#pr-reviews (2023-05)
Pull Request Reviews for Cloud Posse Projects
2023-05-12
Hello there .. Can I please get a review on https://github.com/cloudposse/terraform-aws-documentdb-cluster/pull/57? .. It’s kinda simple and urgent at the same time for us at the moment .. Maybe also I could need your help understanding why the workflow is failing
propagated preferred_maintenance_window
to the docdb cluster instances resources
what
• The maintenance window given as a variable is given to the Terraform Resource aws_docdb_cluster_instance.default
such that the cluster and its instances have the same value given by the user
• Closes #55
why
• Without that the cluster instances were having “random” windows that don’t match the expectations of “potential” down time • Users want to be in control of when their databases can go under maintenance not just at any “random” time
references
@Sherif Ayad PR updated with comments!
propagated preferred_maintenance_window
to the docdb cluster instances resources
what
• The maintenance window given as a variable is given to the Terraform Resource aws_docdb_cluster_instance.default
such that the cluster and its instances have the same value given by the user
• Closes #55
why
• Without that the cluster instances were having “random” windows that don’t match the expectations of “potential” down time • Users want to be in control of when their databases can go under maintenance not just at any “random” time
references
I adjusted the PR as per the comments of the reviewers
2023-05-15
2023-05-16
https://github.com/cloudposse/terraform-aws-alb/pull/125 can we merge this to fix the access log bucket?
This PR contains the following updates:
Configuration
Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
Automerge: Disabled by config. Please merge this manually once you are satisfied.
Rebasing: Renovate will not automatically rebase this PR, because other commits have been found.
Ignore: Close this PR and you won’t be reminded about this update again.
☐ If you want to rebase/retry this PR, check this box
This PR has been generated by Mend Renovate. View repository job log here.
i closed the PR since the latest version of the module is https://github.com/cloudposse/terraform-aws-lb-s3-bucket/releases/tag/0.17.0
This PR contains the following updates:
Configuration
Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
Automerge: Disabled by config. Please merge this manually once you are satisfied.
Rebasing: Renovate will not automatically rebase this PR, because other commits have been found.
Ignore: Close this PR and you won’t be reminded about this update again.
☐ If you want to rebase/retry this PR, check this box
This PR has been generated by Mend Renovate. View repository job log here.
ok, is renovate going to pick the new one?
2023-05-17
https://github.com/cloudposse/docs/pull/584 Just updating the documentation, making it look more professional, merge at your convenience
what
• Fixed typos in documentation, put dots where they need to be.
why
• Improves readability and removes distraction.
references
• Also I am getting familiar with the eco-system and the process of contributing itself.
Thanks a lot!
what
• Fixed typos in documentation, put dots where they need to be.
why
• Improves readability and removes distraction.
references
• Also I am getting familiar with the eco-system and the process of contributing itself.
2023-05-21
what
• adds variable allow_ingress_from_self
which configures the security group to allow traffic within itself on DB port
why
• This is useful in architectures where the db security group will be used to control db access - i.e. it will also be applied to applications.
references
@kevcube updated with comments
what
• adds variable allow_ingress_from_self
which configures the security group to allow traffic within itself on DB port
why
• This is useful in architectures where the db security group will be used to control db access - i.e. it will also be applied to applications.
references
thanks @Linda Pham (Cloud Posse); addressed
2023-05-23
2023-05-24
Hey! Will appreciate a review on a PR adding some improvements to lambda component: https://github.com/cloudposse/terraform-aws-components/pull/692
what
• Add default value for the variable function_name
.
• Replace policy JSON with YAML support to make custom policies more readable.
why
• function_name
was required to set, but it wasn’t actually passed to module "lambda"
inputs.
• YAML makes the policy declaration in stack more readable and compact compared to JSON.
references
• N/A
merged
what
• Add default value for the variable function_name
.
• Replace policy JSON with YAML support to make custom policies more readable.
why
• function_name
was required to set, but it wasn’t actually passed to module "lambda"
inputs.
• YAML makes the policy declaration in stack more readable and compact compared to JSON.
references
• N/A
Hey @Linda Pham (Cloud Posse), there is a change requested in this PR, and I’ll address that shortly.
Added my 2c this morning. I’m okay with this change.
@Dan Miller (Cloud Posse) any concerns?
I think as long as we support var.policy_json
option as well, this should be fine. But @Jeremy G (Cloud Posse) had requested changes
@Veronika Gnilitska, Jeremy requested changes
@Erik Osterman (Cloud Posse) I am opposed to creating a third parallel syntax (YAML) for IAM policies, but if we are going to do it, I would prefer that we standardize on using terraform-aws-iam-policy
and make it full-featured, so that everywhere we allow it, it has the same interface, and we do not need to invest energy reinventing it.
@Veronika Gnilitska @Matt Gowie thoughts
Thank you for review, using terraform-aws-iam-policy
is reasonable indeed, I’ll update the PR.
Yeah, we discussed. Veronika has something in the works that I think will be a good add, so let’s review when she’s got that wrapped Thanks for the conversation and direction @Jeremy G (Cloud Posse) @Erik Osterman (Cloud Posse) @Dan Miller (Cloud Posse)
@Jeremy G (Cloud Posse) @Erik Osterman (Cloud Posse) @Dan Miller (Cloud Posse) the PR was updated to utilize terraform-aws-iam-policy
. Please review when possible, thanks in advance!
@Linda Pham (Cloud Posse) @Gabriela Campana (Cloud Posse)
@Erik Osterman (Cloud Posse) I would like to have terraform-aws-iam-policy
and then this component updated to take a Terraform object with optional attributes rather than type = any
. I can do it, or we can ask Veronika to do it, or we can just proceed as-is. What would you like us to do?
@Jeremy G (Cloud Posse) the PR is up https://github.com/cloudposse/terraform-aws-iam-policy/pull/26 UPD: the tests are failing, I’ll work on that.
what
• This updates iam_policy_statements
variable definition to take Terraform object with optional attributes rather than type = any
. Provider version is bumped sine optional
, as a non-experimental feature, was introduced in 1.3.
why
• Provide more control over the expected structure of the input data for IAM policy statements.
references
• Slack thread + PR #692.
@Veronika Gnilitska https://github.com/cloudposse/terraform-aws-iam-policy/pull/26/files#r1223574353
@Jeremy G (Cloud Posse) I’ve updated the PR #26 and left some comments
@Veronika Gnilitska Thanks for pointing out that iam_policy_statements
is a map and we want to preserve backward compatibility.
I updated your PR to introduce a new iam_policy
input that more closely parallels aws_iam_policy_document
and ask that you use that in the component that started this whole thread. I also made a bunch of other cleanups. Please let me know if you have any suggestions, objections, concerns, etc. about the changes I made. CC @Matt Gowie
@Jeremy G (Cloud Posse) looks great, no additional comments from my side. Thank you! I’ll proceed with the PR to the components once a new module version is released
@Veronika Gnilitska iam-policy v1.0.0 released . Please use iam_policy
input, not iam_policy_statements
. Thank you again for your help.
Awesome, will do. Thanks!
Thanks for working through that folks – That 1.0 is a great cut and I know we’ll be happy to start using that module more now
@Jeremy G (Cloud Posse) hey! I don’t see the latest version 1.0.0 in the registry https://registry.terraform.io/modules/cloudposse/iam-policy/aws/latest. Is there anything else that should be done to make it available?
I manually resync’d it
we have this problem with some of our modules. some bug in the TF registry.
Good to know. Thanks @Erik Osterman (Cloud Posse)!
@Jeremy G (Cloud Posse) it seems like the ability to use var.policy_json
only was lost with the recently added validation blocks. I put up a PR to fix this https://github.com/cloudposse/terraform-aws-iam-policy/pull/28, please take a look when possible.
what
• Consider JSON source policy documents in the recently added precondition block.
why
• It’s expected to support JSON inputs while var.iam_policy
and var.iam_policy_statments
may remain unset. The precondition fails in this case:
│ Error: Resource precondition failed
│
│ on .terraform/modules/iam_policy/main.tf line 90, in data "aws_iam_policy_document" "this":
│ 90: condition = var.iam_policy_statements != null || var.iam_policy != null
│ ├────────────────
│ │ var.iam_policy is null
│ │ var.iam_policy_statements is null
│
│ Exactly 1 of var.iam_policy and var.iam_policy_statments may be used, preferably var.iam_policy.
references
• N/A
@Veronika Gnilitska Good catch, and thank you for the PR. Let’s just remove the failing precondition entirely, because there are several inputs that could possibly be sufficient, and AWS will complain if nothing is provided, so we can rely on that.
@Jeremy G (Cloud Posse) that makes sense - PR was updated.
Thank you, @Veronika Gnilitska. iam-policy
v1.0.1 is now available.
PR #692 was updated to utilize the latest version of terraform-aws-iam-policy
. Not sure what’s the issue with bats check though
@Jeremy G (Cloud Posse) is that something we can fix?
@Gabriela Campana (Cloud Posse) Don’t worry about the bats
failures. I will review your PR later today.
@Veronika Gnilitska I reviewed your PR and requested some small changes.
@Jeremy G (Cloud Posse) thanks! All the suggestions were pushed
Thank you, @Veronika Gnilitska. Your component changes are now available in components release v1.233.0
Great! Thanks a lot for you suggestions and help @Jeremy G (Cloud Posse)
@Veronika Gnilitska you are welcome, and thank you and @Matt Gowie for all of your efforts in making this happen.
2023-05-25
2023-05-26
2023-05-30
2023-05-31
Any chance this https://github.com/cloudposse/terraform-aws-elasticache-memcached/pull/56 gets reviewed soon? I expect it to fix a year long reported issue https://github.com/cloudposse/terraform-aws-elasticache-memcached/issues/45
Hi @z0rc3r
We’ll review it
@z0rc3r requested changes