.aws_s3_bucket_ownership_controls.this[0]
+ bucket = (known after apply)
+ id     = (known after apply)

+ rule {
+     object_ownership = "ObjectWriter"
  }
module.s3_bucket.aws_s3_bucket_public_access_block.this[0]
+ block_public_acls       = true
+ block_public_policy     = true
+ bucket                  = (known after apply)
+ id                      = (known after apply)
+ ignore_public_acls      = true
+ restrict_public_buckets = true
module.s3_bucket.aws_s3_bucket_versioning.this[0]
+ bucket = (known after apply)
+ id     = (known after apply)

+ versioning_configuration {
+     mfa_delete = (known after apply)
+     status     = "Enabled"
  }
module.sqs.aws_sqs_queue.dlq[0]
+ arn                               = (known after apply)
+ content_based_deduplication       = false
+ deduplication_scope               = (known after apply)
+ delay_seconds                     = 0
+ fifo_queue                        = true
+ fifo_throughput_limit             = (known after apply)
+ id                                = (known after apply)
+ kms_data_key_reuse_period_seconds = 0
+ max_message_size                  = 262144
+ message_retention_seconds         = 345600
+ name                              = "prod-thumb-processor-hackaton-queue-dlq.fifo"
+ name_prefix                       = (known after apply)
+ policy                            = (known after apply)
+ receive_wait_time_seconds         = 0
+ redrive_allow_policy              = (known after apply)
+ redrive_policy                    = (known after apply)
+ sqs_managed_sse_enabled           = true
+ tags                              = {
+     "Environment" = "prod"
+     "ManagedBy"   = "Terraform"
  }
+ tags_all                          = {
+     "Environment" = "prod"
+     "ManagedBy"   = "Terraform"
  }
+ url                               = (known after apply)
+ visibility_timeout_seconds        = 30
module.sqs.aws_sqs_queue.this[0]
+ arn                               = (known after apply)
+ content_based_deduplication       = false
+ deduplication_scope               = (known after apply)
+ delay_seconds                     = 0
+ fifo_queue                        = true
+ fifo_throughput_limit             = (known after apply)
+ id                                = (known after apply)
+ kms_data_key_reuse_period_seconds = 0
+ max_message_size                  = 262144
+ message_retention_seconds         = 345600
+ name                              = "prod-thumb-processor-hackaton-queue.fifo"
+ name_prefix                       = (known after apply)
+ policy                            = (known after apply)
+ receive_wait_time_seconds         = 0
+ redrive_allow_policy              = (known after apply)
+ redrive_policy                    = (known after apply)
+ sqs_managed_sse_enabled           = true
+ tags                              = {
+     "Environment" = "prod"
+     "ManagedBy"   = "Terraform"
  }
+ tags_all                          = {
+     "Environment" = "prod"
+     "ManagedBy"   = "Terraform"
  }
+ url                               = (known after apply)
+ visibility_timeout_seconds        = 30
module.sqs.aws_sqs_queue_policy.dlq[0]
+ id        = (known after apply)
+ policy    = (known after apply)
+ queue_url = (known after apply)
module.sqs.aws_sqs_queue_policy.this[0]
+ id        = (known after apply)
+ policy    = (known after apply)
+ queue_url = (known after apply)
module.sqs.aws_sqs_queue_redrive_allow_policy.dlq[0]
+ id                   = (known after apply)
+ queue_url            = (known after apply)
+ redrive_allow_policy = (known after apply)
module.sqs.aws_sqs_queue_redrive_policy.dlq[0]
+ id             = (known after apply)
+ queue_url      = (known after apply)
+ redrive_policy = (known after apply)

Triggered by @pcbarreto, Commit: bd95639c8f14080357f64a3c208f363a77cf5903

@pcbarreto pcbarreto merged commit b24c0db into main Feb 10, 2025
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant