Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add vapor implementation #33

Open
wants to merge 17 commits into
base: main
Choose a base branch
from
Open

Conversation

elmoritz
Copy link
Collaborator

@elmoritz elmoritz commented Apr 3, 2023

Branch-state:

  • implementation
  • build pipeline
  • setup terraform
  • promote Draft to Pull Request
  • fixing upload issues in github action
  • waiting for approval

I tried to get it to deploy but have some issues with terraform.
@akoufa could you have a look, please

@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in Terraform Cloud. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

To view this run in a browser, visit:
https://app.terraform.io/app/arconsis-benchmarks/server-benchmarks/runs/run-j9G1QhzjW4M7BzL2

Waiting for the plan to start...

Terraform v1.3.6
on linux_amd64
Initializing plugins and modules...
module.books-database.module.aurora_postgresql_v2.data.aws_iam_policy_document.monitoring_rds_assume_role: Reading...
data.aws_route53_zone.selected: Reading...
module.books-database.data.aws_rds_engine_version.postgresql: Reading...
module.books-database.module.aurora_postgresql_v2.data.aws_partition.current: Reading...
module.database_secrets.data.aws_secretsmanager_secret.database_password_secret: Reading...
module.books-database.module.aurora_postgresql_v2.data.aws_iam_policy_document.monitoring_rds_assume_role: Read complete after 0s [id=1813475199]
data.aws_iam_policy_document.ecs_task_execution_role: Reading...
module.vpc.data.aws_availability_zones.available: Reading...
module.database_secrets.data.aws_secretsmanager_secret.database_username_secret: Reading...
module.books-database.module.aurora_postgresql_v2.data.aws_partition.current: Read complete after 0s [id=aws]
data.aws_iam_policy_document.ecs_task_execution_role: Read complete after 0s [id=320642683]
module.vpc.data.aws_availability_zones.available: Read complete after 1s [id=eu-west-1]
module.database_secrets.data.aws_secretsmanager_secret.database_username_secret: Read complete after 1s [id=arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_username-LuQUUS]
module.database_secrets.data.aws_secretsmanager_secret_version.database_username_secret: Reading...
module.database_secrets.data.aws_secretsmanager_secret.database_password_secret: Read complete after 1s [id=arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_password-jxLU1d]
module.database_secrets.data.aws_secretsmanager_secret_version.database_password_secret: Reading...
module.books-database.data.aws_rds_engine_version.postgresql: Read complete after 1s [id=14.5]
module.database_secrets.data.aws_secretsmanager_secret_version.database_username_secret: Read complete after 0s [id=arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_username-LuQUUS|AWSCURRENT]
module.database_secrets.data.aws_secretsmanager_secret_version.database_password_secret: Read complete after 0s [id=arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_password-jxLU1d|AWSCURRENT]
data.aws_route53_zone.selected: Read complete after 1s [id=Z06363412OJ2EWYGII7J]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
 <= read (data resources)

Terraform will perform the following actions:

  # aws_cloudwatch_log_group.vpc_flow_logs will be created
  + resource "aws_cloudwatch_log_group" "vpc_flow_logs" {
      + arn               = (known after apply)
      + id                = (known after apply)
      + name              = "bookstore-vpc-flow-logs"
      + name_prefix       = (known after apply)
      + retention_in_days = 30
      + skip_destroy      = false
      + tags_all          = (known after apply)
    }

  # aws_ecs_cluster.main will be created
  + resource "aws_ecs_cluster" "main" {
      + arn                = (known after apply)
      + capacity_providers = (known after apply)
      + id                 = (known after apply)
      + name               = "server-benchmarks"
      + tags               = {
          + "Name" = "server-benchmarks-ecs-cluster"
        }
      + tags_all           = {
          + "Name" = "server-benchmarks-ecs-cluster"
        }

      + default_capacity_provider_strategy {
          + base              = (known after apply)
          + capacity_provider = (known after apply)
          + weight            = (known after apply)
        }

      + setting {
          + name  = (known after apply)
          + value = (known after apply)
        }
    }

  # aws_flow_log.vpc_flow_logs will be created
  + resource "aws_flow_log" "vpc_flow_logs" {
      + arn                      = (known after apply)
      + iam_role_arn             = (known after apply)
      + id                       = (known after apply)
      + log_destination          = (known after apply)
      + log_destination_type     = "cloud-watch-logs"
      + log_format               = (known after apply)
      + log_group_name           = (known after apply)
      + max_aggregation_interval = 600
      + tags_all                 = (known after apply)
      + traffic_type             = "ALL"
      + vpc_id                   = (known after apply)
    }

  # aws_iam_role.ecs_task_execution_role will be created
  + resource "aws_iam_role" "ecs_task_execution_role" {
      + arn                   = (known after apply)
      + assume_role_policy    = jsonencode(
            {
              + Statement = [
                  + {
                      + Action    = "sts:AssumeRole"
                      + Effect    = "Allow"
                      + Principal = {
                          + Service = "ecs-tasks.amazonaws.com"
                        }
                      + Sid       = ""
                    },
                ]
              + Version   = "2012-10-17"
            }
        )
      + create_date           = (known after apply)
      + force_detach_policies = false
      + id                    = (known after apply)
      + managed_policy_arns   = (known after apply)
      + max_session_duration  = 3600
      + name                  = "ecsTaskExecutionRole"
      + name_prefix           = (known after apply)
      + path                  = "/"
      + tags_all              = (known after apply)
      + unique_id             = (known after apply)

      + inline_policy {
          + name   = (known after apply)
          + policy = (known after apply)
        }
    }

  # aws_iam_role.vpc_flow_cloudwatch_logs_role will be created
  + resource "aws_iam_role" "vpc_flow_cloudwatch_logs_role" {
      + arn                   = (known after apply)
      + assume_role_policy    = jsonencode(
            {
              + Statement = [
                  + {
                      + Action    = "sts:AssumeRole"
                      + Effect    = "Allow"
                      + Principal = {
                          + Service = "vpc-flow-logs.amazonaws.com"
                        }
                      + Sid       = ""
                    },
                ]
              + Version   = "2012-10-17"
            }
        )
      + create_date           = (known after apply)
      + force_detach_policies = false
      + id                    = (known after apply)
      + managed_policy_arns   = (known after apply)
      + max_session_duration  = 3600
      + name                  = "vpc-flow-cloudwatch-logs-role"
      + name_prefix           = (known after apply)
      + path                  = "/"
      + tags_all              = (known after apply)
      + unique_id             = (known after apply)

      + inline_policy {
          + name   = (known after apply)
          + policy = (known after apply)
        }
    }

  # aws_iam_role_policy.vpc_flow_cloudwatch_logs_policy will be created
  + resource "aws_iam_role_policy" "vpc_flow_cloudwatch_logs_policy" {
      + id     = (known after apply)
      + name   = "vpc-flow-cloudwatch-logs-policy"
      + policy = jsonencode(
            {
              + Statement = [
                  + {
                      + Action   = [
                          + "logs:CreateLogGroup",
                          + "logs:CreateLogStream",
                          + "logs:PutLogEvents",
                          + "logs:DescribeLogGroups",
                          + "logs:DescribeLogStreams",
                        ]
                      + Effect   = "Allow"
                      + Resource = "*"
                    },
                ]
              + Version   = "2012-10-17"
            }
        )
      + role   = (known after apply)
    }

  # aws_iam_role_policy_attachment.ecs_task_execution_role will be created
  + resource "aws_iam_role_policy_attachment" "ecs_task_execution_role" {
      + id         = (known after apply)
      + policy_arn = "arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy"
      + role       = "ecsTaskExecutionRole"
    }

  # aws_route53_record.www will be created
  + resource "aws_route53_record" "www" {
      + allow_overwrite = true
      + fqdn            = (known after apply)
      + id              = (known after apply)
      + name            = "server-benchmarks.com"
      + type            = "A"
      + zone_id         = "Z06363412OJ2EWYGII7J"

      + alias {
          + evaluate_target_health = true
          + name                   = (known after apply)
          + zone_id                = (known after apply)
        }
    }

  # module.alb_sg.aws_security_group.this will be created
  + resource "aws_security_group" "this" {
      + arn                    = (known after apply)
      + description            = "controls access to the ALB"
      + egress                 = (known after apply)
      + id                     = (known after apply)
      + ingress                = (known after apply)
      + name                   = "load-balancer-security-group"
      + name_prefix            = (known after apply)
      + owner_id               = (known after apply)
      + revoke_rules_on_delete = false
      + tags                   = (known after apply)
      + tags_all               = (known after apply)
      + vpc_id                 = (known after apply)
    }

  # module.alb_sg.aws_security_group_rule.egress_cidr_rules["1"] will be created
  + resource "aws_security_group_rule" "egress_cidr_rules" {
      + cidr_blocks              = [
          + "0.0.0.0/0",
        ]
      + description              = "allow all outbound"
      + from_port                = 0
      + id                       = (known after apply)
      + ipv6_cidr_blocks         = [
          + "::/0",
        ]
      + protocol                 = "-1"
      + security_group_id        = (known after apply)
      + security_group_rule_id   = (known after apply)
      + self                     = false
      + source_security_group_id = (known after apply)
      + to_port                  = 0
      + type                     = "egress"
    }

  # module.alb_sg.aws_security_group_rule.ingress_cidr_rules["1"] will be created
  + resource "aws_security_group_rule" "ingress_cidr_rules" {
      + cidr_blocks              = [
          + "0.0.0.0/0",
        ]
      + description              = "controls access to the ALB"
      + from_port                = 80
      + id                       = (known after apply)
      + ipv6_cidr_blocks         = [
          + "::/0",
        ]
      + protocol                 = "tcp"
      + security_group_id        = (known after apply)
      + security_group_rule_id   = (known after apply)
      + self                     = false
      + source_security_group_id = (known after apply)
      + to_port                  = 80
      + type                     = "ingress"
    }

  # module.books-database.aws_db_parameter_group.this will be created
  + resource "aws_db_parameter_group" "this" {
      + arn         = (known after apply)
      + description = "booksdb-db-parameter-group"
      + family      = "aurora-postgresql14"
      + id          = (known after apply)
      + name        = "booksdb-db-parameter-group"
      + name_prefix = (known after apply)
      + tags        = {
          + "Name" = "booksdb"
        }
      + tags_all    = {
          + "Name" = "booksdb"
        }
    }

  # module.books-database.aws_rds_cluster_parameter_group.this will be created
  + resource "aws_rds_cluster_parameter_group" "this" {
      + arn         = (known after apply)
      + description = "booksdb-cluster-parameter-group"
      + family      = "aurora-postgresql14"
      + id          = (known after apply)
      + name        = "booksdb-cluster-parameter-group"
      + name_prefix = (known after apply)
      + tags        = {
          + "Name" = "booksdb"
        }
      + tags_all    = {
          + "Name" = "booksdb"
        }
    }

  # module.database_secrets.aws_iam_role_policy.password_policy_secretsmanager will be created
  + resource "aws_iam_role_policy" "password_policy_secretsmanager" {
      + id     = (known after apply)
      + name   = "password-policy-secretsmanager"
      + policy = jsonencode(
            {
              + Statement = [
                  + {
                      + Action   = [
                          + "secretsmanager:GetSecretValue",
                        ]
                      + Effect   = "Allow"
                      + Resource = [
                          + "arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_username-LuQUUS",
                          + "arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_password-jxLU1d",
                        ]
                    },
                ]
              + Version   = "2012-10-17"
            }
        )
      + role   = (known after apply)
    }

  # module.ecs_actix_app.data.template_file.this will be read during apply
  # (config refers to values not yet known)
 <= data "template_file" "this" {
      + id       = (known after apply)
      + rendered = (known after apply)
      + template = <<-EOT
            [
              {
                "name": "${task_name}",
                "image": "${image}",
                "cpu": ${fargate_cpu},
                "memory": ${fargate_memory},
                "networkMode": "${network_mode}",
                "logConfiguration": {
                    "logDriver": "awslogs",
                    "options": {
                      "awslogs-group": "${aws_logs_group}",
                      "awslogs-region": "${aws_region}",
                      "awslogs-stream-prefix": "ecs"
                    }
                },
                "portMappings": [
                  {
                    "containerPort": ${container_port},
                    "hostPort": ${host_port}
                  }
                ],
                "environment": ${env_vars},
                "secrets": ${secret_vars}
              }
            ]
        EOT
      + vars     = {
          + "aws_logs_group" = "ecs/bookstore-actix"
          + "aws_region"     = "eu-west-1"
          + "container_port" = "3000"
          + "env_vars"       = (known after apply)
          + "fargate_cpu"    = "1024"
          + "fargate_memory" = "2048"
          + "host_port"      = "3000"
          + "image"          = "143441946271.dkr.ecr.eu-west-1.amazonaws.com/bookstore-actix:15ca550de8c7d3354d4b56f06a38945efdde5d59"
          + "network_mode"   = "awsvpc"
          + "secret_vars"    = jsonencode(
                [
                  + {
                      + name      = "DB_USER"
                      + valueFrom = "arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_username-LuQUUS"
                    },
                  + {
                      + name      = "DB_PASSWORD"
                      + valueFrom = "arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_password-jxLU1d"
                    },
                ]
            )
          + "task_name"      = "bookstore-actix"
        }
    }

  # module.ecs_actix_app.aws_alb_listener_rule.this will be created
  + resource "aws_alb_listener_rule" "this" {
      + arn          = (known after apply)
      + id           = (known after apply)
      + listener_arn = (known after apply)
      + priority     = 4
      + tags_all     = (known after apply)

      + action {
          + order            = (known after apply)
          + target_group_arn = (known after apply)
          + type             = "forward"
        }

      + condition {

          + path_pattern {
              + values = [
                  + "/actix/*",
                ]
            }
        }
    }

  # module.ecs_actix_app.aws_alb_target_group.this will be created
  + resource "aws_alb_target_group" "this" {
      + arn                                = (known after apply)
      + arn_suffix                         = (known after apply)
      + connection_termination             = false
      + deregistration_delay               = "100"
      + id                                 = (known after apply)
      + ip_address_type                    = (known after apply)
      + lambda_multi_value_headers_enabled = false
      + load_balancing_algorithm_type      = (known after apply)
      + name                               = "actix-tg"
      + port                               = 80
      + preserve_client_ip                 = (known after apply)
      + protocol                           = "HTTP"
      + protocol_version                   = (known after apply)
      + proxy_protocol_v2                  = false
      + slow_start                         = 0
      + tags_all                           = (known after apply)
      + target_type                        = "ip"
      + vpc_id                             = (known after apply)

      + health_check {
          + enabled             = true
          + healthy_threshold   = 3
          + interval            = 30
          + matcher             = "200"
          + path                = "/actix/a/health"
          + port                = "traffic-port"
          + protocol            = "HTTP"
          + timeout             = 3
          + unhealthy_threshold = 2
        }

      + stickiness {
          + cookie_duration = (known after apply)
          + cookie_name     = (known after apply)
          + enabled         = (known after apply)
          + type            = (known after apply)
        }

      + target_failover {
          + on_deregistration = (known after apply)
          + on_unhealthy      = (known after apply)
        }
    }

  # module.ecs_actix_app.aws_cloudwatch_log_group.this will be created
  + resource "aws_cloudwatch_log_group" "this" {
      + arn               = (known after apply)
      + id                = (known after apply)
      + name              = "ecs/bookstore-actix"
      + name_prefix       = (known after apply)
      + retention_in_days = 30
      + skip_destroy      = false
      + tags              = {
          + "Name" = "bookstore-actix_lg"
        }
      + tags_all          = {
          + "Name" = "bookstore-actix_lg"
        }
    }

  # module.ecs_actix_app.aws_ecs_service.this will be created
  + resource "aws_ecs_service" "this" {
      + cluster                            = (known after apply)
      + deployment_maximum_percent         = 200
      + deployment_minimum_healthy_percent = 100
      + desired_count                      = 1
      + enable_ecs_managed_tags            = false
      + enable_execute_command             = false
      + health_check_grace_period_seconds  = 180
      + iam_role                           = (known after apply)
      + id                                 = (known after apply)
      + launch_type                        = "FARGATE"
      + name                               = "bookstore-actix"
      + platform_version                   = (known after apply)
      + scheduling_strategy                = "REPLICA"
      + tags_all                           = (known after apply)
      + task_definition                    = (known after apply)
      + triggers                           = (known after apply)
      + wait_for_steady_state              = false

      + load_balancer {
          + container_name   = "bookstore-actix"
          + container_port   = 3000
          + target_group_arn = (known after apply)
        }

      + network_configuration {
          + assign_public_ip = false
          + security_groups  = (known after apply)
          + subnets          = (known after apply)
        }
    }

  # module.ecs_actix_app.aws_ecs_task_definition.this will be created
  + resource "aws_ecs_task_definition" "this" {
      + arn                      = (known after apply)
      + container_definitions    = (known after apply)
      + cpu                      = "1024"
      + execution_role_arn       = (known after apply)
      + family                   = "bookstore-actix-task"
      + id                       = (known after apply)
      + memory                   = "2048"
      + network_mode             = "awsvpc"
      + requires_compatibilities = [
          + "FARGATE",
        ]
      + revision                 = (known after apply)
      + skip_destroy             = false
      + tags_all                 = (known after apply)
    }

  # module.ecs_nestjs_app.data.template_file.this will be read during apply
  # (config refers to values not yet known)
 <= data "template_file" "this" {
      + id       = (known after apply)
      + rendered = (known after apply)
      + template = <<-EOT
            [
              {
                "name": "${task_name}",
                "image": "${image}",
                "cpu": ${fargate_cpu},
                "memory": ${fargate_memory},
                "networkMode": "${network_mode}",
                "logConfiguration": {
                    "logDriver": "awslogs",
                    "options": {
                      "awslogs-group": "${aws_logs_group}",
                      "awslogs-region": "${aws_region}",
                      "awslogs-stream-prefix": "ecs"
                    }
                },
                "portMappings": [
                  {
                    "containerPort": ${container_port},
                    "hostPort": ${host_port}
                  }
                ],
                "environment": ${env_vars},
                "secrets": ${secret_vars}
              }
            ]
        EOT
      + vars     = {
          + "aws_logs_group" = "ecs/bookstore-nestjs"
          + "aws_region"     = "eu-west-1"
          + "container_port" = "3000"
          + "env_vars"       = (known after apply)
          + "fargate_cpu"    = "1024"
          + "fargate_memory" = "2048"
          + "host_port"      = "3000"
          + "image"          = "143441946271.dkr.ecr.eu-west-1.amazonaws.com/bookstore-nestjs:15ca550de8c7d3354d4b56f06a38945efdde5d59"
          + "network_mode"   = "awsvpc"
          + "secret_vars"    = jsonencode(
                [
                  + {
                      + name      = "DB_USER"
                      + valueFrom = "arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_username-LuQUUS"
                    },
                  + {
                      + name      = "DB_PASSWORD"
                      + valueFrom = "arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_password-jxLU1d"
                    },
                ]
            )
          + "task_name"      = "bookstore-nestjs"
        }
    }

  # module.ecs_nestjs_app.aws_alb_listener_rule.this will be created
  + resource "aws_alb_listener_rule" "this" {
      + arn          = (known after apply)
      + id           = (known after apply)
      + listener_arn = (known after apply)
      + priority     = 3
      + tags_all     = (known after apply)

      + action {
          + order            = (known after apply)
          + target_group_arn = (known after apply)
          + type             = "forward"
        }

      + condition {

          + path_pattern {
              + values = [
                  + "/nestjs/*",
                ]
            }
        }
    }

  # module.ecs_nestjs_app.aws_alb_target_group.this will be created
  + resource "aws_alb_target_group" "this" {
      + arn                                = (known after apply)
      + arn_suffix                         = (known after apply)
      + connection_termination             = false
      + deregistration_delay               = "100"
      + id                                 = (known after apply)
      + ip_address_type                    = (known after apply)
      + lambda_multi_value_headers_enabled = false
      + load_balancing_algorithm_type      = (known after apply)
      + name                               = "nestjs-tg"
      + port                               = 80
      + preserve_client_ip                 = (known after apply)
      + protocol                           = "HTTP"
      + protocol_version                   = (known after apply)
      + proxy_protocol_v2                  = false
      + slow_start                         = 0
      + tags_all                           = (known after apply)
      + target_type                        = "ip"
      + vpc_id                             = (known after apply)

      + health_check {
          + enabled             = true
          + healthy_threshold   = 3
          + interval            = 30
          + matcher             = "200"
          + path                = "/nestjs/health"
          + port                = "traffic-port"
          + protocol            = "HTTP"
          + timeout             = 3
          + unhealthy_threshold = 2
        }

      + stickiness {
          + cookie_duration = (known after apply)
          + cookie_name     = (known after apply)
          + enabled         = (known after apply)
          + type            = (known after apply)
        }

      + target_failover {
          + on_deregistration = (known after apply)
          + on_unhealthy      = (known after apply)
        }
    }

  # module.ecs_nestjs_app.aws_cloudwatch_log_group.this will be created
  + resource "aws_cloudwatch_log_group" "this" {
      + arn               = (known after apply)
      + id                = (known after apply)
      + name              = "ecs/bookstore-nestjs"
      + name_prefix       = (known after apply)
      + retention_in_days = 30
      + skip_destroy      = false
      + tags              = {
          + "Name" = "bookstore-nestjs_lg"
        }
      + tags_all          = {
          + "Name" = "bookstore-nestjs_lg"
        }
    }

  # module.ecs_nestjs_app.aws_ecs_service.this will be created
  + resource "aws_ecs_service" "this" {
      + cluster                            = (known after apply)
      + deployment_maximum_percent         = 200
      + deployment_minimum_healthy_percent = 100
      + desired_count                      = 1
      + enable_ecs_managed_tags            = false
      + enable_execute_command             = false
      + health_check_grace_period_seconds  = 180
      + iam_role                           = (known after apply)
      + id                                 = (known after apply)
      + launch_type                        = "FARGATE"
      + name                               = "bookstore-nestjs"
      + platform_version                   = (known after apply)
      + scheduling_strategy                = "REPLICA"
      + tags_all                           = (known after apply)
      + task_definition                    = (known after apply)
      + triggers                           = (known after apply)
      + wait_for_steady_state              = false

      + load_balancer {
          + container_name   = "bookstore-nestjs"
          + container_port   = 3000
          + target_group_arn = (known after apply)
        }

      + network_configuration {
          + assign_public_ip = false
          + security_groups  = (known after apply)
          + subnets          = (known after apply)
        }
    }

  # module.ecs_nestjs_app.aws_ecs_task_definition.this will be created
  + resource "aws_ecs_task_definition" "this" {
      + arn                      = (known after apply)
      + container_definitions    = (known after apply)
      + cpu                      = "1024"
      + execution_role_arn       = (known after apply)
      + family                   = "bookstore-nestjs-task"
      + id                       = (known after apply)
      + memory                   = "2048"
      + network_mode             = "awsvpc"
      + requires_compatibilities = [
          + "FARGATE",
        ]
      + revision                 = (known after apply)
      + skip_destroy             = false
      + tags_all                 = (known after apply)
    }

  # module.ecs_quarkus_app.data.template_file.this will be read during apply
  # (config refers to values not yet known)
 <= data "template_file" "this" {
      + id       = (known after apply)
      + rendered = (known after apply)
      + template = <<-EOT
            [
              {
                "name": "${task_name}",
                "image": "${image}",
                "cpu": ${fargate_cpu},
                "memory": ${fargate_memory},
                "networkMode": "${network_mode}",
                "logConfiguration": {
                    "logDriver": "awslogs",
                    "options": {
                      "awslogs-group": "${aws_logs_group}",
                      "awslogs-region": "${aws_region}",
                      "awslogs-stream-prefix": "ecs"
                    }
                },
                "portMappings": [
                  {
                    "containerPort": ${container_port},
                    "hostPort": ${host_port}
                  }
                ],
                "environment": ${env_vars},
                "secrets": ${secret_vars}
              }
            ]
        EOT
      + vars     = {
          + "aws_logs_group" = "ecs/bookstore-quarkus"
          + "aws_region"     = "eu-west-1"
          + "container_port" = "3000"
          + "env_vars"       = (known after apply)
          + "fargate_cpu"    = "1024"
          + "fargate_memory" = "2048"
          + "host_port"      = "3000"
          + "image"          = "143441946271.dkr.ecr.eu-west-1.amazonaws.com/bookstore-quarkus:15ca550de8c7d3354d4b56f06a38945efdde5d59"
          + "network_mode"   = "awsvpc"
          + "secret_vars"    = jsonencode(
                [
                  + {
                      + name      = "DB_USER"
                      + valueFrom = "arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_username-LuQUUS"
                    },
                  + {
                      + name      = "DB_PASSWORD"
                      + valueFrom = "arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_password-jxLU1d"
                    },
                ]
            )
          + "task_name"      = "bookstore-quarkus"
        }
    }

  # module.ecs_quarkus_app.aws_alb_listener_rule.this will be created
  + resource "aws_alb_listener_rule" "this" {
      + arn          = (known after apply)
      + id           = (known after apply)
      + listener_arn = (known after apply)
      + priority     = 1
      + tags_all     = (known after apply)

      + action {
          + order            = (known after apply)
          + target_group_arn = (known after apply)
          + type             = "forward"
        }

      + condition {

          + path_pattern {
              + values = [
                  + "/quarkus/*",
                ]
            }
        }
    }

  # module.ecs_quarkus_app.aws_alb_target_group.this will be created
  + resource "aws_alb_target_group" "this" {
      + arn                                = (known after apply)
      + arn_suffix                         = (known after apply)
      + connection_termination             = false
      + deregistration_delay               = "100"
      + id                                 = (known after apply)
      + ip_address_type                    = (known after apply)
      + lambda_multi_value_headers_enabled = false
      + load_balancing_algorithm_type      = (known after apply)
      + name                               = "quarkus-tg"
      + port                               = 80
      + preserve_client_ip                 = (known after apply)
      + protocol                           = "HTTP"
      + protocol_version                   = (known after apply)
      + proxy_protocol_v2                  = false
      + slow_start                         = 0
      + tags_all                           = (known after apply)
      + target_type                        = "ip"
      + vpc_id                             = (known after apply)

      + health_check {
          + enabled             = true
          + healthy_threshold   = 3
          + interval            = 30
          + matcher             = "200"
          + path                = "/quarkus/q/health"
          + port                = "traffic-port"
          + protocol            = "HTTP"
          + timeout             = 3
          + unhealthy_threshold = 2
        }

      + stickiness {
          + cookie_duration = (known after apply)
          + cookie_name     = (known after apply)
          + enabled         = (known after apply)
          + type            = (known after apply)
        }

      + target_failover {
          + on_deregistration = (known after apply)
          + on_unhealthy      = (known after apply)
        }
    }

  # module.ecs_quarkus_app.aws_cloudwatch_log_group.this will be created
  + resource "aws_cloudwatch_log_group" "this" {
      + arn               = (known after apply)
      + id                = (known after apply)
      + name              = "ecs/bookstore-quarkus"
      + name_prefix       = (known after apply)
      + retention_in_days = 30
      + skip_destroy      = false
      + tags              = {
          + "Name" = "bookstore-quarkus_lg"
        }
      + tags_all          = {
          + "Name" = "bookstore-quarkus_lg"
        }
    }

  # module.ecs_quarkus_app.aws_ecs_service.this will be created
  + resource "aws_ecs_service" "this" {
      + cluster                            = (known after apply)
      + deployment_maximum_percent         = 200
      + deployment_minimum_healthy_percent = 100
      + desired_count                      = 1
      + enable_ecs_managed_tags            = false
      + enable_execute_command             = false
      + health_check_grace_period_seconds  = 180
      + iam_role                           = (known after apply)
      + id                                 = (known after apply)
      + launch_type                        = "FARGATE"
      + name                               = "bookstore-quarkus"
      + platform_version                   = (known after apply)
      + scheduling_strategy                = "REPLICA"
      + tags_all                           = (known after apply)
      + task_definition                    = (known after apply)
      + triggers                           = (known after apply)
      + wait_for_steady_state              = false

      + load_balancer {
          + container_name   = "bookstore-quarkus"
          + container_port   = 3000
          + target_group_arn = (known after apply)
        }

      + network_configuration {
          + assign_public_ip = false
          + security_groups  = (known after apply)
          + subnets          = (known after apply)
        }
    }

  # module.ecs_quarkus_app.aws_ecs_task_definition.this will be created
  + resource "aws_ecs_task_definition" "this" {
      + arn                      = (known after apply)
      + container_definitions    = (known after apply)
      + cpu                      = "1024"
      + execution_role_arn       = (known after apply)
      + family                   = "bookstore-quarkus-task"
      + id                       = (known after apply)
      + memory                   = "2048"
      + network_mode             = "awsvpc"
      + requires_compatibilities = [
          + "FARGATE",
        ]
      + revision                 = (known after apply)
      + skip_destroy             = false
      + tags_all                 = (known after apply)
    }

  # module.ecs_quarkus_sync_app.data.template_file.this will be read during apply
  # (config refers to values not yet known)
 <= data "template_file" "this" {
      + id       = (known after apply)
      + rendered = (known after apply)
      + template = <<-EOT
            [
              {
                "name": "${task_name}",
                "image": "${image}",
                "cpu": ${fargate_cpu},
                "memory": ${fargate_memory},
                "networkMode": "${network_mode}",
                "logConfiguration": {
                    "logDriver": "awslogs",
                    "options": {
                      "awslogs-group": "${aws_logs_group}",
                      "awslogs-region": "${aws_region}",
                      "awslogs-stream-prefix": "ecs"
                    }
                },
                "portMappings": [
                  {
                    "containerPort": ${container_port},
                    "hostPort": ${host_port}
                  }
                ],
                "environment": ${env_vars},
                "secrets": ${secret_vars}
              }
            ]
        EOT
      + vars     = {
          + "aws_logs_group" = "ecs/bookstore-quarkus-sync"
          + "aws_region"     = "eu-west-1"
          + "container_port" = "3000"
          + "env_vars"       = (known after apply)
          + "fargate_cpu"    = "1024"
          + "fargate_memory" = "2048"
          + "host_port"      = "3000"
          + "image"          = "143441946271.dkr.ecr.eu-west-1.amazonaws.com/bookstore-quarkus-sync:15ca550de8c7d3354d4b56f06a38945efdde5d59"
          + "network_mode"   = "awsvpc"
          + "secret_vars"    = jsonencode(
                [
                  + {
                      + name      = "DB_USER"
                      + valueFrom = "arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_username-LuQUUS"
                    },
                  + {
                      + name      = "DB_PASSWORD"
                      + valueFrom = "arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_password-jxLU1d"
                    },
                ]
            )
          + "task_name"      = "bookstore-quarkus-sync"
        }
    }

  # module.ecs_quarkus_sync_app.aws_alb_listener_rule.this will be created
  + resource "aws_alb_listener_rule" "this" {
      + arn          = (known after apply)
      + id           = (known after apply)
      + listener_arn = (known after apply)
      + priority     = 5
      + tags_all     = (known after apply)

      + action {
          + order            = (known after apply)
          + target_group_arn = (known after apply)
          + type             = "forward"
        }

      + condition {

          + path_pattern {
              + values = [
                  + "/quarkus-sync/*",
                ]
            }
        }
    }

  # module.ecs_quarkus_sync_app.aws_alb_target_group.this will be created
  + resource "aws_alb_target_group" "this" {
      + arn                                = (known after apply)
      + arn_suffix                         = (known after apply)
      + connection_termination             = false
      + deregistration_delay               = "100"
      + id                                 = (known after apply)
      + ip_address_type                    = (known after apply)
      + lambda_multi_value_headers_enabled = false
      + load_balancing_algorithm_type      = (known after apply)
      + name                               = "quarkus-sync-tg"
      + port                               = 80
      + preserve_client_ip                 = (known after apply)
      + protocol                           = "HTTP"
      + protocol_version                   = (known after apply)
      + proxy_protocol_v2                  = false
      + slow_start                         = 0
      + tags_all                           = (known after apply)
      + target_type                        = "ip"
      + vpc_id                             = (known after apply)

      + health_check {
          + enabled             = true
          + healthy_threshold   = 3
          + interval            = 30
          + matcher             = "200"
          + path                = "/quarkus-sync/q/health"
          + port                = "traffic-port"
          + protocol            = "HTTP"
          + timeout             = 3
          + unhealthy_threshold = 2
        }

      + stickiness {
          + cookie_duration = (known after apply)
          + cookie_name     = (known after apply)
          + enabled         = (known after apply)
          + type            = (known after apply)
        }

      + target_failover {
          + on_deregistration = (known after apply)
          + on_unhealthy      = (known after apply)
        }
    }

  # module.ecs_quarkus_sync_app.aws_cloudwatch_log_group.this will be created
  + resource "aws_cloudwatch_log_group" "this" {
      + arn               = (known after apply)
      + id                = (known after apply)
      + name              = "ecs/bookstore-quarkus-sync"
      + name_prefix       = (known after apply)
      + retention_in_days = 30
      + skip_destroy      = false
      + tags              = {
          + "Name" = "bookstore-quarkus-sync_lg"
        }
      + tags_all          = {
          + "Name" = "bookstore-quarkus-sync_lg"
        }
    }

  # module.ecs_quarkus_sync_app.aws_ecs_service.this will be created
  + resource "aws_ecs_service" "this" {
      + cluster                            = (known after apply)
      + deployment_maximum_percent         = 200
      + deployment_minimum_healthy_percent = 100
      + desired_count                      = 1
      + enable_ecs_managed_tags            = false
      + enable_execute_command             = false
      + health_check_grace_period_seconds  = 180
      + iam_role                           = (known after apply)
      + id                                 = (known after apply)
      + launch_type                        = "FARGATE"
      + name                               = "bookstore-quarkus-sync"
      + platform_version                   = (known after apply)
      + scheduling_strategy                = "REPLICA"
      + tags_all                           = (known after apply)
      + task_definition                    = (known after apply)
      + triggers                           = (known after apply)
      + wait_for_steady_state              = false

      + load_balancer {
          + container_name   = "bookstore-quarkus-sync"
          + container_port   = 3000
          + target_group_arn = (known after apply)
        }

      + network_configuration {
          + assign_public_ip = false
          + security_groups  = (known after apply)
          + subnets          = (known after apply)
        }
    }

  # module.ecs_quarkus_sync_app.aws_ecs_task_definition.this will be created
  + resource "aws_ecs_task_definition" "this" {
      + arn                      = (known after apply)
      + container_definitions    = (known after apply)
      + cpu                      = "1024"
      + execution_role_arn       = (known after apply)
      + family                   = "bookstore-quarkus-sync-task"
      + id                       = (known after apply)
      + memory                   = "2048"
      + network_mode             = "awsvpc"
      + requires_compatibilities = [
          + "FARGATE",
        ]
      + revision                 = (known after apply)
      + skip_destroy             = false
      + tags_all                 = (known after apply)
    }

  # module.ecs_springboot_app.data.template_file.this will be read during apply
  # (config refers to values not yet known)
 <= data "template_file" "this" {
      + id       = (known after apply)
      + rendered = (known after apply)
      + template = <<-EOT
            [
              {
                "name": "${task_name}",
                "image": "${image}",
                "cpu": ${fargate_cpu},
                "memory": ${fargate_memory},
                "networkMode": "${network_mode}",
                "logConfiguration": {
                    "logDriver": "awslogs",
                    "options": {
                      "awslogs-group": "${aws_logs_group}",
                      "awslogs-region": "${aws_region}",
                      "awslogs-stream-prefix": "ecs"
                    }
                },
                "portMappings": [
                  {
                    "containerPort": ${container_port},
                    "hostPort": ${host_port}
                  }
                ],
                "environment": ${env_vars},
                "secrets": ${secret_vars}
              }
            ]
        EOT
      + vars     = {
          + "aws_logs_group" = "ecs/bookstore-springboot"
          + "aws_region"     = "eu-west-1"
          + "container_port" = "3000"
          + "env_vars"       = (known after apply)
          + "fargate_cpu"    = "1024"
          + "fargate_memory" = "2048"
          + "host_port"      = "3000"
          + "image"          = "143441946271.dkr.ecr.eu-west-1.amazonaws.com/bookstore-springboot:15ca550de8c7d3354d4b56f06a38945efdde5d59"
          + "network_mode"   = "awsvpc"
          + "secret_vars"    = jsonencode(
                [
                  + {
                      + name      = "DB_USER"
                      + valueFrom = "arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_username-LuQUUS"
                    },
                  + {
                      + name      = "DB_PASSWORD"
                      + valueFrom = "arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_password-jxLU1d"
                    },
                ]
            )
          + "task_name"      = "bookstore-springboot"
        }
    }

  # module.ecs_springboot_app.aws_alb_listener_rule.this will be created
  + resource "aws_alb_listener_rule" "this" {
      + arn          = (known after apply)
      + id           = (known after apply)
      + listener_arn = (known after apply)
      + priority     = 2
      + tags_all     = (known after apply)

      + action {
          + order            = (known after apply)
          + target_group_arn = (known after apply)
          + type             = "forward"
        }

      + condition {

          + path_pattern {
              + values = [
                  + "/springboot/*",
                ]
            }
        }
    }

  # module.ecs_springboot_app.aws_alb_target_group.this will be created
  + resource "aws_alb_target_group" "this" {
      + arn                                = (known after apply)
      + arn_suffix                         = (known after apply)
      + connection_termination             = false
      + deregistration_delay               = "100"
      + id                                 = (known after apply)
      + ip_address_type                    = (known after apply)
      + lambda_multi_value_headers_enabled = false
      + load_balancing_algorithm_type      = (known after apply)
      + name                               = "springboot-tg"
      + port                               = 80
      + preserve_client_ip                 = (known after apply)
      + protocol                           = "HTTP"
      + protocol_version                   = (known after apply)
      + proxy_protocol_v2                  = false
      + slow_start                         = 0
      + tags_all                           = (known after apply)
      + target_type                        = "ip"
      + vpc_id                             = (known after apply)

      + health_check {
          + enabled             = true
          + healthy_threshold   = 3
          + interval            = 30
          + matcher             = "200"
          + path                = "/springboot/actuator/health"
          + port                = "traffic-port"
          + protocol            = "HTTP"
          + timeout             = 3
          + unhealthy_threshold = 2
        }

      + stickiness {
          + cookie_duration = (known after apply)
          + cookie_name     = (known after apply)
          + enabled         = (known after apply)
          + type            = (known after apply)
        }

      + target_failover {
          + on_deregistration = (known after apply)
          + on_unhealthy      = (known after apply)
        }
    }

  # module.ecs_springboot_app.aws_cloudwatch_log_group.this will be created
  + resource "aws_cloudwatch_log_group" "this" {
      + arn               = (known after apply)
      + id                = (known after apply)
      + name              = "ecs/bookstore-springboot"
      + name_prefix       = (known after apply)
      + retention_in_days = 30
      + skip_destroy      = false
      + tags              = {
          + "Name" = "bookstore-springboot_lg"
        }
      + tags_all          = {
          + "Name" = "bookstore-springboot_lg"
        }
    }

  # module.ecs_springboot_app.aws_ecs_service.this will be created
  + resource "aws_ecs_service" "this" {
      + cluster                            = (known after apply)
      + deployment_maximum_percent         = 200
      + deployment_minimum_healthy_percent = 100
      + desired_count                      = 1
      + enable_ecs_managed_tags            = false
      + enable_execute_command             = false
      + health_check_grace_period_seconds  = 180
      + iam_role                           = (known after apply)
      + id                                 = (known after apply)
      + launch_type                        = "FARGATE"
      + name                               = "bookstore-springboot"
      + platform_version                   = (known after apply)
      + scheduling_strategy                = "REPLICA"
      + tags_all                           = (known after apply)
      + task_definition                    = (known after apply)
      + triggers                           = (known after apply)
      + wait_for_steady_state              = false

      + load_balancer {
          + container_name   = "bookstore-springboot"
          + container_port   = 3000
          + target_group_arn = (known after apply)
        }

      + network_configuration {
          + assign_public_ip = false
          + security_groups  = (known after apply)
          + subnets          = (known after apply)
        }
    }

  # module.ecs_springboot_app.aws_ecs_task_definition.this will be created
  + resource "aws_ecs_task_definition" "this" {
      + arn                      = (known after apply)
      + container_definitions    = (known after apply)
      + cpu                      = "1024"
      + execution_role_arn       = (known after apply)
      + family                   = "bookstore-springboot-task"
      + id                       = (known after apply)
      + memory                   = "2048"
      + network_mode             = "awsvpc"
      + requires_compatibilities = [
          + "FARGATE",
        ]
      + revision                 = (known after apply)
      + skip_destroy             = false
      + tags_all                 = (known after apply)
    }

  # module.ecs_tasks_sg.aws_security_group.this will be created
  + resource "aws_security_group" "this" {
      + arn                    = (known after apply)
      + description            = "controls access to the ECS tasks"
      + egress                 = (known after apply)
      + id                     = (known after apply)
      + ingress                = (known after apply)
      + name                   = "ecs-tasks-security-group"
      + name_prefix            = (known after apply)
      + owner_id               = (known after apply)
      + revoke_rules_on_delete = false
      + tags                   = (known after apply)
      + tags_all               = (known after apply)
      + vpc_id                 = (known after apply)
    }

  # module.ecs_tasks_sg.aws_security_group_rule.egress_cidr_rules["1"] will be created
  + resource "aws_security_group_rule" "egress_cidr_rules" {
      + cidr_blocks              = [
          + "0.0.0.0/0",
        ]
      + description              = "allow all outbound"
      + from_port                = 0
      + id                       = (known after apply)
      + ipv6_cidr_blocks         = [
          + "::/0",
        ]
      + protocol                 = "-1"
      + security_group_id        = (known after apply)
      + security_group_rule_id   = (known after apply)
      + self                     = false
      + source_security_group_id = (known after apply)
      + to_port                  = 0
      + type                     = "egress"
    }

  # module.ecs_tasks_sg.aws_security_group_rule.ingress_source_sg_rules["1"] will be created
  + resource "aws_security_group_rule" "ingress_source_sg_rules" {
      + description              = "allow inbound access from the ALB only"
      + from_port                = 0
      + id                       = (known after apply)
      + protocol                 = "-1"
      + security_group_id        = (known after apply)
      + security_group_rule_id   = (known after apply)
      + self                     = false
      + source_security_group_id = (known after apply)
      + to_port                  = 0
      + type                     = "ingress"
    }

  # module.ecs_vapor_app.data.template_file.this will be read during apply
  # (config refers to values not yet known)
 <= data "template_file" "this" {
      + id       = (known after apply)
      + rendered = (known after apply)
      + template = <<-EOT
            [
              {
                "name": "${task_name}",
                "image": "${image}",
                "cpu": ${fargate_cpu},
                "memory": ${fargate_memory},
                "networkMode": "${network_mode}",
                "logConfiguration": {
                    "logDriver": "awslogs",
                    "options": {
                      "awslogs-group": "${aws_logs_group}",
                      "awslogs-region": "${aws_region}",
                      "awslogs-stream-prefix": "ecs"
                    }
                },
                "portMappings": [
                  {
                    "containerPort": ${container_port},
                    "hostPort": ${host_port}
                  }
                ],
                "environment": ${env_vars},
                "secrets": ${secret_vars}
              }
            ]
        EOT
      + vars     = {
          + "aws_logs_group" = "ecs/bookstore-vapor"
          + "aws_region"     = "eu-west-1"
          + "container_port" = "3000"
          + "env_vars"       = (known after apply)
          + "fargate_cpu"    = "1024"
          + "fargate_memory" = "2048"
          + "host_port"      = "3000"
          + "image"          = "143441946271.dkr.ecr.eu-west-1.amazonaws.com/bookstore-vapor:15ca550de8c7d3354d4b56f06a38945efdde5d59"
          + "network_mode"   = "awsvpc"
          + "secret_vars"    = jsonencode(
                [
                  + {
                      + name      = "DB_USER"
                      + valueFrom = "arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_username-LuQUUS"
                    },
                  + {
                      + name      = "DB_PASSWORD"
                      + valueFrom = "arn:aws:secretsmanager:eu-west-1:143441946271:secret:booksdb_password-jxLU1d"
                    },
                ]
            )
          + "task_name"      = "bookstore-vapor"
        }
    }

  # module.ecs_vapor_app.aws_alb_listener_rule.this will be created
  + resource "aws_alb_listener_rule" "this" {
      + arn          = (known after apply)
      + id           = (known after apply)
      + listener_arn = (known after apply)
      + priority     = 6
      + tags_all     = (known after apply)

      + action {
          + order            = (known after apply)
          + target_group_arn = (known after apply)
          + type             = "forward"
        }

      + condition {

          + path_pattern {
              + values = [
                  + "/vapor/*",
                ]
            }
        }
    }

  # module.ecs_vapor_app.aws_alb_target_group.this will be created
  + resource "aws_alb_target_group" "this" {
      + arn                                = (known after apply)
      + arn_suffix                         = (known after apply)
      + connection_termination             = false
      + deregistration_delay               = "100"
      + id                                 = (known after apply)
      + ip_address_type                    = (known after apply)
      + lambda_multi_value_headers_enabled = false
      + load_balancing_algorithm_type      = (known after apply)
      + name                               = "vapor-tg"
      + port                               = 80
      + preserve_client_ip                 = (known after apply)
      + protocol                           = "HTTP"
      + protocol_version                   = (known after apply)
      + proxy_protocol_v2                  = false
      + slow_start                         = 0
      + tags_all                           = (known after apply)
      + target_type                        = "ip"
      + vpc_id                             = (known after apply)

      + health_check {
          + enabled             = true
          + healthy_threshold   = 3
          + interval            = 30
          + matcher             = "200"
          + path                = "/vapor/a/health"
          + port                = "traffic-port"
          + protocol            = "HTTP"
          + timeout             = 3
          + unhealthy_threshold = 2
        }

      + stickiness {
          + cookie_duration = (known after apply)
          + cookie_name     = (known after apply)
          + enabled         = (known after apply)
          + type            = (known after apply)
        }

      + target_failover {
          + on_deregistration = (known after apply)
          + on_unhealthy      = (known after apply)
        }
    }

  # module.ecs_vapor_app.aws_cloudwatch_log_group.this will be created
  + resource "aws_cloudwatch_log_group" "this" {
      + arn               = (known after apply)
      + id                = (known after apply)
      + name              = "ecs/bookstore-vapor"
      + name_prefix       = (known after apply)
      + retention_in_days = 30
      + skip_destroy      = false
      + tags              = {
          + "Name" = "bookstore-vapor_lg"
        }
      + tags_all          = {
          + "Name" = "bookstore-vapor_lg"
        }
    }

  # module.ecs_vapor_app.aws_ecs_service.this will be created
  + resource "aws_ecs_service" "this" {
      + cluster                            = (known after apply)
      + deployment_maximum_percent         = 200
      + deployment_minimum_healthy_percent = 100
      + desired_count                      = 1
      + enable_ecs_managed_tags            = false
      + enable_execute_command             = false
      + health_check_grace_period_seconds  = 180
      + iam_role                           = (known after apply)
      + id                                 = (known after apply)
      + launch_type                        = "FARGATE"
      + name                               = "bookstore-vapor"
      + platform_version                   = (known after apply)
      + scheduling_strategy                = "REPLICA"
      + tags_all                           = (known after apply)
      + task_definition                    = (known after apply)
      + triggers                           = (known after apply)
      + wait_for_steady_state              = false

      + load_balancer {
          + container_name   = "bookstore-vapor"
          + container_port   = 3000
          + target_group_arn = (known after apply)
        }

      + network_configuration {
          + assign_public_ip = false
          + security_groups  = (known after apply)
          + subnets          = (known after apply)
        }
    }

  # module.ecs_vapor_app.aws_ecs_task_definition.this will be created
  + resource "aws_ecs_task_definition" "this" {
      + arn                      = (known after apply)
      + container_definitions    = (known after apply)
      + cpu                      = "1024"
      + execution_role_arn       = (known after apply)
      + family                   = "bookstore-vapor-task"
      + id                       = (known after apply)
      + memory                   = "2048"
      + network_mode             = "awsvpc"
      + requires_compatibilities = [
          + "FARGATE",
        ]
      + revision                 = (known after apply)
      + skip_destroy             = false
      + tags_all                 = (known after apply)
    }

  # module.private_database_sg.aws_security_group.this will be created
  + resource "aws_security_group" "this" {
      + arn                    = (known after apply)
      + description            = "Controls access to the private database (not internet facing)"
      + egress                 = (known after apply)
      + id                     = (known after apply)
      + ingress                = (known after apply)
      + name                   = "private_database_sg"
      + name_prefix            = (known after apply)
      + owner_id               = (known after apply)
      + revoke_rules_on_delete = false
      + tags                   = (known after apply)
      + tags_all               = (known after apply)
      + vpc_id                 = (known after apply)
    }

  # module.private_database_sg.aws_security_group_rule.egress_cidr_rules["1"] will be created
  + resource "aws_security_group_rule" "egress_cidr_rules" {
      + cidr_blocks              = [
          + "0.0.0.0/0",
        ]
      + description              = "allow all outbound"
      + from_port                = 0
      + id                       = (known after apply)
      + ipv6_cidr_blocks         = [
          + "::/0",
        ]
      + protocol                 = "-1"
      + security_group_id        = (known after apply)
      + security_group_rule_id   = (known after apply)
      + self                     = false
      + source_security_group_id = (known after apply)
      + to_port                  = 0
      + type                     = "egress"
    }

  # module.private_database_sg.aws_security_group_rule.ingress_cidr_rules["1"] will be created
  + resource "aws_security_group_rule" "ingress_cidr_rules" {
      + cidr_blocks              = [
          + "10.0.0.0/16",
        ]
      + description              = "allow inbound access only from resources in VPC"
      + from_port                = 0
      + id                       = (known after apply)
      + ipv6_cidr_blocks         = (known after apply)
      + protocol                 = "-1"
      + security_group_id        = (known after apply)
      + security_group_rule_id   = (known after apply)
      + self                     = false
      + source_security_group_id = (known after apply)
      + to_port                  = 0
      + type                     = "ingress"
    }

  # module.public_alb.aws_alb.this will be created
  + resource "aws_alb" "this" {
      + arn                        = (known after apply)
      + arn_suffix                 = (known after apply)
      + desync_mitigation_mode     = "defensive"
      + dns_name                   = (known after apply)
      + drop_invalid_header_fields = false
      + enable_deletion_protection = false
      + enable_http2               = true
      + enable_waf_fail_open       = false
      + id                         = (known after apply)
      + idle_timeout               = 60
      + internal                   = false
      + ip_address_type            = (known after apply)
      + load_balancer_type         = "application"
      + name                       = "main-ecs-lb"
      + preserve_host_header       = false
      + security_groups            = (known after apply)
      + subnets                    = (known after apply)
      + tags                       = {
          + "Name" = "main-ecs-lb-server-benchmarks-alb"
          + "Role" = "external"
        }
      + tags_all                   = {
          + "Name" = "main-ecs-lb-server-benchmarks-alb"
          + "Role" = "external"
        }
      + vpc_id                     = (known after apply)
      + zone_id                    = (known after apply)

      + subnet_mapping {
          + allocation_id        = (known after apply)
          + ipv6_address         = (known after apply)
          + outpost_id           = (known after apply)
          + private_ipv4_address = (known after apply)
          + subnet_id            = (known after apply)
        }
    }

  # module.public_alb.aws_alb_listener.http_tcp[0] will be created
  + resource "aws_alb_listener" "http_tcp" {
      + arn               = (known after apply)
      + id                = (known after apply)
      + load_balancer_arn = (known after apply)
      + port              = 80
      + protocol          = "HTTP"
      + ssl_policy        = (known after apply)
      + tags_all          = (known after apply)

      + default_action {
          + order = (known after apply)
          + type  = "fixed-response"

          + fixed_response {
              + content_type = "text/plain"
              + message_body = "Resource not found"
              + status_code  = "404"
            }
        }
    }

  # module.vpc.aws_eip.nat[0] will be created
  + resource "aws_eip" "nat" {
      + allocation_id        = (known after apply)
      + association_id       = (known after apply)
      + carrier_ip           = (known after apply)
      + customer_owned_ip    = (known after apply)
      + domain               = (known after apply)
      + id                   = (known after apply)
      + instance             = (known after apply)
      + network_border_group = (known after apply)
      + network_interface    = (known after apply)
      + private_dns          = (known after apply)
      + private_ip           = (known after apply)
      + public_dns           = (known after apply)
      + public_ip            = (known after apply)
      + public_ipv4_pool     = (known after apply)
      + tags                 = (known after apply)
      + tags_all             = (known after apply)
      + vpc                  = true
    }

  # module.vpc.aws_eip.nat[1] will be created
  + resource "aws_eip" "nat" {
      + allocation_id        = (known after apply)
      + association_id       = (known after apply)
      + carrier_ip           = (known after apply)
      + customer_owned_ip    = (known after apply)
      + domain               = (known after apply)
      + id                   = (known after apply)
      + instance             = (known after apply)
      + network_border_group = (known after apply)
      + network_interface    = (known after apply)
      + private_dns          = (known after apply)
      + private_ip           = (known after apply)
      + public_dns           = (known after apply)
      + public_ip            = (known after apply)
      + public_ipv4_pool     = (known after apply)
      + tags                 = (known after apply)
      + tags_all             = (known after apply)
      + vpc                  = true
    }

  # module.vpc.aws_eip.nat[2] will be created
  + resource "aws_eip" "nat" {
      + allocation_id        = (known after apply)
      + association_id       = (known after apply)
      + carrier_ip           = (known after apply)
      + customer_owned_ip    = (known after apply)
      + domain               = (known after apply)
      + id                   = (known after apply)
      + instance             = (known after apply)
      + network_border_group = (known after apply)
      + network_interface    = (known after apply)
      + private_dns          = (known after apply)
      + private_ip           = (known after apply)
      + public_dns           = (known after apply)
      + public_ip            = (known after apply)
      + public_ipv4_pool     = (known after apply)
      + tags                 = (known after apply)
      + tags_all             = (known after apply)
      + vpc                  = true
    }

  # module.vpc.aws_internet_gateway.igw will be created
  + resource "aws_internet_gateway" "igw" {
      + arn      = (known after apply)
      + id       = (known after apply)
      + owner_id = (known after apply)
      + tags     = {
          + "Name" = "server-benchmarks-ig"
        }
      + tags_all = {
          + "Name" = "server-benchmarks-ig"
        }
      + vpc_id   = (known after apply)
    }

  # module.vpc.aws_nat_gateway.ngw[0] will be created
  + resource "aws_nat_gateway" "ngw" {
      + allocation_id        = (known after apply)
      + connectivity_type    = "public"
      + id                   = (known after apply)
      + network_interface_id = (known after apply)
      + private_ip           = (known after apply)
      + public_ip            = (known after apply)
      + subnet_id            = (known after apply)
      + tags                 = (known after apply)
      + tags_all             = (known after apply)
    }

  # module.vpc.aws_nat_gateway.ngw[1] will be created
  + resource "aws_nat_gateway" "ngw" {
      + allocation_id        = (known after apply)
      + connectivity_type    = "public"
      + id                   = (known after apply)
      + network_interface_id = (known after apply)
      + private_ip           = (known after apply)
      + public_ip            = (known after apply)
      + subnet_id            = (known after apply)
      + tags                 = (known after apply)
      + tags_all             = (known after apply)
    }

  # module.vpc.aws_nat_gateway.ngw[2] will be created
  + resource "aws_nat_gateway" "ngw" {
      + allocation_id        = (known after apply)
      + connectivity_type    = "public"
      + id                   = (known after apply)
      + network_interface_id = (known after apply)
      + private_ip           = (known after apply)
      + public_ip            = (known after apply)
      + subnet_id            = (known after apply)
      + tags                 = (known after apply)
      + tags_all             = (known after apply)
    }

  # module.vpc.aws_route.private[0] will be created
  + resource "aws_route" "private" {
      + destination_cidr_block = "0.0.0.0/0"
      + id                     = (known after apply)
      + instance_id            = (known after apply)
      + instance_owner_id      = (known after apply)
      + nat_gateway_id         = (known after apply)
      + network_interface_id   = (known after apply)
      + origin                 = (known after apply)
      + route_table_id         = (known after apply)
      + state                  = (known after apply)
    }

  # module.vpc.aws_route.private[1] will be created
  + resource "aws_route" "private" {
      + destination_cidr_block = "0.0.0.0/0"
      + id                     = (known after apply)
      + instance_id            = (known after apply)
      + instance_owner_id      = (known after apply)
      + nat_gateway_id         = (known after apply)
      + network_interface_id   = (known after apply)
      + origin                 = (known after apply)
      + route_table_id         = (known after apply)
      + state                  = (known after apply)
    }

  # module.vpc.aws_route.private[2] will be created
  + resource "aws_route" "private" {
      + destination_cidr_block = "0.0.0.0/0"
      + id                     = (known after apply)
      + instance_id            = (known after apply)
      + instance_owner_id      = (known after apply)
      + nat_gateway_id         = (known after apply)
      + network_interface_id   = (known after apply)
      + origin                 = (known after apply)
      + route_table_id         = (known after apply)
      + state                  = (known after apply)
    }

  # module.vpc.aws_route.public will be created
  + resource "aws_route" "public" {
      + destination_cidr_block = "0.0.0.0/0"
      + gateway_id             = (known after apply)
      + id                     = (known after apply)
      + instance_id            = (known after apply)
      + instance_owner_id      = (known after apply)
      + network_interface_id   = (known after apply)
      + origin                 = (known after apply)
      + route_table_id         = (known after apply)
      + state                  = (known after apply)
    }

  # module.vpc.aws_route_table.private[0] will be created
  + resource "aws_route_table" "private" {
      + arn              = (known after apply)
      + id               = (known after apply)
      + owner_id         = (known after apply)
      + propagating_vgws = (known after apply)
      + route            = (known after apply)
      + tags             = (known after apply)
      + tags_all         = (known after apply)
      + vpc_id           = (known after apply)
    }

  # module.vpc.aws_route_table.private[1] will be created
  + resource "aws_route_table" "private" {
      + arn              = (known after apply)
      + id               = (known after apply)
      + owner_id         = (known after apply)
      + propagating_vgws = (known after apply)
      + route            = (known after apply)
      + tags             = (known after apply)
      + tags_all         = (known after apply)
      + vpc_id           = (known after apply)
    }

  # module.vpc.aws_route_table.private[2] will be created
  + resource "aws_route_table" "private" {
      + arn              = (known after apply)
      + id               = (known after apply)
      + owner_id         = (known after apply)
      + propagating_vgws = (known after apply)
      + route            = (known after apply)
      + tags             = (known after apply)
      + tags_all         = (known after apply)
      + vpc_id           = (known after apply)
    }

  # module.vpc.aws_route_table.public will be created
  + resource "aws_route_table" "public" {
      + arn              = (known after apply)
      + id               = (known after apply)
      + owner_id         = (known after apply)
      + propagating_vgws = (known after apply)
      + route            = (known after apply)
      + tags             = (known after apply)
      + tags_all         = (known after apply)
      + vpc_id           = (known after apply)
    }

  # module.vpc.aws_route_table_association.private[0] will be created
  + resource "aws_route_table_association" "private" {
      + id             = (known after apply)
      + route_table_id = (known after apply)
      + subnet_id      = (known after apply)
    }

  # module.vpc.aws_route_table_association.private[1] will be created
  + resource "aws_route_table_association" "private" {
      + id             = (known after apply)
      + route_table_id = (known after apply)
      + subnet_id      = (known after apply)
    }

  # module.vpc.aws_route_table_association.private[2] will be created
  + resource "aws_route_table_association" "private" {
      + id             = (known after apply)
      + route_table_id = (known after apply)
      + subnet_id      = (known after apply)
    }

  # module.vpc.aws_route_table_association.public[0] will be created
  + resource "aws_route_table_association" "public" {
      + id             = (known after apply)
      + route_table_id = (known after apply)
      + subnet_id      = (known after apply)
    }

  # module.vpc.aws_route_table_association.public[1] will be created
  + resource "aws_route_table_association" "public" {
      + id             = (known after apply)
      + route_table_id = (known after apply)
      + subnet_id      = (known after apply)
    }

  # module.vpc.aws_route_table_association.public[2] will be created
  + resource "aws_route_table_association" "public" {
      + id             = (known after apply)
      + route_table_id = (known after apply)
      + subnet_id      = (known after apply)
    }

  # module.vpc.aws_subnet.private[0] will be created
  + resource "aws_subnet" "private" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "eu-west-1a"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "10.0.48.0/20"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = false
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = (known after apply)
      + tags                                           = (known after apply)
      + tags_all                                       = (known after apply)
      + vpc_id                                         = (known after apply)
    }

  # module.vpc.aws_subnet.private[1] will be created
  + resource "aws_subnet" "private" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "eu-west-1b"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "10.0.64.0/20"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = false
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = (known after apply)
      + tags                                           = (known after apply)
      + tags_all                                       = (known after apply)
      + vpc_id                                         = (known after apply)
    }

  # module.vpc.aws_subnet.private[2] will be created
  + resource "aws_subnet" "private" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "eu-west-1c"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "10.0.80.0/20"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = false
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = (known after apply)
      + tags                                           = (known after apply)
      + tags_all                                       = (known after apply)
      + vpc_id                                         = (known after apply)
    }

  # module.vpc.aws_subnet.public[0] will be created
  + resource "aws_subnet" "public" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "eu-west-1a"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "10.0.0.0/20"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block                                = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = false
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = (known after apply)
      + tags                                           = (known after apply)
      + tags_all                                       = (known after apply)
      + vpc_id                                         = (known after apply)
    }

  # module.vpc.aws_subnet.public[1] will be created
  + resource "aws_subnet" "public" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "eu-west-1b"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "10.0.16.0/20"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block                                = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = false
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = (known after apply)
      + tags                                           = (known after apply)
      + tags_all                                       = (known after apply)
      + vpc_id                                         = (known after apply)
    }

  # module.vpc.aws_subnet.public[2] will be created
  + resource "aws_subnet" "public" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "eu-west-1c"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "10.0.32.0/20"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block                                = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = false
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = (known after apply)
      + tags                                           = (known after apply)
      + tags_all                                       = (known after apply)
      + vpc_id                                         = (known after apply)
    }

  # module.vpc.aws_vpc.main will be created
  + resource "aws_vpc" "main" {
      + arn                                  = (known after apply)
      + assign_generated_ipv6_cidr_block     = true
      + cidr_block                           = "10.0.0.0/16"
      + default_network_acl_id               = (known after apply)
      + default_route_table_id               = (known after apply)
      + default_security_group_id            = (known after apply)
      + dhcp_options_id                      = (known after apply)
      + enable_classiclink                   = (known after apply)
      + enable_classiclink_dns_support       = (known after apply)
      + enable_dns_hostnames                 = true
      + enable_dns_support                   = true
      + enable_network_address_usage_metrics = (known after apply)
      + id                                   = (known after apply)
      + instance_tenancy                     = "default"
      + ipv6_association_id                  = (known after apply)
      + ipv6_cidr_block                      = (known after apply)
      + ipv6_cidr_block_network_border_group = (known after apply)
      + main_route_table_id                  = (known after apply)
      + owner_id                             = (known after apply)
      + tags                                 = {
          + "Name" = "server-benchmarks-vpc"
        }
      + tags_all                             = {
          + "Name" = "server-benchmarks-vpc"
        }
    }

  # module.books-database.module.aurora_postgresql_v2.aws_db_subnet_group.this[0] will be created
  + resource "aws_db_subnet_group" "this" {
      + arn                     = (known after apply)
      + description             = "For Aurora cluster booksdb"
      + id                      = (known after apply)
      + name                    = "booksdb"
      + name_prefix             = (known after apply)
      + subnet_ids              = (known after apply)
      + supported_network_types = (known after apply)
      + tags_all                = (known after apply)
    }

  # module.books-database.module.aurora_postgresql_v2.aws_iam_role.rds_enhanced_monitoring[0] will be created
  + resource "aws_iam_role" "rds_enhanced_monitoring" {
      + arn                   = (known after apply)
      + assume_role_policy    = jsonencode(
            {
              + Statement = [
                  + {
                      + Action    = "sts:AssumeRole"
                      + Effect    = "Allow"
                      + Principal = {
                          + Service = "monitoring.rds.amazonaws.com"
                        }
                      + Sid       = ""
                    },
                ]
              + Version   = "2012-10-17"
            }
        )
      + create_date           = (known after apply)
      + force_detach_policies = false
      + id                    = (known after apply)
      + managed_policy_arns   = (known after apply)
      + max_session_duration  = 3600
      + name                  = (known after apply)
      + name_prefix           = (known after apply)
      + path                  = "/"
      + tags_all              = (known after apply)
      + unique_id             = (known after apply)

      + inline_policy {
          + name   = (known after apply)
          + policy = (known after apply)
        }
    }

  # module.books-database.module.aurora_postgresql_v2.aws_iam_role_policy_attachment.rds_enhanced_monitoring[0] will be created
  + resource "aws_iam_role_policy_attachment" "rds_enhanced_monitoring" {
      + id         = (known after apply)
      + policy_arn = "arn:aws:iam::aws:policy/service-role/AmazonRDSEnhancedMonitoringRole"
      + role       = (known after apply)
    }

  # module.books-database.module.aurora_postgresql_v2.aws_rds_cluster.this[0] will be created
  + resource "aws_rds_cluster" "this" {
      + allocated_storage               = (known after apply)
      + allow_major_version_upgrade     = false
      + apply_immediately               = true
      + arn                             = (known after apply)
      + availability_zones              = (known after apply)
      + backtrack_window                = 0
      + backup_retention_period         = 7
      + cluster_identifier              = "booksdb"
      + cluster_identifier_prefix       = (known after apply)
      + cluster_members                 = (known after apply)
      + cluster_resource_id             = (known after apply)
      + copy_tags_to_snapshot           = false
      + database_name                   = "booksdb"
      + db_cluster_parameter_group_name = (known after apply)
      + db_subnet_group_name            = "booksdb"
      + enable_global_write_forwarding  = false
      + enable_http_endpoint            = false
      + endpoint                        = (known after apply)
      + engine                          = "aurora-postgresql"
      + engine_mode                     = "provisioned"
      + engine_version                  = "14.5"
      + engine_version_actual           = (known after apply)
      + hosted_zone_id                  = (known after apply)
      + iam_roles                       = (known after apply)
      + id                              = (known after apply)
      + kms_key_id                      = (known after apply)
      + master_password                 = (sensitive value)
      + master_username                 = (sensitive value)
      + network_type                    = (known after apply)
      + port                            = 5432
      + preferred_backup_window         = "02:00-03:00"
      + preferred_maintenance_window    = "sun:05:00-sun:06:00"
      + reader_endpoint                 = (known after apply)
      + skip_final_snapshot             = true
      + storage_encrypted               = true
      + tags_all                        = (known after apply)
      + vpc_security_group_ids          = (known after apply)

      + serverlessv2_scaling_configuration {
          + max_capacity = 10
          + min_capacity = 1
        }

      + timeouts {}
    }

  # module.books-database.module.aurora_postgresql_v2.aws_rds_cluster_instance.this["one"] will be created
  + resource "aws_rds_cluster_instance" "this" {
      + apply_immediately                     = true
      + arn                                   = (known after apply)
      + auto_minor_version_upgrade            = true
      + availability_zone                     = (known after apply)
      + ca_cert_identifier                    = (known after apply)
      + cluster_identifier                    = (known after apply)
      + copy_tags_to_snapshot                 = false
      + db_parameter_group_name               = (known after apply)
      + db_subnet_group_name                  = "booksdb"
      + dbi_resource_id                       = (known after apply)
      + endpoint                              = (known after apply)
      + engine                                = "aurora-postgresql"
      + engine_version                        = "14.5"
      + engine_version_actual                 = (known after apply)
      + id                                    = (known after apply)
      + identifier                            = "booksdb-one"
      + identifier_prefix                     = (known after apply)
      + instance_class                        = "db.serverless"
      + kms_key_id                            = (known after apply)
      + monitoring_interval                   = 60
      + monitoring_role_arn                   = (known after apply)
      + network_type                          = (known after apply)
      + performance_insights_enabled          = (known after apply)
      + performance_insights_kms_key_id       = (known after apply)
      + performance_insights_retention_period = (known after apply)
      + port                                  = (known after apply)
      + preferred_backup_window               = (known after apply)
      + preferred_maintenance_window          = "sun:05:00-sun:06:00"
      + promotion_tier                        = 0
      + publicly_accessible                   = false
      + storage_encrypted                     = (known after apply)
      + tags_all                              = (known after apply)
      + writer                                = (known after apply)

      + timeouts {}
    }

Plan: 85 to add, 0 to change, 0 to destroy.


Pushed by: @elmoritz, Action: pull_request

@elmoritz elmoritz marked this pull request as ready for review May 16, 2023 08:16
@elmoritz elmoritz requested a review from akoufa May 17, 2023 06:50
.github/workflows/publish-vapor-image.yml Outdated Show resolved Hide resolved
bookstore-vapor/Dockerfile Show resolved Hide resolved
bookstore-vapor/Dockerfile Outdated Show resolved Hide resolved
@akoufa
Copy link
Member

akoufa commented Jan 27, 2024

@elmoritz There are some conflicts that have to be resolved otherwise it should be fine. You can use the new GitHub Action to manually create your ECR repository before letting the pipelines to try to publish your docker images

# Conflicts:
#	.gitignore
#	terraform/deployment/main.tf
#	terraform/deployment/variables.tf
#	terraform/ecr_repositories/variables.tf
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants