Skip to content

Conversation

@williambrady
Copy link
Owner

The GitHub Terraform provider (integrations/github) uses the legacy plugin SDK, which produces verbose WARN messages during plan/apply when TF_LOG is set to INFO. These warnings are benign but clutter the CI output. Removing TF_LOG lets Terraform use its default log level, showing only actionable output.

The GitHub Terraform provider (integrations/github) uses the legacy
plugin SDK, which produces verbose WARN messages during plan/apply
when TF_LOG is set to INFO. These warnings are benign but clutter
the CI output. Removing TF_LOG lets Terraform use its default log
level, showing only actionable output.
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan
github_repository.managed["portfolio"]: Refreshing state... [id=portfolio]
github_repository.managed["portfolio-aws-org-guardduty"]: Refreshing state... [id=portfolio-aws-org-guardduty]
github_repository.managed["portfolio-github-management"]: Refreshing state... [id=portfolio-github-management]
github_repository.managed["portfolio-github-example"]: Refreshing state... [id=portfolio-github-example]
github_repository.managed["portfolio-aws-account-baseline"]: Refreshing state... [id=portfolio-aws-account-baseline]
github_repository.managed["portfolio-template-iac"]: Refreshing state... [id=portfolio-template-iac]
github_repository.managed["portfolio-aws-org-baseline"]: Refreshing state... [id=portfolio-aws-org-baseline]
github_repository.managed["portfolio-code-scanner"]: Refreshing state... [id=portfolio-code-scanner]
github_repository.managed["portfolio-aws-health"]: Refreshing state... [id=portfolio-aws-health]
github_repository_collaborator.managed["portfolio-aws-org-baseline:ghaworkflow"]: Refreshing state... [id=portfolio-aws-org-baseline:ghaworkflow]
github_repository_collaborator.managed["portfolio:ghaworkflow"]: Refreshing state... [id=portfolio:ghaworkflow]
github_repository_collaborator.managed["portfolio-aws-health:ghaworkflow"]: Refreshing state... [id=portfolio-aws-health:ghaworkflow]
github_repository_collaborator.managed["portfolio-aws-account-baseline:ghaworkflow"]: Refreshing state... [id=portfolio-aws-account-baseline:ghaworkflow]
github_repository_collaborator.managed["portfolio-code-scanner:ghaworkflow"]: Refreshing state... [id=portfolio-code-scanner:ghaworkflow]
github_repository_collaborator.managed["portfolio-github-management:ghaworkflow"]: Refreshing state... [id=portfolio-github-management:ghaworkflow]
github_repository_collaborator.managed["portfolio-template-iac:ghaworkflow"]: Refreshing state... [id=portfolio-template-iac:ghaworkflow]
github_repository_collaborator.managed["portfolio-github-example:ghaworkflow"]: Refreshing state... [id=portfolio-github-example:ghaworkflow]
github_repository_collaborator.managed["portfolio-aws-org-guardduty:ghaworkflow"]: Refreshing state... [id=portfolio-aws-org-guardduty:ghaworkflow]
github_branch_protection.main["portfolio-code-scanner"]: Refreshing state... [id=BPR_kwDOQj8lqc4EQ-vz]
github_branch_protection.main["portfolio-aws-org-baseline"]: Refreshing state... [id=BPR_kwDORC4Icc4ETQI3]
github_branch_protection.main["portfolio-github-example"]: Refreshing state... [id=BPR_kwDOQ1CA-M4EQ_PX]
github_branch_protection.main["portfolio-aws-account-baseline"]: Refreshing state... [id=BPR_kwDORC4J384ETQI4]
github_branch_protection.main["portfolio-github-management"]: Refreshing state... [id=BPR_kwDOQj9B584EQczj]
github_branch_protection.main["portfolio"]: Refreshing state... [id=BPR_kwDOQ4gK2c4ERJDb]
github_branch_protection.main["portfolio-aws-org-guardduty"]: Refreshing state... [id=BPR_kwDORMwp6M4EVMMK]
github_branch_protection.main["portfolio-template-iac"]: Refreshing state... [id=BPR_kwDOQ4f1HM4ERIMj]
github_branch_protection.main["portfolio-aws-health"]: Refreshing state... [id=BPR_kwDORCAGks4ETEzW]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # github_repository.managed["portfolio-aws-org-guardduty"] will be updated in-place
  ~ resource "github_repository" "managed" {
        id                          = "portfolio-aws-org-guardduty"
        name                        = "portfolio-aws-org-guardduty"
        # (39 unchanged attributes hidden)

      - template {
          - include_all_branches = false -> null
          - owner                = "williambrady" -> null
          - repository           = "portfolio-template-iac" -> null
        }

        # (1 unchanged block hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Saved the plan to: tfplan

To perform exactly these actions, run the following command to apply:
    terraform apply "tfplan"

Pushed by: @williambrady, Action: pull_request

@augmentcode
Copy link

augmentcode bot commented Feb 10, 2026

🤖 Augment PR Summary

Summary: Reduces noisy Terraform CI output by removing an explicit TF logging level.

Changes:

  • Deleted TF_LOG: INFO from the Terraform GitHub Actions workflow so Terraform uses its default log level and avoids verbose legacy SDK WARN messages from the GitHub provider.

🤖 Was this summary useful? React with 👍 or 👎

Copy link

@augmentcode augmentcode bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review completed. No suggestions at this time.

Comment augment review to trigger a new review at any time.

Copy link
Collaborator

@ghaworkflow ghaworkflow left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks correct.

@github-actions
Copy link

SDLC Code Scanner Security Scan ✅

Severity Count
Critical 0
High 0
Medium 6
Low 9
Total 15

Scanners: checkov, trivy, pylint

Top Findings

  1. 🟡 MEDIUM - Ensure GitHub repository is Private
    • Tool: checkov | Rule: CKV_GIT_1
    • Location: /terraform/main.tf:10
    • Resource: github_repository.managed
  2. 🟡 MEDIUM - GitHub pull requests should require at least 2 approvals
    • Tool: checkov | Rule: CKV_GIT_5
    • Location: /terraform/main.tf:70
    • Resource: github_branch_protection.main
  3. 🟡 MEDIUM - Ensure GitHub branch protection rules requires signed commits
    • Tool: checkov | Rule: CKV_GIT_6
    • Location: /terraform/main.tf:70
    • Resource: github_branch_protection.main
  4. 🟡 MEDIUM - unused-variable: Unused variable 'encryption'
    • Tool: pylint | Rule: W0612
    • Location: scripts/validate_aws.py:149
  5. 🟡 MEDIUM - broad-exception-caught: Catching too general exception Exception
    • Tool: pylint | Rule: W0718
    • Location: scripts/validate_aws.py:346

View the full report in the Actions artifacts

@williambrady williambrady merged commit ab89eca into main Feb 10, 2026
5 checks passed
@williambrady williambrady deleted the feature/remove-tf-log-info branch February 10, 2026 07:15
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants