#pr-reviews (2024-05)
Pull Request Reviews for Cloud Posse Projects
2024-05-01
https://github.com/cloudposse/terraform-aws-elasticache-redis/pull/227
I added support for Serverless Redis to this module
what
• Add support for Serverless Redis instances
why
• Supporting Redis Serverless for demanding applications
notes
• This upgrades the required version of the AWS provider from “>= 4.18” to “>= 5.32” as this is the first release where aws_elasticache_serverless_cache
was introduced
2024-05-02
Hey there, can someone have a look at this PR discussion? https://github.com/cloudposse/terraform-aws-lb-s3-bucket/pull/82#issuecomment-2090913789 It’s about the correct use of the null label module to generate a default bucket name.
references
closes #81 Copy bucket_name logic from dependent module
Hi Team, Gret help if you guys can help to review this PR https://github.com/cloudposse/terraform-aws-waf/pull/57
what Fixed a typo in aws_wafv2_web_acl resource: changed content_type assignment. why Corrects content_type mapping to use the appropriate value. references Minor fix, no related GitHub issue.
Looks like the readme needs to be updated.
Try running
make init
make docs
make readme
and pushing up
what Fixed a typo in aws_wafv2_web_acl resource: changed content_type assignment. why Corrects content_type mapping to use the appropriate value. references Minor fix, no related GitHub issue.
Actually I am not the author of the PR. I wanted to get the attention for the PR because we are desperately waiting this fix as we depend on WAF module for prod workloads
2024-05-03
Very small PR (one-liner). Adding a try()
around a length()
function to stop it from throwing an error.
2024-05-05
2024-05-06
Could you please review this pull request: https://github.com/terraform-aws-modules/terraform-aws-acm/pull/149 It would be nice to have this feature merged
This is a follow up of #137
Credits to @amontalban for the work, I made requested changes and tested the feature.
Description
This PR allows creating one ACM certificate for multiple domains, which, is useful when using the certificate for CloudFront that only allows one certificate per distribution.
Motivation and Context
CloudFront does not support multiple ACM certificates, like ALB. Therefore, if you need to support multiple domains in a single CloudFront distribution you would have to create the certificate manually because this module does not support it.
Breaking Changes
This change should be backward compatible as I added a zones var containing a map with domains and their Route53 zone ID so the validation records are created in the correct Route53 zone.
Additionally, I have updated the tests in examples/complete-dns-validation to allow variables so it was easier for me (and others) to test with my test domains.
How Has This Been Tested?
☑︎ I have updated at least one of the examples/*
to demonstrate and validate my change(s)
☑︎ I have tested and validated these changes using one or more of the provided examples/*
projects
☑︎ I have executed pre-commit run -a
on my pull request
Fixes #136
2024-05-07
In PR https://github.com/cloudposse/terraform-aws-ec2-bastion-server/pull/230/files
• The tflint
step is failing here due to a github token issue
• The codeowners are set to admins
Is this repo out of date?
Hi, could I get the PR reviewed? https://github.com/cloudposse/terraform-aws-rds-cluster/pull/192
what
I implemented create_before_destroy on the aws_rds_cluster_instance default instances.
why
Making a change to any parameter that triggers a replace on a aws_rds_cluster_instance results in all instances being destroyed before attempting to create a new instance which causes an outage. This a faster (and safer) altenative to #191
references
Hello all. could you check my PR? ref: https://github.com/cloudposse/terraform-aws-elasticache-memcached/pull/79
2024-05-10
Hello, I need a PR review. Thanks ref: https://github.com/cloudposse/terraform-aws-ec2-instance/pull/197
2024-05-14
Could you take a look please? https://github.com/cloudposse/terraform-aws-eks-cluster/pull/227
what
Implements #226.
why
See linked issue.
references
See linked issue.
2024-05-15
Could i get some help with the failing checks in this pr ?
https://github.com/cloudposse/terraform-aws-components/pull/1032
what
• add named subnets to vpc component
why
• allow using named subnets for databases
references
Related thread
@RB we’d appreciate it if you opened a PR and add it
Thanks for surfacing this. I’m looking into it internally and will let you know once it’s resolved
This repo isn’t supposed to have those failing workflows. We’re removing them once Erik confirms this PR https://github.com/cloudposse/terraform-aws-components/pull/1038
what
• Deleted the feature-branch.yaml
workflow
why
• This repo should not have this workflow. It’s intended for module, not component, repos.
references
2024-05-16
hello all, new PR is here I’m eating https://github.com/cloudposse/terraform-aws-rds/pull/181 thank you for your time and effort! best!
what
Output values.
why
We need to pass in the rds.
references
n/a
@Ozan Gazi cc
what
Output values.
why
We need to pass in the rds.
references
n/a
thanks @Ercan Ermis the PR looks good, please address the comments and we’ll merge it
hello @Andriy Knysh (Cloud Posse), they are completed and ready to merge. thanks! ^^
Could I please get a review on https://github.com/cloudposse/terraform-aws-ecs-alb-service-task/pull/238 ?
what
• Update examples/complete to include ECS Service Connect config • bump AWS provider version to support latest ECS Service Connect config
why
• Fix issue when using older AWS provider • Increase test coverage
references
• Closes #236
2024-05-17
2024-05-18
Hi Team, help to review this https://github.com/cloudposse/terraform-aws-waf/pull/79 . While using the WAF module we noticed this part is missing and just thought to raise the PR. Thank you
what
Add a response body for the default blocked action by choosing from the existing custom response bodies.
why
Sometimes, users may want to display a custom response message for default blocked action.
references
Hi Team , help to review this PR. Thank you
what
Add a response body for the default blocked action by choosing from the existing custom response bodies.
why
Sometimes, users may want to display a custom response message for default blocked action.
references
Hi @Duleendra Just asked our team to review it
Thanks @Gabriela Campana (Cloud Posse)
2024-05-22
Could I get a PR review for overriding the dynamodb table name ?
https://github.com/cloudposse/terraform-aws-components/pull/1016
what
• allow overriding the dynamodb table name
why
• This will make it possible to import older dynamodb tables without having to null portions of the context
• Matches s3-bucket module’s bucket_name
references
• See cloudposse/terraform-aws-dynamodb#126 • This depends on the 0.36.0 release https://github.com/cloudposse/terraform-aws-dynamodb/releases
This is already approved. We usually let the submitter merge their own PR after it’s approved. Or you could enable auto-merge if you prefer to submit and forget it
what
• allow overriding the dynamodb table name
why
• This will make it possible to import older dynamodb tables without having to null portions of the context
• Matches s3-bucket module’s bucket_name
references
• See cloudposse/terraform-aws-dynamodb#126 • This depends on the 0.36.0 release https://github.com/cloudposse/terraform-aws-dynamodb/releases
I’m unable to merge the pr tho :(
May i have merge permissions?
If not, could you merge for me?
It could be that it was out of date with main. Can you check again once the checks pass? And if you can’t merge then I will. But it would be helpful to know if others cant merge on their own
/usr/lib/bats-core/test_functions.bash: line 161: terraform: command not found
Hmm that’s a different error. Will raise it internally
It could be that it was out of date with main.
when I got approval, it was in line with main
and I still could not merge
Will raise it internally
thanks!
Oh that’s good to know, thanks. Then I’ll merge once we get bats resolved
fixed and merged
2024-05-23
2024-05-24
2024-05-25
Not sure what your preferred workflow is, but maybe worth sharing here. I believe since the latest aws provider was released the route53 alias module is no longer useable. Several teams internally have reported the same issue I had, so I’d be surprised if any implementations are not suffering the same. I opened #53 therefore.
2024-05-27
Hi. Could you please review this MR in the AWS DocumentDB module? https://github.com/cloudposse/terraform-aws-documentdb-cluster/pull/94
what
This PR adds the argument allow_major_version_upgrade that was released in https://github.com/hashicorp/terraform-provider-aws/releases/tag/v5.21.0
When testing, I noticed that -get-plugins
is not supporting anymore, as mentioned in Terraform documentation. So I removed TF_CLI_ARGS_init
in the test Makefile.
test/src/go.mod
was updated as a result of setting up to run the tests in test/src
.
why
When upgrading the engine_version
to a new major version, allow_major_version_upgrade
needs to be enabled for AWS to apply the upgrade.
references
• https://github.com/hashicorp/terraform-provider-aws/releases/tag/v5.21.0 • https://awscli.amazonaws.com/v2/documentation/api/latest/reference/docdb/modify-db-cluster.html • https://docs.aws.amazon.com/documentdb/latest/developerguide/docdb-mvu.html
Please have a look at this trivial PR, that would fix issue in the terraform-aws-components https://github.com/cloudposse/terraform-aws-components/pull/1048
what
Update dynamic-subnets
module version to fix issue #1047
why
Version 2.3.0 of dynamic-subnets
does not support the new opt-in Melbourne region.
references
This change in utils
module adds support for Melbourne (amongst other regions) - cloudposse/terraform-aws-utils#26
And this is the version of dynamic-subnets
where it was updated to use the updated utils
module. https://github.com/cloudposse/terraform-aws-dynamic-subnets/releases/tag/2.4.0
This PR closes #1047
https://sweetops.slack.com/archives/CDYGZCLDQ/p1716782475227659 this is the original issue.
Hi guys, there seems to be an issue with the VPC component - would it be possible to update the version of dynamic-subnet
within it, so we can use ap-southeast-4
Melbourne?
Details are here - https://github.com/cloudposse/terraform-aws-components/issues/1047
2024-05-29
Hello, Small PR to add missing AMI type in EKS Node group module https://github.com/cloudposse/terraform-aws-eks-node-group/pull/182
what
Adding missing AMI types
why
AL2023_x86_64_STANDARD
and AL2023_ARM_64_STANDARD
are available.
references
Hello there
what
Adding missing AMI types
why
AL2023_x86_64_STANDARD
and AL2023_ARM_64_STANDARD
are available.
references
@Gabriela Campana (Cloud Posse) please help follow up
This has been closed See why here: https://github.com/cloudposse/terraform-aws-eks-node-group/pull/182#issuecomment-2148313850
@QuentinBtd Thank you for this PR. Unfortunately, it is not as simple as that.
See:
• #178 (first attempt to add AL2023 support) • #180
I am closing this PR. You may want to consider contributing to #180, or wait until we get around to adding this support (not currently scheduled).
2024-05-31
Hi. Is it possible to continue the review? The terratest
command and the rest of checks have passed.
https://sweetops.slack.com/archives/CUJPCP1K6/p1716842653008469
Hi. Could you please review this MR in the AWS DocumentDB module? https://github.com/cloudposse/terraform-aws-documentdb-cluster/pull/94
@Gabriela Campana (Cloud Posse)
Hi. Could you please review this MR in the AWS DocumentDB module? https://github.com/cloudposse/terraform-aws-documentdb-cluster/pull/94
@Gabriela Campana (Cloud Posse) can you help follow up with @Igor Rodionov who is working on it
Asked @Igor Rodionov @Jeremy G (Cloud Posse) about the next steps
Jeremy added the next steps to move this forward in his latest comment
@gmeligio Thank you for the offer to update the tests. It’s a big job and one that will take us a while to review, so please only do it if you are excited about the task. Here are my notes on what I would do, but they are shorthand and more needs to be done.
• test/Makefile
and test/src/Makefile
need to be updated.
• go.mod
is at go
version 1.14, should be updated to 1.21 and dependencies updated.
• Test should be updated to use CopyTerraformFolderToTemp
to allow for real parallel testing
• Test for enabled=false
should be added
• strconv.Itoa(rand.Intn(100000))
should be replaced with strings.ToLower(random.UniqueId())
and randId
replaced with randID
The general pattern of starting and cleaning up tests has changed, with the above noting some of the more detailed changes.
• Dynamic subnets is a good, though perhaps overly complicated, example. • You can look at EKS workers, too, but it is not fully up to par. • Terraform example module gives you the basic idea of where we were a few years ago, and is cleaner and easier to understand.
If you are really ambitious, you can try reorganizing the code to accomplish the following objectives:
• Move more boilerplate/support to a separate file that can be common to all our tests. Things like set up and cleanup and random ID and error handling and Kubernetes and AWS clients could all go in there. The idea being that we should be able to update that file to be the same in every repo as our test framework evolves, leaving the test function focused on providing inputs, validating outputs, and making any other checks they need to make.
• Add an option to run the tests only as far as the plan
phase and check the results. This would give us an option to test multiple versions of Terraform and OpenTofu for syntax and features without requiring us to go through all of the resource creation and cleanup each time.
I know the above is a lot to ask, so please do not feel any obligation to do it.
Thank you for the update. I just replied in the issue and I’ll follow those instructions.
Thank you, @Eligio Mariño. In order to make the PR easier to review, please keep commits making changes to the test framework separate from commits making changes to the module. Then we can review the PR one commit at at time if we want to simplify things without it getting too confusing.
Sounds good. I’ll do that.
I’m actually thinking about creating a new PR only for the changes in the test framework. It will be easier for me to follow if I separate those changes in the review discussion from the change I actually wanted to make the first time. Is it OK if I do it like that?
@Jeremy G (Cloud Posse)
@Eligio Mariño If you want to update the test framework in a separate PR, that would be easier for us, too. Just know that the test PR will have to be approved and merged before your substantive PR 94 can be.
@Eligio Mariño You can take a look at this commit to see an example of splitting up the test framework into multiple files.
Hi @Jeremy G (Cloud Posse) . I created a new thread here just for the test framework PR. https://sweetops.slack.com/archives/CUJPCP1K6/p1718841858281129
Hi. Could you please review this PR to update the test framework in terraform-aws-documentdb-cluster
.
https://github.com/cloudposse/terraform-aws-documentdb-cluster/pull/100
Hi @Jeremy G (Cloud Posse). I updated my branch for this PR and re-requested a review. Just wanted to remind you here, too. I hope I’m not making too much noise.
Thank you in advance for taking this into consideration. https://github.com/cloudposse/terraform-aws-documentdb-cluster/pull/94
what
This PR adds the argument allow_major_version_upgrade that was released in https://github.com/hashicorp/terraform-provider-aws/releases/tag/v5.21.0
It includes with the changes in the test framework from #100 .
why
When upgrading the engine_version
to a new major version, allow_major_version_upgrade
needs to be enabled for AWS to apply the upgrade.
references
• https://github.com/hashicorp/terraform-provider-aws/releases/tag/v5.21.0 • https://awscli.amazonaws.com/v2/documentation/api/latest/reference/docdb/modify-db-cluster.html • https://docs.aws.amazon.com/documentdb/latest/developerguide/docdb-mvu.html
@Eligio Mariño No problem reminding me/us here, that is what this Slack Channel is for!
You PR has been approved and merged. Thank you for all your extra work for such a simple change, and for your patience.
Thank you @Jeremy G (Cloud Posse). It was worth the wait. Now I know my change was better tested. Thank you for all your guidance and reviews.