#pr-reviews (2022-01)
Pull Request Reviews for Cloud Posse Projects
2022-01-11
Can someone take a look at https://github.com/cloudposse/terraform-aws-cloudfront-s3-cdn/pull/208 & https://github.com/cloudposse/terraform-aws-cloudfront-s3-cdn/pull/207?
what Sets the viewer_certificate.ssl_support_method to a non-empty value why Since AWS Provider 3.71.0 the viewer_certificate.ssl_support_method is being validated on plan-time and can no longer…
what Add variables to enable the Origin Shield for the CloudFront distribution why Using Origin Shield can help reduce the load on your origin. references https://registry.terraform.io/provide…
Just waiting on https://github.com/cloudposse/terraform-aws-cloudfront-s3-cdn/pull/207#issuecomment-1012253728
@Erik Osterman (Cloud Posse)
what Add variables to enable the Origin Shield for the CloudFront distribution why Using Origin Shield can help reduce the load on your origin. references https://registry.terraform.io/provide…
Really it comes down to https://github.com/cloudposse/terraform-aws-cloudfront-s3-cdn/pull/207#discussion_r784115283
what Add variables to enable the Origin Shield for the CloudFront distribution why Using Origin Shield can help reduce the load on your origin. references https://registry.terraform.io/provide…
We are trying to prevent breaking the interface and without the default(...)
function we can’t solve it. We are avoiding the experimental features due to the big disclaimer that the state object may change/break.
2022-01-18
2022-01-25
Turns out the fix I made earlier does not work in all cases. This one should deal with that. https://github.com/cloudposse/terraform-aws-cloudfront-s3-cdn/pull/213
what Sets ssl_support_method to null when default certificate is being used instead of setting it to sni-only in all cases. why Setting this to an explicit value (sni-only) in conjunction with t…
See comments
what Sets ssl_support_method to null when default certificate is being used instead of setting it to sni-only in all cases. why Setting this to an explicit value (sni-only) in conjunction with t…
Approved
Going to release now as a hotfix.
@Frank I’m wrestling with Terratest here a bit. Will merge once I get tests to pass.
merged
Going to try and release it with https://github.com/cloudposse/terraform-aws-cloudfront-s3-cdn/pull/210
what Fixed conditions when using cache_policy_id why When using cache_policy_id, the module tries to change ttl values from zero to the default values. ~ default_cache_behavior { …
2022-01-26
2022-01-27
Hi everyone. I’m a little bit confused with the bridgecrew’s comments on the below PR. Do I need to validate that the new alias records are pointing to resources created in my account? I didn’t see this validation in the repo before my changes.
Are these crewbridge’s comments the reason because the PR is blocked?
https://github.com/cloudposse/terraform-aws-route53-alias/pull/37
what Modify default and ipv6 aws_route53_record resources to use for_each instead of count. why Prevent destroying and recreating DNS records when removing elements from aliases list.
Ah yes I took care of these for you by adding supressions. BridgeCrew’s policies can’t calculate anything that’s derived from a variable (outside of the root module I suppose?).
So the scenario is:
BridgeCrew: “I need to make sure that all of the alias records are pointing to resources in the same account as the alias”
Module: has general variable that allows for anything to be passed in
BridgeCrew: freaks out
what Modify default and ipv6 aws_route53_record resources to use for_each instead of count. why Prevent destroying and recreating DNS records when removing elements from aliases list.
Ahh, got it. Thank you for reviewing