#pr-reviews (2023-10)
Pull Request Reviews for Cloud Posse Projects
2023-10-02
what
• Removed duplicate name
in portMappings
why
• Object constructor map keys must be unique
could you run make precommit/terraform
and commit the changes please?
what
• Removed duplicate name
in portMappings
why
• Object constructor map keys must be unique
2023-10-03
2023-10-10
Looking for review from cloudposse/engineering please: https://github.com/cloudposse/terraform-aws-lambda-function/pull/45
what
Add tags = module.this.tags
to each of the IAM resources so that they use the tags determined by the null/label context
or the tags
input.
why
Prior to this, the aws_iam_role
and the aws_iam_policy
created by this module did not include any of the tags passed via tags
or via context
.
And a couple of other fixes for terraform-aws-lambda-function
for review please:
• https://github.com/cloudposse/terraform-aws-lambda-function/pull/44
• https://github.com/cloudposse/terraform-aws-lambda-function/pull/46
@Gabriela Campana (Cloud Posse)
2023-10-11
2023-10-12
what
• fix tflint and markdownlint complaints
why
• we want to use this component and instead of just fixing in our repo, I upstream
references
2023-10-15
Not mine, but can we please get this simple one merged https://github.com/cloudposse/terraform-aws-ecs-web-app/pull/235/files
2023-10-16
https://github.com/cloudposse/terraform-aws-components/pull/876
quick one plzplz
what
• allow traffic within db security group
why
• providing network access via shared security groups rather than exposing input/output rules in multiple security groups.
references
2023-10-17
what
Fix typo in readme example.
Added support for IPv6 target group in ip mode
why
- invalid variable name was there in the readme example
- target groups in ip mode allow targets to register using ipv6. where service runs in ipv6 mode. only
2023-10-19
Hi. This PR is currently blocked due a failed test in the CI. This looks like a temporary issue. I’ve run the same test on my client’s infra without problem.
Can anyone retry the CI on cloudposse’s infra ? https://github.com/cloudposse/terraform-aws-tfstate-backend/pull/142
what
This parameter allows the user to specify policies that are applied to the S3 bucket with the policies defined by this module.
why
We want to add policies that forbid non admin users to access the bucket containing tfstates.
This commit allow us to specify a policy that implement these restriction without clobbering the policies put in place by this module.
Note that I have no problem to change the name of this new parameter if you want another.
references
Closes: #115
Updated, approved, and merged. Sorry it took so long.
what
This parameter allows the user to specify policies that are applied to the S3 bucket with the policies defined by this module.
why
We want to add policies that forbid non admin users to access the bucket containing tfstates.
This commit allow us to specify a policy that implement these restriction without clobbering the policies put in place by this module.
Note that I have no problem to change the name of this new parameter if you want another.
references
Closes: #115