#pr-reviews (2021-04)
Pull Request Reviews for Cloud Posse Projects
2021-04-05
Can this one be reviewed (again) please? https://github.com/cloudposse/terraform-aws-cloudfront-s3-cdn/pull/147
what Replaced the enabled flag with distribution_enabled Corrected behavior for actual enabled flag to prevent from creating any resources why The enabled input was being used to manage the dist…
@jose.amengual
what Replaced the enabled flag with distribution_enabled Corrected behavior for actual enabled flag to prevent from creating any resources why The enabled input was being used to manage the dist…
@Frank there is issues with your PR, it looks like the logic on the count is not correct, I left a message on the PR merged and tagged you on the Bug, if you can’t figure out please let me know and I will revert the change
@Frank I saw the replies to the bug, thanks
2021-04-06
2021-04-08
2021-04-14
Can you review this PR please: https://github.com/cloudposse/terraform-aws-eks-node-group/pull/65
what Add placement variable in order to specify optional placement parameters for the managed nodes (e.g. pin them to a single AZ). When the placement variable is set, the module checks if an avai…
2021-04-19
Can someone please take a look at this one? https://github.com/cloudposse/terraform-aws-dynamic-subnets/pull/131
what Replaced removed list function with tolist to make it work with Terraform 0.15. Updated Github Workflows why The list function was deprecated since Terraform v0.12 and has been removed in T…
I’ll resurface with the contributor team to get an admin approval on this one.
what Replaced removed list function with tolist to make it work with Terraform 0.15. Updated Github Workflows why The list function was deprecated since Terraform v0.12 and has been removed in T…
@Frank merged
Thanks!
Hi folks, who is in charge of reviewing the PRs on cloudposse / terraform-aws-rds-cloudwatch-sns-alarms ?
Terraform module that configures important RDS alerts using CloudWatch and sends them to an SNS topic - cloudposse/terraform-aws-rds-cloudwatch-sns-alarms
2021-04-21
what synchronizing part of codebase to match terraform-aws-alb access_logs_region is no longer used bumping vpc and subnet versions to the latest releases for testing syncing access_logs to match …
2021-04-22
not sure how to rerun the failed bridgecrew test
what Describe high-level what changed as a result of these commits (i.e. in plain-english, what do these changes mean?) Use bullet points to be concise and to the point. Context, as inherited fr…
Can you share the output of the failed test?
what Describe high-level what changed as a result of these commits (i.e. in plain-english, what do these changes mean?) Use bullet points to be concise and to the point. Context, as inherited fr…
i cannot see it
ah, i’ve talked to you a few times on here and assumed you were affiliated with CP. my bad haha
I will do it
Ensure the ELBv2 (Application/Network) has access logging enabled
Ensure that ALB drops HTTP headers
this is because bridgecrew thinks they need to be enable but we have a var to enable or disable it
it expect it to be enabled
@jose.amengual and other CloudPosse staff, is there a way to expose what needs to be fixed through bridgecrew? I’m guessing their TOS won’t allow that though, not sure. Alternatively, do you have any opensource ambassadors that have read access to the BridgeCrew results? With the latest updates to Checkov you’ll probably need some help with these broken builds.
not yet, we do not have a way to do that so far
I think for this we need to anotate exception rules
Yeah, I’m famiar with this part of the process. Just curious about the best way to make this part of the workflow a bit more automated and to make it so that users can either find the results or replicate the process on their side. The quick and easy solution is documenting something like this https://github.com/bridgecrewio/checkov#using-docker so that the user can do it themselves.
Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework and other infrastructure-as-code-languages with Checkov by Bridgecrew. - bridgecrew…
They said they were working on a solution for this but I have not heard back
Any chance we could we get another PR review on this one?
merged
anyone know why auto format fails like this? https://github.com/cloudposse/terraform-aws-cicd/pull/94/checks
@mihai.plesa looks to be an issue with there not being a related
entry in the README.yaml
. Check out other README.yaml
files and copy the related key from them and remove any elements and you should be good.
thank you Matt, that worked. just needs review now
and someone to start the tests
Started the tests, but asked a question as I’m not familiar with this module. Someone else from the contributor team might be more helpful.
I’m testing now without passing website_bucket_name
@Matt Gowie please have a look now, it’s ready for tests again
@mihai.plesa merged
awesome, thank you
lol
requesting reviews on the following - please https://github.com/cloudposse/terraform-aws-cloudfront-cdn/pull/61 https://github.com/cloudposse/terraform-aws-cicd/pull/94
another PR, please https://github.com/cloudposse/terraform-aws-lb-s3-bucket/pull/38
what All load balancer types will be able to log to the s3 bucket. why The missing policy info prevents logging from all load balancer types and is incomplete according to AWS documentation. re…
2021-04-23
https://github.com/cloudposse/terraform-aws-nlb/pull/13 https://github.com/cloudposse/terraform-aws-alb/pull/86
what synchronizing part of codebase to match terraform-aws-alb access_logs_region is no longer used bumping vpc and subnet versions to the latest releases for testing syncing access_logs to match …
what Describe high-level what changed as a result of these commits (i.e. in plain-english, what do these changes mean?) Use bullet points to be concise and to the point. Context, as inherited fr…
2021-04-26
what Adding the ability to add multiple origins Duplicated from: cloudposse/terraform-aws-cloudfront-s3-cdn#78 why Allow more origins to be referenced in the ordered_cache block.
thanks @jose.amengual
what Adding the ability to add multiple origins Duplicated from: cloudposse/terraform-aws-cloudfront-s3-cdn#78 why Allow more origins to be referenced in the ordered_cache block.
Would have a look at this PR? - please Not sure what to do about the BC Scanner…
https://github.com/cloudposse/terraform-aws-cloudwatch-flow-logs/pull/16
What Add GitHub Actions Updates Readme Upgrade to TF13/14 Adds example/complete Adds Test Why Attempting to add automation. Attempting to upgrade module to TF 14 References Close #3 & #6
https://github.com/cloudposse/terraform-aws-s3-bucket/pull/86 One-liner bug fix Thank you in advance!
what Fixing a bug where the bucket policy would flip-flop on Terraform apply if var.policy and any of var.allow_ssl_requests_only, var.allow_encrypted_uploads_only were set why The aws_s3_bucket…
2021-04-29
https://github.com/cloudposse/terraform-aws-ecs-web-app/pull/146 - review please
what Modify build_environment_variables var type to include a 'type' map key. why CodePipeline and CodeBuild modules consumed by this module now require the type key to be specified. re…