Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update(config): add Aldo Lacuku to cluster maintainers #1522

Merged
merged 1 commit into from
Jun 17, 2024

Conversation

LucaGuerra
Copy link
Contributor

After a discussion with @alacuku (Falco Core Maintainer) I learned that he is interested in helping with maintenance of our cluster, incl. adding monitoring and other things. Given his expertise with Kubernetes I'm very happy about that interest 😁 . Also, considering that he is a core maintainer he can be a cluster admin (see governance)

Please confirm @alacuku 🙏

Copy link

Terraform Format and Style 🖌failure

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Validation Output

Success! The configuration is valid.


Terraform Plan 📖success

Show Plan

terraform
module.iam_github_oidc_provider.data.tls_certificate.this[0]: Reading...
module.iam_github_oidc_provider.data.tls_certificate.this[0]: Read complete after 0s [id=43add1749d6d9832e0a8fca0784941273380c63a]
module.load_balancer_controller.data.aws_caller_identity.current: Reading...
module.eks.data.aws_partition.current: Reading...
module.test-infra_s3_role.data.aws_partition.current: Reading...
module.plugins_s3_role.data.aws_partition.current: Reading...
module.falcosidekick_ecr_role.data.aws_caller_identity.current: Reading...
module.eks.data.aws_partition.current: Read complete after 0s [id=aws]
module.falcoctl_ecr_role.data.aws_caller_identity.current: Reading...
module.test-infra_reader.data.aws_caller_identity.current: Reading...
data.aws_iam_policy_document.falcosidekick_ui_ecr_access: Reading...
module.test-infra_s3_role.data.aws_caller_identity.current: Reading...
module.test-infra_s3_role.data.aws_partition.current: Read complete after 0s [id=aws]
module.plugins_s3_role.data.aws_partition.current: Read complete after 0s [id=aws]
data.aws_iam_policy_document.falcosidekick_ui_ecr_access: Read complete after 0s [id=2521239600]
module.plugins_s3_role.data.aws_caller_identity.current: Reading...
aws_kms_key.falco-test-infra-state: Refreshing state... [id=ebaa575e-cf32-4f88-a3ae-2d9e6dc7a32e]
module.driver_kit_s3_role.data.aws_caller_identity.current: Reading...
aws_acm_certificate.deck: Refreshing state... [id=arn:aws:acm:eu-west-1:292999226676:certificate/ba966f87-e470-4638-90ba-a2e9a34d5677]
data.aws_iam_policy_document.falco_s3_access: Reading...
data.aws_iam_policy_document.falco_s3_access: Read complete after 0s [id=3637981268]
module.test-infra_reader.data.aws_partition.current: Reading...
module.test-infra_reader.data.aws_partition.current: Read complete after 0s [id=aws]
aws_dynamodb_table.falco-test-infra-state-lock: Refreshing state... [id=falco-test-infra-state-lock]
module.test-infra_reader.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
module.falcosidekick_ecr_role.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
module.plugins_s3_role.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
module.test-infra_s3_role.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
module.falco_ecr_role.data.aws_caller_identity.current: Reading...
module.driver_kit_s3_role.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
module.falcosidekick_ecr_role.data.aws_partition.current: Reading...
aws_ecr_repository.build_drivers: Refreshing state... [id=test-infra/build-drivers]
module.falcosidekick_ecr_role.data.aws_partition.current: Read complete after 0s [id=aws]
module.iam_assumable_role_admin.data.aws_caller_identity.current: Reading...
module.falcoctl_ecr_role.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
aws_acm_certificate.monitor_prow: Refreshing state... [id=arn:aws:acm:eu-west-1:292999226676:certificate/87aa77e9-dceb-480b-8873-8532f02f5813]
data.aws_iam_policy_document.test-infra_s3_access: Reading...
aws_ecr_repository.update_dbg: Refreshing state... [id=test-infra/update-dbg]
data.aws_iam_policy_document.test-infra_s3_access: Read complete after 0s [id=532751175]
module.load_balancer_controller.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
module.eks.data.aws_caller_identity.current: Reading...
data.aws_iam_policy_document.ebs_controller_policy_doc: Reading...
data.aws_iam_policy_document.ebs_controller_policy_doc: Read complete after 0s [id=1584698932]
module.falco_ecr_role.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
module.falco_ecr_role.data.aws_partition.current: Reading...
data.aws_iam_policy_document.falco_ecr_access: Reading...
module.falco_ecr_role.data.aws_partition.current: Read complete after 0s [id=aws]
module.falco_s3_role.data.aws_partition.current: Reading...
data.aws_iam_policy_document.falco_ecr_access: Read complete after 0s [id=931847752]
module.falco_s3_role.data.aws_partition.current: Read complete after 0s [id=aws]
module.iam_assumable_role_admin.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
module.rules_s3_role.data.aws_partition.current: Reading...
module.falcosidekick_ui_ecr_role.data.aws_partition.current: Reading...
module.rules_s3_role.data.aws_partition.current: Read complete after 0s [id=aws]
aws_ecr_repository.golang: Refreshing state... [id=test-infra/golang]
module.falcosidekick_ui_ecr_role.data.aws_partition.current: Read complete after 0s [id=aws]
module.falco_s3_role.data.aws_caller_identity.current: Reading...
module.eks.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
aws_s3_bucket.falco-test-infra-state: Refreshing state... [id=falco-test-infra-state]
module.falco_playground_s3_role.data.aws_caller_identity.current: Reading...
module.falco_s3_role.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
aws_ecr_repository.update_jobs: Refreshing state... [id=test-infra/update-jobs]
module.falco_playground_s3_role.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
module.vpc.aws_vpc.this[0]: Refreshing state... [id=vpc-0654bc7f6f794e1a2]
module.falcosidekick_ui_ecr_role.data.aws_caller_identity.current: Reading...
module.falcosidekick_ui_ecr_role.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
aws_ecr_repository.update_deployment_files: Refreshing state... [id=test-infra/update-falco-k8s-manifests]
data.aws_iam_policy_document.test-infra_state_lock: Reading...
data.aws_iam_policy_document.test-infra_state_lock: Read complete after 0s [id=3171549464]
module.test-infra_cluster_role.data.aws_caller_identity.current: Reading...
data.aws_iam_policy_document.falcosidekick_ecr_access: Reading...
module.test-infra_cluster_role.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
module.falcoctl_ecr_role.data.aws_partition.current: Reading...
data.aws_iam_policy_document.falcosidekick_ecr_access: Read complete after 0s [id=315517080]
module.falcoctl_ecr_role.data.aws_partition.current: Read complete after 0s [id=aws]
module.load_balancer_controller.data.aws_partition.current: Reading...
module.load_balancer_controller.data.aws_partition.current: Read complete after 0s [id=aws]
module.eks.data.aws_iam_policy_document.cluster_assume_role_policy: Reading...
data.aws_iam_policy_document.plugins_s3_access: Reading...
data.aws_availability_zones.available: Reading...
module.eks.data.aws_iam_policy_document.cluster_assume_role_policy: Read complete after 0s [id=2764486067]
data.aws_iam_policy_document.plugins_s3_access: Read complete after 1s [id=3299842136]
data.aws_iam_policy_document.rules_s3_access: Reading...
data.aws_caller_identity.current: Reading...
data.aws_iam_policy_document.rules_s3_access: Read complete after 0s [id=46917358]
aws_ecr_repository.docker_dind: Refreshing state... [id=test-infra/docker-dind]
data.aws_iam_policy_document.falco_playground_s3_access: Reading...
data.aws_iam_policy_document.falco_playground_s3_access: Read complete after 0s [id=1908753999]
data.aws_iam_policy_document.test-infra_cluster_access: Reading...
data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
module.iam_github_oidc_provider.data.aws_partition.current: Reading...
data.aws_iam_policy_document.test-infra_cluster_access: Read complete after 0s [id=3038031340]
module.iam_github_oidc_provider.data.aws_partition.current: Read complete after 0s [id=aws]
aws_ecr_repository.update_rules_index: Refreshing state... [id=test-infra/update-rules-index]
aws_kms_key.prow_storage: Refreshing state... [id=0ec47d8c-dbda-4e3a-8007-0246997e62d5]
aws_s3_bucket.prow_storage: Refreshing state... [id=falco-prow-logs]
module.falco_playground_s3_role.data.aws_partition.current: Reading...
module.falco_playground_s3_role.data.aws_partition.current: Read complete after 0s [id=aws]
module.falco_dev_s3_role.data.aws_partition.current: Reading...
module.falco_dev_s3_role.data.aws_partition.current: Read complete after 0s [id=aws]
aws_ecr_repository.build_plugins: Refreshing state... [id=test-infra/build-plugins]
data.aws_iam_policy_document.cluster_autoscaler_policy_doc: Reading...
data.aws_iam_policy_document.cluster_autoscaler_policy_doc: Read complete after 0s [id=1342303187]
data.aws_canonical_user_id.current_user: Reading...
data.aws_iam_policy_document.falco_dev_s3_access: Reading...
data.aws_availability_zones.available: Read complete after 1s [id=eu-west-1]
module.falco_dev_s3_role.data.aws_caller_identity.current: Reading...
data.aws_iam_policy_document.falco_dev_s3_access: Read complete after 0s [id=3316268599]
module.falco_dev_s3_role.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
data.aws_iam_policy_document.falcoctl_ecr_access: Reading...
data.aws_iam_policy_document.falcoctl_ecr_access: Read complete after 0s [id=2545128901]
data.aws_iam_policy_document.loadbalancer_controller: Reading...
module.driver_kit_s3_role.data.aws_partition.current: Reading...
module.driver_kit_s3_role.data.aws_partition.current: Read complete after 0s [id=aws]
module.eks.data.aws_iam_policy_document.cluster_elb_sl_role_creation[0]: Reading...
module.eks.data.aws_iam_policy_document.cluster_elb_sl_role_creation[0]: Read complete after 0s [id=3709839417]
data.aws_iam_policy_document.loadbalancer_controller: Read complete after 0s [id=1297636145]
module.rules_s3_role.data.aws_caller_identity.current: Reading...
data.aws_iam_policy_document.driverkit_s3_access: Reading...
data.aws_iam_policy_document.driverkit_s3_access: Read complete after 0s [id=795073047]
aws_iam_policy.falcosidekick_ui_ecr_access: Refreshing state... [id=arn:aws:iam::292999226676:policy/github_actions-falcosidekick-ui-ecr20230913155739228400000001]
module.test-infra_cluster_role.data.aws_partition.current: Reading...
module.test-infra_cluster_role.data.aws_partition.current: Read complete after 0s [id=aws]
module.eks.aws_cloudwatch_log_group.this[0]: Refreshing state... [id=/aws/eks/falco-prow-test-infra/cluster]
module.rules_s3_role.data.aws_caller_identity.current: Read complete after 0s [id=292999226676]
module.iam_assumable_role_admin.data.aws_partition.current: Reading...
module.iam_assumable_role_admin.data.aws_partition.current: Read complete after 0s [id=aws]
aws_iam_policy.falco_s3_access: Refreshing state... [id=arn:aws:iam::292999226676:policy/github_actions-falco-s320230427085324265200000002]
aws_iam_policy.test-infra_s3_access: Refreshing state... [id=arn:aws:iam::292999226676:policy/github_actions-test-infra-s320230405135707027100000001]
aws_iam_policy.ebs_controller_policy: Refreshing state... [id=arn:aws:iam::292999226676:policy/falco-prow-test-infra-ebs-csi-driver20201105152818548300000001]
aws_iam_policy.falco_ecr_access: Refreshing state... [id=arn:aws:iam::292999226676:policy/github_actions-falco-ecr20230427091417611700000001]
aws_iam_policy.test-infra_state_lock: Refreshing state... [id=arn:aws:iam::292999226676:policy/github_actions-test-infra-cluster20240325081408031400000001]
module.eks.data.aws_iam_policy_document.workers_assume_role_policy: Reading...
aws_iam_policy.falcosidekick_ecr_access: Refreshing state... [id=arn:aws:iam::292999226676:policy/github_actions-falcosidekick-ecr20230308175813643500000001]
module.eks.data.aws_iam_policy_document.workers_assume_role_policy: Read complete after 0s [id=3778018924]
aws_iam_policy.plugins_s3_access: Refreshing state... [id=arn:aws:iam::292999226676:policy/github_actions-plugins-s320230413152829770200000001]
module.eks.aws_iam_role.cluster[0]: Refreshing state... [id=falco-prow-test-infra20201105152818554200000003]
data.aws_canonical_user_id.current_user: Read complete after 0s [id=6e179ab6a522e9123d39ace0dace05f83ca531f9e778367bb90199a80786c709]
aws_iam_policy.rules_s3_access: Refreshing state... [id=arn:aws:iam::292999226676:policy/github_actions-rules-s320230120142903094100000001]
aws_iam_policy.falco_playground_s3_access: Refreshing state... [id=arn:aws:iam::292999226676:policy/github_actions-falco-playground-s320240311212715659700000001]
data.aws_iam_policy_document.ecr_standard: Reading...
data.aws_iam_policy_document.ecr_standard: Read complete after 0s [id=490672708]
aws_iam_policy.test-infra_cluster_access: Refreshing state... [id=arn:aws:iam::292999226676:policy/github_actions-test-infra-cluster20240220093903726400000001]
module.iam_github_oidc_provider.aws_iam_openid_connect_provider.this[0]: Refreshing state... [id=arn:aws:iam::292999226676:oidc-provider/token.actions.githubusercontent.com]
aws_iam_policy.cluster_autoscaler_policy: Refreshing state... [id=arn:aws:iam::292999226676:policy/falco-prow-test-infra-cluster-autoscaler20201120161034370800000001]
aws_iam_policy.falco_dev_s3_access: Refreshing state... [id=arn:aws:iam::292999226676:policy/github_actions-falco-dev-s320230427085324265100000001]
aws_iam_policy.falcoctl_ecr_access: Refreshing state... [id=arn:aws:iam::292999226676:policy/github_actions-falcoctl-ecr20240220101903926000000001]
module.eks.aws_iam_policy.cluster_elb_sl_role_creation[0]: Refreshing state... [id=arn:aws:iam::292999226676:policy/falco-prow-test-infra-elb-sl-role-creation20201105152818552700000002]
module.plugins_s3_role.data.aws_iam_policy_document.this[0]: Reading...
module.test-infra_s3_role.data.aws_iam_policy_document.this[0]: Reading...
module.plugins_s3_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=2396550039]
module.test-infra_s3_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=3682994372]
module.test-infra_reader.data.aws_iam_policy_document.this[0]: Reading...
module.falcosidekick_ecr_role.data.aws_iam_policy_document.this[0]: Reading...
module.test-infra_reader.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=2077266412]
module.falcosidekick_ecr_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=2934820887]
module.falco_ecr_role.data.aws_iam_policy_document.this[0]: Reading...
module.falco_s3_role.data.aws_iam_policy_document.this[0]: Reading...
module.falco_ecr_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=2088837448]
module.falco_s3_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=771382233]
module.falcosidekick_ui_ecr_role.data.aws_iam_policy_document.this[0]: Reading...
module.falcosidekick_ui_ecr_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=4162468877]
module.falcoctl_ecr_role.data.aws_iam_policy_document.this[0]: Reading...
module.falcoctl_ecr_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=2227282869]
aws_ecr_repository_policy.golang: Refreshing state... [id=test-infra/golang]
aws_ecr_repository_policy.update_jobs: Refreshing state... [id=test-infra/update-jobs]
aws_ecr_repository_policy.update_deployment_files: Refreshing state... [id=test-infra/update-falco-k8s-manifests]
aws_ecr_repository_policy.build_plugins: Refreshing state... [id=test-infra/build-plugins]
aws_ecr_repository_policy.docker_dind: Refreshing state... [id=test-infra/docker-dind]
aws_ecr_repository_policy.update_dbg: Refreshing state... [id=test-infra/update-dbg]
aws_ecr_repository_policy.build_drivers: Refreshing state... [id=test-infra/build-drivers]
module.falco_playground_s3_role.data.aws_iam_policy_document.this[0]: Reading...
module.falco_playground_s3_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=2845281180]
module.falco_dev_s3_role.data.aws_iam_policy_document.this[0]: Reading...
module.falco_dev_s3_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=2088837448]
module.test-infra_cluster_role.data.aws_iam_policy_document.this[0]: Reading...
module.test-infra_cluster_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=3682994372]
module.rules_s3_role.data.aws_iam_policy_document.this[0]: Reading...
module.plugins_s3_role.aws_iam_role.this[0]: Refreshing state... [id=github_actions-plugins-s3]
module.rules_s3_role.data.aws_iam_policy_document.this[0]: Read complete after 0s [id=4063866326]
module.test-infra_s3_role.aws_iam_role.this[0]: Refreshing state... [id=github_actions-test-infra-s3]
module.test-infra_reader.aws_iam_role.this[0]: Refreshing state... [id=github_actions-test-infra-reader]
module.falcosidekick_ecr_role.aws_iam_role.this[0]: Refreshing state... [id=github_actions-falcosidekick-ecr]
module.falco_ecr_role.aws_iam_role.this[0]: Refreshing state... [id=github_actions-falco-ecr]
module.falco_s3_role.aws_iam_role.this[0]: Refreshing state... [id=github_actions-falco-s3]
module.falcosidekick_ui_ecr_role.aws_iam_role.this[0]: Refreshing state... [id=github_actions-falcosidekick-ui-ecr]
module.falcoctl_ecr_role.aws_iam_role.this[0]: Refreshing state... [id=github_actions-falcoctl-ecr]
module.falco_playground_s3_role.aws_iam_role.this[0]: Refreshing state... [id=github_actions-falco-playground-s3]
module.vpc.aws_eip.nat[0]: Refreshing state... [id=eipalloc-0cd240b1070debefa]
module.falco_dev_s3_role.aws_iam_role.this[0]: Refreshing state... [id=github_actions-falco-dev-s3]
module.test-infra_cluster_role.aws_iam_role.this[0]: Refreshing state... [id=github_actions-test-infra-cluster]
module.rules_s3_role.aws_iam_role.this[0]: Refreshing state... [id=terraform-20230120142903096000000002]
module.test-infra_s3_role.aws_iam_role_policy_attachment.this["test-infra_s3_access"]: Refreshing state... [id=github_actions-test-infra-s3-20230405135707795800000002]
module.plugins_s3_role.aws_iam_role_policy_attachment.this["plugins_s3_access"]: Refreshing state... [id=github_actions-plugins-s3-20230413152830383900000002]
aws_s3_bucket_versioning.falco-test-infra-state_versioning: Refreshing state... [id=falco-test-infra-state]
aws_s3_bucket_acl.falco-test-infra-state_acl: Refreshing state... [id=falco-test-infra-state,private]
aws_s3_bucket_server_side_encryption_configuration.falco-test-infra-state_server_side_encryption_configuration: Refreshing state... [id=falco-test-infra-state]
data.aws_iam_policy_document.falco-test-infra-state: Reading...
module.test-infra_reader.aws_iam_role_policy_attachment.this["test-infra_read_access"]: Refreshing state... [id=github_actions-test-infra-reader-20240321163504745700000001]
data.aws_iam_policy_document.falco-test-infra-state: Read complete after 0s [id=3883224714]
module.test-infra_reader.aws_iam_role_policy_attachment.this["test-infra_state_lock"]: Refreshing state... [id=github_actions-test-infra-reader-20240325081409156900000002]
module.falco_ecr_role.aws_iam_role_policy_attachment.this["falco_ecr_access"]: Refreshing state... [id=github_actions-falco-ecr-20230427091418182800000002]
module.falco_s3_role.aws_iam_role_policy_attachment.this["falco_s3_access"]: Refreshing state... [id=github_actions-falco-s3-20230427085324980000000004]
module.falcosidekick_ecr_role.aws_iam_role_policy_attachment.this["falcosidekick_ecr_access"]: Refreshing state... [id=github_actions-falcosidekick-ecr-20230308175814271600000002]
module.eks.aws_iam_role_policy_attachment.cluster_elb_sl_role_creation[0]: Refreshing state... [id=falco-prow-test-infra20201105152818554200000003-20201105152820341400000007]
module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSClusterPolicy[0]: Refreshing state... [id=falco-prow-test-infra20201105152818554200000003-20201105152819990700000006]
module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSVPCResourceControllerPolicy[0]: Refreshing state... [id=falco-prow-test-infra20201105152818554200000003-20201105152819867600000004]
module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSServicePolicy[0]: Refreshing state... [id=falco-prow-test-infra20201105152818554200000003-20201105152819898000000005]
aws_security_group.all_worker_mgmt: Refreshing state... [id=sg-0e16b80a3ed5cf816]
aws_security_group.worker_group_mgmt_one: Refreshing state... [id=sg-0cc7b1677349c65ce]
module.vpc.aws_subnet.public[0]: Refreshing state... [id=subnet-0a0fe757bebcaf795]
module.vpc.aws_subnet.public[1]: Refreshing state... [id=subnet-0abe8636ec65c0206]
module.vpc.aws_subnet.public[2]: Refreshing state... [id=subnet-02e57666a36d1545a]
module.vpc.aws_subnet.private[0]: Refreshing state... [id=subnet-02d6ff228997829f9]
module.vpc.aws_subnet.private[1]: Refreshing state... [id=subnet-09361e94faa3fa8eb]
module.vpc.aws_subnet.private[2]: Refreshing state... [id=subnet-0dccb91c994a313fd]
module.vpc.aws_route_table.private[0]: Refreshing state... [id=rtb-07f1775c2de8ec969]
module.vpc.aws_internet_gateway.this[0]: Refreshing state... [id=igw-0f325c0242d048d8f]
module.vpc.aws_route_table.public[0]: Refreshing state... [id=rtb-0fdfd32f4524c8dc8]
module.falcosidekick_ui_ecr_role.aws_iam_role_policy_attachment.this["falcosidekick_ui_ecr_access"]: Refreshing state... [id=github_actions-falcosidekick-ui-ecr-20230913155739870800000002]
aws_s3_bucket_policy.falco-test-infra-state: Refreshing state... [id=falco-test-infra-state]
module.eks.aws_security_group.workers[0]: Refreshing state... [id=sg-0d2304cab1b3957b1]
module.eks.aws_security_group.cluster[0]: Refreshing state... [id=sg-05d3ba5e703e1c5f1]
module.falcoctl_ecr_role.aws_iam_role_policy_attachment.this["falcoctl_ecr_access"]: Refreshing state... [id=github_actions-falcoctl-ecr-20240220101904532000000002]
module.falco_playground_s3_role.aws_iam_role_policy_attachment.this["falco_playground_s3_access"]: Refreshing state... [id=github_actions-falco-playground-s3-20240311212716930200000002]
module.test-infra_cluster_role.aws_iam_role_policy_attachment.this["test-infra_cluster_access"]: Refreshing state... [id=github_actions-test-infra-cluster-20240220093904349300000002]
module.rules_s3_role.aws_iam_role_policy_attachment.this["rules_s3_access"]: Refreshing state... [id=terraform-20230120142903096000000002-20230120142903785300000003]
module.falco_dev_s3_role.aws_iam_role_policy_attachment.this["falco_s3_access"]: Refreshing state... [id=github_actions-falco-dev-s3-20230427085324972500000003]
data.aws_iam_policy_document.s3_access: Reading...
data.aws_iam_policy_document.s3_access: Read complete after 0s [id=278244951]
aws_s3_bucket_versioning.prow_storage_versioning: Refreshing state... [id=falco-prow-logs]
aws_s3_bucket_acl.prow_storage_acl: Refreshing state... [id=falco-prow-logs,private]
aws_s3_bucket_server_side_encryption_configuration.prow_storage_server_side_encryption_configuration: Refreshing state... [id=falco-prow-logs]
aws_s3_bucket_lifecycle_configuration.prow_storage_lifecycle_configuration: Refreshing state... [id=falco-prow-logs]
module.vpc.aws_nat_gateway.this[0]: Refreshing state... [id=nat-0069c2978d157c4cd]
module.vpc.aws_route_table_association.private[2]: Refreshing state... [id=rtbassoc-034c965b472c568fd]
module.vpc.aws_route_table_association.private[0]: Refreshing state... [id=rtbassoc-003d282252839a3b9]
module.vpc.aws_route_table_association.private[1]: Refreshing state... [id=rtbassoc-03ad0749fbe6f1117]
module.vpc.aws_route_table_association.public[1]: Refreshing state... [id=rtbassoc-0f5df778686c05fe5]
module.vpc.aws_route_table_association.public[2]: Refreshing state... [id=rtbassoc-0e9e855baf7cd1212]
module.vpc.aws_route_table_association.public[0]: Refreshing state... [id=rtbassoc-0e9f749c7d12e3267]
module.vpc.aws_route.public_internet_gateway[0]: Refreshing state... [id=r-rtb-0fdfd32f4524c8dc81080289494]
module.vpc.aws_route.private_nat_gateway[0]: Refreshing state... [id=r-rtb-07f1775c2de8ec9691080289494]
module.eks.aws_security_group_rule.cluster_egress_internet[0]: Refreshing state... [id=sgrule-280492479]
module.eks.aws_security_group_rule.workers_ingress_self[0]: Refreshing state... [id=sgrule-2377827212]
module.eks.aws_security_group_rule.workers_ingress_cluster_https[0]: Refreshing state... [id=sgrule-341689192]
module.eks.aws_security_group_rule.workers_egress_internet[0]: Refreshing state... [id=sgrule-1247502868]
module.eks.aws_security_group_rule.workers_ingress_cluster[0]: Refreshing state... [id=sgrule-36459906]
module.eks.aws_security_group_rule.cluster_https_worker_ingress[0]: Refreshing state... [id=sgrule-1969485948]
module.eks.aws_eks_cluster.this[0]: Refreshing state... [id=falco-prow-test-infra]
module.eks.aws_iam_openid_connect_provider.oidc_provider[0]: Refreshing state... [id=arn:aws:iam::292999226676:oidc-provider/oidc.eks.eu-west-1.amazonaws.com/id/352DA0E4F639E76F92BD99E5683F0478]
module.load_balancer_controller.data.aws_iam_policy_document.assume_role_with_oidc[0]: Reading...
module.eks.aws_iam_role.workers[0]: Refreshing state... [id=falco-prow-test-infra20201105155238686500000001]
module.eks.local_file.kubeconfig[0]: Refreshing state... [id=9709b49e9fb9768ceb0d46920a5878052ab40ab6]
module.load_balancer_controller.data.aws_iam_policy_document.assume_role_with_oidc[0]: Read complete after 0s [id=4091739281]
module.driver_kit_s3_role.data.aws_iam_policy_document.assume_role_with_oidc[0]: Reading...
module.eks.data.http.wait_for_cluster[0]: Reading...
module.driver_kit_s3_role.data.aws_iam_policy_document.assume_role_with_oidc[0]: Read complete after 0s [id=440209149]
module.load_balancer_controller.aws_iam_role.this[0]: Refreshing state... [id=falco-prow-test-infra-loadbalancer-controller]
module.iam_assumable_role_admin.data.aws_iam_policy_document.assume_role_with_oidc[0]: Reading...
module.iam_assumable_role_admin.data.aws_iam_policy_document.assume_role_with_oidc[0]: Read complete after 0s [id=1787711474]
module.driver_kit_s3_role.aws_iam_role.this[0]: Refreshing state... [id=falco-prow-test-infra-drivers_s3_access]
module.iam_assumable_role_admin.aws_iam_role.this[0]: Refreshing state... [id=falco-prow-test-infra-prow_s3_access]
module.eks.data.http.wait_for_cluster[0]: Read complete after 0s [id=https://352DA0E4F639E76F92BD99E5683F0478.gr7.eu-west-1.eks.amazonaws.com/healthz]
data.aws_eks_cluster_auth.cluster: Reading...
aws_iam_policy.driverkit_s3_access: Refreshing state... [id=arn:aws:iam::292999226676:policy/falco-prow-test-infra-driverkit-s320201213215323984400000001]
aws_iam_policy.s3_access: Refreshing state... [id=arn:aws:iam::292999226676:policy/falco-prow-test-infra-prow-s320201105155512012300000006]
aws_iam_policy.loadbalancer_controller: Refreshing state... [id=arn:aws:iam::292999226676:policy/falco-prow-test-infra-lb-controller20201112211541650900000001]
data.aws_eks_cluster_auth.cluster: Read complete after 0s [id=falco-prow-test-infra]
data.aws_eks_cluster.cluster: Reading...
module.iam_assumable_role_admin.aws_iam_role_policy_attachment.custom[0]: Refreshing state... [id=falco-prow-test-infra-prow_s3_access-20201213222417722400000001]
data.aws_iam_policy_document.prow_storage: Reading...
module.load_balancer_controller.aws_iam_role_policy_attachment.custom[0]: Refreshing state... [id=falco-prow-test-infra-loadbalancer-controller-20201112211541903700000002]
data.aws_iam_policy_document.prow_storage: Read complete after 0s [id=1314906468]
aws_s3_bucket_policy.prow_storage: Refreshing state... [id=falco-prow-logs]
module.driver_kit_s3_role.aws_iam_role_policy_attachment.custom[0]: Refreshing state... [id=falco-prow-test-infra-drivers_s3_access-20201213222658154700000001]
module.eks.aws_iam_role_policy_attachment.workers_AmazonEKSWorkerNodePolicy[0]: Refreshing state... [id=falco-prow-test-infra20201105155238686500000001-20201105155240059700000003]
module.eks.aws_iam_role_policy_attachment.workers_additional_policies[0]: Refreshing state... [id=falco-prow-test-infra20201105155238686500000001-20201105155240151600000005]
module.eks.aws_iam_role_policy_attachment.workers_additional_policies[1]: Refreshing state... [id=falco-prow-test-infra20201105155238686500000001-20201120161034700700000003]
module.eks.aws_iam_role_policy_attachment.workers_AmazonEC2ContainerRegistryReadOnly[0]: Refreshing state... [id=falco-prow-test-infra20201105155238686500000001-20201105155240120500000004]
module.eks.aws_iam_role_policy_attachment.workers_AmazonEKS_CNI_Policy[0]: Refreshing state... [id=falco-prow-test-infra20201105155238686500000001-20201105155240056800000002]
data.aws_eks_cluster.cluster: Read complete after 0s [id=falco-prow-test-infra]
module.eks.kubernetes_config_map.aws_auth[0]: Refreshing state... [id=kube-system/aws-auth]
module.eks.module.node_groups.aws_eks_node_group.workers["jobs_arm"]: Refreshing state... [id=falco-prow-test-infra:jobs-arm-worker-group]
module.eks.module.node_groups.aws_eks_node_group.workers["jobs"]: Refreshing state... [id=falco-prow-test-infra:jobs-worker-group]
module.eks.module.node_groups.aws_eks_node_group.workers["default"]: Refreshing state... [id=falco-prow-test-infra:prow-worker-group]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
  ~ update in-place

Terraform will perform the following actions:

  # module.eks.kubernetes_config_map.aws_auth[0] will be updated in-place
  ~ resource "kubernetes_config_map" "aws_auth" {
      ~ data        = {
          ~ "mapUsers"    = <<-EOT
                - "groups":
                  - "system:masters"
                  "userarn": "arn:aws:iam::292999226676:user/jonah.jones"
                  "username": "jonah.jones"
                - "groups":
                  - "system:masters"
                  "userarn": "arn:aws:iam::292999226676:user/[email protected]"
                  "username": "[email protected]"
                - "groups":
                  - "system:masters"
                  "userarn": "arn:aws:iam::292999226676:user/[email protected]"
                  "username": "[email protected]"
                - "groups":
                  - "system:masters"
                  "userarn": "arn:aws:iam::292999226676:user/leonardo.grasso"
                  "username": "leonardo.grasso"
                - "groups":
                  - "system:masters"
                  "userarn": "arn:aws:iam::292999226676:user/massimiliano.giovagnoli"
                  "username": "massimiliano.giovagnoli"
                - "groups":
                  - "system:masters"
                  "userarn": "arn:aws:iam::292999226676:user/[email protected]"
                  "username": "[email protected]"
                - "groups":
                  - "system:masters"
                  "userarn": "arn:aws:iam::292999226676:user/federico.dipierro"
                  "username": "federico.dipierro"
                - "groups":
                  - "system:masters"
                  "userarn": "arn:aws:iam::292999226676:user/luca.guerra"
                  "username": "luca.guerra"
              + - "groups":
              +   - "system:masters"
              +   "userarn": "arn:aws:iam::292999226676:user/aldo.lacuku"
              +   "username": "aldo.lacuku"
            EOT
            # (2 unchanged elements hidden)
        }
        id          = "kube-system/aws-auth"
        # (2 unchanged attributes hidden)

        # (1 unchanged block hidden)
    }

  # module.eks.local_file.kubeconfig[0] will be created
  + resource "local_file" "kubeconfig" {
      + content              = <<-EOT
            apiVersion: v1
            preferences: {}
            kind: Config
            
            clusters:
            - cluster:
                server: https://352DA0E4F639E76F92BD99E5683F0478.gr7.eu-west-1.eks.amazonaws.com
                certificate-authority-data: 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
              name: eks_falco-prow-test-infra
            
            contexts:
            - context:
                cluster: eks_falco-prow-test-infra
                user: eks_falco-prow-test-infra
              name: eks_falco-prow-test-infra
            
            current-context: eks_falco-prow-test-infra
            
            users:
            - name: eks_falco-prow-test-infra
              user:
                exec:
                  apiVersion: client.authentication.k8s.io/v1alpha1
                  command: aws-iam-authenticator
                  args:
                    - "token"
                    - "-i"
                    - "falco-prow-test-infra"
        EOT
      + directory_permission = "0755"
      + file_permission      = "0600"
      + filename             = "./kubeconfig_falco-prow-test-infra"
      + id                   = (known after apply)
    }

Plan: 1 to add, 1 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pusher: @LucaGuerra, Action: pull_request, Working Directory: ``, Workflow: Terraform plan

Copy link
Contributor

@FedeDP FedeDP left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Very happy too!
/approve

@poiana
Copy link
Contributor

poiana commented Jun 17, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: FedeDP, LucaGuerra

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@poiana
Copy link
Contributor

poiana commented Jun 17, 2024

LGTM label has been added.

Git tree hash: 5879c81ea311dd79e73338f9bfd96d3db37ef6fe

@poiana poiana merged commit e034a33 into master Jun 17, 2024
6 checks passed
@poiana poiana deleted the LucaGuerra-patch-1 branch June 17, 2024 11:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants