Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ci: Delete Shiftleft from workflow runs #24

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

jeremyrajan
Copy link

@jeremyrajan jeremyrajan commented Aug 22, 2023

This is an automated PR, created by a script to remove Shiftleft workflows.

Description

As we are moving to Synk, we will be removing all references of Shiftleft from our codebase.
This PR removes Shiftleft from the workflow runs.


This change is Reviewable

@jeremyrajan jeremyrajan requested a review from a team as a code owner August 22, 2023 06:25
@jeremyrajan jeremyrajan requested a review from bibek4699 August 22, 2023 06:25
@honestbank-bot
Copy link
Contributor

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖Success! The configuration is valid.

Terraform Plan 📖success

Show Plan
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # random_id.run_id will be created
  + resource "random_id" "run_id" {
      + b64_std     = (known after apply)
      + b64_url     = (known after apply)
      + byte_length = 4
      + dec         = (known after apply)
      + hex         = (known after apply)
      + id          = (known after apply)
    }

  # module.google_service_account_instance.google_folder_iam_member.folder_iam_memberships["1004506453476 - roles/viewer"] will be created
  + resource "google_folder_iam_member" "folder_iam_memberships" {
      + etag   = (known after apply)
      + folder = "1004506453476"
      + id     = (known after apply)
      + member = (known after apply)
      + role   = "roles/viewer"
    }

  # module.google_service_account_instance.google_project_iam_member.cross_project_iam_memberships["tf-shared-vpc-host-78a3 - roles/viewer"] will be created
  + resource "google_project_iam_member" "cross_project_iam_memberships" {
      + etag    = (known after apply)
      + id      = (known after apply)
      + member  = (known after apply)
      + project = "tf-shared-vpc-host-78a3"
      + role    = "roles/viewer"
    }

  # module.google_service_account_instance.google_project_iam_member.project_iam_memberships["roles/viewer"] will be created
  + resource "google_project_iam_member" "project_iam_memberships" {
      + etag    = (known after apply)
      + id      = (known after apply)
      + member  = (known after apply)
      + project = "storage-0994"
      + role    = "roles/viewer"
    }

  # module.google_service_account_instance.google_service_account.service_account will be created
  + resource "google_service_account" "service_account" {
      + account_id   = (known after apply)
      + description  = "An instance of the google_service_account Terraform component module."
      + disabled     = false
      + display_name = (known after apply)
      + email        = (known after apply)
      + id           = (known after apply)
      + member       = (known after apply)
      + name         = (known after apply)
      + project      = "storage-0994"
      + unique_id    = (known after apply)
    }

  # module.google_service_account_instance.google_service_account_key.keys["another_key"] will be created
  + resource "google_service_account_key" "keys" {
      + id                 = (known after apply)
      + key_algorithm      = "KEY_ALG_RSA_2048"
      + name               = (known after apply)
      + private_key        = (sensitive value)
      + private_key_type   = "TYPE_GOOGLE_CREDENTIALS_FILE"
      + public_key         = (known after apply)
      + public_key_type    = "TYPE_X509_PEM_FILE"
      + service_account_id = (known after apply)
      + valid_after        = (known after apply)
      + valid_before       = (known after apply)
    }

  # module.google_service_account_instance.google_service_account_key.keys["primary"] will be created
  + resource "google_service_account_key" "keys" {
      + id                 = (known after apply)
      + key_algorithm      = "KEY_ALG_RSA_2048"
      + name               = (known after apply)
      + private_key        = (sensitive value)
      + private_key_type   = "TYPE_GOOGLE_CREDENTIALS_FILE"
      + public_key         = (known after apply)
      + public_key_type    = "TYPE_X509_PEM_FILE"
      + service_account_id = (known after apply)
      + valid_after        = (known after apply)
      + valid_before       = (known after apply)
    }

  # module.google_service_account_instance.google_service_account_key.keys["secondary"] will be created
  + resource "google_service_account_key" "keys" {
      + id                 = (known after apply)
      + key_algorithm      = "KEY_ALG_RSA_2048"
      + name               = (known after apply)
      + private_key        = (sensitive value)
      + private_key_type   = "TYPE_GOOGLE_CREDENTIALS_FILE"
      + public_key         = (known after apply)
      + public_key_type    = "TYPE_X509_PEM_FILE"
      + service_account_id = (known after apply)
      + valid_after        = (known after apply)
      + valid_before       = (known after apply)
    }

Plan: 8 to add, 0 to change, 0 to destroy.

Changes to Outputs:
  + account_email                    = (known after apply)
  + service_account_key_private_keys = (sensitive value)

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pusher: @jeremyrajan, Action: pull_request, Working Directory: ``, Workflow: terraform

@MXfive MXfive requested a review from a team August 23, 2023 03:09
@MXfive MXfive enabled auto-merge (squash) August 23, 2023 03:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants