Skip to content

test: github workflow with dynamic secret#4

Open
ishuar wants to merge 3 commits intomainfrom
version-0.8.4
Open

test: github workflow with dynamic secret#4
ishuar wants to merge 3 commits intomainfrom
version-0.8.4

Conversation

@ishuar
Copy link
Copy Markdown
Owner

@ishuar ishuar commented May 6, 2026

No description provided.

@github-actions
Copy link
Copy Markdown

github-actions Bot commented May 6, 2026

Terraform plan for envs/dev/eu-central-1/customer-1

Plan: 1 to add, 0 to change, 0 to destroy.
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+   create

Terraform will perform the following actions:

  # aws_s3_bucket.tfskel_demo will be created
+   resource "aws_s3_bucket" "tfskel_demo" {
+       acceleration_status         = (known after apply)
+       acl                         = (known after apply)
+       arn                         = (known after apply)
+       bucket                      = "my-customer-1-dev-euc1-bucket"
+       bucket_domain_name          = (known after apply)
+       bucket_namespace            = (known after apply)
+       bucket_prefix               = (known after apply)
+       bucket_region               = (known after apply)
+       bucket_regional_domain_name = (known after apply)
+       force_destroy               = false
+       hosted_zone_id              = (known after apply)
+       id                          = (known after apply)
+       object_lock_enabled         = (known after apply)
+       policy                      = (known after apply)
+       region                      = "eu-central-1"
+       request_payer               = (known after apply)
+       tags                        = {
+           "Name"                   = "my-customer-1-dev-euc1-bucket"
+           "tag_from_github_secret" = "*********************************"
        }
+       tags_all                    = {
+           "Name"                   = "my-customer-1-dev-euc1-bucket"
+           "app"                    = "customer-1"
+           "env"                    = "dev"
+           "github_repo"            = "tfskel-demo"
+           "managed_by"             = "terraform"
+           "tag_from_github_secret" = "*********************************"
        }
+       website_domain              = (known after apply)
+       website_endpoint            = (known after apply)

+       cors_rule (known after apply)

+       grant (known after apply)

+       lifecycle_rule (known after apply)

+       logging (known after apply)

+       object_lock_configuration (known after apply)

+       replication_configuration (known after apply)

+       server_side_encryption_configuration (known after apply)

+       versioning (known after apply)

+       website (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.

📝 Plan generated in dev: TF plan & apply #13

@github-actions
Copy link
Copy Markdown

github-actions Bot commented May 6, 2026

Terraform plan for envs/dev/eu-central-1/customer-2

Plan: 1 to add, 0 to change, 0 to destroy.
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+   create

Terraform will perform the following actions:

  # aws_s3_bucket.tfskel_demo will be created
+   resource "aws_s3_bucket" "tfskel_demo" {
+       acceleration_status         = (known after apply)
+       acl                         = (known after apply)
+       arn                         = (known after apply)
+       bucket                      = "my-customer-2-dev-euc1-bucket"
+       bucket_domain_name          = (known after apply)
+       bucket_namespace            = (known after apply)
+       bucket_prefix               = (known after apply)
+       bucket_region               = (known after apply)
+       bucket_regional_domain_name = (known after apply)
+       force_destroy               = false
+       hosted_zone_id              = (known after apply)
+       id                          = (known after apply)
+       object_lock_enabled         = (known after apply)
+       policy                      = (known after apply)
+       region                      = "eu-central-1"
+       request_payer               = (known after apply)
+       tags                        = {
+           "Name" = "my-customer-2-dev-euc1-bucket"
        }
+       tags_all                    = {
+           "Name"        = "my-customer-2-dev-euc1-bucket"
+           "app"         = "customer-2"
+           "env"         = "dev"
+           "github_repo" = "tfskel-demo"
+           "managed_by"  = "terraform"
        }
+       website_domain              = (known after apply)
+       website_endpoint            = (known after apply)

+       cors_rule (known after apply)

+       grant (known after apply)

+       lifecycle_rule (known after apply)

+       logging (known after apply)

+       object_lock_configuration (known after apply)

+       replication_configuration (known after apply)

+       server_side_encryption_configuration (known after apply)

+       versioning (known after apply)

+       website (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.

📝 Plan generated in dev: TF plan & apply #13

ishuar added 2 commits May 6, 2026 13:32
Signed-off-by: ishuar <ishansharma887@gmail.com>
just for testing

Signed-off-by: ishuar <ishansharma887@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant