diff --git a/.github/workflows/terraform_apply.yaml b/.github/workflows/terraform_apply.yaml
new file mode 100644
index 0000000..a9a4d05
--- /dev/null
+++ b/.github/workflows/terraform_apply.yaml
@@ -0,0 +1,59 @@
+# This is a basic workflow to help you get started with Actions
+name: Terraform Apply
+
+# Controls when the workflow will run
+on:
+ push:
+ branches: [ "main" ]
+ # Allows you to run this workflow manually from the Actions tab
+ workflow_dispatch:
+
+# A workflow run is made up of one or more jobs that can run sequentially or in parallel
+jobs:
+ # This workflow contains a single job called "build"
+ build:
+ # The type of runner that the job will run on
+ runs-on: [ automation-repos ]
+ env:
+ AWS_SECRET_ACCESS_KEY: "${{ secrets.AWS_SECRET_ACCESS_KEY }}"
+ AWS_ACCESS_KEY_ID: "${{ vars.AWS_ACCESS_KEY_ID }}"
+ AWS_SESSION_TOKEN: "${{ secrets.AWS_SESSION_TOKEN }}"
+ GITHUB_TOKEN: "${{ secrets.GH_TOKEN }}"
+
+
+ # Steps represent a sequence of tasks that will be executed as part of the job
+ steps:
+ # Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it
+ - uses: actions/checkout@v3
+
+
+ - uses: CSVD/gh-actions-setup-node@v3
+ with:
+ node-version: 16
+
+ - uses: CSVD/gh-actions-setup-terraform@v2
+ with:
+ terraform_wrapper: false
+ terraform_version: ${{ vars.terraform_version }}
+
+ - name: Terraform Format
+ id: fmt
+ run: |
+ terraform fmt -check
+
+ - name: Autoformat Halt
+ if: env.auto_format == 'true'
+ run: exit 1
+
+ - name: Terraform Init
+ id: init
+ run: terraform init -upgrade
+
+ - name: Terraform Validate
+ id: validate
+ run: terraform validate
+
+ - name: Terraform Apply
+ id: plan
+ run: terraform apply -auto-approve
+ continue-on-error: true
diff --git a/.github/workflows/terraform_plan.yaml b/.github/workflows/terraform_plan.yaml
new file mode 100644
index 0000000..50b6820
--- /dev/null
+++ b/.github/workflows/terraform_plan.yaml
@@ -0,0 +1,120 @@
+# This is a basic workflow to help you get started with Actions
+name: Terraform Plan
+
+# Controls when the workflow will run
+on:
+ pull_request:
+ # Allows you to run this workflow manually from the Actions tab
+ workflow_dispatch:
+
+# A workflow run is made up of one or more jobs that can run sequentially or in parallel
+jobs:
+ # This workflow contains a single job called "build"
+ build:
+ # The type of runner that the job will run on
+ runs-on: [ automation-repos ]
+ env:
+ AWS_SECRET_ACCESS_KEY: "${{ secrets.AWS_SECRET_ACCESS_KEY }}"
+ AWS_ACCESS_KEY_ID: "${{ vars.AWS_ACCESS_KEY_ID }}"
+ AWS_SESSION_TOKEN: "${{ secrets.AWS_SESSION_TOKEN }}"
+ GITHUB_TOKEN: "${{ secrets.GH_TOKEN }}"
+
+
+ # Steps represent a sequence of tasks that will be executed as part of the job
+ steps:
+ # Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it
+ - uses: CSVD/gh-actions-checkout@v3
+ with:
+ github-server-url: https://github.e.it.census.gov
+ ref: ${{ github.head_ref }}
+ token: ${{ secrets.GH_TOKEN }}
+
+
+ - uses: CSVD/gh-actions-setup-node@v3
+ with:
+ node-version: 16
+
+ - uses: CSVD/gh-actions-setup-terraform@v2
+ with:
+ terraform_version: ${{ vars.terraform_version }}
+
+ - name: Set output
+ id: vars
+ run: echo ::set-output name=short_ref::${GITHUB_REF#refs/*/}
+
+ - name: Terraform Format
+ id: fmt
+ run: |
+ terraform fmt
+ if ! git diff-index --quiet HEAD; then
+ git config --global user.name '${{ vars.REPO_OWNER }}'
+ git config --global user.email '${{ vars.REPO_OWNER_EMAIL }}'
+ git commit -am "Autoformatting TF Code"
+ git push
+ echo "auto_format=true" >> $GITHUB_ENV
+ fi
+
+ - name: Autoformat Halt
+ if: env.auto_format == 'true'
+ run: exit 0
+
+ - name: Terraform Init
+ id: init
+ run: terraform init -upgrade
+
+ - name: Terraform Validate
+ id: validate
+ run: terraform validate -no-color
+
+ - name: Terraform Plan
+ id: plan
+ if: github.event_name == 'pull_request'
+ run: terraform plan -no-color -out=${{ vars.plan_cache }}/${{ github.sha }}
+ continue-on-error: true
+
+ - name: Terraform Plan
+ if: github.event_name != 'pull_request'
+ run: terraform plan -no-color
+ continue-on-error: true
+
+ - name: Terraform Show plan
+ if: github.event_name == 'pull_request'
+ run: echo ::set-output name=terraform_plan::$(terraform show ${{ vars.plan_cache }}/${{ github.sha }})
+
+ - name: Post Terraform Plan to PR
+ uses: CSVD/gh-actions-github-script@v6
+ if: github.event_name == 'pull_request'
+ env:
+ PLAN: "terraform\n${{ env.terraform_plan }}"
+ with:
+ github-token: ${{ secrets.GH_TOKEN }}
+ script: |
+ const output = `#### Terraform Format and Style 🖌\`${{ steps.fmt.outcome }}\`
+ #### Terraform Initialization ⚙️\`${{ steps.init.outcome }}\`
+ #### Terraform Validation 🤖\`${{ steps.validate.outcome }}\`
+ Validation Output
+
+ \`\`\`\n
+ ${{ steps.validate.outputs.stdout }}
+ \`\`\`
+
+
+
+ #### Terraform Plan 📖\`${{ steps.plan.outcome }}\`
+
+ Show Plan
+
+ \`\`\`\n
+ ${process.env.PLAN}
+ \`\`\`
+
+
+
+ *Pusher: @${{ github.actor }}, Action: \`${{ github.event_name }}\`, Workflow: \`${{ github.workflow }}\`*`;
+
+ github.rest.issues.createComment({
+ issue_number: context.issue.number,
+ owner: context.repo.owner,
+ repo: context.repo.repo,
+ body: output
+ })
diff --git a/.gitignore b/.gitignore
index 8f37c76..0da0020 100644
--- a/.gitignore
+++ b/.gitignore
@@ -50,3 +50,4 @@ aws-image-pipeline/aws-image-pipeline/
windows-image-pipeline/windows-image-pipeline/
linux-image-pipeline/linux-image-pipeline/
automation-repos/automation-repos
+ghe-runners/ghe-runners
diff --git a/backend.tf b/backend.tf
new file mode 100644
index 0000000..54ce7cf
--- /dev/null
+++ b/backend.tf
@@ -0,0 +1,8 @@
+terraform {
+ backend "s3" {
+ bucket = "inf-tfstate-229685449397"
+ key = "csvd-dev-gov/common/apps/ghe-runner"
+ region = "us-gov-east-1"
+ dynamodb_table = "tf_remote_state"
+ }
+}
diff --git a/external_actions.tf b/external_actions.tf
index 150168e..94c1669 100644
--- a/external_actions.tf
+++ b/external_actions.tf
@@ -16,3 +16,11 @@ module github_checkout {
repo_org = "CSVD"
}
+module setup_python {
+ source = "HappyPathway/gh-actions/importer"
+ version = "0.0.15"
+ git_repo_url = "https://github.com/actions/setup-python.git"
+ git_repo_path = "/home/a/arnol377/git/gh-actions-setup-python"
+ repo_name = "gh-actions-setup-python"
+ repo_org = "CSVD"
+}
diff --git a/ghe-runners/config.sh b/ghe-runners/config.sh
new file mode 100755
index 0000000..14cc6ba
--- /dev/null
+++ b/ghe-runners/config.sh
@@ -0,0 +1,81 @@
+#!/bin/bash
+
+user_id=`id -u`
+
+# we want to snapshot the environment of the config user
+if [ $user_id -eq 0 -a -z "$RUNNER_ALLOW_RUNASROOT" ]; then
+ echo "Must not run with sudo"
+ exit 1
+fi
+
+# Check dotnet Core 6.0 dependencies for Linux
+if [[ (`uname` == "Linux") ]]
+then
+ command -v ldd > /dev/null
+ if [ $? -ne 0 ]
+ then
+ echo "Can not find 'ldd'. Please install 'ldd' and try again."
+ exit 1
+ fi
+
+ message="Execute sudo ./bin/installdependencies.sh to install any missing Dotnet Core 6.0 dependencies."
+
+ ldd ./bin/libcoreclr.so | grep 'not found'
+ if [ $? -eq 0 ]; then
+ echo "Dependencies is missing for Dotnet Core 6.0"
+ echo $message
+ exit 1
+ fi
+
+ ldd ./bin/libSystem.Security.Cryptography.Native.OpenSsl.so | grep 'not found'
+ if [ $? -eq 0 ]; then
+ echo "Dependencies is missing for Dotnet Core 6.0"
+ echo $message
+ exit 1
+ fi
+
+ ldd ./bin/libSystem.IO.Compression.Native.so | grep 'not found'
+ if [ $? -eq 0 ]; then
+ echo "Dependencies is missing for Dotnet Core 6.0"
+ echo $message
+ exit 1
+ fi
+
+ if ! [ -x "$(command -v ldconfig)" ]; then
+ LDCONFIG_COMMAND="/sbin/ldconfig"
+ if ! [ -x "$LDCONFIG_COMMAND" ]; then
+ echo "Can not find 'ldconfig' in PATH and '/sbin/ldconfig' doesn't exists either. Please install 'ldconfig' and try again."
+ exit 1
+ fi
+ else
+ LDCONFIG_COMMAND="ldconfig"
+ fi
+
+ libpath=${LD_LIBRARY_PATH:-}
+ $LDCONFIG_COMMAND -NXv ${libpath//:/ } 2>&1 | grep libicu >/dev/null 2>&1
+ if [ $? -ne 0 ]; then
+ echo "Libicu's dependencies is missing for Dotnet Core 6.0"
+ echo $message
+ exit 1
+ fi
+fi
+
+# Change directory to the script root directory
+# https://stackoverflow.com/questions/59895/getting-the-source-directory-of-a-bash-script-from-within
+SOURCE="${BASH_SOURCE[0]}"
+while [ -h "$SOURCE" ]; do # resolve $SOURCE until the file is no longer a symlink
+ DIR="$( cd -P "$( dirname "$SOURCE" )" && pwd )"
+ SOURCE="$(readlink "$SOURCE")"
+ [[ $SOURCE != /* ]] && SOURCE="$DIR/$SOURCE" # if $SOURCE was a relative symlink, we need to resolve it relative to the path where the symlink file was located
+done
+DIR="$( cd -P "$( dirname "$SOURCE" )" && pwd )"
+cd "$DIR"
+
+source ./env.sh
+
+shopt -s nocasematch
+if [[ "$1" == "remove" ]]; then
+ ./bin/Runner.Listener "$@"
+else
+ ./bin/Runner.Listener configure "$@"
+fi
diff --git a/ghe-runners/env.sh b/ghe-runners/env.sh
new file mode 100755
index 0000000..641d244
--- /dev/null
+++ b/ghe-runners/env.sh
@@ -0,0 +1,42 @@
+#!/bin/bash
+
+varCheckList=(
+ 'LANG'
+ 'JAVA_HOME'
+ 'ANT_HOME'
+ 'M2_HOME'
+ 'ANDROID_HOME'
+ 'ANDROID_SDK_ROOT'
+ 'GRADLE_HOME'
+ 'NVM_BIN'
+ 'NVM_PATH'
+ 'LD_LIBRARY_PATH'
+ 'PERL5LIB'
+ )
+
+envContents=""
+
+if [ -f ".env" ]; then
+ envContents=`cat .env`
+else
+ touch .env
+fi
+
+function writeVar()
+{
+ checkVar="$1"
+ checkDelim="${1}="
+ if test "${envContents#*$checkDelim}" = "$envContents"
+ then
+ if [ ! -z "${!checkVar}" ]; then
+ echo "${checkVar}=${!checkVar}">>.env
+ fi
+ fi
+}
+
+echo $PATH>.path
+
+for var_name in ${varCheckList[@]}
+do
+ writeVar "${var_name}"
+done
diff --git a/ghe-runners/run-helper.cmd.template b/ghe-runners/run-helper.cmd.template
new file mode 100644
index 0000000..23e4246
--- /dev/null
+++ b/ghe-runners/run-helper.cmd.template
@@ -0,0 +1,53 @@
+@echo off
+SET UPDATEFILE=update.finished
+"%~dp0\bin\Runner.Listener.exe" run %*
+
+rem using `if %ERRORLEVEL% EQU N` insterad of `if ERRORLEVEL N`
+rem `if ERRORLEVEL N` means: error level is N or MORE
+
+if %ERRORLEVEL% EQU 0 (
+ echo "Runner listener exit with 0 return code, stop the service, no retry needed."
+ exit /b 0
+)
+
+if %ERRORLEVEL% EQU 1 (
+ echo "Runner listener exit with terminated error, stop the service, no retry needed."
+ exit /b 0
+)
+
+if %ERRORLEVEL% EQU 2 (
+ echo "Runner listener exit with retryable error, re-launch runner in 5 seconds."
+ ping 127.0.0.1 -n 6 -w 1000 >NUL
+ exit /b 1
+)
+
+if %ERRORLEVEL% EQU 3 (
+ rem Wait for 30 seconds or for flag file to exists for the ephemeral runner update process finish
+ echo "Runner listener exit because of updating, re-launch runner after successful update"
+ FOR /L %%G IN (1,1,30) DO (
+ IF EXIST %UPDATEFILE% (
+ echo "Update finished successfully."
+ del %FILE%
+ exit /b 1
+ )
+ ping 127.0.0.1 -n 2 -w 1000 >NUL
+ )
+ exit /b 1
+)
+
+if %ERRORLEVEL% EQU 4 (
+ rem Wait for 30 seconds or for flag file to exists for the runner update process finish
+ echo "Runner listener exit because of updating, re-launch runner after successful update"
+ FOR /L %%G IN (1,1,30) DO (
+ IF EXIST %UPDATEFILE% (
+ echo "Update finished successfully."
+ del %FILE%
+ exit /b 1
+ )
+ ping 127.0.0.1 -n 2 -w 1000 >NUL
+ )
+ exit /b 1
+)
+
+echo "Exiting after unknown error code: %ERRORLEVEL%"
+exit /b 0
\ No newline at end of file
diff --git a/ghe-runners/run-helper.sh b/ghe-runners/run-helper.sh
new file mode 100755
index 0000000..743fd8b
--- /dev/null
+++ b/ghe-runners/run-helper.sh
@@ -0,0 +1,76 @@
+#!/bin/bash
+
+# Validate not sudo
+user_id=`id -u`
+if [ $user_id -eq 0 -a -z "$RUNNER_ALLOW_RUNASROOT" ]; then
+ echo "Must not run interactively with sudo"
+ exit 1
+fi
+
+# Run
+shopt -s nocasematch
+
+SOURCE="${BASH_SOURCE[0]}"
+while [ -h "$SOURCE" ]; do # resolve $SOURCE until the file is no longer a symlink
+ DIR="$( cd -P "$( dirname "$SOURCE" )" && pwd )"
+ SOURCE="$(readlink "$SOURCE")"
+ [[ $SOURCE != /* ]] && SOURCE="$DIR/$SOURCE" # if $SOURCE was a relative symlink, we need to resolve it relative to the path where the symlink file was located
+done
+DIR="$( cd -P "$( dirname "$SOURCE" )" && pwd )"
+
+# Wait for docker to start
+if [ ! -z "$RUNNER_WAIT_FOR_DOCKER_IN_SECONDS" ]; then
+ if [ "$RUNNER_WAIT_FOR_DOCKER_IN_SECONDS" -gt 0 ]; then
+ echo "Waiting for docker to be ready."
+ for i in $(seq "$RUNNER_WAIT_FOR_DOCKER_IN_SECONDS"); do
+ if docker ps > /dev/null 2>&1; then
+ echo "Docker is ready."
+ break
+ fi
+ "$DIR"/safe_sleep.sh 1
+ done
+ fi
+fi
+
+updateFile="update.finished"
+"$DIR"/bin/Runner.Listener run $*
+
+returnCode=$?
+if [[ $returnCode == 0 ]]; then
+ echo "Runner listener exit with 0 return code, stop the service, no retry needed."
+ exit 0
+elif [[ $returnCode == 1 ]]; then
+ echo "Runner listener exit with terminated error, stop the service, no retry needed."
+ exit 0
+elif [[ $returnCode == 2 ]]; then
+ echo "Runner listener exit with retryable error, re-launch runner in 5 seconds."
+ "$DIR"/safe_sleep.sh 5
+ exit 2
+elif [[ $returnCode == 3 ]]; then
+ # Wait for 30 seconds or for flag file to exists for the runner update process finish
+ echo "Runner listener exit because of updating, re-launch runner after successful update"
+ for i in {0..30}; do
+ if test -f "$updateFile"; then
+ echo "Update finished successfully."
+ rm "$updateFile"
+ break
+ fi
+ "$DIR"/safe_sleep.sh 1
+ done
+ exit 2
+elif [[ $returnCode == 4 ]]; then
+ # Wait for 30 seconds or for flag file to exists for the ephemeral runner update process finish
+ echo "Runner listener exit because of updating, re-launch runner after successful update"
+ for i in {0..30}; do
+ if test -f "$updateFile"; then
+ echo "Update finished successfully."
+ rm "$updateFile"
+ break
+ fi
+ "$DIR"/safe_sleep.sh 1
+ done
+ exit 2
+else
+ echo "Exiting with unknown error code: ${returnCode}"
+ exit 0
+fi
diff --git a/ghe-runners/run-helper.sh.template b/ghe-runners/run-helper.sh.template
new file mode 100755
index 0000000..743fd8b
--- /dev/null
+++ b/ghe-runners/run-helper.sh.template
@@ -0,0 +1,76 @@
+#!/bin/bash
+
+# Validate not sudo
+user_id=`id -u`
+if [ $user_id -eq 0 -a -z "$RUNNER_ALLOW_RUNASROOT" ]; then
+ echo "Must not run interactively with sudo"
+ exit 1
+fi
+
+# Run
+shopt -s nocasematch
+
+SOURCE="${BASH_SOURCE[0]}"
+while [ -h "$SOURCE" ]; do # resolve $SOURCE until the file is no longer a symlink
+ DIR="$( cd -P "$( dirname "$SOURCE" )" && pwd )"
+ SOURCE="$(readlink "$SOURCE")"
+ [[ $SOURCE != /* ]] && SOURCE="$DIR/$SOURCE" # if $SOURCE was a relative symlink, we need to resolve it relative to the path where the symlink file was located
+done
+DIR="$( cd -P "$( dirname "$SOURCE" )" && pwd )"
+
+# Wait for docker to start
+if [ ! -z "$RUNNER_WAIT_FOR_DOCKER_IN_SECONDS" ]; then
+ if [ "$RUNNER_WAIT_FOR_DOCKER_IN_SECONDS" -gt 0 ]; then
+ echo "Waiting for docker to be ready."
+ for i in $(seq "$RUNNER_WAIT_FOR_DOCKER_IN_SECONDS"); do
+ if docker ps > /dev/null 2>&1; then
+ echo "Docker is ready."
+ break
+ fi
+ "$DIR"/safe_sleep.sh 1
+ done
+ fi
+fi
+
+updateFile="update.finished"
+"$DIR"/bin/Runner.Listener run $*
+
+returnCode=$?
+if [[ $returnCode == 0 ]]; then
+ echo "Runner listener exit with 0 return code, stop the service, no retry needed."
+ exit 0
+elif [[ $returnCode == 1 ]]; then
+ echo "Runner listener exit with terminated error, stop the service, no retry needed."
+ exit 0
+elif [[ $returnCode == 2 ]]; then
+ echo "Runner listener exit with retryable error, re-launch runner in 5 seconds."
+ "$DIR"/safe_sleep.sh 5
+ exit 2
+elif [[ $returnCode == 3 ]]; then
+ # Wait for 30 seconds or for flag file to exists for the runner update process finish
+ echo "Runner listener exit because of updating, re-launch runner after successful update"
+ for i in {0..30}; do
+ if test -f "$updateFile"; then
+ echo "Update finished successfully."
+ rm "$updateFile"
+ break
+ fi
+ "$DIR"/safe_sleep.sh 1
+ done
+ exit 2
+elif [[ $returnCode == 4 ]]; then
+ # Wait for 30 seconds or for flag file to exists for the ephemeral runner update process finish
+ echo "Runner listener exit because of updating, re-launch runner after successful update"
+ for i in {0..30}; do
+ if test -f "$updateFile"; then
+ echo "Update finished successfully."
+ rm "$updateFile"
+ break
+ fi
+ "$DIR"/safe_sleep.sh 1
+ done
+ exit 2
+else
+ echo "Exiting with unknown error code: ${returnCode}"
+ exit 0
+fi
diff --git a/ghe-runners/run.sh b/ghe-runners/run.sh
new file mode 100755
index 0000000..6b02ea1
--- /dev/null
+++ b/ghe-runners/run.sh
@@ -0,0 +1,87 @@
+#!/bin/bash
+
+# Change directory to the script root directory
+# https://stackoverflow.com/questions/59895/getting-the-source-directory-of-a-bash-script-from-within
+SOURCE="${BASH_SOURCE[0]}"
+while [ -h "$SOURCE" ]; do # resolve $SOURCE until the file is no longer a symlink
+ DIR="$( cd -P "$( dirname "$SOURCE" )" && pwd )"
+ SOURCE="$(readlink "$SOURCE")"
+ [[ $SOURCE != /* ]] && SOURCE="$DIR/$SOURCE" # if $SOURCE was a relative symlink, we need to resolve it relative to the path where the symlink file was located
+done
+DIR="$( cd -P "$( dirname "$SOURCE" )" && pwd )"
+
+run() {
+ # run the helper process which keep the listener alive
+ while :;
+ do
+ cp -f "$DIR"/run-helper.sh.template "$DIR"/run-helper.sh
+ "$DIR"/run-helper.sh $*
+ returnCode=$?
+ if [[ $returnCode -eq 2 ]]; then
+ echo "Restarting runner..."
+ else
+ echo "Exiting runner..."
+ exit 0
+ fi
+ done
+}
+
+runWithManualTrap() {
+ # Set job control
+ set -m
+
+ trap 'kill -INT -$PID' INT TERM
+
+ # run the helper process which keep the listener alive
+ while :;
+ do
+ cp -f "$DIR"/run-helper.sh.template "$DIR"/run-helper.sh
+ "$DIR"/run-helper.sh $* &
+ PID=$!
+ wait -f $PID
+ returnCode=$?
+ if [[ $returnCode -eq 2 ]]; then
+ echo "Restarting runner..."
+ else
+ echo "Exiting runner..."
+ # Unregister signal handling before exit
+ trap - INT TERM
+ # wait for last parts to be logged
+ wait $PID
+ exit $returnCode
+ fi
+ done
+}
+
+function updateCerts() {
+ local sudo_prefix=""
+ local user_id=`id -u`
+
+ if [ $user_id -ne 0 ]; then
+ if [[ ! -x "$(command -v sudo)" ]]; then
+ echo "Warning: failed to update certificate store: sudo is required but not found"
+ return 1
+ else
+ sudo_prefix="sudo"
+ fi
+ fi
+
+ if [[ -x "$(command -v update-ca-certificates)" ]]; then
+ eval $sudo_prefix "update-ca-certificates"
+ elif [[ -x "$(command -v update-ca-trust)" ]]; then
+ eval $sudo_prefix "update-ca-trust"
+ else
+ echo "Warning: failed to update certificate store: update-ca-certificates or update-ca-trust not found. This can happen if you're using a different runner base image."
+ return 1
+ fi
+}
+
+if [[ ! -z "$RUNNER_UPDATE_CA_CERTS" ]]; then
+ updateCerts
+fi
+
+if [[ -z "$RUNNER_MANUALLY_TRAP_SIG" ]]; then
+ run $*
+else
+ runWithManualTrap $*
+fi
\ No newline at end of file
diff --git a/ghe-runners/safe_sleep.sh b/ghe-runners/safe_sleep.sh
new file mode 100755
index 0000000..7ba5be3
--- /dev/null
+++ b/ghe-runners/safe_sleep.sh
@@ -0,0 +1,6 @@
+#!/bin/bash
+
+SECONDS=0
+while [[ $SECONDS != $1 ]]; do
+ :
+done
diff --git a/ghe-runners/svc.sh b/ghe-runners/svc.sh
new file mode 100755
index 0000000..9538155
--- /dev/null
+++ b/ghe-runners/svc.sh
@@ -0,0 +1,179 @@
+#!/bin/bash
+
+SVC_NAME="actions.runner._services.ghe-runners.service"
+SVC_NAME=${SVC_NAME// /_}
+SVC_DESCRIPTION="GitHub Actions Runner (_services.ghe-runners)"
+
+SVC_CMD=$1
+arg_2=${2}
+
+RUNNER_ROOT=`pwd`
+
+UNIT_PATH=/etc/systemd/system/${SVC_NAME}
+TEMPLATE_PATH=$GITHUB_ACTIONS_RUNNER_SERVICE_TEMPLATE
+IS_CUSTOM_TEMPLATE=0
+if [[ -z $TEMPLATE_PATH ]]; then
+ TEMPLATE_PATH=./bin/actions.runner.service.template
+else
+ IS_CUSTOM_TEMPLATE=1
+fi
+TEMP_PATH=./bin/actions.runner.service.temp
+CONFIG_PATH=.service
+
+user_id=`id -u`
+
+# systemctl must run as sudo
+# this script is a convenience wrapper around systemctl
+if [ $user_id -ne 0 ]; then
+ echo "Must run as sudo"
+ exit 1
+fi
+
+function failed()
+{
+ local error=${1:-Undefined error}
+ echo "Failed: $error" >&2
+ exit 1
+}
+
+if [ ! -f "${TEMPLATE_PATH}" ]; then
+ if [[ $IS_CUSTOM_TEMPLATE = 0 ]]; then
+ failed "Must run from runner root or install is corrupt"
+ else
+ failed "Service file at '$GITHUB_ACTIONS_RUNNER_SERVICE_TEMPLATE' using GITHUB_ACTIONS_RUNNER_SERVICE_TEMPLATE env variable is not found"
+ fi
+fi
+
+#check if we run as root
+if [[ $(id -u) != "0" ]]; then
+ echo "Failed: This script requires to run with sudo." >&2
+ exit 1
+fi
+
+function install()
+{
+ echo "Creating launch runner in ${UNIT_PATH}"
+ if [ -f "${UNIT_PATH}" ]; then
+ failed "error: exists ${UNIT_PATH}"
+ fi
+
+ if [ -f "${TEMP_PATH}" ]; then
+ rm "${TEMP_PATH}" || failed "failed to delete ${TEMP_PATH}"
+ fi
+
+ # can optionally use username supplied
+ run_as_user=${arg_2:-$SUDO_USER}
+ echo "Run as user: ${run_as_user}"
+
+ run_as_uid=$(id -u ${run_as_user}) || failed "User does not exist"
+ echo "Run as uid: ${run_as_uid}"
+
+ run_as_gid=$(id -g ${run_as_user}) || failed "Group not available"
+ echo "gid: ${run_as_gid}"
+
+ sed "s/{{User}}/${run_as_user}/g; s/{{Description}}/$(echo ${SVC_DESCRIPTION} | sed -e 's/[\/&]/\\&/g')/g; s/{{RunnerRoot}}/$(echo ${RUNNER_ROOT} | sed -e 's/[\/&]/\\&/g')/g;" "${TEMPLATE_PATH}" > "${TEMP_PATH}" || failed "failed to create replacement temp file"
+ mv "${TEMP_PATH}" "${UNIT_PATH}" || failed "failed to copy unit file"
+
+ # Recent Fedora based Linux (CentOS/Redhat) has SELinux enabled by default
+ # We need to restore security context on the unit file we added otherwise SystemD have no access to it.
+ command -v getenforce > /dev/null
+ if [ $? -eq 0 ]
+ then
+ selinuxEnabled=$(getenforce)
+ if [[ $selinuxEnabled == "Enforcing" ]]
+ then
+ # SELinux is enabled, we will need to Restore SELinux Context for the service file
+ restorecon -r -v "${UNIT_PATH}" || failed "failed to restore SELinux context on ${UNIT_PATH}"
+ fi
+ fi
+
+ # unit file should not be executable and world writable
+ chmod 664 "${UNIT_PATH}" || failed "failed to set permissions on ${UNIT_PATH}"
+ systemctl daemon-reload || failed "failed to reload daemons"
+
+ # Since we started with sudo, runsvc.sh will be owned by root. Change this to current login user.
+ cp ./bin/runsvc.sh ./runsvc.sh || failed "failed to copy runsvc.sh"
+ chown ${run_as_uid}:${run_as_gid} ./runsvc.sh || failed "failed to set owner for runsvc.sh"
+ chmod 755 ./runsvc.sh || failed "failed to set permission for runsvc.sh"
+
+ systemctl enable ${SVC_NAME} || failed "failed to enable ${SVC_NAME}"
+
+ echo "${SVC_NAME}" > ${CONFIG_PATH} || failed "failed to create .service file"
+ chown ${run_as_uid}:${run_as_gid} ${CONFIG_PATH} || failed "failed to set permission for ${CONFIG_PATH}"
+}
+
+function start()
+{
+ systemctl start ${SVC_NAME} || failed "failed to start ${SVC_NAME}"
+ status
+}
+
+function stop()
+{
+ systemctl stop ${SVC_NAME} || failed "failed to stop ${SVC_NAME}"
+ status
+}
+
+function uninstall()
+{
+ if service_exists; then
+ stop
+ systemctl disable ${SVC_NAME} || failed "failed to disable ${SVC_NAME}"
+ rm "${UNIT_PATH}" || failed "failed to delete ${UNIT_PATH}"
+ else
+ echo "Service ${SVC_NAME} is not installed"
+ fi
+ if [ -f "${CONFIG_PATH}" ]; then
+ rm "${CONFIG_PATH}" || failed "failed to delete ${CONFIG_PATH}"
+ fi
+ systemctl daemon-reload || failed "failed to reload daemons"
+}
+
+function service_exists() {
+ if [ -f "${UNIT_PATH}" ]; then
+ return 0
+ else
+ return 1
+ fi
+}
+
+function status()
+{
+ if service_exists; then
+ echo
+ echo "${UNIT_PATH}"
+ else
+ echo
+ echo "not installed"
+ echo
+ exit 1
+ fi
+
+ systemctl --no-pager status ${SVC_NAME}
+}
+
+function usage()
+{
+ echo
+ echo Usage:
+ echo "./svc.sh [install, start, stop, status, uninstall]"
+ echo "Commands:"
+ echo " install [user]: Install runner service as Root or specified user."
+ echo " start: Manually start the runner service."
+ echo " stop: Manually stop the runner service."
+ echo " status: Display status of runner service."
+ echo " uninstall: Uninstall runner service."
+ echo
+}
+
+case $SVC_CMD in
+ "install") install;;
+ "status") status;;
+ "uninstall") uninstall;;
+ "start") start;;
+ "stop") stop;;
+ "status") status;;
+ *) usage;;
+esac
+
+exit 0
diff --git a/main.tf b/main.tf
index d7e0661..1389279 100644
--- a/main.tf
+++ b/main.tf
@@ -8,7 +8,8 @@ locals {
"image-pipeline-ansible-playbooks",
]
workspace_repos = [
- "automation-repos"
+ "automation-repos",
+ "ghe-runners"
]
all_repos = concat(
local.pipeline_repos,
diff --git a/supervisor/ghe-runners.conf b/supervisor/ghe-runners.conf
new file mode 100755
index 0000000..b730198
--- /dev/null
+++ b/supervisor/ghe-runners.conf
@@ -0,0 +1,16 @@
+[program:ghe-runners]
+directory=/apps/terraform/workspaces/arnol377/git/ghe-runner/ghe-runners ; directory to cwd to before exec (def no cwd)
+command=/apps/terraform/workspaces/arnol377/git/ghe-runner/ghe-runners/run.sh
+;numprocs=1 ; number of processes copies to start (def 1)
+autostart=true ; start at supervisord start (default: true)
+;startsecs=1 ; # of secs prog must stay up to be running (def. 1)
+startretries=3 ; max # of serial start failures when starting (default 3)
+autorestart=true
+stdout_logfile=/apps/terraform/workspaces/arnol377/git/ghe-runner/ghe-runners/runner.log ; stdout log path, NONE for none; default AUTO
+stdout_logfile_maxbytes=1MB ; max # logfile bytes b4 rotation (default 50MB)
+stdout_logfile_backups=10 ; # of stdout logfile backups (0 means none, default 10)
+stdout_capture_maxbytes=1MB ; number of bytes in 'capturemode' (default 0)
+stderr_logfile=/apps/terraform/workspaces/arnol377/git/ghe-runner/ghe-runners/runner_error.log ; stderr log path, NONE for none; default AUTO
+stderr_logfile_maxbytes=1MB ; max # logfile bytes b4 rotation (default 50MB)
+stderr_logfile_backups=10 ; # of stderr logfile backups (0 means none, default 10)
+stderr_capture_maxbytes=1MB ; number of bytes in 'capturemode' (default 0)
\ No newline at end of file
diff --git a/terraform.tfstate b/terraform.tfstate
index 04bbc13..e69de29 100644
--- a/terraform.tfstate
+++ b/terraform.tfstate
@@ -1,2946 +0,0 @@
-{
- "version": 4,
- "terraform_version": "1.9.4",
- "serial": 672,
- "lineage": "e78a4e10-cf81-43c7-3669-9d54a726a442",
- "outputs": {
- "secrets": {
- "value": {
- "AWS_ACCESS_KEY_ID": {
- "set": true,
- "value": "ASIATK6SR2K27JMKCZWF"
- },
- "AWS_SECRET_ACCESS_KEY": {
- "set": true,
- "value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor"
- },
- "AWS_SESSION_TOKEN": {
- "set": true,
- "value": "IQoJb3JpZ2luX2VjENH//////////wEaDXVzLWdvdi1lYXN0LTEiRzBFAiA1bXzDtUaBLN5c7y0DU79ZPwEM0E4X0+EsNEkZZmeYXwIhAISKrI7b1rCjPkzwjyBPMaSDzS3L4W4ty+od/ubhAojGKqADCO7//////////wEQABoMMjI5Njg1NDQ5Mzk3Igwmc2r9x6ZCLaA7/MEq9AIn8ArKVhts60a/S1MLFUyRP51IOkdolpyA7zc9S94I/unEmMFaFPiU7M1idu9dV6bXIUOM+gOiK+dAivKOPy9/OdqCnzA08RCbCpK15MPd+mb+jFNJizk6tU+ycyMtWrp7XeanqcQu64OWUi35zROZG2x/x7OAXv2jAMM4/NyAqg+PxM8coqkybWLNsjyb5SgD7PkXv0uj6vaXYzKuQGI3PRifAr6pwPe+PN7KX/P7A0PKWXKGBjKQTU+AMgJTcgyJLVleqfqlEwNr4eji+zbBn7zTOVVmwjMqPrYM4XuxEiNYyJTKpHAsk3j2KT//+Kmq51k1piaZa4t1IuHp5SGKHHKU0HXwDiKYtNXM6ayDrdUbp5TTCxWnrCklRiXVvAjOQ2PAcMEPIgOn1pNTbnmuMka965F/iQH4ccg8bjzSZrRN8qQfRtMxGh/1h9FfqcGrEWXQ5WtlT539I3G7gBclRCbn3owJfNvAY3cRkA6ZKlR86iMw/u/9tQY6pgFKYCO+WJ8W+csYeLNQEcWy2DMSUNEkO373V6iMwt8WZ6BjZbWbbYH/624tSxca6zvTN8GjkUIykgWgHagHsSQlHm4qDiDsPsEQvOGA3A6UA/q3x8s4n7VSMRDiSNDlCAPbnx12H3t6Zsga2RnfDAWZ5cdnFJPxwZTI2dLpOCUKkcOcSHNXCpB1mqGFAXEk+etEgInN2urj6+Gt4Ad38TCiLCJ16dB8"
- },
- "GITHUB_TOKEN": {
- "set": true,
- "value": "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"
- }
- },
- "type": [
- "object",
- {
- "AWS_ACCESS_KEY_ID": [
- "object",
- {
- "set": "bool",
- "value": "string"
- }
- ],
- "AWS_SECRET_ACCESS_KEY": [
- "object",
- {
- "set": "bool",
- "value": "string"
- }
- ],
- "AWS_SESSION_TOKEN": [
- "object",
- {
- "set": "bool",
- "value": "string"
- }
- ],
- "GITHUB_TOKEN": [
- "object",
- {
- "set": "bool",
- "value": "string"
- }
- ]
- }
- ]
- }
- },
- "resources": [
- {
- "module": "module.env_var[\"AWS_ACCESS_KEY_ID\"]",
- "mode": "data",
- "type": "external",
- "name": "var",
- "provider": "provider[\"registry.terraform.io/hashicorp/external\"]",
- "instances": [
- {
- "schema_version": 0,
- "attributes": {
- "id": "-",
- "program": [
- "python",
- ".terraform/modules/env_var/env-var.py"
- ],
- "query": {
- "nonce": "Y0C1xpRh1PYQNUE9",
- "var": "AWS_ACCESS_KEY_ID"
- },
- "result": {
- "value": "ASIATK6SR2K27JMKCZWF",
- "varset": "set"
- },
- "working_dir": null
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.env_var[\"AWS_ACCESS_KEY_ID\"]",
- "mode": "managed",
- "type": "random_string",
- "name": "random",
- "provider": "provider[\"registry.terraform.io/hashicorp/random\"]",
- "instances": [
- {
- "schema_version": 2,
- "attributes": {
- "id": "Y0C1xpRh1PYQNUE9",
- "keepers": null,
- "length": 16,
- "lower": true,
- "min_lower": 0,
- "min_numeric": 0,
- "min_special": 0,
- "min_upper": 0,
- "number": true,
- "numeric": true,
- "override_special": "/@£$",
- "result": "Y0C1xpRh1PYQNUE9",
- "special": true,
- "upper": true
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.env_var[\"AWS_SECRET_ACCESS_KEY\"]",
- "mode": "data",
- "type": "external",
- "name": "var",
- "provider": "provider[\"registry.terraform.io/hashicorp/external\"]",
- "instances": [
- {
- "schema_version": 0,
- "attributes": {
- "id": "-",
- "program": [
- "python",
- ".terraform/modules/env_var/env-var.py"
- ],
- "query": {
- "nonce": "ormbyBD�p9Uz6Xmu",
- "var": "AWS_SECRET_ACCESS_KEY"
- },
- "result": {
- "value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor",
- "varset": "set"
- },
- "working_dir": null
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.env_var[\"AWS_SECRET_ACCESS_KEY\"]",
- "mode": "managed",
- "type": "random_string",
- "name": "random",
- "provider": "provider[\"registry.terraform.io/hashicorp/random\"]",
- "instances": [
- {
- "schema_version": 2,
- "attributes": {
- "id": "ormbyBD�p9Uz6Xmu",
- "keepers": null,
- "length": 16,
- "lower": true,
- "min_lower": 0,
- "min_numeric": 0,
- "min_special": 0,
- "min_upper": 0,
- "number": true,
- "numeric": true,
- "override_special": "/@£$",
- "result": "ormbyBD�p9Uz6Xmu",
- "special": true,
- "upper": true
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.env_var[\"AWS_SESSION_TOKEN\"]",
- "mode": "data",
- "type": "external",
- "name": "var",
- "provider": "provider[\"registry.terraform.io/hashicorp/external\"]",
- "instances": [
- {
- "schema_version": 0,
- "attributes": {
- "id": "-",
- "program": [
- "python",
- ".terraform/modules/env_var/env-var.py"
- ],
- "query": {
- "nonce": "UyZS3NU1oQ4Z6W�a",
- "var": "AWS_SESSION_TOKEN"
- },
- "result": {
- "value": "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",
- "varset": "set"
- },
- "working_dir": null
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.env_var[\"AWS_SESSION_TOKEN\"]",
- "mode": "managed",
- "type": "random_string",
- "name": "random",
- "provider": "provider[\"registry.terraform.io/hashicorp/random\"]",
- "instances": [
- {
- "schema_version": 2,
- "attributes": {
- "id": "UyZS3NU1oQ4Z6W�a",
- "keepers": null,
- "length": 16,
- "lower": true,
- "min_lower": 0,
- "min_numeric": 0,
- "min_special": 0,
- "min_upper": 0,
- "number": true,
- "numeric": true,
- "override_special": "/@£$",
- "result": "UyZS3NU1oQ4Z6W�a",
- "special": true,
- "upper": true
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.env_var[\"GITHUB_TOKEN\"]",
- "mode": "data",
- "type": "external",
- "name": "var",
- "provider": "provider[\"registry.terraform.io/hashicorp/external\"]",
- "instances": [
- {
- "schema_version": 0,
- "attributes": {
- "id": "-",
- "program": [
- "python",
- ".terraform/modules/env_var/env-var.py"
- ],
- "query": {
- "nonce": "J8DJ8wCKnWpL�td9",
- "var": "GITHUB_TOKEN"
- },
- "result": {
- "value": "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",
- "varset": "set"
- },
- "working_dir": null
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.env_var[\"GITHUB_TOKEN\"]",
- "mode": "managed",
- "type": "random_string",
- "name": "random",
- "provider": "provider[\"registry.terraform.io/hashicorp/random\"]",
- "instances": [
- {
- "schema_version": 2,
- "attributes": {
- "id": "J8DJ8wCKnWpL�td9",
- "keepers": null,
- "length": 16,
- "lower": true,
- "min_lower": 0,
- "min_numeric": 0,
- "min_special": 0,
- "min_upper": 0,
- "number": true,
- "numeric": true,
- "override_special": "/@£$",
- "result": "J8DJ8wCKnWpL�td9",
- "special": true,
- "upper": true
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.github_checkout",
- "mode": "managed",
- "type": "null_resource",
- "name": "git_clone",
- "provider": "provider[\"registry.terraform.io/hashicorp/null\"]",
- "instances": [
- {
- "schema_version": 0,
- "attributes": {
- "id": "8897704676140641730",
- "triggers": null
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.github_checkout",
- "mode": "managed",
- "type": "null_resource",
- "name": "git_clone_new_repo",
- "provider": "provider[\"registry.terraform.io/hashicorp/null\"]",
- "instances": [
- {
- "schema_version": 0,
- "attributes": {
- "id": "6698714341156138565",
- "triggers": null
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.github_checkout.module.internal_github_actions.data.github_organization_teams.root_teams",
- "module.github_checkout.module.internal_github_actions.data.github_ref.ref",
- "module.github_checkout.module.internal_github_actions.data.github_repository.template_repo",
- "module.github_checkout.module.internal_github_actions.data.github_user.pull_request_bypassers",
- "module.github_checkout.module.internal_github_actions.github_actions_secret.secret",
- "module.github_checkout.module.internal_github_actions.github_actions_variable.variable",
- "module.github_checkout.module.internal_github_actions.github_branch.branch",
- "module.github_checkout.module.internal_github_actions.github_branch_default.default_main_branch",
- "module.github_checkout.module.internal_github_actions.github_branch_protection.main",
- "module.github_checkout.module.internal_github_actions.github_repository.repo",
- "module.github_checkout.module.internal_github_actions.github_repository_collaborator.collaborators",
- "module.github_checkout.module.internal_github_actions.github_repository_file.codeowners",
- "module.github_checkout.module.internal_github_actions.github_repository_file.extra_files",
- "module.github_checkout.module.internal_github_actions.github_repository_file.managed_extra_files",
- "module.github_checkout.module.internal_github_actions.github_team_repository.admin",
- "module.github_checkout.null_resource.git_clone"
- ]
- }
- ]
- },
- {
- "module": "module.github_checkout.module.internal_github_actions",
- "mode": "data",
- "type": "github_organization_teams",
- "name": "root_teams",
- "provider": "provider[\"registry.terraform.io/integrations/github\"]",
- "instances": [
- {
- "index_key": 0,
- "schema_version": 0,
- "attributes": {
- "id": "MDEyOk9yZ2FuaXphdGlvbjM1",
- "results_per_page": 100,
- "root_teams_only": false,
- "summary_only": false,
- "teams": [
- {
- "description": "",
- "id": 2,
- "members": [
- "winge001",
- "pinto005",
- "garri325",
- "tanyi001",
- "desai018",
- "sivil001"
- ],
- "name": "CSVD_Admins",
- "node_id": "MDQ6VGVhbTI=",
- "parent": {
- "id": "",
- "name": "",
- "slug": ""
- },
- "privacy": "VISIBLE",
- "repositories": [],
- "slug": "csvd_admins"
- },
- {
- "description": "",
- "id": 3,
- "members": [
- "gogel001",
- "lange309",
- "dodd0306",
- "onyek002",
- "raybi001",
- "cf-user",
- "csvd-openshift",
- "svc-ansible",
- "garre343",
- "schic001",
- "garri325",
- "carro356",
- "davis323",
- "mille441",
- "harpe341",
- "quatt008",
- "akapo001",
- "bell0402",
- "agbo0001",
- "zunig011",
- "bouvi301",
- "aravi001",
- "niang001",
- "shaik005",
- "pazou001",
- "dwara001",
- "kalat002",
- "zulfi001",
- "nform001",
- "cymer001",
- "jacks404",
- "ullah302",
- "kalep001",
- "andra315",
- "lawso358",
- "owens397",
- "jezes001",
- "brow0041",
- "alade001",
- "rehma003",
- "McCoy371",
- "patel385",
- "arnol377",
- "sivil001",
- "naray007",
- "lolli001",
- "roger367"
- ],
- "name": "CSVD_Users",
- "node_id": "MDQ6VGVhbTM=",
- "parent": {
- "id": "",
- "name": "",
- "slug": ""
- },
- "privacy": "VISIBLE",
- "repositories": [
- "Legacy-Ansible-Applications",
- "Legacy-Ansible-Operations",
- "Legacy-Ansible-SAS",
- "Configuration-Novell-LDAP-CSVD",
- "Legacy-tools-for-tools",
- "Operation-Redhat-RHEL-CSVD-sudo",
- "Operation-AWS-CSVD-instance_tagging",
- "Operation-VMware-CSVD-custom_attributes",
- "Application-ClamAV-ClamAV-CSVD",
- "Operation-Amazon-CSVD-provision_ec2",
- "Operation-Ansible-CSVD-build_vars",
- "Operation-Ansible-CSVD-workflow-application_catalog",
- "Operation-Ansible-CSVD-workflow-checks",
- "Operation-Ansible-CSVD-workflow-convergence-check",
- "Operation-Ansible-CSVD-workflow-notification",
- "Operation-BMC-Atrium_Core-CSVD",
- "Operation-Cloudforms-CSVD-workflow-callbacks",
- "Operation-Redhat-CloudForms-CSVD-CICD-order",
- "Operation-Redhat-RHEL7-aws-mount-ephemeral",
- "Operation-Redhat-RHEL7-CSVD-audit",
- "Operation-Redhat-RHEL-CSVD-chrony",
- "Operation-Redhat-RHEL-CSVD-mount_disk",
- "Operation-VMware-CSVD-provision_vm",
- "Operation-Windows-OS-CSVD-mount_disk",
- "Report-Tenable-SecurityCenter-CSVD",
- "Legacy-atx-win-applications",
- "Legacy-atx-win-build",
- "Operation-Cisco-UCS-Profiles",
- "Application-Veritas-NetBackup-CSVD",
- "Legacy-atx-win-playbooks",
- "Splunk-SC4S-gomplate",
- "Operation-Red_Hat-RHEL8-CSVD-Baseline",
- "product-test-s3-bucket"
- ],
- "slug": "csvd_users"
- },
- {
- "description": "Best Team Ever!",
- "id": 4,
- "members": [
- "youss001",
- "pavul001",
- "rainw303",
- "winge001",
- "pinto005",
- "gogel001",
- "lange309",
- "dodd0306",
- "onyek002",
- "raybi001",
- "garri325",
- "vidab001",
- "conte015",
- "cymer001",
- "ullah302",
- "owens397",
- "basil307"
- ],
- "name": "csvd_test_team",
- "node_id": "MDQ6VGVhbTQ=",
- "parent": {
- "id": "",
- "name": "",
- "slug": ""
- },
- "privacy": "VISIBLE",
- "repositories": [],
- "slug": "csvd_test_team"
- },
- {
- "description": "IEB Automation team is under IEB Org",
- "id": 5,
- "members": [
- "winge001",
- "dodd0306",
- "onyek002",
- "raybi001",
- "garri325",
- "gomez385"
- ],
- "name": "IEB Automation",
- "node_id": "MDQ6VGVhbTU=",
- "parent": {
- "id": "",
- "name": "",
- "slug": ""
- },
- "privacy": "VISIBLE",
- "repositories": [
- "Operation-Windows-OS-AD-Actions",
- "Operation-Ansible-CSVD-workflow-winbuild-vmw",
- "CloudForms-SERVICE_DIALOGS",
- "CloudForms-REPORTS",
- "CloudForms-ROLES",
- "CloudForms-Email",
- "CloudForms-CSVD",
- "CloudForms-CSVD_Variables",
- "CloudForms-BUTTONS",
- "CloudForms-TAGS",
- "Operation-Redhat-RHEL7-CSVD-banners",
- "Ansible-Windows-Build-AZR",
- "Ansible-Windows-Build-Ops",
- "Ansible-Windows-Build-VMW",
- "Ansible-Windows-Image-Ops",
- "Ansible-Windows-Retirement-Ops",
- "Operation-Redhat-RHEL7-CSVD-logrotate",
- "Operation-Red_Hat-Satellite-CSVD",
- "Ansible-Windows-Development",
- "Ansible_Inventory_Setup",
- "Operation-Redhat-RHEL7-CSVD-sshd",
- "Operation-Redhat-RHEL7-CSVD-grub2",
- "Operation-CSVD-podman",
- "Operation-Redhat-RHEL7-CSVD-sendmail",
- "Operation-Red_Hat-Ansible_Tower-CSVD",
- "Operation-Redhat-RHEL7-CSVD-svc_account",
- "Operations_RHEL_OS_Configurations",
- "Operations-RHEL-Ansible",
- "Collection-Red_Hat-RHEL_Baseline-CSVD",
- "Application-Red_Hat-Ansible_Automation_Platform-CSVD",
- "Operation-Redhat-RHEL7-CSVD-systemctl",
- "Application-Splunk-Splunk_Universal_Forwarder-CSVD",
- "Operation-Amazon-CSVD-provision_services",
- "Operation-Amazon-AWS-CSVD-RHEL_AMI",
- "Operation-Red_Hat-Insights-CSVD",
- "Operation-GitHub-GitHub_Enterprise-CSVD",
- "Ansible-Windows-Build-AZR-LAB",
- "SAT6_cert_renew_PROD",
- "Application-Redhat-Satellite-CSVD-certificate-renew",
- "Operation-Microsoft-MDE_Linux",
- "Operation-Microsoft-Azure_Connected_Machine_agent",
- "Ansible-Windows-Build-AWS",
- "Application-HCL-BigFix-CSVD",
- "Application-Morpheus_Data-Morpheus-CSVD",
- "AAP-Windows-Build-AWS",
- "Ansible-Windows-Build-AWS-LAB"
- ],
- "slug": "ieb-automation"
- },
- {
- "description": "",
- "id": 62,
- "members": [
- "ojimi001",
- "short343"
- ],
- "name": "Spunk Admin",
- "node_id": "MDQ6VGVhbTYy",
- "parent": {
- "id": "",
- "name": "",
- "slug": ""
- },
- "privacy": "VISIBLE",
- "repositories": [
- "splunk-connect-for-syslog",
- "Splunk-SC4S-gomplate"
- ],
- "slug": "spunk-admin"
- },
- {
- "description": "",
- "id": 716,
- "members": [],
- "name": "csvd-automation",
- "node_id": "MDQ6VGVhbTcxNg==",
- "parent": {
- "id": "",
- "name": "",
- "slug": ""
- },
- "privacy": "VISIBLE",
- "repositories": [],
- "slug": "csvd-automation"
- }
- ]
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.github_checkout.module.internal_github_actions",
- "mode": "managed",
- "type": "github_repository",
- "name": "repo",
- "provider": "provider[\"registry.terraform.io/integrations/github\"]",
- "instances": [
- {
- "schema_version": 1,
- "attributes": {
- "allow_auto_merge": false,
- "allow_merge_commit": false,
- "allow_rebase_merge": false,
- "allow_squash_merge": true,
- "allow_update_branch": false,
- "archive_on_destroy": true,
- "archived": false,
- "auto_init": true,
- "default_branch": "main",
- "delete_branch_on_merge": true,
- "description": "Imported External Github Actions Repository",
- "etag": "W/\"76ffc347af83201a93efffd0c85c896a351c1c1c12f0e4eb5c85bc94074a4624\"",
- "full_name": "CSVD/gh-actions-checkout",
- "git_clone_url": "git://github.e.it.census.gov/CSVD/gh-actions-checkout.git",
- "gitignore_template": "Terraform",
- "has_discussions": false,
- "has_downloads": false,
- "has_issues": false,
- "has_projects": true,
- "has_wiki": true,
- "homepage_url": "",
- "html_url": "https://github.e.it.census.gov/CSVD/gh-actions-checkout",
- "http_clone_url": "https://github.e.it.census.gov/CSVD/gh-actions-checkout.git",
- "id": "gh-actions-checkout",
- "ignore_vulnerability_alerts_during_read": null,
- "is_template": false,
- "license_template": null,
- "merge_commit_message": "PR_TITLE",
- "merge_commit_title": "MERGE_MESSAGE",
- "name": "gh-actions-checkout",
- "node_id": "MDEwOlJlcG9zaXRvcnkxMDA5",
- "pages": [],
- "primary_language": "",
- "private": false,
- "repo_id": 1009,
- "security_and_analysis": [
- {
- "advanced_security": [
- {
- "status": "disabled"
- }
- ],
- "secret_scanning": [
- {
- "status": "disabled"
- }
- ],
- "secret_scanning_push_protection": [
- {
- "status": "disabled"
- }
- ]
- }
- ],
- "squash_merge_commit_message": "COMMIT_MESSAGES",
- "squash_merge_commit_title": "COMMIT_OR_PR_TITLE",
- "ssh_clone_url": "git@github.e.it.census.gov:CSVD/gh-actions-checkout.git",
- "svn_url": "https://github.e.it.census.gov/CSVD/gh-actions-checkout",
- "template": [],
- "topics": [
- "github-actions"
- ],
- "visibility": "public",
- "vulnerability_alerts": false,
- "web_commit_signoff_required": false
- },
- "sensitive_attributes": [],
- "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ=="
- }
- ]
- },
- {
- "module": "module.github_script",
- "mode": "managed",
- "type": "null_resource",
- "name": "git_clone",
- "provider": "provider[\"registry.terraform.io/hashicorp/null\"]",
- "instances": [
- {
- "schema_version": 0,
- "attributes": {
- "id": "1223174279697704692",
- "triggers": null
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.github_script",
- "mode": "managed",
- "type": "null_resource",
- "name": "git_clone_new_repo",
- "provider": "provider[\"registry.terraform.io/hashicorp/null\"]",
- "instances": [
- {
- "schema_version": 0,
- "attributes": {
- "id": "4614869244027441992",
- "triggers": null
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.github_script.module.internal_github_actions.data.github_organization_teams.root_teams",
- "module.github_script.module.internal_github_actions.data.github_ref.ref",
- "module.github_script.module.internal_github_actions.data.github_repository.template_repo",
- "module.github_script.module.internal_github_actions.data.github_user.pull_request_bypassers",
- "module.github_script.module.internal_github_actions.github_actions_secret.secret",
- "module.github_script.module.internal_github_actions.github_actions_variable.variable",
- "module.github_script.module.internal_github_actions.github_branch.branch",
- "module.github_script.module.internal_github_actions.github_branch_default.default_main_branch",
- "module.github_script.module.internal_github_actions.github_branch_protection.main",
- "module.github_script.module.internal_github_actions.github_repository.repo",
- "module.github_script.module.internal_github_actions.github_repository_collaborator.collaborators",
- "module.github_script.module.internal_github_actions.github_repository_file.codeowners",
- "module.github_script.module.internal_github_actions.github_repository_file.extra_files",
- "module.github_script.module.internal_github_actions.github_repository_file.managed_extra_files",
- "module.github_script.module.internal_github_actions.github_team_repository.admin",
- "module.github_script.null_resource.git_clone"
- ]
- }
- ]
- },
- {
- "module": "module.github_script.module.internal_github_actions",
- "mode": "data",
- "type": "github_organization_teams",
- "name": "root_teams",
- "provider": "provider[\"registry.terraform.io/integrations/github\"]",
- "instances": [
- {
- "index_key": 0,
- "schema_version": 0,
- "attributes": {
- "id": "MDEyOk9yZ2FuaXphdGlvbjM1",
- "results_per_page": 100,
- "root_teams_only": false,
- "summary_only": false,
- "teams": [
- {
- "description": "",
- "id": 2,
- "members": [
- "winge001",
- "pinto005",
- "garri325",
- "tanyi001",
- "desai018",
- "sivil001"
- ],
- "name": "CSVD_Admins",
- "node_id": "MDQ6VGVhbTI=",
- "parent": {
- "id": "",
- "name": "",
- "slug": ""
- },
- "privacy": "VISIBLE",
- "repositories": [],
- "slug": "csvd_admins"
- },
- {
- "description": "",
- "id": 3,
- "members": [
- "gogel001",
- "lange309",
- "dodd0306",
- "onyek002",
- "raybi001",
- "cf-user",
- "csvd-openshift",
- "svc-ansible",
- "garre343",
- "schic001",
- "garri325",
- "carro356",
- "davis323",
- "mille441",
- "harpe341",
- "quatt008",
- "akapo001",
- "bell0402",
- "agbo0001",
- "zunig011",
- "bouvi301",
- "aravi001",
- "niang001",
- "shaik005",
- "pazou001",
- "dwara001",
- "kalat002",
- "zulfi001",
- "nform001",
- "cymer001",
- "jacks404",
- "ullah302",
- "kalep001",
- "andra315",
- "lawso358",
- "owens397",
- "jezes001",
- "brow0041",
- "alade001",
- "rehma003",
- "McCoy371",
- "patel385",
- "arnol377",
- "sivil001",
- "naray007",
- "lolli001",
- "roger367"
- ],
- "name": "CSVD_Users",
- "node_id": "MDQ6VGVhbTM=",
- "parent": {
- "id": "",
- "name": "",
- "slug": ""
- },
- "privacy": "VISIBLE",
- "repositories": [
- "Legacy-Ansible-Applications",
- "Legacy-Ansible-Operations",
- "Legacy-Ansible-SAS",
- "Configuration-Novell-LDAP-CSVD",
- "Legacy-tools-for-tools",
- "Operation-Redhat-RHEL-CSVD-sudo",
- "Operation-AWS-CSVD-instance_tagging",
- "Operation-VMware-CSVD-custom_attributes",
- "Application-ClamAV-ClamAV-CSVD",
- "Operation-Amazon-CSVD-provision_ec2",
- "Operation-Ansible-CSVD-build_vars",
- "Operation-Ansible-CSVD-workflow-application_catalog",
- "Operation-Ansible-CSVD-workflow-checks",
- "Operation-Ansible-CSVD-workflow-convergence-check",
- "Operation-Ansible-CSVD-workflow-notification",
- "Operation-BMC-Atrium_Core-CSVD",
- "Operation-Cloudforms-CSVD-workflow-callbacks",
- "Operation-Redhat-CloudForms-CSVD-CICD-order",
- "Operation-Redhat-RHEL7-aws-mount-ephemeral",
- "Operation-Redhat-RHEL7-CSVD-audit",
- "Operation-Redhat-RHEL-CSVD-chrony",
- "Operation-Redhat-RHEL-CSVD-mount_disk",
- "Operation-VMware-CSVD-provision_vm",
- "Operation-Windows-OS-CSVD-mount_disk",
- "Report-Tenable-SecurityCenter-CSVD",
- "Legacy-atx-win-applications",
- "Legacy-atx-win-build",
- "Operation-Cisco-UCS-Profiles",
- "Application-Veritas-NetBackup-CSVD",
- "Legacy-atx-win-playbooks",
- "Splunk-SC4S-gomplate",
- "Operation-Red_Hat-RHEL8-CSVD-Baseline",
- "product-test-s3-bucket"
- ],
- "slug": "csvd_users"
- },
- {
- "description": "Best Team Ever!",
- "id": 4,
- "members": [
- "youss001",
- "pavul001",
- "rainw303",
- "winge001",
- "pinto005",
- "gogel001",
- "lange309",
- "dodd0306",
- "onyek002",
- "raybi001",
- "garri325",
- "vidab001",
- "conte015",
- "cymer001",
- "ullah302",
- "owens397",
- "basil307"
- ],
- "name": "csvd_test_team",
- "node_id": "MDQ6VGVhbTQ=",
- "parent": {
- "id": "",
- "name": "",
- "slug": ""
- },
- "privacy": "VISIBLE",
- "repositories": [],
- "slug": "csvd_test_team"
- },
- {
- "description": "IEB Automation team is under IEB Org",
- "id": 5,
- "members": [
- "winge001",
- "dodd0306",
- "onyek002",
- "raybi001",
- "garri325",
- "gomez385"
- ],
- "name": "IEB Automation",
- "node_id": "MDQ6VGVhbTU=",
- "parent": {
- "id": "",
- "name": "",
- "slug": ""
- },
- "privacy": "VISIBLE",
- "repositories": [
- "Operation-Windows-OS-AD-Actions",
- "Operation-Ansible-CSVD-workflow-winbuild-vmw",
- "CloudForms-SERVICE_DIALOGS",
- "CloudForms-REPORTS",
- "CloudForms-ROLES",
- "CloudForms-Email",
- "CloudForms-CSVD",
- "CloudForms-CSVD_Variables",
- "CloudForms-BUTTONS",
- "CloudForms-TAGS",
- "Operation-Redhat-RHEL7-CSVD-banners",
- "Ansible-Windows-Build-AZR",
- "Ansible-Windows-Build-Ops",
- "Ansible-Windows-Build-VMW",
- "Ansible-Windows-Image-Ops",
- "Ansible-Windows-Retirement-Ops",
- "Operation-Redhat-RHEL7-CSVD-logrotate",
- "Operation-Red_Hat-Satellite-CSVD",
- "Ansible-Windows-Development",
- "Ansible_Inventory_Setup",
- "Operation-Redhat-RHEL7-CSVD-sshd",
- "Operation-Redhat-RHEL7-CSVD-grub2",
- "Operation-CSVD-podman",
- "Operation-Redhat-RHEL7-CSVD-sendmail",
- "Operation-Red_Hat-Ansible_Tower-CSVD",
- "Operation-Redhat-RHEL7-CSVD-svc_account",
- "Operations_RHEL_OS_Configurations",
- "Operations-RHEL-Ansible",
- "Collection-Red_Hat-RHEL_Baseline-CSVD",
- "Application-Red_Hat-Ansible_Automation_Platform-CSVD",
- "Operation-Redhat-RHEL7-CSVD-systemctl",
- "Application-Splunk-Splunk_Universal_Forwarder-CSVD",
- "Operation-Amazon-CSVD-provision_services",
- "Operation-Amazon-AWS-CSVD-RHEL_AMI",
- "Operation-Red_Hat-Insights-CSVD",
- "Operation-GitHub-GitHub_Enterprise-CSVD",
- "Ansible-Windows-Build-AZR-LAB",
- "SAT6_cert_renew_PROD",
- "Application-Redhat-Satellite-CSVD-certificate-renew",
- "Operation-Microsoft-MDE_Linux",
- "Operation-Microsoft-Azure_Connected_Machine_agent",
- "Ansible-Windows-Build-AWS",
- "Application-HCL-BigFix-CSVD",
- "Application-Morpheus_Data-Morpheus-CSVD",
- "AAP-Windows-Build-AWS",
- "Ansible-Windows-Build-AWS-LAB"
- ],
- "slug": "ieb-automation"
- },
- {
- "description": "",
- "id": 62,
- "members": [
- "ojimi001",
- "short343"
- ],
- "name": "Spunk Admin",
- "node_id": "MDQ6VGVhbTYy",
- "parent": {
- "id": "",
- "name": "",
- "slug": ""
- },
- "privacy": "VISIBLE",
- "repositories": [
- "splunk-connect-for-syslog",
- "Splunk-SC4S-gomplate"
- ],
- "slug": "spunk-admin"
- },
- {
- "description": "",
- "id": 716,
- "members": [],
- "name": "csvd-automation",
- "node_id": "MDQ6VGVhbTcxNg==",
- "parent": {
- "id": "",
- "name": "",
- "slug": ""
- },
- "privacy": "VISIBLE",
- "repositories": [],
- "slug": "csvd-automation"
- }
- ]
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.github_script.module.internal_github_actions",
- "mode": "managed",
- "type": "github_repository",
- "name": "repo",
- "provider": "provider[\"registry.terraform.io/integrations/github\"]",
- "instances": [
- {
- "schema_version": 1,
- "attributes": {
- "allow_auto_merge": false,
- "allow_merge_commit": false,
- "allow_rebase_merge": false,
- "allow_squash_merge": true,
- "allow_update_branch": false,
- "archive_on_destroy": true,
- "archived": false,
- "auto_init": true,
- "default_branch": "main",
- "delete_branch_on_merge": true,
- "description": "Imported External Github Actions Repository",
- "etag": "W/\"173e1ef79d94b634e9f8e6f27f5e0ca8cc7ee3e1f6a6fc4de0a45f04a57bfeb6\"",
- "full_name": "CSVD/gh-actions-github-script",
- "git_clone_url": "git://github.e.it.census.gov/CSVD/gh-actions-github-script.git",
- "gitignore_template": "Terraform",
- "has_discussions": false,
- "has_downloads": false,
- "has_issues": false,
- "has_projects": true,
- "has_wiki": true,
- "homepage_url": "",
- "html_url": "https://github.e.it.census.gov/CSVD/gh-actions-github-script",
- "http_clone_url": "https://github.e.it.census.gov/CSVD/gh-actions-github-script.git",
- "id": "gh-actions-github-script",
- "ignore_vulnerability_alerts_during_read": null,
- "is_template": false,
- "license_template": null,
- "merge_commit_message": "PR_TITLE",
- "merge_commit_title": "MERGE_MESSAGE",
- "name": "gh-actions-github-script",
- "node_id": "MDEwOlJlcG9zaXRvcnkxMDA2",
- "pages": [],
- "primary_language": "",
- "private": false,
- "repo_id": 1006,
- "security_and_analysis": [
- {
- "advanced_security": [
- {
- "status": "disabled"
- }
- ],
- "secret_scanning": [
- {
- "status": "disabled"
- }
- ],
- "secret_scanning_push_protection": [
- {
- "status": "disabled"
- }
- ]
- }
- ],
- "squash_merge_commit_message": "COMMIT_MESSAGES",
- "squash_merge_commit_title": "COMMIT_OR_PR_TITLE",
- "ssh_clone_url": "git@github.e.it.census.gov:CSVD/gh-actions-github-script.git",
- "svn_url": "https://github.e.it.census.gov/CSVD/gh-actions-github-script",
- "template": [],
- "topics": [
- "github-actions"
- ],
- "visibility": "public",
- "vulnerability_alerts": false,
- "web_commit_signoff_required": false
- },
- "sensitive_attributes": [],
- "private": "eyJzY2hlbWFfdmVyc2lvbiI6IjEifQ=="
- }
- ]
- },
- {
- "module": "module.repo_secrets[\"automation-repos\"]",
- "mode": "managed",
- "type": "github_actions_secret",
- "name": "secret",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "AWS_SECRET_ACCESS_KEY",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-16 16:03:23 +0000 UTC",
- "encrypted_value": "",
- "id": "automation-repos:AWS_SECRET_ACCESS_KEY",
- "plaintext_value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor",
- "repository": "automation-repos",
- "secret_name": "AWS_SECRET_ACCESS_KEY",
- "updated_at": "2024-08-16 16:03:23 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- },
- {
- "index_key": "AWS_SESSION_TOKEN",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-16 16:03:12 +0000 UTC",
- "encrypted_value": "",
- "id": "automation-repos:AWS_SESSION_TOKEN",
- "plaintext_value": "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",
- "repository": "automation-repos",
- "secret_name": "AWS_SESSION_TOKEN",
- "updated_at": "2024-08-16 16:03:12 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- },
- {
- "index_key": "GH_TOKEN",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-09 19:55:08 +0000 UTC",
- "encrypted_value": "",
- "id": "automation-repos:GH_TOKEN",
- "plaintext_value": "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",
- "repository": "automation-repos",
- "secret_name": "GH_TOKEN",
- "updated_at": "2024-08-09 19:55:08 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- }
- ]
- },
- {
- "module": "module.repo_secrets[\"automation-repos\"]",
- "mode": "managed",
- "type": "github_actions_variable",
- "name": "variable",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "AWS_ACCESS_KEY_ID",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-13 15:58:54 +0000 UTC",
- "id": "automation-repos:AWS_ACCESS_KEY_ID",
- "repository": "automation-repos",
- "updated_at": "2024-08-16 16:03:07 +0000 UTC",
- "value": "ASIATK6SR2K27JMKCZWF",
- "variable_name": "AWS_ACCESS_KEY_ID"
- },
- "sensitive_attributes": [],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- }
- ]
- },
- {
- "module": "module.repo_secrets[\"aws-image-pipeline\"]",
- "mode": "managed",
- "type": "github_actions_secret",
- "name": "secret",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "AWS_SECRET_ACCESS_KEY",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-16 16:03:26 +0000 UTC",
- "encrypted_value": "",
- "id": "aws-image-pipeline:AWS_SECRET_ACCESS_KEY",
- "plaintext_value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor",
- "repository": "aws-image-pipeline",
- "secret_name": "AWS_SECRET_ACCESS_KEY",
- "updated_at": "2024-08-16 16:03:26 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- },
- {
- "index_key": "AWS_SESSION_TOKEN",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-16 16:03:19 +0000 UTC",
- "encrypted_value": "",
- "id": "aws-image-pipeline:AWS_SESSION_TOKEN",
- "plaintext_value": "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",
- "repository": "aws-image-pipeline",
- "secret_name": "AWS_SESSION_TOKEN",
- "updated_at": "2024-08-16 16:03:19 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- },
- {
- "index_key": "GH_TOKEN",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-09 19:55:11 +0000 UTC",
- "encrypted_value": "",
- "id": "aws-image-pipeline:GH_TOKEN",
- "plaintext_value": "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",
- "repository": "aws-image-pipeline",
- "secret_name": "GH_TOKEN",
- "updated_at": "2024-08-09 19:55:11 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- }
- ]
- },
- {
- "module": "module.repo_secrets[\"aws-image-pipeline\"]",
- "mode": "managed",
- "type": "github_actions_variable",
- "name": "variable",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "AWS_ACCESS_KEY_ID",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-13 15:59:56 +0000 UTC",
- "id": "aws-image-pipeline:AWS_ACCESS_KEY_ID",
- "repository": "aws-image-pipeline",
- "updated_at": "2024-08-16 16:03:04 +0000 UTC",
- "value": "ASIATK6SR2K27JMKCZWF",
- "variable_name": "AWS_ACCESS_KEY_ID"
- },
- "sensitive_attributes": [],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- }
- ]
- },
- {
- "module": "module.repo_secrets[\"image-pipeline-ansible-playbooks\"]",
- "mode": "managed",
- "type": "github_actions_secret",
- "name": "secret",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "AWS_SECRET_ACCESS_KEY",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-16 16:03:11 +0000 UTC",
- "encrypted_value": "",
- "id": "image-pipeline-ansible-playbooks:AWS_SECRET_ACCESS_KEY",
- "plaintext_value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor",
- "repository": "image-pipeline-ansible-playbooks",
- "secret_name": "AWS_SECRET_ACCESS_KEY",
- "updated_at": "2024-08-16 16:03:11 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- },
- {
- "index_key": "AWS_SESSION_TOKEN",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-16 16:03:22 +0000 UTC",
- "encrypted_value": "",
- "id": "image-pipeline-ansible-playbooks:AWS_SESSION_TOKEN",
- "plaintext_value": "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",
- "repository": "image-pipeline-ansible-playbooks",
- "secret_name": "AWS_SESSION_TOKEN",
- "updated_at": "2024-08-16 16:03:22 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- },
- {
- "index_key": "GH_TOKEN",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-09 19:55:02 +0000 UTC",
- "encrypted_value": "",
- "id": "image-pipeline-ansible-playbooks:GH_TOKEN",
- "plaintext_value": "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",
- "repository": "image-pipeline-ansible-playbooks",
- "secret_name": "GH_TOKEN",
- "updated_at": "2024-08-09 19:55:02 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- }
- ]
- },
- {
- "module": "module.repo_secrets[\"image-pipeline-ansible-playbooks\"]",
- "mode": "managed",
- "type": "github_actions_variable",
- "name": "variable",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "AWS_ACCESS_KEY_ID",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-13 15:58:50 +0000 UTC",
- "id": "image-pipeline-ansible-playbooks:AWS_ACCESS_KEY_ID",
- "repository": "image-pipeline-ansible-playbooks",
- "updated_at": "2024-08-16 16:03:09 +0000 UTC",
- "value": "ASIATK6SR2K27JMKCZWF",
- "variable_name": "AWS_ACCESS_KEY_ID"
- },
- "sensitive_attributes": [],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- }
- ]
- },
- {
- "module": "module.repo_secrets[\"image-pipeline-goss-testing\"]",
- "mode": "managed",
- "type": "github_actions_secret",
- "name": "secret",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "AWS_SECRET_ACCESS_KEY",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-16 16:03:18 +0000 UTC",
- "encrypted_value": "",
- "id": "image-pipeline-goss-testing:AWS_SECRET_ACCESS_KEY",
- "plaintext_value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor",
- "repository": "image-pipeline-goss-testing",
- "secret_name": "AWS_SECRET_ACCESS_KEY",
- "updated_at": "2024-08-16 16:03:18 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- },
- {
- "index_key": "AWS_SESSION_TOKEN",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-16 16:03:20 +0000 UTC",
- "encrypted_value": "",
- "id": "image-pipeline-goss-testing:AWS_SESSION_TOKEN",
- "plaintext_value": "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",
- "repository": "image-pipeline-goss-testing",
- "secret_name": "AWS_SESSION_TOKEN",
- "updated_at": "2024-08-16 16:03:20 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- },
- {
- "index_key": "GH_TOKEN",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-09 19:55:22 +0000 UTC",
- "encrypted_value": "",
- "id": "image-pipeline-goss-testing:GH_TOKEN",
- "plaintext_value": "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",
- "repository": "image-pipeline-goss-testing",
- "secret_name": "GH_TOKEN",
- "updated_at": "2024-08-09 19:55:22 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- }
- ]
- },
- {
- "module": "module.repo_secrets[\"image-pipeline-goss-testing\"]",
- "mode": "managed",
- "type": "github_actions_variable",
- "name": "variable",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "AWS_ACCESS_KEY_ID",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-13 15:58:55 +0000 UTC",
- "id": "image-pipeline-goss-testing:AWS_ACCESS_KEY_ID",
- "repository": "image-pipeline-goss-testing",
- "updated_at": "2024-08-16 16:03:06 +0000 UTC",
- "value": "ASIATK6SR2K27JMKCZWF",
- "variable_name": "AWS_ACCESS_KEY_ID"
- },
- "sensitive_attributes": [],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- }
- ]
- },
- {
- "module": "module.repo_secrets[\"linux-image-pipeline\"]",
- "mode": "managed",
- "type": "github_actions_secret",
- "name": "secret",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "AWS_SECRET_ACCESS_KEY",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-16 16:03:25 +0000 UTC",
- "encrypted_value": "",
- "id": "linux-image-pipeline:AWS_SECRET_ACCESS_KEY",
- "plaintext_value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor",
- "repository": "linux-image-pipeline",
- "secret_name": "AWS_SECRET_ACCESS_KEY",
- "updated_at": "2024-08-16 16:03:25 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- },
- {
- "index_key": "AWS_SESSION_TOKEN",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-16 16:03:13 +0000 UTC",
- "encrypted_value": "",
- "id": "linux-image-pipeline:AWS_SESSION_TOKEN",
- "plaintext_value": "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",
- "repository": "linux-image-pipeline",
- "secret_name": "AWS_SESSION_TOKEN",
- "updated_at": "2024-08-16 16:03:13 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- },
- {
- "index_key": "GH_TOKEN",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-09 19:55:24 +0000 UTC",
- "encrypted_value": "",
- "id": "linux-image-pipeline:GH_TOKEN",
- "plaintext_value": "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",
- "repository": "linux-image-pipeline",
- "secret_name": "GH_TOKEN",
- "updated_at": "2024-08-09 19:55:24 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- }
- ]
- },
- {
- "module": "module.repo_secrets[\"linux-image-pipeline\"]",
- "mode": "managed",
- "type": "github_actions_variable",
- "name": "variable",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "AWS_ACCESS_KEY_ID",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-13 15:58:56 +0000 UTC",
- "id": "linux-image-pipeline:AWS_ACCESS_KEY_ID",
- "repository": "linux-image-pipeline",
- "updated_at": "2024-08-16 16:03:05 +0000 UTC",
- "value": "ASIATK6SR2K27JMKCZWF",
- "variable_name": "AWS_ACCESS_KEY_ID"
- },
- "sensitive_attributes": [],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- }
- ]
- },
- {
- "module": "module.repo_secrets[\"windows-image-pipeline\"]",
- "mode": "managed",
- "type": "github_actions_secret",
- "name": "secret",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "AWS_SECRET_ACCESS_KEY",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-16 16:03:17 +0000 UTC",
- "encrypted_value": "",
- "id": "windows-image-pipeline:AWS_SECRET_ACCESS_KEY",
- "plaintext_value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor",
- "repository": "windows-image-pipeline",
- "secret_name": "AWS_SECRET_ACCESS_KEY",
- "updated_at": "2024-08-16 16:03:17 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- },
- {
- "index_key": "AWS_SESSION_TOKEN",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-16 16:03:15 +0000 UTC",
- "encrypted_value": "",
- "id": "windows-image-pipeline:AWS_SESSION_TOKEN",
- "plaintext_value": "IQoJb3JpZ2luX2VjENH//////////wEaDXVzLWdvdi1lYXN0LTEiRzBFAiA1bXzDtUaBLN5c7y0DU79ZPwEM0E4X0+EsNEkZZmeYXwIhAISKrI7b1rCjPkzwjyBPMaSDzS3L4W4ty+od/ubhAojGKqADCO7//////////wEQABoMMjI5Njg1NDQ5Mzk3Igwmc2r9x6ZCLaA7/MEq9AIn8ArKVhts60a/S1MLFUyRP51IOkdolpyA7zc9S94I/unEmMFaFPiU7M1idu9dV6bXIUOM+gOiK+dAivKOPy9/OdqCnzA08RCbCpK15MPd+mb+jFNJizk6tU+ycyMtWrp7XeanqcQu64OWUi35zROZG2x/x7OAXv2jAMM4/NyAqg+PxM8coqkybWLNsjyb5SgD7PkXv0uj6vaXYzKuQGI3PRifAr6pwPe+PN7KX/P7A0PKWXKGBjKQTU+AMgJTcgyJLVleqfqlEwNr4eji+zbBn7zTOVVmwjMqPrYM4XuxEiNYyJTKpHAsk3j2KT//+Kmq51k1piaZa4t1IuHp5SGKHHKU0HXwDiKYtNXM6ayDrdUbp5TTCxWnrCklRiXVvAjOQ2PAcMEPIgOn1pNTbnmuMka965F/iQH4ccg8bjzSZrRN8qQfRtMxGh/1h9FfqcGrEWXQ5WtlT539I3G7gBclRCbn3owJfNvAY3cRkA6ZKlR86iMw/u/9tQY6pgFKYCO+WJ8W+csYeLNQEcWy2DMSUNEkO373V6iMwt8WZ6BjZbWbbYH/624tSxca6zvTN8GjkUIykgWgHagHsSQlHm4qDiDsPsEQvOGA3A6UA/q3x8s4n7VSMRDiSNDlCAPbnx12H3t6Zsga2RnfDAWZ5cdnFJPxwZTI2dLpOCUKkcOcSHNXCpB1mqGFAXEk+etEgInN2urj6+Gt4Ad38TCiLCJ16dB8",
- "repository": "windows-image-pipeline",
- "secret_name": "AWS_SESSION_TOKEN",
- "updated_at": "2024-08-16 16:03:15 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- },
- {
- "index_key": "GH_TOKEN",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-09 19:54:56 +0000 UTC",
- "encrypted_value": "",
- "id": "windows-image-pipeline:GH_TOKEN",
- "plaintext_value": "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",
- "repository": "windows-image-pipeline",
- "secret_name": "GH_TOKEN",
- "updated_at": "2024-08-09 19:54:56 +0000 UTC"
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "plaintext_value"
- }
- ],
- [
- {
- "type": "get_attr",
- "value": "encrypted_value"
- }
- ]
- ],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- }
- ]
- },
- {
- "module": "module.repo_secrets[\"windows-image-pipeline\"]",
- "mode": "managed",
- "type": "github_actions_variable",
- "name": "variable",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "AWS_ACCESS_KEY_ID",
- "schema_version": 0,
- "attributes": {
- "created_at": "2024-08-13 15:58:51 +0000 UTC",
- "id": "windows-image-pipeline:AWS_ACCESS_KEY_ID",
- "repository": "windows-image-pipeline",
- "updated_at": "2024-08-16 16:03:03 +0000 UTC",
- "value": "ASIATK6SR2K27JMKCZWF",
- "variable_name": "AWS_ACCESS_KEY_ID"
- },
- "sensitive_attributes": [],
- "private": "bnVsbA==",
- "dependencies": [
- "module.env_var.data.external.var",
- "module.env_var.random_string.random"
- ]
- }
- ]
- },
- {
- "module": "module.runner",
- "mode": "data",
- "type": "github_actions_registration_token",
- "name": "token",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "aws-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "expires_at": 1723827734,
- "id": "CSVD/aws-image-pipeline",
- "repository": "aws-image-pipeline",
- "token": "AAAAEJLQS2QBDH3RIUVJWADGX6DBM"
- },
- "sensitive_attributes": []
- },
- {
- "index_key": "image-pipeline-ansible-playbooks",
- "schema_version": 0,
- "attributes": {
- "expires_at": 1723827733,
- "id": "CSVD/image-pipeline-ansible-playbooks",
- "repository": "image-pipeline-ansible-playbooks",
- "token": "AAAAEJNF5CVBHLRTCBD267TGX6DBK"
- },
- "sensitive_attributes": []
- },
- {
- "index_key": "image-pipeline-goss-testing",
- "schema_version": 0,
- "attributes": {
- "expires_at": 1723827737,
- "id": "CSVD/image-pipeline-goss-testing",
- "repository": "image-pipeline-goss-testing",
- "token": "AAAAEJOGZJWTM3F4AOCOIRTGX6DBS"
- },
- "sensitive_attributes": []
- },
- {
- "index_key": "linux-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "expires_at": 1723827740,
- "id": "CSVD/linux-image-pipeline",
- "repository": "linux-image-pipeline",
- "token": "AAAAEJOAQQJ2BQ7UGNNYEU3GX6DBY"
- },
- "sensitive_attributes": []
- },
- {
- "index_key": "windows-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "expires_at": 1723827738,
- "id": "CSVD/windows-image-pipeline",
- "repository": "windows-image-pipeline",
- "token": "AAAAEJJGZGXS4AZ7NEJJ4LLGX6DBU"
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.runner",
- "mode": "data",
- "type": "github_repository",
- "name": "repository",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "aws-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "allow_auto_merge": false,
- "allow_merge_commit": false,
- "allow_rebase_merge": false,
- "allow_squash_merge": true,
- "archived": false,
- "default_branch": "main",
- "description": "Terraform Workspace for creating and managing AWS Image Pipelines",
- "fork": false,
- "full_name": "CSVD/aws-image-pipeline",
- "git_clone_url": "git://github.e.it.census.gov/CSVD/aws-image-pipeline.git",
- "has_discussions": false,
- "has_downloads": false,
- "has_issues": false,
- "has_projects": true,
- "has_wiki": true,
- "homepage_url": "",
- "html_url": "https://github.e.it.census.gov/CSVD/aws-image-pipeline",
- "http_clone_url": "https://github.e.it.census.gov/CSVD/aws-image-pipeline.git",
- "id": "aws-image-pipeline",
- "is_template": false,
- "merge_commit_message": "PR_TITLE",
- "merge_commit_title": "MERGE_MESSAGE",
- "name": "aws-image-pipeline",
- "node_id": "MDEwOlJlcG9zaXRvcnk5MjY=",
- "pages": [],
- "primary_language": "HCL",
- "private": true,
- "repo_id": 926,
- "repository_license": [],
- "squash_merge_commit_message": "COMMIT_MESSAGES",
- "squash_merge_commit_title": "COMMIT_OR_PR_TITLE",
- "ssh_clone_url": "git@github.e.it.census.gov:CSVD/aws-image-pipeline.git",
- "svn_url": "https://github.e.it.census.gov/CSVD/aws-image-pipeline",
- "template": [],
- "topics": [
- "terraform"
- ],
- "visibility": "private"
- },
- "sensitive_attributes": []
- },
- {
- "index_key": "image-pipeline-ansible-playbooks",
- "schema_version": 0,
- "attributes": {
- "allow_auto_merge": false,
- "allow_merge_commit": false,
- "allow_rebase_merge": false,
- "allow_squash_merge": true,
- "archived": false,
- "default_branch": "main",
- "description": "Template repo for windows image pipelines",
- "fork": false,
- "full_name": "CSVD/image-pipeline-ansible-playbooks",
- "git_clone_url": "git://github.e.it.census.gov/CSVD/image-pipeline-ansible-playbooks.git",
- "has_discussions": false,
- "has_downloads": false,
- "has_issues": false,
- "has_projects": true,
- "has_wiki": true,
- "homepage_url": "",
- "html_url": "https://github.e.it.census.gov/CSVD/image-pipeline-ansible-playbooks",
- "http_clone_url": "https://github.e.it.census.gov/CSVD/image-pipeline-ansible-playbooks.git",
- "id": "image-pipeline-ansible-playbooks",
- "is_template": false,
- "merge_commit_message": "PR_TITLE",
- "merge_commit_title": "MERGE_MESSAGE",
- "name": "image-pipeline-ansible-playbooks",
- "node_id": "MDEwOlJlcG9zaXRvcnk5ODM=",
- "pages": [],
- "primary_language": "",
- "private": true,
- "repo_id": 983,
- "repository_license": [],
- "squash_merge_commit_message": "COMMIT_MESSAGES",
- "squash_merge_commit_title": "COMMIT_OR_PR_TITLE",
- "ssh_clone_url": "git@github.e.it.census.gov:CSVD/image-pipeline-ansible-playbooks.git",
- "svn_url": "https://github.e.it.census.gov/CSVD/image-pipeline-ansible-playbooks",
- "template": [],
- "topics": [
- "terraform"
- ],
- "visibility": "private"
- },
- "sensitive_attributes": []
- },
- {
- "index_key": "image-pipeline-goss-testing",
- "schema_version": 0,
- "attributes": {
- "allow_auto_merge": false,
- "allow_merge_commit": false,
- "allow_rebase_merge": false,
- "allow_squash_merge": true,
- "archived": false,
- "default_branch": "main",
- "description": "Template repo for windows image pipelines",
- "fork": false,
- "full_name": "CSVD/image-pipeline-goss-testing",
- "git_clone_url": "git://github.e.it.census.gov/CSVD/image-pipeline-goss-testing.git",
- "has_discussions": false,
- "has_downloads": false,
- "has_issues": false,
- "has_projects": true,
- "has_wiki": true,
- "homepage_url": "",
- "html_url": "https://github.e.it.census.gov/CSVD/image-pipeline-goss-testing",
- "http_clone_url": "https://github.e.it.census.gov/CSVD/image-pipeline-goss-testing.git",
- "id": "image-pipeline-goss-testing",
- "is_template": false,
- "merge_commit_message": "PR_TITLE",
- "merge_commit_title": "MERGE_MESSAGE",
- "name": "image-pipeline-goss-testing",
- "node_id": "MDEwOlJlcG9zaXRvcnk5NDI=",
- "pages": [],
- "primary_language": "HCL",
- "private": true,
- "repo_id": 942,
- "repository_license": [],
- "squash_merge_commit_message": "COMMIT_MESSAGES",
- "squash_merge_commit_title": "COMMIT_OR_PR_TITLE",
- "ssh_clone_url": "git@github.e.it.census.gov:CSVD/image-pipeline-goss-testing.git",
- "svn_url": "https://github.e.it.census.gov/CSVD/image-pipeline-goss-testing",
- "template": [],
- "topics": [
- "terraform"
- ],
- "visibility": "private"
- },
- "sensitive_attributes": []
- },
- {
- "index_key": "linux-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "allow_auto_merge": false,
- "allow_merge_commit": false,
- "allow_rebase_merge": false,
- "allow_squash_merge": true,
- "archived": false,
- "default_branch": "main",
- "description": "Template repo for windows image pipelines",
- "fork": false,
- "full_name": "CSVD/linux-image-pipeline",
- "git_clone_url": "git://github.e.it.census.gov/CSVD/linux-image-pipeline.git",
- "has_discussions": false,
- "has_downloads": false,
- "has_issues": false,
- "has_projects": true,
- "has_wiki": true,
- "homepage_url": "",
- "html_url": "https://github.e.it.census.gov/CSVD/linux-image-pipeline",
- "http_clone_url": "https://github.e.it.census.gov/CSVD/linux-image-pipeline.git",
- "id": "linux-image-pipeline",
- "is_template": false,
- "merge_commit_message": "PR_TITLE",
- "merge_commit_title": "MERGE_MESSAGE",
- "name": "linux-image-pipeline",
- "node_id": "MDEwOlJlcG9zaXRvcnk5OTU=",
- "pages": [],
- "primary_language": "HCL",
- "private": true,
- "repo_id": 995,
- "repository_license": [],
- "squash_merge_commit_message": "COMMIT_MESSAGES",
- "squash_merge_commit_title": "COMMIT_OR_PR_TITLE",
- "ssh_clone_url": "git@github.e.it.census.gov:CSVD/linux-image-pipeline.git",
- "svn_url": "https://github.e.it.census.gov/CSVD/linux-image-pipeline",
- "template": [],
- "topics": [
- "terraform"
- ],
- "visibility": "private"
- },
- "sensitive_attributes": []
- },
- {
- "index_key": "windows-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "allow_auto_merge": false,
- "allow_merge_commit": false,
- "allow_rebase_merge": false,
- "allow_squash_merge": true,
- "archived": false,
- "default_branch": "main",
- "description": "Template repo for windows image pipelines",
- "fork": false,
- "full_name": "CSVD/windows-image-pipeline",
- "git_clone_url": "git://github.e.it.census.gov/CSVD/windows-image-pipeline.git",
- "has_discussions": false,
- "has_downloads": false,
- "has_issues": false,
- "has_projects": true,
- "has_wiki": true,
- "homepage_url": "",
- "html_url": "https://github.e.it.census.gov/CSVD/windows-image-pipeline",
- "http_clone_url": "https://github.e.it.census.gov/CSVD/windows-image-pipeline.git",
- "id": "windows-image-pipeline",
- "is_template": false,
- "merge_commit_message": "PR_TITLE",
- "merge_commit_title": "MERGE_MESSAGE",
- "name": "windows-image-pipeline",
- "node_id": "MDEwOlJlcG9zaXRvcnk5NzY=",
- "pages": [],
- "primary_language": "PowerShell",
- "private": true,
- "repo_id": 976,
- "repository_license": [],
- "squash_merge_commit_message": "COMMIT_MESSAGES",
- "squash_merge_commit_title": "COMMIT_OR_PR_TITLE",
- "ssh_clone_url": "git@github.e.it.census.gov:CSVD/windows-image-pipeline.git",
- "svn_url": "https://github.e.it.census.gov/CSVD/windows-image-pipeline",
- "template": [],
- "topics": [
- "terraform"
- ],
- "visibility": "private"
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.runner",
- "mode": "managed",
- "type": "local_file",
- "name": "env",
- "provider": "provider[\"registry.terraform.io/hashicorp/local\"]",
- "instances": [
- {
- "index_key": "aws-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "content": "NODE_TLS_REJECT_UNAUTHORIZED=0\nLANG=en_US.UTF-8",
- "content_base64": null,
- "content_base64sha256": "hjukrj+7PjBRu4QVzbayQxRmCLJfjkX8Kw8DWfGzpYU=",
- "content_base64sha512": "SbU6liwc37tOavPIjF2dp104aoJIKQHB6f72wA0reAb+QPyNgkRRQe33WiV/A9A4WLkb+bTK/NycUdhHXE2viw==",
- "content_md5": "571d647ad4e7189b47c950353f725050",
- "content_sha1": "0992362ec0c2ec12c1eeef49b680cad8f0d8670a",
- "content_sha256": "863ba4ae3fbb3e3051bb8415cdb6b243146608b25f8e45fc2b0f0359f1b3a585",
- "content_sha512": "49b53a962c1cdfbb4e6af3c88c5d9da75d386a82482901c1e9fef6c00d2b7806fe40fc8d82445141edf75a257f03d03858b91bf9b4cafcdc9c51d8475c4daf8b",
- "directory_permission": "0777",
- "file_permission": "0777",
- "filename": "/apps/terraform/workspaces/arnol377/git/ghe-runner/aws-image-pipeline/.env",
- "id": "0992362ec0c2ec12c1eeef49b680cad8f0d8670a",
- "sensitive_content": null,
- "source": null
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "sensitive_content"
- }
- ]
- ]
- },
- {
- "index_key": "image-pipeline-ansible-playbooks",
- "schema_version": 0,
- "attributes": {
- "content": "NODE_TLS_REJECT_UNAUTHORIZED=0\nLANG=en_US.UTF-8",
- "content_base64": null,
- "content_base64sha256": "hjukrj+7PjBRu4QVzbayQxRmCLJfjkX8Kw8DWfGzpYU=",
- "content_base64sha512": "SbU6liwc37tOavPIjF2dp104aoJIKQHB6f72wA0reAb+QPyNgkRRQe33WiV/A9A4WLkb+bTK/NycUdhHXE2viw==",
- "content_md5": "571d647ad4e7189b47c950353f725050",
- "content_sha1": "0992362ec0c2ec12c1eeef49b680cad8f0d8670a",
- "content_sha256": "863ba4ae3fbb3e3051bb8415cdb6b243146608b25f8e45fc2b0f0359f1b3a585",
- "content_sha512": "49b53a962c1cdfbb4e6af3c88c5d9da75d386a82482901c1e9fef6c00d2b7806fe40fc8d82445141edf75a257f03d03858b91bf9b4cafcdc9c51d8475c4daf8b",
- "directory_permission": "0777",
- "file_permission": "0777",
- "filename": "/apps/terraform/workspaces/arnol377/git/ghe-runner/image-pipeline-ansible-playbooks/.env",
- "id": "0992362ec0c2ec12c1eeef49b680cad8f0d8670a",
- "sensitive_content": null,
- "source": null
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "sensitive_content"
- }
- ]
- ]
- },
- {
- "index_key": "image-pipeline-goss-testing",
- "schema_version": 0,
- "attributes": {
- "content": "NODE_TLS_REJECT_UNAUTHORIZED=0\nLANG=en_US.UTF-8",
- "content_base64": null,
- "content_base64sha256": "hjukrj+7PjBRu4QVzbayQxRmCLJfjkX8Kw8DWfGzpYU=",
- "content_base64sha512": "SbU6liwc37tOavPIjF2dp104aoJIKQHB6f72wA0reAb+QPyNgkRRQe33WiV/A9A4WLkb+bTK/NycUdhHXE2viw==",
- "content_md5": "571d647ad4e7189b47c950353f725050",
- "content_sha1": "0992362ec0c2ec12c1eeef49b680cad8f0d8670a",
- "content_sha256": "863ba4ae3fbb3e3051bb8415cdb6b243146608b25f8e45fc2b0f0359f1b3a585",
- "content_sha512": "49b53a962c1cdfbb4e6af3c88c5d9da75d386a82482901c1e9fef6c00d2b7806fe40fc8d82445141edf75a257f03d03858b91bf9b4cafcdc9c51d8475c4daf8b",
- "directory_permission": "0777",
- "file_permission": "0777",
- "filename": "/apps/terraform/workspaces/arnol377/git/ghe-runner/image-pipeline-goss-testing/.env",
- "id": "0992362ec0c2ec12c1eeef49b680cad8f0d8670a",
- "sensitive_content": null,
- "source": null
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "sensitive_content"
- }
- ]
- ]
- },
- {
- "index_key": "linux-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "content": "NODE_TLS_REJECT_UNAUTHORIZED=0\nLANG=en_US.UTF-8",
- "content_base64": null,
- "content_base64sha256": "hjukrj+7PjBRu4QVzbayQxRmCLJfjkX8Kw8DWfGzpYU=",
- "content_base64sha512": "SbU6liwc37tOavPIjF2dp104aoJIKQHB6f72wA0reAb+QPyNgkRRQe33WiV/A9A4WLkb+bTK/NycUdhHXE2viw==",
- "content_md5": "571d647ad4e7189b47c950353f725050",
- "content_sha1": "0992362ec0c2ec12c1eeef49b680cad8f0d8670a",
- "content_sha256": "863ba4ae3fbb3e3051bb8415cdb6b243146608b25f8e45fc2b0f0359f1b3a585",
- "content_sha512": "49b53a962c1cdfbb4e6af3c88c5d9da75d386a82482901c1e9fef6c00d2b7806fe40fc8d82445141edf75a257f03d03858b91bf9b4cafcdc9c51d8475c4daf8b",
- "directory_permission": "0777",
- "file_permission": "0777",
- "filename": "/apps/terraform/workspaces/arnol377/git/ghe-runner/linux-image-pipeline/.env",
- "id": "0992362ec0c2ec12c1eeef49b680cad8f0d8670a",
- "sensitive_content": null,
- "source": null
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "sensitive_content"
- }
- ]
- ]
- },
- {
- "index_key": "windows-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "content": "NODE_TLS_REJECT_UNAUTHORIZED=0\nLANG=en_US.UTF-8",
- "content_base64": null,
- "content_base64sha256": "hjukrj+7PjBRu4QVzbayQxRmCLJfjkX8Kw8DWfGzpYU=",
- "content_base64sha512": "SbU6liwc37tOavPIjF2dp104aoJIKQHB6f72wA0reAb+QPyNgkRRQe33WiV/A9A4WLkb+bTK/NycUdhHXE2viw==",
- "content_md5": "571d647ad4e7189b47c950353f725050",
- "content_sha1": "0992362ec0c2ec12c1eeef49b680cad8f0d8670a",
- "content_sha256": "863ba4ae3fbb3e3051bb8415cdb6b243146608b25f8e45fc2b0f0359f1b3a585",
- "content_sha512": "49b53a962c1cdfbb4e6af3c88c5d9da75d386a82482901c1e9fef6c00d2b7806fe40fc8d82445141edf75a257f03d03858b91bf9b4cafcdc9c51d8475c4daf8b",
- "directory_permission": "0777",
- "file_permission": "0777",
- "filename": "/apps/terraform/workspaces/arnol377/git/ghe-runner/windows-image-pipeline/.env",
- "id": "0992362ec0c2ec12c1eeef49b680cad8f0d8670a",
- "sensitive_content": null,
- "source": null
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "sensitive_content"
- }
- ]
- ]
- }
- ]
- },
- {
- "module": "module.runner",
- "mode": "managed",
- "type": "local_file",
- "name": "supervisorctl",
- "provider": "provider[\"registry.terraform.io/hashicorp/local\"]",
- "instances": [
- {
- "index_key": "aws-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "content": "[program:aws-image-pipeline]\ndirectory=/apps/terraform/workspaces/arnol377/git/ghe-runner/aws-image-pipeline ; directory to cwd to before exec (def no cwd)\ncommand=/apps/terraform/workspaces/arnol377/git/ghe-runner/aws-image-pipeline/run.sh\n;numprocs=1 ; number of processes copies to start (def 1)\nautostart=true ; start at supervisord start (default: true)\n;startsecs=1 ; # of secs prog must stay up to be running (def. 1)\nstartretries=3 ; max # of serial start failures when starting (default 3)\nautorestart=true\nstdout_logfile=/apps/terraform/workspaces/arnol377/git/ghe-runner/aws-image-pipeline/runner.log ; stdout log path, NONE for none; default AUTO\nstdout_logfile_maxbytes=1MB ; max # logfile bytes b4 rotation (default 50MB)\nstdout_logfile_backups=10 ; # of stdout logfile backups (0 means none, default 10)\nstdout_capture_maxbytes=1MB ; number of bytes in 'capturemode' (default 0)\nstderr_logfile=/apps/terraform/workspaces/arnol377/git/ghe-runner/aws-image-pipeline/runner_error.log ; stderr log path, NONE for none; default AUTO\nstderr_logfile_maxbytes=1MB ; max # logfile bytes b4 rotation (default 50MB)\nstderr_logfile_backups=10 ; # of stderr logfile backups (0 means none, default 10)\nstderr_capture_maxbytes=1MB ; number of bytes in 'capturemode' (default 0)",
- "content_base64": null,
- "content_base64sha256": "goKqhad13qLKcO/zTPtlAtwiIYwPoZVKSWD4vLoZVyI=",
- "content_base64sha512": "J3bbhrIjipzmKZMqlVsMmoSeJY/pcNPay2Vj0eLHSmqvpYb8vRW5nYa/Y5BgL8v+0jdaEkzBWO2ElQk7XM8G4A==",
- "content_md5": "63f4fcbc7871dcaf800df45240394590",
- "content_sha1": "b229058e47aed45386fc120477bb64f2282dcb95",
- "content_sha256": "8282aa85a775dea2ca70eff34cfb6502dc22218c0fa1954a4960f8bcba195722",
- "content_sha512": "2776db86b2238a9ce629932a955b0c9a849e258fe970d3dacb6563d1e2c74a6aafa586fcbd15b99d86bf6390602fcbfed2375a124cc158ed8495093b5ccf06e0",
- "directory_permission": "0777",
- "file_permission": "0777",
- "filename": "./supervisor/aws-image-pipeline.conf",
- "id": "b229058e47aed45386fc120477bb64f2282dcb95",
- "sensitive_content": null,
- "source": null
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "sensitive_content"
- }
- ]
- ]
- },
- {
- "index_key": "image-pipeline-ansible-playbooks",
- "schema_version": 0,
- "attributes": {
- "content": "[program:image-pipeline-ansible-playbooks]\ndirectory=/apps/terraform/workspaces/arnol377/git/ghe-runner/image-pipeline-ansible-playbooks ; directory to cwd to before exec (def no cwd)\ncommand=/apps/terraform/workspaces/arnol377/git/ghe-runner/image-pipeline-ansible-playbooks/run.sh\n;numprocs=1 ; number of processes copies to start (def 1)\nautostart=true ; start at supervisord start (default: true)\n;startsecs=1 ; # of secs prog must stay up to be running (def. 1)\nstartretries=3 ; max # of serial start failures when starting (default 3)\nautorestart=true\nstdout_logfile=/apps/terraform/workspaces/arnol377/git/ghe-runner/image-pipeline-ansible-playbooks/runner.log ; stdout log path, NONE for none; default AUTO\nstdout_logfile_maxbytes=1MB ; max # logfile bytes b4 rotation (default 50MB)\nstdout_logfile_backups=10 ; # of stdout logfile backups (0 means none, default 10)\nstdout_capture_maxbytes=1MB ; number of bytes in 'capturemode' (default 0)\nstderr_logfile=/apps/terraform/workspaces/arnol377/git/ghe-runner/image-pipeline-ansible-playbooks/runner_error.log ; stderr log path, NONE for none; default AUTO\nstderr_logfile_maxbytes=1MB ; max # logfile bytes b4 rotation (default 50MB)\nstderr_logfile_backups=10 ; # of stderr logfile backups (0 means none, default 10)\nstderr_capture_maxbytes=1MB ; number of bytes in 'capturemode' (default 0)",
- "content_base64": null,
- "content_base64sha256": "cmCeaFP3EIZRLhmkKID8csVONazdzxV4oTNk9QwM83c=",
- "content_base64sha512": "f2+V1fXzy7kfRi1PsqhDw00l9szUCbVaYuu7hRfFc8qs17B4njeTO+G7D9LMxAB6bjkPfFs8Gg+3LdxE3cJqfg==",
- "content_md5": "fc6190dde467eeb11b1398d0796cecf6",
- "content_sha1": "2a416c4d5f3666392d90fb7e75948a9b891c8a1c",
- "content_sha256": "72609e6853f71086512e19a42880fc72c54e35acddcf1578a13364f50c0cf377",
- "content_sha512": "7f6f95d5f5f3cbb91f462d4fb2a843c34d25f6ccd409b55a62ebbb8517c573caacd7b0789e37933be1bb0fd2ccc4007a6e390f7c5b3c1a0fb72ddc44ddc26a7e",
- "directory_permission": "0777",
- "file_permission": "0777",
- "filename": "./supervisor/image-pipeline-ansible-playbooks.conf",
- "id": "2a416c4d5f3666392d90fb7e75948a9b891c8a1c",
- "sensitive_content": null,
- "source": null
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "sensitive_content"
- }
- ]
- ]
- },
- {
- "index_key": "image-pipeline-goss-testing",
- "schema_version": 0,
- "attributes": {
- "content": "[program:image-pipeline-goss-testing]\ndirectory=/apps/terraform/workspaces/arnol377/git/ghe-runner/image-pipeline-goss-testing ; directory to cwd to before exec (def no cwd)\ncommand=/apps/terraform/workspaces/arnol377/git/ghe-runner/image-pipeline-goss-testing/run.sh\n;numprocs=1 ; number of processes copies to start (def 1)\nautostart=true ; start at supervisord start (default: true)\n;startsecs=1 ; # of secs prog must stay up to be running (def. 1)\nstartretries=3 ; max # of serial start failures when starting (default 3)\nautorestart=true\nstdout_logfile=/apps/terraform/workspaces/arnol377/git/ghe-runner/image-pipeline-goss-testing/runner.log ; stdout log path, NONE for none; default AUTO\nstdout_logfile_maxbytes=1MB ; max # logfile bytes b4 rotation (default 50MB)\nstdout_logfile_backups=10 ; # of stdout logfile backups (0 means none, default 10)\nstdout_capture_maxbytes=1MB ; number of bytes in 'capturemode' (default 0)\nstderr_logfile=/apps/terraform/workspaces/arnol377/git/ghe-runner/image-pipeline-goss-testing/runner_error.log ; stderr log path, NONE for none; default AUTO\nstderr_logfile_maxbytes=1MB ; max # logfile bytes b4 rotation (default 50MB)\nstderr_logfile_backups=10 ; # of stderr logfile backups (0 means none, default 10)\nstderr_capture_maxbytes=1MB ; number of bytes in 'capturemode' (default 0)",
- "content_base64": null,
- "content_base64sha256": "TF9TyUoheXICZ8Ln6QbeEdJsAKA0zojhr7JzVVCDprE=",
- "content_base64sha512": "NFo3X/mO/geWs36p/+lKXU9yOQcmvf4dMp/7bXr6CFaYGwSfOABvgVXgvyKuctBaac4U8PfSvFCtLH9G04/YZg==",
- "content_md5": "5c05e2b496296cc9c59d655fb89cdd01",
- "content_sha1": "9cc53fa7963b9d7464fb22f7bb84eed064a790c9",
- "content_sha256": "4c5f53c94a2179720267c2e7e906de11d26c00a034ce88e1afb273555083a6b1",
- "content_sha512": "345a375ff98efe0796b37ea9ffe94a5d4f72390726bdfe1d329ffb6d7afa0856981b049f38006f8155e0bf22ae72d05a69ce14f0f7d2bc50ad2c7f46d38fd866",
- "directory_permission": "0777",
- "file_permission": "0777",
- "filename": "./supervisor/image-pipeline-goss-testing.conf",
- "id": "9cc53fa7963b9d7464fb22f7bb84eed064a790c9",
- "sensitive_content": null,
- "source": null
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "sensitive_content"
- }
- ]
- ]
- },
- {
- "index_key": "linux-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "content": "[program:linux-image-pipeline]\ndirectory=/apps/terraform/workspaces/arnol377/git/ghe-runner/linux-image-pipeline ; directory to cwd to before exec (def no cwd)\ncommand=/apps/terraform/workspaces/arnol377/git/ghe-runner/linux-image-pipeline/run.sh\n;numprocs=1 ; number of processes copies to start (def 1)\nautostart=true ; start at supervisord start (default: true)\n;startsecs=1 ; # of secs prog must stay up to be running (def. 1)\nstartretries=3 ; max # of serial start failures when starting (default 3)\nautorestart=true\nstdout_logfile=/apps/terraform/workspaces/arnol377/git/ghe-runner/linux-image-pipeline/runner.log ; stdout log path, NONE for none; default AUTO\nstdout_logfile_maxbytes=1MB ; max # logfile bytes b4 rotation (default 50MB)\nstdout_logfile_backups=10 ; # of stdout logfile backups (0 means none, default 10)\nstdout_capture_maxbytes=1MB ; number of bytes in 'capturemode' (default 0)\nstderr_logfile=/apps/terraform/workspaces/arnol377/git/ghe-runner/linux-image-pipeline/runner_error.log ; stderr log path, NONE for none; default AUTO\nstderr_logfile_maxbytes=1MB ; max # logfile bytes b4 rotation (default 50MB)\nstderr_logfile_backups=10 ; # of stderr logfile backups (0 means none, default 10)\nstderr_capture_maxbytes=1MB ; number of bytes in 'capturemode' (default 0)",
- "content_base64": null,
- "content_base64sha256": "jIB51lPAa2/pDtd8YQojmDAfypuT3T1v3MOgzwaiaWs=",
- "content_base64sha512": "55z+hu6PhT9pJpSW4g7mWdB/ezb54qGQJbTiuHpuSos0Rx9+45UqASetnzOUhH7UFuWopMebCw037n3L3SQIjg==",
- "content_md5": "4f3f24cdcffb3856268aeb722672a4ab",
- "content_sha1": "5f016f99cab492f889226d48bf1c12eab03c2d29",
- "content_sha256": "8c8079d653c06b6fe90ed77c610a2398301fca9b93dd3d6fdcc3a0cf06a2696b",
- "content_sha512": "e79cfe86ee8f853f69269496e20ee659d07f7b36f9e2a19025b4e2b87a6e4a8b34471f7ee3952a0127ad9f3394847ed416e5a8a4c79b0b0d37ee7dcbdd24088e",
- "directory_permission": "0777",
- "file_permission": "0777",
- "filename": "./supervisor/linux-image-pipeline.conf",
- "id": "5f016f99cab492f889226d48bf1c12eab03c2d29",
- "sensitive_content": null,
- "source": null
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "sensitive_content"
- }
- ]
- ]
- },
- {
- "index_key": "windows-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "content": "[program:windows-image-pipeline]\ndirectory=/apps/terraform/workspaces/arnol377/git/ghe-runner/windows-image-pipeline ; directory to cwd to before exec (def no cwd)\ncommand=/apps/terraform/workspaces/arnol377/git/ghe-runner/windows-image-pipeline/run.sh\n;numprocs=1 ; number of processes copies to start (def 1)\nautostart=true ; start at supervisord start (default: true)\n;startsecs=1 ; # of secs prog must stay up to be running (def. 1)\nstartretries=3 ; max # of serial start failures when starting (default 3)\nautorestart=true\nstdout_logfile=/apps/terraform/workspaces/arnol377/git/ghe-runner/windows-image-pipeline/runner.log ; stdout log path, NONE for none; default AUTO\nstdout_logfile_maxbytes=1MB ; max # logfile bytes b4 rotation (default 50MB)\nstdout_logfile_backups=10 ; # of stdout logfile backups (0 means none, default 10)\nstdout_capture_maxbytes=1MB ; number of bytes in 'capturemode' (default 0)\nstderr_logfile=/apps/terraform/workspaces/arnol377/git/ghe-runner/windows-image-pipeline/runner_error.log ; stderr log path, NONE for none; default AUTO\nstderr_logfile_maxbytes=1MB ; max # logfile bytes b4 rotation (default 50MB)\nstderr_logfile_backups=10 ; # of stderr logfile backups (0 means none, default 10)\nstderr_capture_maxbytes=1MB ; number of bytes in 'capturemode' (default 0)",
- "content_base64": null,
- "content_base64sha256": "ciwCZUaTe1bvgtKM5lL0NxB+Gh4OHEvKXYQ/mFrFLtc=",
- "content_base64sha512": "sZB4Gm3RumgecmDeFvKGxHL+ZEhuymUL0d/WN9MD6Wr/i+geXK/PSBOvaYv3nsh84uJCSrxl/76Py8G+/qts3g==",
- "content_md5": "8a73337b5e245bcbbdf1aa814b8f3d85",
- "content_sha1": "de1d1e9b9dd707ed356e63480d6a0c2477cb2f77",
- "content_sha256": "722c026546937b56ef82d28ce652f437107e1a1e0e1c4bca5d843f985ac52ed7",
- "content_sha512": "b190781a6dd1ba681e7260de16f286c472fe64486eca650bd1dfd637d303e96aff8be81e5cafcf4813af698bf79ec87ce2e2424abc65ffbe8fcbc1befeab6cde",
- "directory_permission": "0777",
- "file_permission": "0777",
- "filename": "./supervisor/windows-image-pipeline.conf",
- "id": "de1d1e9b9dd707ed356e63480d6a0c2477cb2f77",
- "sensitive_content": null,
- "source": null
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "sensitive_content"
- }
- ]
- ]
- }
- ]
- },
- {
- "module": "module.runner",
- "mode": "managed",
- "type": "null_resource",
- "name": "install_runner",
- "provider": "provider[\"registry.terraform.io/hashicorp/null\"]",
- "instances": [
- {
- "index_key": "aws-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "id": "167377063895277739",
- "triggers": {
- "repos": "aws-image-pipeline,linux-image-pipeline,windows-image-pipeline,image-pipeline-goss-testing,image-pipeline-ansible-playbooks"
- }
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.runner.local_file.supervisorctl"
- ]
- },
- {
- "index_key": "image-pipeline-ansible-playbooks",
- "schema_version": 0,
- "attributes": {
- "id": "8444992136404658959",
- "triggers": {
- "repos": "aws-image-pipeline,linux-image-pipeline,windows-image-pipeline,image-pipeline-goss-testing,image-pipeline-ansible-playbooks"
- }
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.runner.local_file.supervisorctl"
- ]
- },
- {
- "index_key": "image-pipeline-goss-testing",
- "schema_version": 0,
- "attributes": {
- "id": "8916824004276529952",
- "triggers": {
- "repos": "aws-image-pipeline,linux-image-pipeline,windows-image-pipeline,image-pipeline-goss-testing,image-pipeline-ansible-playbooks"
- }
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.runner.local_file.supervisorctl"
- ]
- },
- {
- "index_key": "linux-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "id": "5098658504687988707",
- "triggers": {
- "repos": "aws-image-pipeline,linux-image-pipeline,windows-image-pipeline,image-pipeline-goss-testing,image-pipeline-ansible-playbooks"
- }
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.runner.local_file.supervisorctl"
- ]
- },
- {
- "index_key": "windows-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "id": "4709777514127541133",
- "triggers": {
- "repos": "aws-image-pipeline,linux-image-pipeline,windows-image-pipeline,image-pipeline-goss-testing,image-pipeline-ansible-playbooks"
- }
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.runner.local_file.supervisorctl"
- ]
- }
- ]
- },
- {
- "module": "module.runner",
- "mode": "managed",
- "type": "null_resource",
- "name": "register_runner",
- "provider": "provider[\"registry.terraform.io/hashicorp/null\"]",
- "instances": [
- {
- "index_key": "aws-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "id": "1187637572805030232",
- "triggers": {
- "repos": "aws-image-pipeline,linux-image-pipeline,windows-image-pipeline,image-pipeline-goss-testing,image-pipeline-ansible-playbooks"
- }
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.runner.data.github_actions_registration_token.token",
- "module.runner.data.github_repository.repository",
- "module.runner.github_actions_runner_group.rg",
- "module.runner.local_file.env",
- "module.runner.local_file.supervisorctl",
- "module.runner.null_resource.install_runner"
- ]
- },
- {
- "index_key": "image-pipeline-ansible-playbooks",
- "schema_version": 0,
- "attributes": {
- "id": "1179195919023235710",
- "triggers": {
- "repos": "aws-image-pipeline,linux-image-pipeline,windows-image-pipeline,image-pipeline-goss-testing,image-pipeline-ansible-playbooks"
- }
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.runner.data.github_actions_registration_token.token",
- "module.runner.data.github_repository.repository",
- "module.runner.github_actions_runner_group.rg",
- "module.runner.local_file.env",
- "module.runner.local_file.supervisorctl",
- "module.runner.null_resource.install_runner"
- ]
- },
- {
- "index_key": "image-pipeline-goss-testing",
- "schema_version": 0,
- "attributes": {
- "id": "8277050170472805959",
- "triggers": {
- "repos": "aws-image-pipeline,linux-image-pipeline,windows-image-pipeline,image-pipeline-goss-testing,image-pipeline-ansible-playbooks"
- }
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.runner.data.github_actions_registration_token.token",
- "module.runner.data.github_repository.repository",
- "module.runner.github_actions_runner_group.rg",
- "module.runner.local_file.env",
- "module.runner.local_file.supervisorctl",
- "module.runner.null_resource.install_runner"
- ]
- },
- {
- "index_key": "linux-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "id": "3118937862415230253",
- "triggers": {
- "repos": "aws-image-pipeline,linux-image-pipeline,windows-image-pipeline,image-pipeline-goss-testing,image-pipeline-ansible-playbooks"
- }
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.runner.data.github_actions_registration_token.token",
- "module.runner.data.github_repository.repository",
- "module.runner.github_actions_runner_group.rg",
- "module.runner.local_file.env",
- "module.runner.local_file.supervisorctl",
- "module.runner.null_resource.install_runner"
- ]
- },
- {
- "index_key": "windows-image-pipeline",
- "schema_version": 0,
- "attributes": {
- "id": "6729366528579288901",
- "triggers": {
- "repos": "aws-image-pipeline,linux-image-pipeline,windows-image-pipeline,image-pipeline-goss-testing,image-pipeline-ansible-playbooks"
- }
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.runner.data.github_actions_registration_token.token",
- "module.runner.data.github_repository.repository",
- "module.runner.github_actions_runner_group.rg",
- "module.runner.local_file.env",
- "module.runner.local_file.supervisorctl",
- "module.runner.null_resource.install_runner"
- ]
- }
- ]
- },
- {
- "module": "module.runner",
- "mode": "managed",
- "type": "null_resource",
- "name": "supervisorctl_reload",
- "provider": "provider[\"registry.terraform.io/hashicorp/null\"]",
- "instances": [
- {
- "schema_version": 0,
- "attributes": {
- "id": "8944391168438319500",
- "triggers": {
- "repos": "aws-image-pipeline,linux-image-pipeline,windows-image-pipeline,image-pipeline-goss-testing,image-pipeline-ansible-playbooks"
- }
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.runner.data.github_actions_registration_token.token",
- "module.runner.data.github_repository.repository",
- "module.runner.github_actions_runner_group.rg",
- "module.runner.local_file.env",
- "module.runner.local_file.supervisorctl",
- "module.runner.null_resource.install_runner",
- "module.runner.null_resource.register_runner"
- ]
- }
- ]
- },
- {
- "module": "module.tf_workspace_runners",
- "mode": "data",
- "type": "github_actions_registration_token",
- "name": "token",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "automation-repos",
- "schema_version": 0,
- "attributes": {
- "expires_at": 1723827735,
- "id": "CSVD/automation-repos",
- "repository": "automation-repos",
- "token": "AAAAEJPEUN6NU5LOFENWNQTGX6DBO"
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.tf_workspace_runners",
- "mode": "data",
- "type": "github_repository",
- "name": "repository",
- "provider": "provider[\"registry.terraform.io/hashicorp/github\"]",
- "instances": [
- {
- "index_key": "automation-repos",
- "schema_version": 0,
- "attributes": {
- "allow_auto_merge": false,
- "allow_merge_commit": false,
- "allow_rebase_merge": false,
- "allow_squash_merge": true,
- "archived": false,
- "default_branch": "main",
- "description": "Automation Repos for Morpheus POC",
- "fork": false,
- "full_name": "CSVD/automation-repos",
- "git_clone_url": "git://github.e.it.census.gov/CSVD/automation-repos.git",
- "has_discussions": false,
- "has_downloads": false,
- "has_issues": true,
- "has_projects": true,
- "has_wiki": true,
- "homepage_url": "",
- "html_url": "https://github.e.it.census.gov/CSVD/automation-repos",
- "http_clone_url": "https://github.e.it.census.gov/CSVD/automation-repos.git",
- "id": "automation-repos",
- "is_template": false,
- "merge_commit_message": "PR_TITLE",
- "merge_commit_title": "MERGE_MESSAGE",
- "name": "automation-repos",
- "node_id": "MDEwOlJlcG9zaXRvcnk5ODE=",
- "pages": [],
- "primary_language": "HCL",
- "private": true,
- "repo_id": 981,
- "repository_license": [],
- "squash_merge_commit_message": "COMMIT_MESSAGES",
- "squash_merge_commit_title": "COMMIT_OR_PR_TITLE",
- "ssh_clone_url": "git@github.e.it.census.gov:CSVD/automation-repos.git",
- "svn_url": "https://github.e.it.census.gov/CSVD/automation-repos",
- "template": [],
- "topics": [
- "terraform"
- ],
- "visibility": "private"
- },
- "sensitive_attributes": []
- }
- ]
- },
- {
- "module": "module.tf_workspace_runners",
- "mode": "managed",
- "type": "local_file",
- "name": "env",
- "provider": "provider[\"registry.terraform.io/hashicorp/local\"]",
- "instances": [
- {
- "index_key": "automation-repos",
- "schema_version": 0,
- "attributes": {
- "content": "NODE_TLS_REJECT_UNAUTHORIZED=0\nLANG=en_US.UTF-8",
- "content_base64": null,
- "content_base64sha256": "hjukrj+7PjBRu4QVzbayQxRmCLJfjkX8Kw8DWfGzpYU=",
- "content_base64sha512": "SbU6liwc37tOavPIjF2dp104aoJIKQHB6f72wA0reAb+QPyNgkRRQe33WiV/A9A4WLkb+bTK/NycUdhHXE2viw==",
- "content_md5": "571d647ad4e7189b47c950353f725050",
- "content_sha1": "0992362ec0c2ec12c1eeef49b680cad8f0d8670a",
- "content_sha256": "863ba4ae3fbb3e3051bb8415cdb6b243146608b25f8e45fc2b0f0359f1b3a585",
- "content_sha512": "49b53a962c1cdfbb4e6af3c88c5d9da75d386a82482901c1e9fef6c00d2b7806fe40fc8d82445141edf75a257f03d03858b91bf9b4cafcdc9c51d8475c4daf8b",
- "directory_permission": "0777",
- "file_permission": "0777",
- "filename": "/apps/terraform/workspaces/arnol377/git/ghe-runner/automation-repos/.env",
- "id": "0992362ec0c2ec12c1eeef49b680cad8f0d8670a",
- "sensitive_content": null,
- "source": null
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "sensitive_content"
- }
- ]
- ]
- }
- ]
- },
- {
- "module": "module.tf_workspace_runners",
- "mode": "managed",
- "type": "local_file",
- "name": "supervisorctl",
- "provider": "provider[\"registry.terraform.io/hashicorp/local\"]",
- "instances": [
- {
- "index_key": "automation-repos",
- "schema_version": 0,
- "attributes": {
- "content": "[program:automation-repos]\ndirectory=/apps/terraform/workspaces/arnol377/git/ghe-runner/automation-repos ; directory to cwd to before exec (def no cwd)\ncommand=/apps/terraform/workspaces/arnol377/git/ghe-runner/automation-repos/run.sh\n;numprocs=1 ; number of processes copies to start (def 1)\nautostart=true ; start at supervisord start (default: true)\n;startsecs=1 ; # of secs prog must stay up to be running (def. 1)\nstartretries=3 ; max # of serial start failures when starting (default 3)\nautorestart=true\nstdout_logfile=/apps/terraform/workspaces/arnol377/git/ghe-runner/automation-repos/runner.log ; stdout log path, NONE for none; default AUTO\nstdout_logfile_maxbytes=1MB ; max # logfile bytes b4 rotation (default 50MB)\nstdout_logfile_backups=10 ; # of stdout logfile backups (0 means none, default 10)\nstdout_capture_maxbytes=1MB ; number of bytes in 'capturemode' (default 0)\nstderr_logfile=/apps/terraform/workspaces/arnol377/git/ghe-runner/automation-repos/runner_error.log ; stderr log path, NONE for none; default AUTO\nstderr_logfile_maxbytes=1MB ; max # logfile bytes b4 rotation (default 50MB)\nstderr_logfile_backups=10 ; # of stderr logfile backups (0 means none, default 10)\nstderr_capture_maxbytes=1MB ; number of bytes in 'capturemode' (default 0)",
- "content_base64": null,
- "content_base64sha256": "jSviPBeKLUwT9Q+3zVyhdSFeDqjAH2Mt3CL2a1yibpU=",
- "content_base64sha512": "ZZLCmARxk52QxgaisSAVfltt8QdKHqMRFrFza1ULkjdA5KhwbnKynUET7i2ikd2Fsc7mG/G0De6gU56zod48hA==",
- "content_md5": "f71d0d222b953987e7739f79ca0cc106",
- "content_sha1": "65eb0d24b79d343b913922137d0505bca429c654",
- "content_sha256": "8d2be23c178a2d4c13f50fb7cd5ca175215e0ea8c01f632ddc22f66b5ca26e95",
- "content_sha512": "6592c2980471939d90c606a2b120157e5b6df1074a1ea31116b1736b550b923740e4a8706e72b29d4113ee2da291dd85b1cee61bf1b40deea0539eb3a1de3c84",
- "directory_permission": "0777",
- "file_permission": "0777",
- "filename": "./supervisor/automation-repos.conf",
- "id": "65eb0d24b79d343b913922137d0505bca429c654",
- "sensitive_content": null,
- "source": null
- },
- "sensitive_attributes": [
- [
- {
- "type": "get_attr",
- "value": "sensitive_content"
- }
- ]
- ]
- }
- ]
- },
- {
- "module": "module.tf_workspace_runners",
- "mode": "managed",
- "type": "null_resource",
- "name": "install_runner",
- "provider": "provider[\"registry.terraform.io/hashicorp/null\"]",
- "instances": [
- {
- "index_key": "automation-repos",
- "schema_version": 0,
- "attributes": {
- "id": "3548973422666814197",
- "triggers": {
- "repos": "automation-repos"
- }
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.tf_workspace_runners.local_file.supervisorctl"
- ]
- }
- ]
- },
- {
- "module": "module.tf_workspace_runners",
- "mode": "managed",
- "type": "null_resource",
- "name": "register_runner",
- "provider": "provider[\"registry.terraform.io/hashicorp/null\"]",
- "instances": [
- {
- "index_key": "automation-repos",
- "schema_version": 0,
- "attributes": {
- "id": "4622048817907345114",
- "triggers": {
- "repos": "automation-repos"
- }
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.tf_workspace_runners.data.github_actions_registration_token.token",
- "module.tf_workspace_runners.data.github_repository.repository",
- "module.tf_workspace_runners.github_actions_runner_group.rg",
- "module.tf_workspace_runners.local_file.env",
- "module.tf_workspace_runners.local_file.supervisorctl",
- "module.tf_workspace_runners.null_resource.install_runner"
- ]
- }
- ]
- },
- {
- "module": "module.tf_workspace_runners",
- "mode": "managed",
- "type": "null_resource",
- "name": "supervisorctl_reload",
- "provider": "provider[\"registry.terraform.io/hashicorp/null\"]",
- "instances": [
- {
- "schema_version": 0,
- "attributes": {
- "id": "3192770779385682437",
- "triggers": {
- "repos": "automation-repos"
- }
- },
- "sensitive_attributes": [],
- "dependencies": [
- "module.tf_workspace_runners.data.github_actions_registration_token.token",
- "module.tf_workspace_runners.data.github_repository.repository",
- "module.tf_workspace_runners.github_actions_runner_group.rg",
- "module.tf_workspace_runners.local_file.env",
- "module.tf_workspace_runners.local_file.supervisorctl",
- "module.tf_workspace_runners.null_resource.install_runner",
- "module.tf_workspace_runners.null_resource.register_runner"
- ]
- }
- ]
- }
- ],
- "check_results": null
-}
diff --git a/terraform.tfstate.backup b/terraform.tfstate.backup
index 764bee8..04bbc13 100644
--- a/terraform.tfstate.backup
+++ b/terraform.tfstate.backup
@@ -1,22 +1,22 @@
{
"version": 4,
"terraform_version": "1.9.4",
- "serial": 641,
+ "serial": 672,
"lineage": "e78a4e10-cf81-43c7-3669-9d54a726a442",
"outputs": {
"secrets": {
"value": {
"AWS_ACCESS_KEY_ID": {
"set": true,
- "value": "ASIATK6SR2K2SW7SXDM2"
+ "value": "ASIATK6SR2K27JMKCZWF"
},
"AWS_SECRET_ACCESS_KEY": {
"set": true,
- "value": "ek+ETgaND88bRWr0IdFHyOZ4LeEONYsjVMLeIZ5t"
+ "value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor"
},
"AWS_SESSION_TOKEN": {
"set": true,
- "value": "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"
+ "value": "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"
},
"GITHUB_TOKEN": {
"set": true,
@@ -79,7 +79,7 @@
"var": "AWS_ACCESS_KEY_ID"
},
"result": {
- "value": "ASIATK6SR2K2SW7SXDM2",
+ "value": "ASIATK6SR2K27JMKCZWF",
"varset": "set"
},
"working_dir": null
@@ -137,7 +137,7 @@
"var": "AWS_SECRET_ACCESS_KEY"
},
"result": {
- "value": "ek+ETgaND88bRWr0IdFHyOZ4LeEONYsjVMLeIZ5t",
+ "value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor",
"varset": "set"
},
"working_dir": null
@@ -195,7 +195,7 @@
"var": "AWS_SESSION_TOKEN"
},
"result": {
- "value": "IQoJb3JpZ2luX2VjELn//////////wEaDXVzLWdvdi1lYXN0LTEiSDBGAiEA9OGFOY1tfw6tWzanOPiGTewaDrqi6cuju5O/ggJK5kECIQDB5+FmgsmtznKNQmJIDVMu0028vOj3skCol0qkRHZ7SSqgAwjW//////////8BEAAaDDIyOTY4NTQ0OTM5NyIMxb0yvYJ4ozGiLmpyKvQCP91SWpgkzAnFQYfU6waaXqTXP2k5ptQ2LKa+D/dkWbPl6+EuhVW0u3vSjUM7GbgYAwg+pPO6fO59m4m08FIjKM4Hngwv+TqFQG0SaS9Hbbd+wQeJJc/T71/D3G+oHg5NOA/5/57gB26f79KRwhbUU9zkYId+79fY83diIfx4Z5SFBIeoyWwmhf8mamY7Qi6N39O1N/7cEAI1V8asZyfs/HPxuk0ZADCt6ekximlotJahWldQGmugrjMfmciRnLQuSiAoCb18fK8pN/9/lg7xVqO0sbGWmTBbWNaLctH+xG1RazedmQzcLTFq7z7zlql6FBhrQXUybSjj4i7kT3ZIKOH2C5TKCgYVNnf2Y/0LJuW8rLpA/S5OuBEP6UbhItkDzj5kZn6ec0f3vx3cMIB4jNzLBH9awfUF8aDkXSioqTLhhrB2j92ky/UaNLbtZXZU61buHlcTUI5zhziwpa0K9liHt7Tn5u7F2ngUmz6W6W7nLVPvMJjI+LUGOqUBxfo7tOTKsY5modN0EqLIvWOM0ZGgOrgFcKXfGRTIztSO/QdsgMkGVnr4yvkFCxJC3VwrpScwUVj5JpF6g79S3O11fWIN3sYOhzol/GRYApNN+xA7qY8o0QGCWamdrUR2x0Vi1sWkvNxhbL2TJlo6akYlFp+8sE4/gz7q1uoQG0NbJTRCJWMc2kR8I07LhqDImsSUng6lFx0eZQtR5EFhxK0JjrYk",
+ "value": "IQoJb3JpZ2luX2VjENH//////////wEaDXVzLWdvdi1lYXN0LTEiRzBFAiA1bXzDtUaBLN5c7y0DU79ZPwEM0E4X0+EsNEkZZmeYXwIhAISKrI7b1rCjPkzwjyBPMaSDzS3L4W4ty+od/ubhAojGKqADCO7//////////wEQABoMMjI5Njg1NDQ5Mzk3Igwmc2r9x6ZCLaA7/MEq9AIn8ArKVhts60a/S1MLFUyRP51IOkdolpyA7zc9S94I/unEmMFaFPiU7M1idu9dV6bXIUOM+gOiK+dAivKOPy9/OdqCnzA08RCbCpK15MPd+mb+jFNJizk6tU+ycyMtWrp7XeanqcQu64OWUi35zROZG2x/x7OAXv2jAMM4/NyAqg+PxM8coqkybWLNsjyb5SgD7PkXv0uj6vaXYzKuQGI3PRifAr6pwPe+PN7KX/P7A0PKWXKGBjKQTU+AMgJTcgyJLVleqfqlEwNr4eji+zbBn7zTOVVmwjMqPrYM4XuxEiNYyJTKpHAsk3j2KT//+Kmq51k1piaZa4t1IuHp5SGKHHKU0HXwDiKYtNXM6ayDrdUbp5TTCxWnrCklRiXVvAjOQ2PAcMEPIgOn1pNTbnmuMka965F/iQH4ccg8bjzSZrRN8qQfRtMxGh/1h9FfqcGrEWXQ5WtlT539I3G7gBclRCbn3owJfNvAY3cRkA6ZKlR86iMw/u/9tQY6pgFKYCO+WJ8W+csYeLNQEcWy2DMSUNEkO373V6iMwt8WZ6BjZbWbbYH/624tSxca6zvTN8GjkUIykgWgHagHsSQlHm4qDiDsPsEQvOGA3A6UA/q3x8s4n7VSMRDiSNDlCAPbnx12H3t6Zsga2RnfDAWZ5cdnFJPxwZTI2dLpOCUKkcOcSHNXCpB1mqGFAXEk+etEgInN2urj6+Gt4Ad38TCiLCJ16dB8",
"varset": "set"
},
"working_dir": null
@@ -643,7 +643,7 @@
"default_branch": "main",
"delete_branch_on_merge": true,
"description": "Imported External Github Actions Repository",
- "etag": "W/\"0ae8177344f7a849c965d5626b910a46bea59a532db68a88a9e765b2c6ea6bb3\"",
+ "etag": "W/\"76ffc347af83201a93efffd0c85c896a351c1c1c12f0e4eb5c85bc94074a4624\"",
"full_name": "CSVD/gh-actions-checkout",
"git_clone_url": "git://github.e.it.census.gov/CSVD/gh-actions-checkout.git",
"gitignore_template": "Terraform",
@@ -1126,13 +1126,13 @@
"index_key": "AWS_SECRET_ACCESS_KEY",
"schema_version": 0,
"attributes": {
- "created_at": "2024-08-15 15:53:16 +0000 UTC",
+ "created_at": "2024-08-16 16:03:23 +0000 UTC",
"encrypted_value": "",
"id": "automation-repos:AWS_SECRET_ACCESS_KEY",
- "plaintext_value": "ek+ETgaND88bRWr0IdFHyOZ4LeEONYsjVMLeIZ5t",
+ "plaintext_value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor",
"repository": "automation-repos",
"secret_name": "AWS_SECRET_ACCESS_KEY",
- "updated_at": "2024-08-15 15:53:16 +0000 UTC"
+ "updated_at": "2024-08-16 16:03:23 +0000 UTC"
},
"sensitive_attributes": [
[
@@ -1158,25 +1158,25 @@
"index_key": "AWS_SESSION_TOKEN",
"schema_version": 0,
"attributes": {
- "created_at": "2024-08-15 15:53:05 +0000 UTC",
+ "created_at": "2024-08-16 16:03:12 +0000 UTC",
"encrypted_value": "",
"id": "automation-repos:AWS_SESSION_TOKEN",
- "plaintext_value": "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",
+ "plaintext_value": "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",
"repository": "automation-repos",
"secret_name": "AWS_SESSION_TOKEN",
- "updated_at": "2024-08-15 15:53:05 +0000 UTC"
+ "updated_at": "2024-08-16 16:03:12 +0000 UTC"
},
"sensitive_attributes": [
[
{
"type": "get_attr",
- "value": "encrypted_value"
+ "value": "plaintext_value"
}
],
[
{
"type": "get_attr",
- "value": "plaintext_value"
+ "value": "encrypted_value"
}
]
],
@@ -1234,8 +1234,8 @@
"created_at": "2024-08-13 15:58:54 +0000 UTC",
"id": "automation-repos:AWS_ACCESS_KEY_ID",
"repository": "automation-repos",
- "updated_at": "2024-08-15 15:52:57 +0000 UTC",
- "value": "ASIATK6SR2K2SW7SXDM2",
+ "updated_at": "2024-08-16 16:03:07 +0000 UTC",
+ "value": "ASIATK6SR2K27JMKCZWF",
"variable_name": "AWS_ACCESS_KEY_ID"
},
"sensitive_attributes": [],
@@ -1258,25 +1258,25 @@
"index_key": "AWS_SECRET_ACCESS_KEY",
"schema_version": 0,
"attributes": {
- "created_at": "2024-08-15 15:53:14 +0000 UTC",
+ "created_at": "2024-08-16 16:03:26 +0000 UTC",
"encrypted_value": "",
"id": "aws-image-pipeline:AWS_SECRET_ACCESS_KEY",
- "plaintext_value": "ek+ETgaND88bRWr0IdFHyOZ4LeEONYsjVMLeIZ5t",
+ "plaintext_value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor",
"repository": "aws-image-pipeline",
"secret_name": "AWS_SECRET_ACCESS_KEY",
- "updated_at": "2024-08-15 15:53:14 +0000 UTC"
+ "updated_at": "2024-08-16 16:03:26 +0000 UTC"
},
"sensitive_attributes": [
[
{
"type": "get_attr",
- "value": "plaintext_value"
+ "value": "encrypted_value"
}
],
[
{
"type": "get_attr",
- "value": "encrypted_value"
+ "value": "plaintext_value"
}
]
],
@@ -1290,13 +1290,13 @@
"index_key": "AWS_SESSION_TOKEN",
"schema_version": 0,
"attributes": {
- "created_at": "2024-08-15 15:53:17 +0000 UTC",
+ "created_at": "2024-08-16 16:03:19 +0000 UTC",
"encrypted_value": "",
"id": "aws-image-pipeline:AWS_SESSION_TOKEN",
- "plaintext_value": "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",
+ "plaintext_value": "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",
"repository": "aws-image-pipeline",
"secret_name": "AWS_SESSION_TOKEN",
- "updated_at": "2024-08-15 15:53:17 +0000 UTC"
+ "updated_at": "2024-08-16 16:03:19 +0000 UTC"
},
"sensitive_attributes": [
[
@@ -1334,13 +1334,13 @@
[
{
"type": "get_attr",
- "value": "plaintext_value"
+ "value": "encrypted_value"
}
],
[
{
"type": "get_attr",
- "value": "encrypted_value"
+ "value": "plaintext_value"
}
]
],
@@ -1366,8 +1366,8 @@
"created_at": "2024-08-13 15:59:56 +0000 UTC",
"id": "aws-image-pipeline:AWS_ACCESS_KEY_ID",
"repository": "aws-image-pipeline",
- "updated_at": "2024-08-15 15:53:00 +0000 UTC",
- "value": "ASIATK6SR2K2SW7SXDM2",
+ "updated_at": "2024-08-16 16:03:04 +0000 UTC",
+ "value": "ASIATK6SR2K27JMKCZWF",
"variable_name": "AWS_ACCESS_KEY_ID"
},
"sensitive_attributes": [],
@@ -1390,13 +1390,13 @@
"index_key": "AWS_SECRET_ACCESS_KEY",
"schema_version": 0,
"attributes": {
- "created_at": "2024-08-15 15:53:04 +0000 UTC",
+ "created_at": "2024-08-16 16:03:11 +0000 UTC",
"encrypted_value": "",
"id": "image-pipeline-ansible-playbooks:AWS_SECRET_ACCESS_KEY",
- "plaintext_value": "ek+ETgaND88bRWr0IdFHyOZ4LeEONYsjVMLeIZ5t",
+ "plaintext_value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor",
"repository": "image-pipeline-ansible-playbooks",
"secret_name": "AWS_SECRET_ACCESS_KEY",
- "updated_at": "2024-08-15 15:53:04 +0000 UTC"
+ "updated_at": "2024-08-16 16:03:11 +0000 UTC"
},
"sensitive_attributes": [
[
@@ -1422,25 +1422,25 @@
"index_key": "AWS_SESSION_TOKEN",
"schema_version": 0,
"attributes": {
- "created_at": "2024-08-15 15:53:10 +0000 UTC",
+ "created_at": "2024-08-16 16:03:22 +0000 UTC",
"encrypted_value": "",
"id": "image-pipeline-ansible-playbooks:AWS_SESSION_TOKEN",
- "plaintext_value": "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",
+ "plaintext_value": "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",
"repository": "image-pipeline-ansible-playbooks",
"secret_name": "AWS_SESSION_TOKEN",
- "updated_at": "2024-08-15 15:53:10 +0000 UTC"
+ "updated_at": "2024-08-16 16:03:22 +0000 UTC"
},
"sensitive_attributes": [
[
{
"type": "get_attr",
- "value": "encrypted_value"
+ "value": "plaintext_value"
}
],
[
{
"type": "get_attr",
- "value": "plaintext_value"
+ "value": "encrypted_value"
}
]
],
@@ -1498,8 +1498,8 @@
"created_at": "2024-08-13 15:58:50 +0000 UTC",
"id": "image-pipeline-ansible-playbooks:AWS_ACCESS_KEY_ID",
"repository": "image-pipeline-ansible-playbooks",
- "updated_at": "2024-08-15 15:52:58 +0000 UTC",
- "value": "ASIATK6SR2K2SW7SXDM2",
+ "updated_at": "2024-08-16 16:03:09 +0000 UTC",
+ "value": "ASIATK6SR2K27JMKCZWF",
"variable_name": "AWS_ACCESS_KEY_ID"
},
"sensitive_attributes": [],
@@ -1522,25 +1522,25 @@
"index_key": "AWS_SECRET_ACCESS_KEY",
"schema_version": 0,
"attributes": {
- "created_at": "2024-08-15 15:53:12 +0000 UTC",
+ "created_at": "2024-08-16 16:03:18 +0000 UTC",
"encrypted_value": "",
"id": "image-pipeline-goss-testing:AWS_SECRET_ACCESS_KEY",
- "plaintext_value": "ek+ETgaND88bRWr0IdFHyOZ4LeEONYsjVMLeIZ5t",
+ "plaintext_value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor",
"repository": "image-pipeline-goss-testing",
"secret_name": "AWS_SECRET_ACCESS_KEY",
- "updated_at": "2024-08-15 15:53:12 +0000 UTC"
+ "updated_at": "2024-08-16 16:03:18 +0000 UTC"
},
"sensitive_attributes": [
[
{
"type": "get_attr",
- "value": "encrypted_value"
+ "value": "plaintext_value"
}
],
[
{
"type": "get_attr",
- "value": "plaintext_value"
+ "value": "encrypted_value"
}
]
],
@@ -1554,25 +1554,25 @@
"index_key": "AWS_SESSION_TOKEN",
"schema_version": 0,
"attributes": {
- "created_at": "2024-08-15 15:53:08 +0000 UTC",
+ "created_at": "2024-08-16 16:03:20 +0000 UTC",
"encrypted_value": "",
"id": "image-pipeline-goss-testing:AWS_SESSION_TOKEN",
- "plaintext_value": "IQoJb3JpZ2luX2VjELn//////////wEaDXVzLWdvdi1lYXN0LTEiSDBGAiEA9OGFOY1tfw6tWzanOPiGTewaDrqi6cuju5O/ggJK5kECIQDB5+FmgsmtznKNQmJIDVMu0028vOj3skCol0qkRHZ7SSqgAwjW//////////8BEAAaDDIyOTY4NTQ0OTM5NyIMxb0yvYJ4ozGiLmpyKvQCP91SWpgkzAnFQYfU6waaXqTXP2k5ptQ2LKa+D/dkWbPl6+EuhVW0u3vSjUM7GbgYAwg+pPO6fO59m4m08FIjKM4Hngwv+TqFQG0SaS9Hbbd+wQeJJc/T71/D3G+oHg5NOA/5/57gB26f79KRwhbUU9zkYId+79fY83diIfx4Z5SFBIeoyWwmhf8mamY7Qi6N39O1N/7cEAI1V8asZyfs/HPxuk0ZADCt6ekximlotJahWldQGmugrjMfmciRnLQuSiAoCb18fK8pN/9/lg7xVqO0sbGWmTBbWNaLctH+xG1RazedmQzcLTFq7z7zlql6FBhrQXUybSjj4i7kT3ZIKOH2C5TKCgYVNnf2Y/0LJuW8rLpA/S5OuBEP6UbhItkDzj5kZn6ec0f3vx3cMIB4jNzLBH9awfUF8aDkXSioqTLhhrB2j92ky/UaNLbtZXZU61buHlcTUI5zhziwpa0K9liHt7Tn5u7F2ngUmz6W6W7nLVPvMJjI+LUGOqUBxfo7tOTKsY5modN0EqLIvWOM0ZGgOrgFcKXfGRTIztSO/QdsgMkGVnr4yvkFCxJC3VwrpScwUVj5JpF6g79S3O11fWIN3sYOhzol/GRYApNN+xA7qY8o0QGCWamdrUR2x0Vi1sWkvNxhbL2TJlo6akYlFp+8sE4/gz7q1uoQG0NbJTRCJWMc2kR8I07LhqDImsSUng6lFx0eZQtR5EFhxK0JjrYk",
+ "plaintext_value": "IQoJb3JpZ2luX2VjENH//////////wEaDXVzLWdvdi1lYXN0LTEiRzBFAiA1bXzDtUaBLN5c7y0DU79ZPwEM0E4X0+EsNEkZZmeYXwIhAISKrI7b1rCjPkzwjyBPMaSDzS3L4W4ty+od/ubhAojGKqADCO7//////////wEQABoMMjI5Njg1NDQ5Mzk3Igwmc2r9x6ZCLaA7/MEq9AIn8ArKVhts60a/S1MLFUyRP51IOkdolpyA7zc9S94I/unEmMFaFPiU7M1idu9dV6bXIUOM+gOiK+dAivKOPy9/OdqCnzA08RCbCpK15MPd+mb+jFNJizk6tU+ycyMtWrp7XeanqcQu64OWUi35zROZG2x/x7OAXv2jAMM4/NyAqg+PxM8coqkybWLNsjyb5SgD7PkXv0uj6vaXYzKuQGI3PRifAr6pwPe+PN7KX/P7A0PKWXKGBjKQTU+AMgJTcgyJLVleqfqlEwNr4eji+zbBn7zTOVVmwjMqPrYM4XuxEiNYyJTKpHAsk3j2KT//+Kmq51k1piaZa4t1IuHp5SGKHHKU0HXwDiKYtNXM6ayDrdUbp5TTCxWnrCklRiXVvAjOQ2PAcMEPIgOn1pNTbnmuMka965F/iQH4ccg8bjzSZrRN8qQfRtMxGh/1h9FfqcGrEWXQ5WtlT539I3G7gBclRCbn3owJfNvAY3cRkA6ZKlR86iMw/u/9tQY6pgFKYCO+WJ8W+csYeLNQEcWy2DMSUNEkO373V6iMwt8WZ6BjZbWbbYH/624tSxca6zvTN8GjkUIykgWgHagHsSQlHm4qDiDsPsEQvOGA3A6UA/q3x8s4n7VSMRDiSNDlCAPbnx12H3t6Zsga2RnfDAWZ5cdnFJPxwZTI2dLpOCUKkcOcSHNXCpB1mqGFAXEk+etEgInN2urj6+Gt4Ad38TCiLCJ16dB8",
"repository": "image-pipeline-goss-testing",
"secret_name": "AWS_SESSION_TOKEN",
- "updated_at": "2024-08-15 15:53:08 +0000 UTC"
+ "updated_at": "2024-08-16 16:03:20 +0000 UTC"
},
"sensitive_attributes": [
[
{
"type": "get_attr",
- "value": "plaintext_value"
+ "value": "encrypted_value"
}
],
[
{
"type": "get_attr",
- "value": "encrypted_value"
+ "value": "plaintext_value"
}
]
],
@@ -1598,13 +1598,13 @@
[
{
"type": "get_attr",
- "value": "encrypted_value"
+ "value": "plaintext_value"
}
],
[
{
"type": "get_attr",
- "value": "plaintext_value"
+ "value": "encrypted_value"
}
]
],
@@ -1630,8 +1630,8 @@
"created_at": "2024-08-13 15:58:55 +0000 UTC",
"id": "image-pipeline-goss-testing:AWS_ACCESS_KEY_ID",
"repository": "image-pipeline-goss-testing",
- "updated_at": "2024-08-15 15:53:01 +0000 UTC",
- "value": "ASIATK6SR2K2SW7SXDM2",
+ "updated_at": "2024-08-16 16:03:06 +0000 UTC",
+ "value": "ASIATK6SR2K27JMKCZWF",
"variable_name": "AWS_ACCESS_KEY_ID"
},
"sensitive_attributes": [],
@@ -1654,25 +1654,25 @@
"index_key": "AWS_SECRET_ACCESS_KEY",
"schema_version": 0,
"attributes": {
- "created_at": "2024-08-15 15:53:11 +0000 UTC",
+ "created_at": "2024-08-16 16:03:25 +0000 UTC",
"encrypted_value": "",
"id": "linux-image-pipeline:AWS_SECRET_ACCESS_KEY",
- "plaintext_value": "ek+ETgaND88bRWr0IdFHyOZ4LeEONYsjVMLeIZ5t",
+ "plaintext_value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor",
"repository": "linux-image-pipeline",
"secret_name": "AWS_SECRET_ACCESS_KEY",
- "updated_at": "2024-08-15 15:53:11 +0000 UTC"
+ "updated_at": "2024-08-16 16:03:25 +0000 UTC"
},
"sensitive_attributes": [
[
{
"type": "get_attr",
- "value": "plaintext_value"
+ "value": "encrypted_value"
}
],
[
{
"type": "get_attr",
- "value": "encrypted_value"
+ "value": "plaintext_value"
}
]
],
@@ -1686,13 +1686,13 @@
"index_key": "AWS_SESSION_TOKEN",
"schema_version": 0,
"attributes": {
- "created_at": "2024-08-15 15:53:19 +0000 UTC",
+ "created_at": "2024-08-16 16:03:13 +0000 UTC",
"encrypted_value": "",
"id": "linux-image-pipeline:AWS_SESSION_TOKEN",
- "plaintext_value": "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",
+ "plaintext_value": "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",
"repository": "linux-image-pipeline",
"secret_name": "AWS_SESSION_TOKEN",
- "updated_at": "2024-08-15 15:53:19 +0000 UTC"
+ "updated_at": "2024-08-16 16:03:13 +0000 UTC"
},
"sensitive_attributes": [
[
@@ -1730,13 +1730,13 @@
[
{
"type": "get_attr",
- "value": "encrypted_value"
+ "value": "plaintext_value"
}
],
[
{
"type": "get_attr",
- "value": "plaintext_value"
+ "value": "encrypted_value"
}
]
],
@@ -1762,8 +1762,8 @@
"created_at": "2024-08-13 15:58:56 +0000 UTC",
"id": "linux-image-pipeline:AWS_ACCESS_KEY_ID",
"repository": "linux-image-pipeline",
- "updated_at": "2024-08-15 15:52:56 +0000 UTC",
- "value": "ASIATK6SR2K2SW7SXDM2",
+ "updated_at": "2024-08-16 16:03:05 +0000 UTC",
+ "value": "ASIATK6SR2K27JMKCZWF",
"variable_name": "AWS_ACCESS_KEY_ID"
},
"sensitive_attributes": [],
@@ -1786,13 +1786,13 @@
"index_key": "AWS_SECRET_ACCESS_KEY",
"schema_version": 0,
"attributes": {
- "created_at": "2024-08-15 15:53:06 +0000 UTC",
+ "created_at": "2024-08-16 16:03:17 +0000 UTC",
"encrypted_value": "",
"id": "windows-image-pipeline:AWS_SECRET_ACCESS_KEY",
- "plaintext_value": "ek+ETgaND88bRWr0IdFHyOZ4LeEONYsjVMLeIZ5t",
+ "plaintext_value": "etnJvcdI2du8loIBxfUfMhZSNofkkco7RAj/rvor",
"repository": "windows-image-pipeline",
"secret_name": "AWS_SECRET_ACCESS_KEY",
- "updated_at": "2024-08-15 15:53:06 +0000 UTC"
+ "updated_at": "2024-08-16 16:03:17 +0000 UTC"
},
"sensitive_attributes": [
[
@@ -1818,25 +1818,25 @@
"index_key": "AWS_SESSION_TOKEN",
"schema_version": 0,
"attributes": {
- "created_at": "2024-08-15 15:53:13 +0000 UTC",
+ "created_at": "2024-08-16 16:03:15 +0000 UTC",
"encrypted_value": "",
"id": "windows-image-pipeline:AWS_SESSION_TOKEN",
- "plaintext_value": "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",
+ "plaintext_value": "IQoJb3JpZ2luX2VjENH//////////wEaDXVzLWdvdi1lYXN0LTEiRzBFAiA1bXzDtUaBLN5c7y0DU79ZPwEM0E4X0+EsNEkZZmeYXwIhAISKrI7b1rCjPkzwjyBPMaSDzS3L4W4ty+od/ubhAojGKqADCO7//////////wEQABoMMjI5Njg1NDQ5Mzk3Igwmc2r9x6ZCLaA7/MEq9AIn8ArKVhts60a/S1MLFUyRP51IOkdolpyA7zc9S94I/unEmMFaFPiU7M1idu9dV6bXIUOM+gOiK+dAivKOPy9/OdqCnzA08RCbCpK15MPd+mb+jFNJizk6tU+ycyMtWrp7XeanqcQu64OWUi35zROZG2x/x7OAXv2jAMM4/NyAqg+PxM8coqkybWLNsjyb5SgD7PkXv0uj6vaXYzKuQGI3PRifAr6pwPe+PN7KX/P7A0PKWXKGBjKQTU+AMgJTcgyJLVleqfqlEwNr4eji+zbBn7zTOVVmwjMqPrYM4XuxEiNYyJTKpHAsk3j2KT//+Kmq51k1piaZa4t1IuHp5SGKHHKU0HXwDiKYtNXM6ayDrdUbp5TTCxWnrCklRiXVvAjOQ2PAcMEPIgOn1pNTbnmuMka965F/iQH4ccg8bjzSZrRN8qQfRtMxGh/1h9FfqcGrEWXQ5WtlT539I3G7gBclRCbn3owJfNvAY3cRkA6ZKlR86iMw/u/9tQY6pgFKYCO+WJ8W+csYeLNQEcWy2DMSUNEkO373V6iMwt8WZ6BjZbWbbYH/624tSxca6zvTN8GjkUIykgWgHagHsSQlHm4qDiDsPsEQvOGA3A6UA/q3x8s4n7VSMRDiSNDlCAPbnx12H3t6Zsga2RnfDAWZ5cdnFJPxwZTI2dLpOCUKkcOcSHNXCpB1mqGFAXEk+etEgInN2urj6+Gt4Ad38TCiLCJ16dB8",
"repository": "windows-image-pipeline",
"secret_name": "AWS_SESSION_TOKEN",
- "updated_at": "2024-08-15 15:53:13 +0000 UTC"
+ "updated_at": "2024-08-16 16:03:15 +0000 UTC"
},
"sensitive_attributes": [
[
{
"type": "get_attr",
- "value": "plaintext_value"
+ "value": "encrypted_value"
}
],
[
{
"type": "get_attr",
- "value": "encrypted_value"
+ "value": "plaintext_value"
}
]
],
@@ -1894,8 +1894,8 @@
"created_at": "2024-08-13 15:58:51 +0000 UTC",
"id": "windows-image-pipeline:AWS_ACCESS_KEY_ID",
"repository": "windows-image-pipeline",
- "updated_at": "2024-08-15 15:53:02 +0000 UTC",
- "value": "ASIATK6SR2K2SW7SXDM2",
+ "updated_at": "2024-08-16 16:03:03 +0000 UTC",
+ "value": "ASIATK6SR2K27JMKCZWF",
"variable_name": "AWS_ACCESS_KEY_ID"
},
"sensitive_attributes": [],
@@ -1918,10 +1918,10 @@
"index_key": "aws-image-pipeline",
"schema_version": 0,
"attributes": {
- "expires_at": 1723753461,
+ "expires_at": 1723827734,
"id": "CSVD/aws-image-pipeline",
"repository": "aws-image-pipeline",
- "token": "AAAAEJMMDQ6HPPJ6G2MYJDDGXZR7K"
+ "token": "AAAAEJLQS2QBDH3RIUVJWADGX6DBM"
},
"sensitive_attributes": []
},
@@ -1929,10 +1929,10 @@
"index_key": "image-pipeline-ansible-playbooks",
"schema_version": 0,
"attributes": {
- "expires_at": 1723753466,
+ "expires_at": 1723827733,
"id": "CSVD/image-pipeline-ansible-playbooks",
"repository": "image-pipeline-ansible-playbooks",
- "token": "AAAAEJLP6RS7X6AQEE4CQBTGXZR7U"
+ "token": "AAAAEJNF5CVBHLRTCBD267TGX6DBK"
},
"sensitive_attributes": []
},
@@ -1940,10 +1940,10 @@
"index_key": "image-pipeline-goss-testing",
"schema_version": 0,
"attributes": {
- "expires_at": 1723753462,
+ "expires_at": 1723827737,
"id": "CSVD/image-pipeline-goss-testing",
"repository": "image-pipeline-goss-testing",
- "token": "AAAAEJNSWXLQ5CA7FRCJZ4DGXZR7M"
+ "token": "AAAAEJOGZJWTM3F4AOCOIRTGX6DBS"
},
"sensitive_attributes": []
},
@@ -1951,10 +1951,10 @@
"index_key": "linux-image-pipeline",
"schema_version": 0,
"attributes": {
- "expires_at": 1723753465,
+ "expires_at": 1723827740,
"id": "CSVD/linux-image-pipeline",
"repository": "linux-image-pipeline",
- "token": "AAAAEJMZOXUTO6MAEZO63M3GXZR7S"
+ "token": "AAAAEJOAQQJ2BQ7UGNNYEU3GX6DBY"
},
"sensitive_attributes": []
},
@@ -1962,10 +1962,10 @@
"index_key": "windows-image-pipeline",
"schema_version": 0,
"attributes": {
- "expires_at": 1723753464,
+ "expires_at": 1723827738,
"id": "CSVD/windows-image-pipeline",
"repository": "windows-image-pipeline",
- "token": "AAAAEJO5U6G34LBMXUSY7BTGXZR7Q"
+ "token": "AAAAEJJGZGXS4AZ7NEJJ4LLGX6DBU"
},
"sensitive_attributes": []
}
@@ -2725,10 +2725,10 @@
"index_key": "automation-repos",
"schema_version": 0,
"attributes": {
- "expires_at": 1723753460,
+ "expires_at": 1723827735,
"id": "CSVD/automation-repos",
"repository": "automation-repos",
- "token": "AAAAEJKJUHTIV7P6RXHIKCTGXZR7I"
+ "token": "AAAAEJPEUN6NU5LOFENWNQTGX6DBO"
},
"sensitive_attributes": []
}