Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Revert "testing vpc" #3

Merged
merged 1 commit into from
May 21, 2024

Revert "testing vpc"

a9bd6b5
Select commit
Loading
Failed to load commit list.
Merged

Revert "testing vpc" #3

Revert "testing vpc"
a9bd6b5
Select commit
Loading
Failed to load commit list.
Google Cloud Build / push-to-branch-keneobum881 (aksgkelearning) succeeded May 21, 2024 in 30s

Summary

Build Information

Trigger push-to-branch-keneobum881
Build 21cec4e2-6d02-4d02-a54f-3b684d1faca4
Start 2024-05-21T06:05:38-07:00
Duration 28.89s
Status SUCCESS

Steps

Step Status Duration
branch name SUCCESS 2.504s
tf init SUCCESS 13.497s
tf plan SUCCESS 8.876s
tf apply SUCCESS 739ms

Details


starting build "21cec4e2-6d02-4d02-a54f-3b684d1faca4"

FETCHSOURCE
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint: 
hint: 	git config --global init.defaultBranch <name>
hint: 
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint: 
hint: 	git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
 * branch            a9bd6b507705b12f809db97bd1b209d875b3aeec -> FETCH_HEAD
HEAD is now at a9bd6b5 Revert "testing vpc"
BUILD
Starting Step #0 - "branch name"
Step #0 - "branch name": Pulling image: alpine
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "branch name": Digest: sha256:c5b1261d6d3e43071626931fc004f70149baeba2c8ec672bd4f27761f8e1ad6b
Step #0 - "branch name": Status: Downloaded newer image for alpine:latest
Step #0 - "branch name": docker.io/library/alpine:latest
Step #0 - "branch name": ***********************
Step #0 - "branch name": revert-2-feature
Step #0 - "branch name": ***********************
Finished Step #0 - "branch name"
Starting Step #1 - "tf init"
Step #1 - "tf init": Pulling image: hashicorp/terraform:1.0.0
Step #1 - "tf init": 1.0.0: Pulling from hashicorp/terraform
Step #1 - "tf init": 540db60ca938: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Pulling fs layer
Step #1 - "tf init": a82f6d5351c2: Pulling fs layer
Step #1 - "tf init": 540db60ca938: Verifying Checksum
Step #1 - "tf init": 540db60ca938: Download complete
Step #1 - "tf init": a84ab4c8a000: Verifying Checksum
Step #1 - "tf init": a84ab4c8a000: Download complete
Step #1 - "tf init": a82f6d5351c2: Verifying Checksum
Step #1 - "tf init": a82f6d5351c2: Download complete
Step #1 - "tf init": 540db60ca938: Pull complete
Step #1 - "tf init": a84ab4c8a000: Pull complete
Step #1 - "tf init": a82f6d5351c2: Pull complete
Step #1 - "tf init": Digest: sha256:6dafbe34b7c18d189ff18e3dfb7cd5fc4144a2714eb2bc7b6dd9352455e8848a
Step #1 - "tf init": Status: Downloaded newer image for hashicorp/terraform:1.0.0
Step #1 - "tf init": docker.io/hashicorp/terraform:1.0.0
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m

starting build "21cec4e2-6d02-4d02-a54f-3b684d1faca4"

FETCHSOURCE
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint: 
hint: 	git config --global init.defaultBranch <name>
hint: 
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint: 
hint: 	git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
 * branch            a9bd6b507705b12f809db97bd1b209d875b3aeec -> FETCH_HEAD
HEAD is now at a9bd6b5 Revert "testing vpc"
BUILD
Starting Step #0 - "branch name"
Step #0 - "branch name": Pulling image: alpine
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "branch name": Digest: sha256:c5b1261d6d3e43071626931fc004f70149baeba2c8ec672bd4f27761f8e1ad6b
Step #0 - "branch name": Status: Downloaded newer image for alpine:latest
Step #0 - "branch name": docker.io/library/alpine:latest
Step #0 - "branch name": ***********************
Step #0 - "branch name": revert-2-feature
Step #0 - "branch name": ***********************
Finished Step #0 - "branch name"
Starting Step #1 - "tf init"
Step #1 - "tf init": Pulling image: hashicorp/terraform:1.0.0
Step #1 - "tf init": 1.0.0: Pulling from hashicorp/terraform
Step #1 - "tf init": 540db60ca938: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Pulling fs layer
Step #1 - "tf init": a82f6d5351c2: Pulling fs layer
Step #1 - "tf init": 540db60ca938: Verifying Checksum
Step #1 - "tf init": 540db60ca938: Download complete
Step #1 - "tf init": a84ab4c8a000: Verifying Checksum
Step #1 - "tf init": a84ab4c8a000: Download complete
Step #1 - "tf init": a82f6d5351c2: Verifying Checksum
Step #1 - "tf init": a82f6d5351c2: Download complete
Step #1 - "tf init": 540db60ca938: Pull complete
Step #1 - "tf init": a84ab4c8a000: Pull complete
Step #1 - "tf init": a82f6d5351c2: Pull complete
Step #1 - "tf init": Digest: sha256:6dafbe34b7c18d189ff18e3dfb7cd5fc4144a2714eb2bc7b6dd9352455e8848a
Step #1 - "tf init": Status: Downloaded newer image for hashicorp/terraform:1.0.0
Step #1 - "tf init": docker.io/hashicorp/terraform:1.0.0
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m

starting build "21cec4e2-6d02-4d02-a54f-3b684d1faca4"

FETCHSOURCE
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint: 
hint: 	git config --global init.defaultBranch <name>
hint: 
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint: 
hint: 	git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
 * branch            a9bd6b507705b12f809db97bd1b209d875b3aeec -> FETCH_HEAD
HEAD is now at a9bd6b5 Revert "testing vpc"
BUILD
Starting Step #0 - "branch name"
Step #0 - "branch name": Pulling image: alpine
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "branch name": Digest: sha256:c5b1261d6d3e43071626931fc004f70149baeba2c8ec672bd4f27761f8e1ad6b
Step #0 - "branch name": Status: Downloaded newer image for alpine:latest
Step #0 - "branch name": docker.io/library/alpine:latest
Step #0 - "branch name": ***********************
Step #0 - "branch name": revert-2-feature
Step #0 - "branch name": ***********************
Finished Step #0 - "branch name"
Starting Step #1 - "tf init"
Step #1 - "tf init": Pulling image: hashicorp/terraform:1.0.0
Step #1 - "tf init": 1.0.0: Pulling from hashicorp/terraform
Step #1 - "tf init": 540db60ca938: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Pulling fs layer
Step #1 - "tf init": a82f6d5351c2: Pulling fs layer
Step #1 - "tf init": 540db60ca938: Verifying Checksum
Step #1 - "tf init": 540db60ca938: Download complete
Step #1 - "tf init": a84ab4c8a000: Verifying Checksum
Step #1 - "tf init": a84ab4c8a000: Download complete
Step #1 - "tf init": a82f6d5351c2: Verifying Checksum
Step #1 - "tf init": a82f6d5351c2: Download complete
Step #1 - "tf init": 540db60ca938: Pull complete
Step #1 - "tf init": a84ab4c8a000: Pull complete
Step #1 - "tf init": a82f6d5351c2: Pull complete
Step #1 - "tf init": Digest: sha256:6dafbe34b7c18d189ff18e3dfb7cd5fc4144a2714eb2bc7b6dd9352455e8848a
Step #1 - "tf init": Status: Downloaded newer image for hashicorp/terraform:1.0.0
Step #1 - "tf init": docker.io/hashicorp/terraform:1.0.0
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m

starting build "21cec4e2-6d02-4d02-a54f-3b684d1faca4"

FETCHSOURCE
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint: 
hint: 	git config --global init.defaultBranch <name>
hint: 
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint: 
hint: 	git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
 * branch            a9bd6b507705b12f809db97bd1b209d875b3aeec -> FETCH_HEAD
HEAD is now at a9bd6b5 Revert "testing vpc"
BUILD
Starting Step #0 - "branch name"
Step #0 - "branch name": Pulling image: alpine
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "branch name": Digest: sha256:c5b1261d6d3e43071626931fc004f70149baeba2c8ec672bd4f27761f8e1ad6b
Step #0 - "branch name": Status: Downloaded newer image for alpine:latest
Step #0 - "branch name": docker.io/library/alpine:latest
Step #0 - "branch name": ***********************
Step #0 - "branch name": revert-2-feature
Step #0 - "branch name": ***********************
Finished Step #0 - "branch name"
Starting Step #1 - "tf init"
Step #1 - "tf init": Pulling image: hashicorp/terraform:1.0.0
Step #1 - "tf init": 1.0.0: Pulling from hashicorp/terraform
Step #1 - "tf init": 540db60ca938: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Pulling fs layer
Step #1 - "tf init": a82f6d5351c2: Pulling fs layer
Step #1 - "tf init": 540db60ca938: Verifying Checksum
Step #1 - "tf init": 540db60ca938: Download complete
Step #1 - "tf init": a84ab4c8a000: Verifying Checksum
Step #1 - "tf init": a84ab4c8a000: Download complete
Step #1 - "tf init": a82f6d5351c2: Verifying Checksum
Step #1 - "tf init": a82f6d5351c2: Download complete
Step #1 - "tf init": 540db60ca938: Pull complete
Step #1 - "tf init": a84ab4c8a000: Pull complete
Step #1 - "tf init": a82f6d5351c2: Pull complete
Step #1 - "tf init": Digest: sha256:6dafbe34b7c18d189ff18e3dfb7cd5fc4144a2714eb2bc7b6dd9352455e8848a
Step #1 - "tf init": Status: Downloaded newer image for hashicorp/terraform:1.0.0
Step #1 - "tf init": docker.io/hashicorp/terraform:1.0.0
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the back
...
[Logs truncated due to log size limitations. For full logs, see https://console.cloud.google.com/logs/viewer?advancedFilter=resource.type%3D%22build%22+AND+resource.labels.build_id%3D%2221cec4e2-6d02-4d02-a54f-3b684d1faca4%22+AND+resource.labels.build_trigger_id%3D%229c83ae6b-aaeb-488d-b178-8582f08c6683%22&project=aksgkelearning.]
...
p #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m

starting build "21cec4e2-6d02-4d02-a54f-3b684d1faca4"

FETCHSOURCE
hint: Using 'master' as the name for the initial branch. This default branch name
hint: is subject to change. To configure the initial branch name to use in all
hint: of your new repositories, which will suppress this warning, call:
hint: 
hint: 	git config --global init.defaultBranch <name>
hint: 
hint: Names commonly chosen instead of 'master' are 'main', 'trunk' and
hint: 'development'. The just-created branch can be renamed via this command:
hint: 
hint: 	git branch -m <name>
Initialized empty Git repository in /workspace/.git/
From https://github.com/keneobum881/ken-cloudbuild-gitops
 * branch            a9bd6b507705b12f809db97bd1b209d875b3aeec -> FETCH_HEAD
HEAD is now at a9bd6b5 Revert "testing vpc"
BUILD
Starting Step #0 - "branch name"
Step #0 - "branch name": Pulling image: alpine
Step #0 - "branch name": Using default tag: latest
Step #0 - "branch name": latest: Pulling from library/alpine
Step #0 - "branch name": Digest: sha256:c5b1261d6d3e43071626931fc004f70149baeba2c8ec672bd4f27761f8e1ad6b
Step #0 - "branch name": Status: Downloaded newer image for alpine:latest
Step #0 - "branch name": docker.io/library/alpine:latest
Step #0 - "branch name": ***********************
Step #0 - "branch name": revert-2-feature
Step #0 - "branch name": ***********************
Finished Step #0 - "branch name"
Starting Step #1 - "tf init"
Step #1 - "tf init": Pulling image: hashicorp/terraform:1.0.0
Step #1 - "tf init": 1.0.0: Pulling from hashicorp/terraform
Step #1 - "tf init": 540db60ca938: Pulling fs layer
Step #1 - "tf init": a84ab4c8a000: Pulling fs layer
Step #1 - "tf init": a82f6d5351c2: Pulling fs layer
Step #1 - "tf init": 540db60ca938: Verifying Checksum
Step #1 - "tf init": 540db60ca938: Download complete
Step #1 - "tf init": a84ab4c8a000: Verifying Checksum
Step #1 - "tf init": a84ab4c8a000: Download complete
Step #1 - "tf init": a82f6d5351c2: Verifying Checksum
Step #1 - "tf init": a82f6d5351c2: Download complete
Step #1 - "tf init": 540db60ca938: Pull complete
Step #1 - "tf init": a84ab4c8a000: Pull complete
Step #1 - "tf init": a82f6d5351c2: Pull complete
Step #1 - "tf init": Digest: sha256:6dafbe34b7c18d189ff18e3dfb7cd5fc4144a2714eb2bc7b6dd9352455e8848a
Step #1 - "tf init": Status: Downloaded newer image for hashicorp/terraform:1.0.0
Step #1 - "tf init": docker.io/hashicorp/terraform:1.0.0
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: dev ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": *************** TERRAFORM INIT ******************
Step #1 - "tf init": ******* At environment: prod ********
Step #1 - "tf init": *************************************************
Step #1 - "tf init": �[0m�[1mInitializing modules...�[0m
Step #1 - "tf init": - firewall in ../../modules/firewall
Step #1 - "tf init": - http_server in ../../modules/http_server
Step #1 - "tf init": - vpc in ../../modules/vpc
Step #1 - "tf init": Downloading terraform-google-modules/network/google 3.3.0 for vpc.vpc...
Step #1 - "tf init": - vpc.vpc in .terraform/modules/vpc.vpc
Step #1 - "tf init": - vpc.vpc.firewall_rules in .terraform/modules/vpc.vpc/modules/firewall-rules
Step #1 - "tf init": - vpc.vpc.routes in .terraform/modules/vpc.vpc/modules/routes
Step #1 - "tf init": - vpc.vpc.subnets in .terraform/modules/vpc.vpc/modules/subnets
Step #1 - "tf init": - vpc.vpc.vpc in .terraform/modules/vpc.vpc/modules/vpc
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing the backend...�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": Successfully configured the backend "gcs"! Terraform will automatically
Step #1 - "tf init": use this backend unless the backend configuration changes.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1mInitializing provider plugins...�[0m
Step #1 - "tf init": - Finding hashicorp/google-beta versions matching "~> 3.45"...
Step #1 - "tf init": - Finding hashicorp/google versions matching ">= 2.12.0, ~> 3.45, < 4.0.0"...
Step #1 - "tf init": - Installing hashicorp/google-beta v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google-beta v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": - Installing hashicorp/google v3.90.1...
Step #1 - "tf init": - Installed hashicorp/google v3.90.1 (signed by HashiCorp)
Step #1 - "tf init": 
Step #1 - "tf init": Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
Step #1 - "tf init": selections it made above. Include this file in your version control repository
Step #1 - "tf init": so that Terraform can guarantee to make the same selections by default when
Step #1 - "tf init": you run "terraform init" in the future.�[0m
Step #1 - "tf init": 
Step #1 - "tf init": �[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
Step #1 - "tf init": �[0m�[32m
Step #1 - "tf init": You may now begin working with Terraform. Try running "terraform plan" to see
Step #1 - "tf init": any changes that are required for your infrastructure. All Terraform commands
Step #1 - "tf init": should now work.
Step #1 - "tf init": 
Step #1 - "tf init": If you ever set or change modules or backend configuration for Terraform,
Step #1 - "tf init": rerun this command to reinitialize your working directory. If you forget, other
Step #1 - "tf init": commands will detect it and remind you to do so if necessary.�[0m
Finished Step #1 - "tf init"
Starting Step #2 - "tf plan"
Step #2 - "tf plan": Already have image (with digest): hashicorp/terraform:1.0.0
Step #2 - "tf plan": 
Step #2 - "tf plan": *************** TERRAFORM PLAN ******************
Step #2 - "tf plan": ******* At environment: dev ********
Step #2 - "tf plan": *************************************************
Step #2 - "tf plan": �[0m�[1mmodule.vpc.module.vpc2.module.vpc.google_compute_network.network: Refreshing state... [id=projects/aksgkelearning/global/networks/dev-ken]�[0m
Step #2 - "tf plan": �[0m�[1mmodule.vpc.module.vpc.module.vpc.google_compute_network.network: Refreshing state... [id=projects/aksgkelearning/global/networks/dev]�[0m
Step #2 - "tf plan": �[0m�[1mmodule.vpc.module.vpc.module.subnets.google_compute_subnetwork.subnetwork["us-west1/dev-subnet-01"]: Refreshing state... [id=projects/aksgkelearning/regions/us-west1/subnetworks/dev-subnet-01]�[0m
Step #2 - "tf plan": �[0m�[1mmodule.firewall.google_compute_firewall.allow-http: Refreshing state... [id=projects/aksgkelearning/global/firewalls/dev-allow-http]�[0m
Step #2 - "tf plan": �[0m�[1mmodule.http_server.google_compute_instance.http_server: Refreshing state... [id=projects/aksgkelearning/zones/us-west1-a/instances/dev-apache2-instance]�[0m
Step #2 - "tf plan": 
Step #2 - "tf plan": Terraform used the selected providers to generate the following execution
Step #2 - "tf plan": plan. Resource actions are indicated with the following symbols:
Step #2 - "tf plan":   �[31m-�[0m destroy
Step #2 - "tf plan": �[0m
Step #2 - "tf plan": Terraform will perform the following actions:
Step #2 - "tf plan": 
Step #2 - "tf plan": �[1m  # module.vpc.module.vpc2.module.vpc.google_compute_network.network�[0m will be �[1m�[31mdestroyed�[0m�[0m
Step #2 - "tf plan": �[0m  �[31m-�[0m�[0m resource "google_compute_network" "network" {
Step #2 - "tf plan":       �[31m-�[0m �[0m�[1m�[0mauto_create_subnetworks�[0m�[0m         = false �[90m->�[0m �[0m�[90mnull�[0m�[0m
Step #2 - "tf plan":       �[31m-�[0m �[0m�[1m�[0mdelete_default_routes_on_create�[0m�[0m = false �[90m->�[0m �[0m�[90mnull�[0m�[0m
Step #2 - "tf plan":       �[31m-�[0m �[0m�[1m�[0mid�[0m�[0m                              = "projects/aksgkelearning/global/networks/dev-ken" �[90m->�[0m �[0m�[90mnull�[0m�[0m
Step #2 - "tf plan":       �[31m-�[0m �[0m�[1m�[0mmtu�[0m�[0m                             = 0 �[90m->�[0m �[0m�[90mnull�[0m�[0m
Step #2 - "tf plan":       �[31m-�[0m �[0m�[1m�[0mname�[0m�[0m                            = "dev-ken" �[90m->�[0m �[0m�[90mnull�[0m�[0m
Step #2 - "tf plan":       �[31m-�[0m �[0m�[1m�[0mproject�[0m�[0m                         = "aksgkelearning" �[90m->�[0m �[0m�[90mnull�[0m�[0m
Step #2 - "tf plan":       �[31m-�[0m �[0m�[1m�[0mrouting_mode�[0m�[0m                    = "GLOBAL" �[90m->�[0m �[0m�[90mnull�[0m�[0m
Step #2 - "tf plan":       �[31m-�[0m �[0m�[1m�[0mself_link�[0m�[0m                       = "https://www.googleapis.com/compute/v1/projects/aksgkelearning/global/networks/dev-ken" �[90m->�[0m �[0m�[90mnull�[0m�[0m
Step #2 - "tf plan":     }
Step #2 - "tf plan": 
Step #2 - "tf plan": �[0m�[1mPlan:�[0m 0 to add, 0 to change, 1 to destroy.
Step #2 - "tf plan": �[0m�[90m
Step #2 - "tf plan": ─────────────────────────────────────────────────────────────────────────────�[0m
Step #2 - "tf plan": 
Step #2 - "tf plan": Note: You didn't use the -out option to save this plan, so Terraform can't
Step #2 - "tf plan": guarantee to take exactly these actions if you run "terraform apply" now.
Step #2 - "tf plan": 
Step #2 - "tf plan": *************** TERRAFORM PLAN ******************
Step #2 - "tf plan": ******* At environment: prod ********
Step #2 - "tf plan": *************************************************
Step #2 - "tf plan": 
Step #2 - "tf plan": Terraform used the selected providers to generate the following execution
Step #2 - "tf plan": plan. Resource actions are indicated with the following symbols:
Step #2 - "tf plan":   �[32m+�[0m create
Step #2 - "tf plan": �[0m
Step #2 - "tf plan": Terraform will perform the following actions:
Step #2 - "tf plan": 
Step #2 - "tf plan": �[1m  # module.firewall.google_compute_firewall.allow-http�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m  �[32m+�[0m�[0m resource "google_compute_firewall" "allow-http" {
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mcreation_timestamp�[0m�[0m = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mdestination_ranges�[0m�[0m = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mdirection�[0m�[0m          = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0menable_logging�[0m�[0m     = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m                 = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m               = "prod-allow-http"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m            = "prod"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mpriority�[0m�[0m           = 1000
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m            = "aksgkelearning"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m          = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0msource_ranges�[0m�[0m      = [
Step #2 - "tf plan":           �[32m+�[0m �[0m"0.0.0.0/0",
Step #2 - "tf plan":         ]
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mtarget_tags�[0m�[0m        = [
Step #2 - "tf plan":           �[32m+�[0m �[0m"http-server",
Step #2 - "tf plan":         ]
Step #2 - "tf plan": 
Step #2 - "tf plan":       �[32m+�[0m �[0mallow {
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mports�[0m�[0m    = [
Step #2 - "tf plan":               �[32m+�[0m �[0m"80",
Step #2 - "tf plan":             ]
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mprotocol�[0m�[0m = "tcp"
Step #2 - "tf plan":         }
Step #2 - "tf plan":     }
Step #2 - "tf plan": 
Step #2 - "tf plan": �[1m  # module.http_server.google_compute_instance.http_server�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m  �[32m+�[0m�[0m resource "google_compute_instance" "http_server" {
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mcan_ip_forward�[0m�[0m          = false
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mcpu_platform�[0m�[0m            = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mcurrent_status�[0m�[0m          = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mdeletion_protection�[0m�[0m     = false
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mguest_accelerator�[0m�[0m       = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m                      = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0minstance_id�[0m�[0m             = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mlabel_fingerprint�[0m�[0m       = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mmachine_type�[0m�[0m            = "f1-micro"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mmetadata_fingerprint�[0m�[0m    = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mmetadata_startup_script�[0m�[0m = "sudo apt-get update && sudo apt-get install apache2 -y && echo '<html><body><h1>Environment: prod</h1></body></html>' | sudo tee /var/www/html/index.html"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mmin_cpu_platform�[0m�[0m        = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m                    = "prod-apache2-instance"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m                 = "aksgkelearning"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m               = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mtags�[0m�[0m                    = [
Step #2 - "tf plan":           �[32m+�[0m �[0m"http-server",
Step #2 - "tf plan":         ]
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mtags_fingerprint�[0m�[0m        = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mzone�[0m�[0m                    = "us-west1-a"
Step #2 - "tf plan": 
Step #2 - "tf plan":       �[32m+�[0m �[0mboot_disk {
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mauto_delete�[0m�[0m                = true
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mdevice_name�[0m�[0m                = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mdisk_encryption_key_sha256�[0m�[0m = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mkms_key_self_link�[0m�[0m          = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mmode�[0m�[0m                       = "READ_WRITE"
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0msource�[0m�[0m                     = (known after apply)
Step #2 - "tf plan": 
Step #2 - "tf plan":           �[32m+�[0m �[0minitialize_params {
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mimage�[0m�[0m  = "debian-cloud/debian-11"
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mlabels�[0m�[0m = (known after apply)
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0msize�[0m�[0m   = (known after apply)
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mtype�[0m�[0m   = (known after apply)
Step #2 - "tf plan":             }
Step #2 - "tf plan":         }
Step #2 - "tf plan": 
Step #2 - "tf plan":       �[32m+�[0m �[0mconfidential_instance_config {
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0menable_confidential_compute�[0m�[0m = (known after apply)
Step #2 - "tf plan":         }
Step #2 - "tf plan": 
Step #2 - "tf plan":       �[32m+�[0m �[0mnetwork_interface {
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mipv6_access_type�[0m�[0m   = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m               = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m            = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mnetwork_ip�[0m�[0m         = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mstack_type�[0m�[0m         = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0msubnetwork�[0m�[0m         = "prod-subnet-01"
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0msubnetwork_project�[0m�[0m = (known after apply)
Step #2 - "tf plan": 
Step #2 - "tf plan":           �[32m+�[0m �[0maccess_config {
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mnat_ip�[0m�[0m       = (known after apply)
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mnetwork_tier�[0m�[0m = (known after apply)
Step #2 - "tf plan":             }
Step #2 - "tf plan":         }
Step #2 - "tf plan": 
Step #2 - "tf plan":       �[32m+�[0m �[0mreservation_affinity {
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mtype�[0m�[0m = (known after apply)
Step #2 - "tf plan": 
Step #2 - "tf plan":           �[32m+�[0m �[0mspecific_reservation {
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mkey�[0m�[0m    = (known after apply)
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mvalues�[0m�[0m = (known after apply)
Step #2 - "tf plan":             }
Step #2 - "tf plan":         }
Step #2 - "tf plan": 
Step #2 - "tf plan":       �[32m+�[0m �[0mscheduling {
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mautomatic_restart�[0m�[0m   = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mmin_node_cpus�[0m�[0m       = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mon_host_maintenance�[0m�[0m = (known after apply)
Step #2 - "tf plan":           �[32m+�[0m �[0m�[1m�[0mpreemptible�[0m�[0m         = (known after apply)
Step #2 - "tf plan": 
Step #2 - "tf plan":           �[32m+�[0m �[0mnode_affinities {
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mkey�[0m�[0m      = (known after apply)
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0moperator�[0m�[0m = (known after apply)
Step #2 - "tf plan":               �[32m+�[0m �[0m�[1m�[0mvalues�[0m�[0m   = (known after apply)
Step #2 - "tf plan":             }
Step #2 - "tf plan":         }
Step #2 - "tf plan":     }
Step #2 - "tf plan": 
Step #2 - "tf plan": �[1m  # module.vpc.module.vpc.module.subnets.google_compute_subnetwork.subnetwork["us-west1/prod-subnet-01"]�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m  �[32m+�[0m�[0m resource "google_compute_subnetwork" "subnetwork" {
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mcreation_timestamp�[0m�[0m         = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mexternal_ipv6_prefix�[0m�[0m       = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mfingerprint�[0m�[0m                = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mgateway_address�[0m�[0m            = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m                         = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mip_cidr_range�[0m�[0m              = "10.20.10.0/24"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mipv6_cidr_range�[0m�[0m            = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m                       = "prod-subnet-01"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m                    = "prod"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mprivate_ip_google_access�[0m�[0m   = false
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mprivate_ipv6_google_access�[0m�[0m = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m                    = "aksgkelearning"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mpurpose�[0m�[0m                    = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mregion�[0m�[0m                     = "us-west1"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0msecondary_ip_range�[0m�[0m         = []
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m                  = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mstack_type�[0m�[0m                 = (known after apply)
Step #2 - "tf plan":     }
Step #2 - "tf plan": 
Step #2 - "tf plan": �[1m  # module.vpc.module.vpc.module.vpc.google_compute_network.network�[0m will be created�[0m�[0m
Step #2 - "tf plan": �[0m  �[32m+�[0m�[0m resource "google_compute_network" "network" {
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mauto_create_subnetworks�[0m�[0m         = false
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mdelete_default_routes_on_create�[0m�[0m = false
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mgateway_ipv4�[0m�[0m                    = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mid�[0m�[0m                              = (known after apply)
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mmtu�[0m�[0m                             = 0
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mname�[0m�[0m                            = "prod"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mproject�[0m�[0m                         = "aksgkelearning"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mrouting_mode�[0m�[0m                    = "GLOBAL"
Step #2 - "tf plan":       �[32m+�[0m �[0m�[1m�[0mself_link�[0m�[0m                       = (known after apply)
Step #2 - "tf plan":     }
Step #2 - "tf plan": 
Step #2 - "tf plan": �[0m�[1mPlan:�[0m 4 to add, 0 to change, 0 to destroy.
Step #2 - "tf plan": �[0m�[0m
Step #2 - "tf plan": �[1mChanges to Outputs:�[0m�[0m
Step #2 - "tf plan":   �[32m+�[0m �[0m�[1m�[0mexternal_ip�[0m�[0m   = (known after apply)
Step #2 - "tf plan":   �[32m+�[0m �[0m�[1m�[0mfirewall_rule�[0m�[0m = "prod-allow-http"
Step #2 - "tf plan":   �[32m+�[0m �[0m�[1m�[0minstance_name�[0m�[0m = "prod-apache2-instance"
Step #2 - "tf plan":   �[32m+�[0m �[0m�[1m�[0mnetwork�[0m�[0m       = "prod"
Step #2 - "tf plan":   �[32m+�[0m �[0m�[1m�[0msubnet�[0m�[0m        = "prod-subnet-01"
Step #2 - "tf plan": �[90m
Step #2 - "tf plan": ─────────────────────────────────────────────────────────────────────────────�[0m
Step #2 - "tf plan": 
Step #2 - "tf plan": Note: You didn't use the -out option to save this plan, so Terraform can't
Step #2 - "tf plan": guarantee to take exactly these actions if you run "terraform apply" now.
Finished Step #2 - "tf plan"
Starting Step #3 - "tf apply"
Step #3 - "tf apply": Already have image (with digest): hashicorp/terraform:1.0.0
Step #3 - "tf apply": ***************************** SKIPPING APPLYING *******************************
Step #3 - "tf apply": Branch 'revert-2-feature' does not represent an official environment.
Step #3 - "tf apply": *******************************************************************************
Finished Step #3 - "tf apply"
PUSH
DONE

Build Log: https://console.cloud.google.com/logs/viewer?advancedFilter=resource.type%3D%22build%22+AND+resource.labels.build_id%3D%2221cec4e2-6d02-4d02-a54f-3b684d1faca4%22+AND+resource.labels.build_trigger_id%3D%229c83ae6b-aaeb-488d-b178-8582f08c6683%22&project=aksgkelearning