Test atlantis on kops-infra-ci changes#8763
Conversation
Signed-off-by: Iftach Konshtok <[email protected]>
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: iftachk The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
atlantis plan |
|
Ran Plan for dir: Plan Error Show OutputWarning: Output length greater than max comment size. Continued in next comment. |
|
Continued plan output from previous comment. Show Outputle"
+ name_prefix = (known after apply)
+ path = "/"
+ tags = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ unique_id = (known after apply)
+ inline_policy (known after apply)
}
# aws_iam_role_policy_attachment.eks_pod_identity_policy will be created
+ resource "aws_iam_role_policy_attachment" "eks_pod_identity_policy" {
+ id = (known after apply)
+ policy_arn = "arn:aws:iam::aws:policy/AdministratorAccess"
+ role = "EKSPodIdentityRole"
}
# aws_vpc_ipam.main will be created
+ resource "aws_vpc_ipam" "main" {
+ arn = (known after apply)
+ default_resource_discovery_association_id = (known after apply)
+ default_resource_discovery_id = (known after apply)
+ description = "k8s-infra-kops-us-east-2-ipam"
+ enable_private_gua = false
+ id = (known after apply)
+ metered_account = (known after apply)
+ private_default_scope_id = (known after apply)
+ public_default_scope_id = (known after apply)
+ region = "us-east-2"
+ scope_count = (known after apply)
+ tags = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tier = "advanced"
+ operating_regions {
+ region_name = "us-east-2"
}
}
# aws_vpc_ipam_pool.main will be created
+ resource "aws_vpc_ipam_pool" "main" {
+ address_family = "ipv4"
+ arn = (known after apply)
+ auto_import = false
+ id = (known after apply)
+ ipam_scope_id = (known after apply)
+ ipam_scope_type = (known after apply)
+ locale = "us-east-2"
+ pool_depth = (known after apply)
+ region = "us-east-2"
+ state = (known after apply)
+ tags = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
}
# aws_vpc_ipam_pool_cidr.main will be created
+ resource "aws_vpc_ipam_pool_cidr" "main" {
+ cidr = "10.128.0.0/16"
+ id = (known after apply)
+ ipam_pool_cidr_id = (known after apply)
+ ipam_pool_id = (known after apply)
+ netmask_length = (known after apply)
+ region = "us-east-2"
}
# aws_vpc_ipam_preview_next_cidr.main must be replaced
+/- resource "aws_vpc_ipam_preview_next_cidr" "main" {
~ cidr = "10.128.0.0/20" -> (known after apply)
~ id = "10.128.0.0/20_ipam-pool-0cefae006ed9905cc" -> (known after apply)
~ ipam_pool_id = "ipam-pool-0cefae006ed9905cc" -> (known after apply) # forces replacement
# (2 unchanged attributes hidden)
}
# aws_vpc_ipam_scope.main will be created
+ resource "aws_vpc_ipam_scope" "main" {
+ arn = (known after apply)
+ description = "k8s-infra-kops-us-east-2-ipam-scope"
+ id = (known after apply)
+ ipam_arn = (known after apply)
+ ipam_id = (known after apply)
+ ipam_scope_type = (known after apply)
+ is_default = (known after apply)
+ pool_count = (known after apply)
+ region = "us-east-2"
+ tags = {
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
}
# module.ci_iam_group.aws_iam_group.this[0] will be created
+ resource "aws_iam_group" "this" {
+ arn = (known after apply)
+ id = (known after apply)
+ name = "ci-admins"
+ path = "/"
+ unique_id = (known after apply)
}
# module.ci_iam_group.aws_iam_group_membership.this[0] will be created
+ resource "aws_iam_group_membership" "this" {
+ group = (known after apply)
+ id = (known after apply)
+ name = "ci-admins"
+ users = [
+ "kops-ci-user",
]
}
# module.ci_iam_group.aws_iam_group_policy_attachment.custom_arns[0] will be created
+ resource "aws_iam_group_policy_attachment" "custom_arns" {
+ group = (known after apply)
+ id = (known after apply)
+ policy_arn = "arn:aws:iam::aws:policy/AdministratorAccess"
}
# module.ci_iam_group.aws_iam_group_policy_attachment.iam_self_management[0] will be created
+ resource "aws_iam_group_policy_attachment" "iam_self_management" {
+ group = (known after apply)
+ id = (known after apply)
+ policy_arn = (known after apply)
}
# module.ci_iam_group.aws_iam_policy.iam_self_management[0] will be created
+ resource "aws_iam_policy" "iam_self_management" {
+ arn = (known after apply)
+ attachment_count = (known after apply)
+ id = (known after apply)
+ name = (known after apply)
+ name_prefix = "IAMSelfManagement-"
+ path = "/"
+ policy = jsonencode(
{
+ Statement = [
+ {
+ Action = [
+ "iam:ListVirtualMFADevices",
+ "iam:ListAccountAliases",
+ "iam:GetAccountSummary",
+ "iam:GetAccountPasswordPolicy",
]
+ Effect = "Allow"
+ Resource = "*"
+ Sid = "AllowViewAccountInfo"
},
+ {
+ Action = [
+ "iam:UpdateLoginProfile",
+ "iam:GetUser",
+ "iam:GetLoginProfile",
+ "iam:ChangePassword",
]
+ Effect = "Allow"
+ Resource = [
+ "arn:aws:iam::348685125169:user/*/${aws:username}",
+ "arn:aws:iam::348685125169:user/${aws:username}",
]
+ Sid = "AllowManageOwnPasswords"
},
+ {
+ Action = [
+ "iam:UpdateAccessKey",
+ "iam:UntagUser",
+ "iam:TagUser",
+ "iam:ListUserTags",
+ "iam:ListAccessKeys",
+ "iam:GetAccessKeyLastUsed",
+ "iam:DeleteAccessKey",
+ "iam:CreateAccessKey",
]
+ Effect = "Allow"
+ Resource = [
+ "arn:aws:iam::348685125169:user/*/${aws:username}",
+ "arn:aws:iam::348685125169:user/${aws:username}",
]
+ Sid = "AllowManageOwnAccessKeys"
},
+ {
+ Action = [
+ "iam:UploadSigningCertificate",
+ "iam:UpdateSigningCertificate",
+ "iam:ListSigningCertificates",
+ "iam:DeleteSigningCertificate",
]
+ Effect = "Allow"
+ Resource = [
+ "arn:aws:iam::348685125169:user/*/${aws:username}",
+ "arn:aws:iam::348685125169:user/${aws:username}",
]
+ Sid = "AllowManageOwnSigningCertificates"
},
+ {
+ Action = [
+ "iam:UploadSSHPublicKey",
+ "iam:UpdateSSHPublicKey",
+ "iam:ListSSHPublicKeys",
+ "iam:GetSSHPublicKey",
+ "iam:DeleteSSHPublicKey",
]
+ Effect = "Allow"
+ Resource = [
+ "arn:aws:iam::348685125169:user/*/${aws:username}",
+ "arn:aws:iam::348685125169:user/${aws:username}",
]
+ Sid = "AllowManageOwnSSHPublicKeys"
},
+ {
+ Action = [
+ "iam:UpdateServiceSpecificCredential",
+ "iam:ResetServiceSpecificCredential",
+ "iam:ListServiceSpecificCredentials",
+ "iam:DeleteServiceSpecificCredential",
+ "iam:CreateServiceSpecificCredential",
]
+ Effect = "Allow"
+ Resource = [
+ "arn:aws:iam::348685125169:user/*/${aws:username}",
+ "arn:aws:iam::348685125169:user/${aws:username}",
]
+ Sid = "AllowManageOwnGitCredentials"
},
+ {
+ Action = "iam:CreateVirtualMFADevice"
+ Effect = "Allow"
+ Resource = "arn:aws:iam::348685125169:mfa/*"
+ Sid = "AllowManageOwnVirtualMFADevice"
},
+ {
+ Action = [
+ "iam:ResyncMFADevice",
+ "iam:ListMFADevices",
+ "iam:EnableMFADevice",
+ "iam:DeactivateMFADevice",
]
+ Effect = "Allow"
+ Resource = [
+ "arn:aws:iam::348685125169:user/*/${aws:username}",
+ "arn:aws:iam::348685125169:user/${aws:username}",
]
+ Sid = "AllowManageOwnUserMFA"
},
]
+ Version = "2012-10-17"
}
)
+ policy_id = (known after apply)
+ tags = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
}
# module.ebs_csi_irsa.aws_iam_policy.this[0] will be created
+ resource "aws_iam_policy" "this" {
+ arn = (known after apply)
+ attachment_count = (known after apply)
+ description = "Provides permissions to manage EBS volumes via the container storage interface driver"
+ id = (known after apply)
+ name = (known after apply)
+ name_prefix = "EBS_CSI-"
+ path = "/"
+ policy = jsonencode(
{
+ Statement = [
+ {
+ Action = [
+ "ec2:DescribeVolumesModifications",
+ "ec2:DescribeVolumes",
+ "ec2:DescribeTags",
+ "ec2:DescribeSnapshots",
+ "ec2:DescribeInstances",
+ "ec2:DescribeAvailabilityZones",
]
+ Effect = "Allow"
+ Resource = "*"
},
+ {
+ Action = [
+ "ec2:ModifyVolume",
+ "ec2:CreateSnapshot",
]
+ Effect = "Allow"
+ Resource = "arn:aws:ec2:*:*:volume/*"
},
+ {
+ Action = [
+ "ec2:DetachVolume",
+ "ec2:AttachVolume",
]
+ Effect = "Allow"
+ Resource = [
+ "arn:aws:ec2:*:*:volume/*",
+ "arn:aws:ec2:*:*:instance/*",
]
},
+ {
+ Action = [
+ "ec2:EnableFastSnapshotRestores",
+ "ec2:CreateVolume",
]
+ Effect = "Allow"
+ Resource = "arn:aws:ec2:*:*:snapshot/*"
},
+ {
+ Action = "ec2:CreateTags"
+ Condition = {
+ StringEquals = {
+ "ec2:CreateAction" = [
+ "CreateVolume",
+ "CreateSnapshot",
]
}
}
+ Effect = "Allow"
+ Resource = [
+ "arn:aws:ec2:*:*:volume/*",
+ "arn:aws:ec2:*:*:snapshot/*",
]
},
+ {
+ Action = "ec2:DeleteTags"
+ Effect = "Allow"
+ Resource = [
+ "arn:aws:ec2:*:*:volume/*",
+ "arn:aws:ec2:*:*:snapshot/*",
]
},
+ {
+ Action = "ec2:CreateVolume"
+ Condition = {
+ StringLike = {
+ "aws:RequestTag/ebs.csi.aws.com/cluster" = "true"
}
}
+ Effect = "Allow"
+ Resource = "arn:aws:ec2:*:*:volume/*"
},
+ {
+ Action = "ec2:CreateVolume"
+ Condition = {
+ StringLike = {
+ "aws:RequestTag/CSIVolumeName" = "*"
}
}
+ Effect = "Allow"
+ Resource = "arn:aws:ec2:*:*:volume/*"
},
+ {
+ Action = "ec2:DeleteVolume"
+ Condition = {
+ StringLike = {
+ "aws:ResourceTag/ebs.csi.aws.com/cluster" = "true"
}
}
+ Effect = "Allow"
+ Resource = "arn:aws:ec2:*:*:volume/*"
},
+ {
+ Action = "ec2:DeleteVolume"
+ Condition = {
+ StringLike = {
+ "aws:ResourceTag/CSIVolumeName" = "*"
}
}
+ Effect = "Allow"
+ Resource = "arn:aws:ec2:*:*:volume/*"
},
+ {
+ Action = "ec2:DeleteVolume"
+ Condition = {
+ StringLike = {
+ "ec2:ResourceTag/kubernetes.io/created-for/pvc/name" = "*"
}
}
+ Effect = "Allow"
+ Resource = "arn:aws:ec2:*:*:volume/*"
},
+ {
+ Action = "ec2:CreateSnapshot"
+ Condition = {
+ StringLike = {
+ "aws:RequestTag/CSIVolumeSnapshotName" = "*"
}
}
+ Effect = "Allow"
+ Resource = "arn:aws:ec2:*:*:snapshot/*"
},
+ {
+ Action = "ec2:CreateSnapshot"
+ Condition = {
+ StringLike = {
+ "aws:RequestTag/ebs.csi.aws.com/cluster" = "true"
}
}
+ Effect = "Allow"
+ Resource = "arn:aws:ec2:*:*:snapshot/*"
},
+ {
+ Action = "ec2:DeleteSnapshot"
+ Condition = {
+ StringLike = {
+ "aws:ResourceTag/CSIVolumeSnapshotName" = "*"
}
}
+ Effect = "Allow"
+ Resource = "arn:aws:ec2:*:*:snapshot/*"
},
+ {
+ Action = "ec2:DeleteSnapshot"
+ Condition = {
+ StringLike = {
+ "aws:ResourceTag/ebs.csi.aws.com/cluster" = "true"
}
}
+ Effect = "Allow"
+ Resource = "arn:aws:ec2:*:*:snapshot/*"
},
]
+ Version = "2012-10-17"
}
)
+ policy_id = (known after apply)
+ tags = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
}
# module.eks.aws_cloudwatch_log_group.this[0] will be created
+ resource "aws_cloudwatch_log_group" "this" {
+ arn = (known after apply)
+ id = (known after apply)
+ log_group_class = (known after apply)
+ name = "/aws/eks/k8s-infra-kops-prow-build/cluster"
+ name_prefix = (known after apply)
+ region = "us-east-2"
+ retention_in_days = 30
+ skip_destroy = false
+ tags = {
+ "Name" = "/aws/eks/k8s-infra-kops-prow-build/cluster"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Name" = "/aws/eks/k8s-infra-kops-prow-build/cluster"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
}
# module.eks.aws_iam_policy.cluster_encryption[0] will be created
+ resource "aws_iam_policy" "cluster_encryption" {
+ arn = (known after apply)
+ attachment_count = (known after apply)
+ description = "Cluster encryption policy to allow cluster role to utilize CMK provided"
+ id = (known after apply)
+ name = (known after apply)
+ name_prefix = "k8s-infra-kops-prow-build-cluster-ClusterEncryption"
+ path = "/"
+ policy = (known after apply)
+ policy_id = (known after apply)
+ tags = {
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
}
# module.eks.aws_iam_role.this[0] will be created
+ resource "aws_iam_role" "this" {
+ arn = (known after apply)
+ assume_role_policy = jsonencode(
{
+ Statement = [
+ {
+ Action = [
+ "sts:TagSession",
+ "sts:AssumeRole",
]
+ Effect = "Allow"
+ Principal = {
+ Service = "eks.amazonaws.com"
}
+ Sid = "EKSClusterAssumeRole"
},
]
+ Version = "2012-10-17"
}
)
+ create_date = (known after apply)
+ force_detach_policies = true
+ id = (known after apply)
+ managed_policy_arns = (known after apply)
+ max_session_duration = 3600
+ name = (known after apply)
+ name_prefix = "k8s-infra-kops-prow-build-cluster-"
+ path = "/"
+ tags = {
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ unique_id = (known after apply)
+ inline_policy (known after apply)
}
# module.eks.aws_iam_role_policy_attachment.cluster_encryption[0] will be created
+ resource "aws_iam_role_policy_attachment" "cluster_encryption" {
+ id = (known after apply)
+ policy_arn = (known after apply)
+ role = (known after apply)
}
# module.eks.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"] will be created
+ resource "aws_iam_role_policy_attachment" "this" {
+ id = (known after apply)
+ policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"
+ role = (known after apply)
}
# module.eks.aws_security_group.cluster[0] will be created
+ resource "aws_security_group" "cluster" {
+ arn = (known after apply)
+ description = "EKS cluster security group"
+ egress = (known after apply)
+ id = (known after apply)
+ ingress = (known after apply)
+ name = (known after apply)
+ name_prefix = "k8s-infra-kops-prow-build-cluster-"
+ owner_id = (known after apply)
+ region = "us-east-2"
+ revoke_rules_on_delete = false
+ tags = {
+ "Name" = "k8s-infra-kops-prow-build-cluster"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Name" = "k8s-infra-kops-prow-build-cluster"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ vpc_id = (known after apply)
}
# module.eks.aws_security_group.node[0] will be created
+ resource "aws_security_group" "node" {
+ arn = (known after apply)
+ description = "EKS node shared security group"
+ egress = (known after apply)
+ id = (known after apply)
+ ingress = (known after apply)
+ name = (known after apply)
+ name_prefix = "k8s-infra-kops-prow-build-node-"
+ owner_id = (known after apply)
+ region = "us-east-2"
+ revoke_rules_on_delete = false
+ tags = {
+ "Name" = "k8s-infra-kops-prow-build-node"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "kubernetes.io/cluster/k8s-infra-kops-prow-build" = "owned"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Name" = "k8s-infra-kops-prow-build-node"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "kubernetes.io/cluster/k8s-infra-kops-prow-build" = "owned"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ vpc_id = (known after apply)
}
# module.eks.aws_security_group_rule.cluster["ingress_nodes_443"] will be created
+ resource "aws_security_group_rule" "cluster" {
+ description = "Node groups to cluster API"
+ from_port = 443
+ id = (known after apply)
+ protocol = "tcp"
+ region = "us-east-2"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 443
+ type = "ingress"
}
# module.eks.aws_security_group_rule.node["egress_all"] will be created
+ resource "aws_security_group_rule" "node" {
+ cidr_blocks = [
+ "0.0.0.0/0",
]
+ description = "Allow all egress"
+ from_port = 0
+ id = (known after apply)
+ protocol = "-1"
+ region = "us-east-2"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 0
+ type = "egress"
}
# module.eks.aws_security_group_rule.node["ingress_cluster_443"] will be created
+ resource "aws_security_group_rule" "node" {
+ description = "Cluster API to node groups"
+ from_port = 443
+ id = (known after apply)
+ protocol = "tcp"
+ region = "us-east-2"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 443
+ type = "ingress"
}
# module.eks.aws_security_group_rule.node["ingress_cluster_4443_webhook"] will be created
+ resource "aws_security_group_rule" "node" {
+ description = "Cluster API to node 4443/tcp webhook"
+ from_port = 4443
+ id = (known after apply)
+ protocol = "tcp"
+ region = "us-east-2"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 4443
+ type = "ingress"
}
# module.eks.aws_security_group_rule.node["ingress_cluster_6443_webhook"] will be created
+ resource "aws_security_group_rule" "node" {
+ description = "Cluster API to node 6443/tcp webhook"
+ from_port = 6443
+ id = (known after apply)
+ protocol = "tcp"
+ region = "us-east-2"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 6443
+ type = "ingress"
}
# module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"] will be created
+ resource "aws_security_group_rule" "node" {
+ description = "Cluster API to node 8443/tcp webhook"
+ from_port = 8443
+ id = (known after apply)
+ protocol = "tcp"
+ region = "us-east-2"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 8443
+ type = "ingress"
}
# module.eks.aws_security_group_rule.node["ingress_cluster_9443_webhook"] will be created
+ resource "aws_security_group_rule" "node" {
+ description = "Cluster API to node 9443/tcp webhook"
+ from_port = 9443
+ id = (known after apply)
+ protocol = "tcp"
+ region = "us-east-2"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 9443
+ type = "ingress"
}
# module.eks.aws_security_group_rule.node["ingress_cluster_kubelet"] will be created
+ resource "aws_security_group_rule" "node" {
+ description = "Cluster API to node kubelets"
+ from_port = 10250
+ id = (known after apply)
+ protocol = "tcp"
+ region = "us-east-2"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 10250
+ type = "ingress"
}
# module.eks.aws_security_group_rule.node["ingress_nodes_ephemeral"] will be created
+ resource "aws_security_group_rule" "node" {
+ description = "Node to node ingress on ephemeral ports"
+ from_port = 1025
+ id = (known after apply)
+ protocol = "tcp"
+ region = "us-east-2"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = true
+ source_security_group_id = (known after apply)
+ to_port = 65535
+ type = "ingress"
}
# module.eks.aws_security_group_rule.node["ingress_self_coredns_tcp"] will be created
+ resource "aws_security_group_rule" "node" {
+ description = "Node to node CoreDNS"
+ from_port = 53
+ id = (known after apply)
+ protocol = "tcp"
+ region = "us-east-2"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = true
+ source_security_group_id = (known after apply)
+ to_port = 53
+ type = "ingress"
}
# module.eks.aws_security_group_rule.node["ingress_self_coredns_udp"] will be created
+ resource "aws_security_group_rule" "node" {
+ description = "Node to node CoreDNS UDP"
+ from_port = 53
+ id = (known after apply)
+ protocol = "udp"
+ region = "us-east-2"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = true
+ source_security_group_id = (known after apply)
+ to_port = 53
+ type = "ingress"
}
# module.kops_ci_user.aws_iam_access_key.this_no_pgp[0] will be created
+ resource "aws_iam_access_key" "this_no_pgp" {
+ create_date = (known after apply)
+ encrypted_secret = (known after apply)
+ encrypted_ses_smtp_password_v4 = (known after apply)
+ id = (known after apply)
+ key_fingerprint = (known after apply)
+ secret = (sensitive value)
+ ses_smtp_password_v4 = (sensitive value)
+ status = "Active"
+ user = "kops-ci-user"
}
# module.kops_ci_user.aws_iam_user.this[0] will be updated in-place
~ resource "aws_iam_user" "this" {
id = "kops-ci-user"
name = "kops-ci-user"
~ tags = {
+ "Shared" = "Ignore"
"githubRepo" = "git.k8s.io/k8s.io"
"group" = "sig-cluster-lifecycle"
"managed-by" = "Terraform"
+ "region" = "us-east-2"
"subproject" = "kops"
}
~ tags_all = {
+ "Shared" = "Ignore"
+ "region" = "us-east-2"
# (4 unchanged elements hidden)
}
# (5 unchanged attributes hidden)
}
# module.vpc.data.aws_iam_policy_document.vpc_flow_log_cloudwatch[0] will be read during apply
# (config refers to values not yet known)
<= data "aws_iam_policy_document" "vpc_flow_log_cloudwatch" {
+ id = (known after apply)
+ json = (known after apply)
+ minified_json = (known after apply)
+ statement {
+ actions = [
+ "logs:CreateLogStream",
+ "logs:DescribeLogGroups",
+ "logs:DescribeLogStreams",
+ "logs:PutLogEvents",
]
+ effect = "Allow"
+ resources = [
+ (known after apply),
]
+ sid = "AWSVPCFlowLogsPushToCloudWatch"
}
}
# module.vpc.aws_cloudwatch_log_group.flow_log[0] will be created
+ resource "aws_cloudwatch_log_group" "flow_log" {
+ arn = (known after apply)
+ id = (known after apply)
+ log_group_class = (known after apply)
+ name = (known after apply)
+ name_prefix = (known after apply)
+ region = "us-east-2"
+ retention_in_days = 30
+ skip_destroy = false
+ tags = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
}
# module.vpc.aws_default_network_acl.this[0] will be created
+ resource "aws_default_network_acl" "this" {
+ arn = (known after apply)
+ default_network_acl_id = (known after apply)
+ id = (known after apply)
+ owner_id = (known after apply)
+ region = "us-east-2"
+ tags = {
+ "Name" = "k8s-infra-kops-vpc-default"
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Name" = "k8s-infra-kops-vpc-default"
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ vpc_id = (known after apply)
+ egress {
+ action = "allow"
+ from_port = 0
+ ipv6_cidr_block = "::/0"
+ protocol = "-1"
+ rule_no = 101
+ to_port = 0
# (1 unchanged attribute hidden)
}
+ egress {
+ action = "allow"
+ cidr_block = "0.0.0.0/0"
+ from_port = 0
+ protocol = "-1"
+ rule_no = 100
+ to_port = 0
# (1 unchanged attribute hidden)
}
+ ingress {
+ action = "allow"
+ from_port = 0
+ ipv6_cidr_block = "::/0"
+ protocol = "-1"
+ rule_no = 101
+ to_port = 0
# (1 unchanged attribute hidden)
}
+ ingress {
+ action = "allow"
+ cidr_block = "0.0.0.0/0"
+ from_port = 0
+ protocol = "-1"
+ rule_no = 100
+ to_port = 0
# (1 unchanged attribute hidden)
}
}
# module.vpc.aws_default_route_table.default[0] will be created
+ resource "aws_default_route_table" "default" {
+ arn = (known after apply)
+ default_route_table_id = (known after apply)
+ id = (known after apply)
+ owner_id = (known after apply)
+ region = "us-east-2"
+ route = (known after apply)
+ tags = {
+ "Name" = "k8s-infra-kops-vpc-default"
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Name" = "k8s-infra-kops-vpc-default"
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ vpc_id = (known after apply)
+ timeouts {
+ create = "5m"
+ update = "5m"
}
}
# module.vpc.aws_default_security_group.this[0] will be created
+ resource "aws_default_security_group" "this" {
+ arn = (known after apply)
+ description = (known after apply)
+ egress = (known after apply)
+ id = (known after apply)
+ ingress = (known after apply)
+ name = (known after apply)
+ name_prefix = (known after apply)
+ owner_id = (known after apply)
+ region = "us-east-2"
+ revoke_rules_on_delete = false
+ tags = {
+ "Name" = "k8s-infra-kops-vpc-default"
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Name" = "k8s-infra-kops-vpc-default"
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ vpc_id = (known after apply)
}
# module.vpc.aws_flow_log.this[0] will be created
+ resource "aws_flow_log" "this" {
+ arn = (known after apply)
+ iam_role_arn = (known after apply)
+ id = (known after apply)
+ log_destination = (known after apply)
+ log_destination_type = "cloud-watch-logs"
+ log_format = (known after apply)
+ max_aggregation_interval = 600
+ region = "us-east-2"
+ tags = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ traffic_type = "ALL"
+ vpc_id = (known after apply)
}
# module.vpc.aws_iam_policy.vpc_flow_log_cloudwatch[0] will be created
+ resource "aws_iam_policy" "vpc_flow_log_cloudwatch" {
+ arn = (known after apply)
+ attachment_count = (known after apply)
+ id = (known after apply)
+ name = (known after apply)
+ name_prefix = "vpc-flow-log-to-cloudwatch-"
+ path = "/"
+ policy = (known after apply)
+ policy_id = (known after apply)
+ tags = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
}
# module.vpc.aws_iam_role.vpc_flow_log_cloudwatch[0] will be created
+ resource "aws_iam_role" "vpc_flow_log_cloudwatch" {
+ arn = (known after apply)
+ assume_role_policy = jsonencode(
{
+ Statement = [
+ {
+ Action = "sts:AssumeRole"
+ Effect = "Allow"
+ Principal = {
+ Service = "vpc-flow-logs.amazonaws.com"
}
+ Sid = "AWSVPCFlowLogsAssumeRole"
},
]
+ Version = "2012-10-17"
}
)
+ create_date = (known after apply)
+ force_detach_policies = false
+ id = (known after apply)
+ managed_policy_arns = (known after apply)
+ max_session_duration = 3600
+ name = (known after apply)
+ name_prefix = "vpc-flow-log-role-"
+ path = "/"
+ tags = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ unique_id = (known after apply)
+ inline_policy (known after apply)
}
# module.vpc.aws_iam_role_policy_attachment.vpc_flow_log_cloudwatch[0] will be created
+ resource "aws_iam_role_policy_attachment" "vpc_flow_log_cloudwatch" {
+ id = (known after apply)
+ policy_arn = (known after apply)
+ role = (known after apply)
}
# module.vpc.aws_vpc.this[0] will be created
+ resource "aws_vpc" "this" {
+ arn = (known after apply)
+ cidr_block = (known after apply)
+ default_network_acl_id = (known after apply)
+ default_route_table_id = (known after apply)
+ default_security_group_id = (known after apply)
+ dhcp_options_id = (known after apply)
+ enable_dns_hostnames = true
+ enable_dns_support = true
+ enable_network_address_usage_metrics = (known after apply)
+ id = (known after apply)
+ instance_tenancy = "default"
+ ipv4_ipam_pool_id = (known after apply)
+ ipv6_association_id = (known after apply)
+ ipv6_cidr_block = (known after apply)
+ ipv6_cidr_block_network_border_group = (known after apply)
+ main_route_table_id = (known after apply)
+ owner_id = (known after apply)
+ region = "us-east-2"
+ tags = {
+ "Name" = "k8s-infra-kops-vpc"
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Name" = "k8s-infra-kops-vpc"
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
}
# module.vpc_cni_irsa.aws_iam_policy.this[0] will be created
+ resource "aws_iam_policy" "this" {
+ arn = (known after apply)
+ attachment_count = (known after apply)
+ description = "Provides the Amazon VPC CNI Plugin (amazon-vpc-cni-k8s) the permissions it requires to modify the IPv4/IPv6 address configuration on your EKS worker nodes"
+ id = (known after apply)
+ name = (known after apply)
+ name_prefix = "VPC_CNI_IPv4-"
+ path = "/"
+ policy = jsonencode(
{
+ Statement = [
+ {
+ Action = [
+ "ec2:UnassignPrivateIpAddresses",
+ "ec2:ModifyNetworkInterfaceAttribute",
+ "ec2:DetachNetworkInterface",
+ "ec2:DescribeTags",
+ "ec2:DescribeSubnets",
+ "ec2:DescribeNetworkInterfaces",
+ "ec2:DescribeInstances",
+ "ec2:DescribeInstanceTypes",
+ "ec2:DeleteNetworkInterface",
+ "ec2:CreateNetworkInterface",
+ "ec2:AttachNetworkInterface",
+ "ec2:AssignPrivateIpAddresses",
]
+ Effect = "Allow"
+ Resource = "*"
+ Sid = "IPV4"
},
+ {
+ Action = "ec2:CreateTags"
+ Effect = "Allow"
+ Resource = "arn:aws:ec2:*:*:network-interface/*"
+ Sid = "CreateTags"
},
]
+ Version = "2012-10-17"
}
)
+ policy_id = (known after apply)
+ tags = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
}
# module.vpc_endpoints.aws_security_group.this[0] will be created
+ resource "aws_security_group" "this" {
+ arn = (known after apply)
+ description = "VPC endpoint security group"
+ egress = (known after apply)
+ id = (known after apply)
+ ingress = (known after apply)
+ name = (known after apply)
+ name_prefix = "k8s-infra-kops-vpc-endpoints-"
+ owner_id = (known after apply)
+ region = "us-east-2"
+ revoke_rules_on_delete = false
+ tags = {
+ "Name" = "k8s-infra-kops-vpc-endpoints-"
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ tags_all = {
+ "Name" = "k8s-infra-kops-vpc-endpoints-"
+ "Shared" = "Ignore"
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
}
+ vpc_id = (known after apply)
}
# module.vpc_endpoints.aws_security_group_rule.this["ingress_https"] will be created
+ resource "aws_security_group_rule" "this" {
+ cidr_blocks = (known after apply)
+ description = "HTTPS from VPC"
+ from_port = 443
+ id = (known after apply)
+ protocol = "tcp"
+ region = "us-east-2"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 443
+ type = "ingress"
}
# module.eks.module.kms.data.aws_iam_policy_document.this[0] will be read during apply
# (config refers to values not yet known)
<= data "aws_iam_policy_document" "this" {
+ id = (known after apply)
+ json = (known after apply)
+ minified_json = (known after apply)
+ override_policy_documents = []
+ source_policy_documents = []
+ statement {
+ actions = [
+ "kms:*",
]
+ resources = [
+ "*",
]
+ sid = "Default"
+ principals {
+ identifiers = [
+ "arn:aws:iam::348685125169:root",
]
+ type = "AWS"
}
}
+ statement {
+ actions = [
+ "kms:CancelKeyDeletion",
+ "kms:Create*",
+ "kms:Delete*",
+ "kms:Describe*",
+ "kms:Disable*",
+ "kms:Enable*",
+ "kms:Get*",
+ "kms:ImportKeyMaterial",
+ "kms:List*",
+ "kms:Put*",
+ "kms:ReplicateKey",
+ "kms:Revoke*",
+ "kms:ScheduleKeyDeletion",
+ "kms:TagResource",
+ "kms:UntagResource",
+ "kms:Update*",
]
+ resources = [
+ "*",
]
+ sid = "KeyAdministration"
+ principals {
+ identifiers = [
+ "arn:aws:iam::348685125169:role/atlantis",
]
+ type = "AWS"
}
}
+ statement {
+ actions = [
+ "kms:Decrypt",
+ "kms:DescribeKey",
+ "kms:Encrypt",
+ "kms:GenerateDataKey*",
+ "kms:ReEncrypt*",
]
+ resources = [
+ "*",
]
+ sid = "KeyUsage"
+ principals {
+ identifiers = [
+ (known after apply),
]
+ type = "AWS"
}
}
}
# module.eks.module.kms.aws_kms_alias.this["cluster"] will be created
+ resource "aws_kms_alias" "this" {
+ arn = (known after apply)
+ id = (known after apply)
+ name = "alias/eks/k8s-infra-kops-prow-build"
+ name_prefix = (known after apply)
+ region = "us-east-2"
+ target_key_arn = (known after apply)
+ target_key_id = (known after apply)
}
# module.eks.module.kms.aws_kms_key.this[0] will be created
+ resource "aws_kms_key" "this" {
+ arn = (known after apply)
+ bypass_policy_lockout_safety_check = false
+ customer_master_key_spec = "SYMMETRIC_DEFAULT"
+ description = "k8s-infra-kops-prow-build cluster encryption key"
+ enable_key_rotation = true
+ id = (known after apply)
+ is_enabled = true
+ key_id = (known after apply)
+ key_usage = "ENCRYPT_DECRYPT"
+ multi_region = false
+ policy = (known after apply)
+ region = "us-east-2"
+ rotation_period_in_days = (known after apply)
+ tags = {
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
+ "terraform-aws-modules" = "eks"
}
+ tags_all = {
+ "githubRepo" = "git.k8s.io/k8s.io"
+ "group" = "sig-cluster-lifecycle"
+ "managed-by" = "Terraform"
+ "region" = "us-east-2"
+ "subproject" = "kops"
+ "terraform-aws-modules" = "eks"
}
}
Plan: 46 to add, 1 to change, 1 to destroy.
Changes to Outputs:
- kops-ci-user-secret-key = (sensitive value) -> null
- kops-ci_user-access-key = "AKIA3YUWJ5XPHTELQU62" -> null
╷
│ Warning: Missing required argument
│
│ with provider["registry.terraform.io/hashicorp/aws"].kops-infra-ci,
│ on providers.tf line 17, in provider "aws":
│ 17: provider "aws" {
│
│ The argument "role_arn" is required, but no definition was found.
│
│ This will be an error in a future release.
╵
╷
│ Error: reading IAM OIDC Provider (arn:aws:iam::808842816990:oidc-provider/container.googleapis.com/v1/projects/k8s-prow/locations/us-central1-f/clusters/prow): operation error IAM: GetOpenIDConnectProvider, https response error StatusCode: 403, RequestID: 149a7894-7d3f-4feb-bfa8-2f5d08d8d895, api error AccessDenied: User: arn:aws:sts::348685125169:assumed-role/atlantis/1763470458794565738 is not authorized to access this resource
│
│ with aws_iam_openid_connect_provider.google_prow_idp,
│ on main.tf line 19, in resource "aws_iam_openid_connect_provider" "google_prow_idp":
│ 19: resource "aws_iam_openid_connect_provider" "google_prow_idp" {
│
╵
╷
│ Error: failed to get shared config profile, kops-ci
│
│ with provider["registry.terraform.io/hashicorp/aws"].kops-local-ci,
│ on providers.tf line 26, in provider "aws":
│ 26: provider "aws" {
│
╵
╷
│ Error: reading S3 Bucket (k8s-kops-ci-prow-state-store) policy: operation error S3: GetBucketPolicy, https response error StatusCode: 403, RequestID: PV7A6K8YAE7SBWBX, HostID: UqZYssYtaVzTJGRK16+qG0sHRuAcbn8bpY2ccFY/ALGrDqm11AnogprJ1iOoIMf85Z8HBbzZ3Nw=, api error AccessDenied: User: arn:aws:sts::348685125169:assumed-role/atlantis/1763470458794565738 is not authorized to perform: s3:GetBucketPolicy on resource: "arn:aws:s3:::k8s-kops-ci-prow-state-store" because no resource-based policy allows the s3:GetBucketPolicy action
│
│ with aws_s3_bucket.kops_state_store,
│ on s3.tf line 18, in resource "aws_s3_bucket" "kops_state_store":
│ 18: resource "aws_s3_bucket" "kops_state_store" {
│
╵
╷
│ Error: reading S3 Bucket (k8s-kops-ci-prow) policy: operation error S3: GetBucketPolicy, https response error StatusCode: 403, RequestID: PV742N6VN2323WQY, HostID: O5oqEfmAZTH1ZTfXKQdfeQWYU5uQ4Alj42anpiqarkEx6w57lVdE1x/lLjEXCf9Fi9tkYwphKOvZLqN8+NTp7BrOgMKPrKIa51a2RiywlIc=, api error AccessDenied: User: arn:aws:sts::348685125169:assumed-role/atlantis/1763470458794565738 is not authorized to perform: s3:GetBucketPolicy on resource: "arn:aws:s3:::k8s-kops-ci-prow" because no resource-based policy allows the s3:GetBucketPolicy action
│
│ with aws_s3_bucket.kops_oidc_store,
│ on s3.tf line 57, in resource "aws_s3_bucket" "kops_oidc_store":
│ 57: resource "aws_s3_bucket" "kops_oidc_store" {
│
╵
╷
│ Error: Invalid count argument
│
│ on .terraform/modules/vpc/main.tf line 146, in resource "aws_subnet" "public":
│ 146: count = local.create_public_subnets && (!var.one_nat_gateway_per_az || local.len_public_subnets >= length(var.azs)) ? local.len_public_subnets : 0
│
│ The "count" value depends on resource attributes that cannot be determined
│ until apply, so Terraform cannot predict how many instances will be
│ created. To work around this, use the -target argument to first apply only
│ the resources that the count depends on.
╵
╷
│ Error: Invalid count argument
│
│ on .terraform/modules/vpc/main.tf line 177, in resource "aws_route_table" "public":
│ 177: count = local.create_public_subnets ? local.num_public_route_tables : 0
│
│ The "count" value depends on resource attributes that cannot be determined
│ until apply, so Terraform cannot predict how many instances will be
│ created. To work around this, use the -target argument to first apply only
│ the resources that the count depends on.
╵
╷
│ Error: Invalid count argument
│
│ on .terraform/modules/vpc/main.tf line 294, in resource "aws_subnet" "private":
│ 294: count = local.create_private_subnets ? local.len_private_subnets : 0
│
│ The "count" value depends on resource attributes that cannot be determined
│ until apply, so Terraform cannot predict how many instances will be
│ created. To work around this, use the -target argument to first apply only
│ the resources that the count depends on.
╵
╷
│ Error: Invalid count argument
│
│ on .terraform/modules/vpc/main.tf line 325, in resource "aws_route_table" "private":
│ 325: count = local.create_private_subnets && local.max_subnet_length > 0 ? local.nat_gateway_count : 0
│
│ The "count" value depends on resource attributes that cannot be determined
│ until apply, so Terraform cannot predict how many instances will be
│ created. To work around this, use the -target argument to first apply only
│ the resources that the count depends on.
╵
╷
│ Error: Invalid count argument
│
│ on .terraform/modules/vpc/main.tf line 1161, in resource "aws_internet_gateway" "this":
│ 1161: count = local.create_public_subnets && var.create_igw ? 1 : 0
│
│ The "count" value depends on resource attributes that cannot be determined
│ until apply, so Terraform cannot predict how many instances will be
│ created. To work around this, use the -target argument to first apply only
│ the resources that the count depends on.
╵
╷
│ Error: Invalid count argument
│
│ on .terraform/modules/vpc/main.tf line 1175, in resource "aws_egress_only_internet_gateway" "this":
│ 1175: count = local.create_vpc && var.create_egress_only_igw && var.enable_ipv6 && local.max_subnet_length > 0 ? 1 : 0
│
│ The "count" value depends on resource attributes that cannot be determined
│ until apply, so Terraform cannot predict how many instances will be
│ created. To work around this, use the -target argument to first apply only
│ the resources that the count depends on.
╵
|
|
The Kubernetes project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
No description provided.