#pr-reviews (2024-10)
Pull Request Reviews for Cloud Posse Projects
2024-10-01
2024-10-02
2024-10-04
May I get a review on this PR https://github.com/cloudposse/github-action-pre-commit/pull/26
Bumps the npm_and_yarn group with 2 updates: webpack and undici.
Updates webpack
from 5.90.1 to 5.94.0
Release notes
Sourced from webpack’s releases.
v5.94.0
Bug Fixes
• Added runtime condition for harmony reexport checked • Handle properly
data
/http
/https
protocols in source maps • Makebigint
optimistic when browserslist not found • Move@types/eslint-scope
to dev deps • Related in asset stats is now always an array when no related found • Handle ASI for export declarations • Mangle destruction incorrect with export named default properly • Fixed unexpected asi generation with sequence expression • Fixed a lot of typesNew Features
• Added new external type “module-import” • Support
webpackIgnore
fornew URL()
construction • [CSS]@import
pathinfo supportSecurity
• Fixed DOM clobbering in auto public path
v5.93.0
Bug Fixes
• Generate correct relative path to runtime chunks • Makes
DefinePlugin
quieter under default log level • Fixed mangle destructuring default in namespace import • Fixed consumption of eager shared modules for module federation • Strip slash for pretty regexp • Calculate correct contenthash for CSS generator optionsNew Features
• Added the
binary
generator option for asset modules to explicitly keep source maps produced by loaders • Added themodern-module
library value for tree shakable output • Added theoverrideStrict
option to override strict or non-strict mode for javascript modulesv5.92.1
Bug Fixes
• Doesn’t crash with an error when the css experiment is enabled and contenthash is used
v5.92.0
Bug Fixes
• Correct tidle range’s comutation for module federation • Consider runtime for pure expression dependency update hash • Return value in the
subtractRuntime
function for runtime logic
… (truncated)
Commits
• eabf85d
chore(release): 5.94.0
• 955e057
security: fix DOM clobbering in auto public path
• 9822387
test: fix
• cbb86ed
test: fix
• 5ac3d7f
fix: unexpected asi generation with sequence expression
• 2411661
security: fix DOM clobbering in auto public path
• b8c03d4
fix: unexpected asi generation with sequence expression
• f46a03c
revert: do not use heuristic fallback for “module-import”
• 60f1898
fix: do not use heuristic fallback for “module-import”
• 66306aa
Revert “fix: module-import get fallback from externalsPresets”
• Additional commits viewable in compare view
Updates undici
from 5.28.3 to 5.28.4
Release notes
Sourced from undici’s releases.
v5.28.4
:warning: Security Release :warning:
• Fixes <https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7 “GHSA-m4v8-wqvr-p9f7” GHSA-m4v8-wqvr-p9f7> CVE-2024-30260 • Fixes <https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672 “GHSA-9qxr-qj54-h672” GHSA-9qxr-qj54-h672> CVE-2024-30261 Full Changelog: nodejs/[email protected]…v5.28.4
Commits
• fb98306
Bumped v5.28.4
• 2b39440
Merge pull request from https://github.com/advisories/GHSA-9qxr-qj54-h672 "GHSA-9qxr-qj54-h672"|GHSA-9qxr-qj54-h672
• 64e3402
Merge pull request from https://github.com/advisories/GHSA-m4v8-wqvr-p9f7 "GHSA-m4v8-wqvr-p9f7"|GHSA-m4v8-wqvr-p9f7
• 723c4e7
Revert “build(deps-dev): bump formdata-node from 4.4.1 to 6.0.3 (#2389)”
• 0e9d54b
skip failing test due to Node.js changes
• See full diff in compare view
Dependabot will resolve any conflicts with this PR as long as you don’t alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
• @dependabot rebase
will rebase this PR
• @dependabot recreate
will recreate this PR, overwriting any edits that have been made to it
• @dependabot merge
will merge this PR after your CI passes on it
• @dependabot squash and merge
will squash and merge this PR after your CI passes on it
• @dependabot cancel merge
will cancel a previously requested merge and block automerging
• @dependabot reopen
will reopen this PR if it is closed
• @dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
• @dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency
• @dependabot ignore <dependency name> major version
will close this group update PR and stop Dependabot creating any more for the specific dependency’s major version (unless you unignore this specific dependency’s major version or upgrade to it yourself)
• @dependabot ignore <dependency name> minor version
will close this group update PR and stop Dependabot creating any more for the specific dependency’s minor version (unless you unignore this specific dependency’s minor version or upgrade to it yourself)
• @dependabot ignore <dependency name>
will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
• @dependabot unignore <dependency name>
will remove all of the ignore conditions of the specified dependency
• @dependabot unignore <dependency name> <ignore condition>
will remove the ignore condition of the specified dependency and ignore conditions
You can disable automated security fix PRs for this repo from the Security Alerts page.
@Igor Rodionov @Jeremy G (Cloud Posse)
Bumps the npm_and_yarn group with 2 updates: webpack and undici.
Updates webpack
from 5.90.1 to 5.94.0
Release notes
Sourced from webpack’s releases.
v5.94.0
Bug Fixes
• Added runtime condition for harmony reexport checked • Handle properly
data
/http
/https
protocols in source maps • Makebigint
optimistic when browserslist not found • Move@types/eslint-scope
to dev deps • Related in asset stats is now always an array when no related found • Handle ASI for export declarations • Mangle destruction incorrect with export named default properly • Fixed unexpected asi generation with sequence expression • Fixed a lot of typesNew Features
• Added new external type “module-import” • Support
webpackIgnore
fornew URL()
construction • [CSS]@import
pathinfo supportSecurity
• Fixed DOM clobbering in auto public path
v5.93.0
Bug Fixes
• Generate correct relative path to runtime chunks • Makes
DefinePlugin
quieter under default log level • Fixed mangle destructuring default in namespace import • Fixed consumption of eager shared modules for module federation • Strip slash for pretty regexp • Calculate correct contenthash for CSS generator optionsNew Features
• Added the
binary
generator option for asset modules to explicitly keep source maps produced by loaders • Added themodern-module
library value for tree shakable output • Added theoverrideStrict
option to override strict or non-strict mode for javascript modulesv5.92.1
Bug Fixes
• Doesn’t crash with an error when the css experiment is enabled and contenthash is used
v5.92.0
Bug Fixes
• Correct tidle range’s comutation for module federation • Consider runtime for pure expression dependency update hash • Return value in the
subtractRuntime
function for runtime logic
… (truncated)
Commits
• eabf85d
chore(release): 5.94.0
• 955e057
security: fix DOM clobbering in auto public path
• 9822387
test: fix
• cbb86ed
test: fix
• 5ac3d7f
fix: unexpected asi generation with sequence expression
• 2411661
security: fix DOM clobbering in auto public path
• b8c03d4
fix: unexpected asi generation with sequence expression
• f46a03c
revert: do not use heuristic fallback for “module-import”
• 60f1898
fix: do not use heuristic fallback for “module-import”
• 66306aa
Revert “fix: module-import get fallback from externalsPresets”
• Additional commits viewable in compare view
Updates undici
from 5.28.3 to 5.28.4
Release notes
Sourced from undici’s releases.
v5.28.4
:warning: Security Release :warning:
• Fixes <https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7 “GHSA-m4v8-wqvr-p9f7” GHSA-m4v8-wqvr-p9f7> CVE-2024-30260 • Fixes <https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672 “GHSA-9qxr-qj54-h672” GHSA-9qxr-qj54-h672> CVE-2024-30261 Full Changelog: nodejs/[email protected]…v5.28.4
Commits
• fb98306
Bumped v5.28.4
• 2b39440
Merge pull request from https://github.com/advisories/GHSA-9qxr-qj54-h672 "GHSA-9qxr-qj54-h672"|GHSA-9qxr-qj54-h672
• 64e3402
Merge pull request from https://github.com/advisories/GHSA-m4v8-wqvr-p9f7 "GHSA-m4v8-wqvr-p9f7"|GHSA-m4v8-wqvr-p9f7
• 723c4e7
Revert “build(deps-dev): bump formdata-node from 4.4.1 to 6.0.3 (#2389)”
• 0e9d54b
skip failing test due to Node.js changes
• See full diff in compare view
Dependabot will resolve any conflicts with this PR as long as you don’t alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
• @dependabot rebase
will rebase this PR
• @dependabot recreate
will recreate this PR, overwriting any edits that have been made to it
• @dependabot merge
will merge this PR after your CI passes on it
• @dependabot squash and merge
will squash and merge this PR after your CI passes on it
• @dependabot cancel merge
will cancel a previously requested merge and block automerging
• @dependabot reopen
will reopen this PR if it is closed
• @dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
• @dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency
• @dependabot ignore <dependency name> major version
will close this group update PR and stop Dependabot creating any more for the specific dependency’s major version (unless you unignore this specific dependency’s major version or upgrade to it yourself)
• @dependabot ignore <dependency name> minor version
will close this group update PR and stop Dependabot creating any more for the specific dependency’s minor version (unless you unignore this specific dependency’s minor version or upgrade to it yourself)
• @dependabot ignore <dependency name>
will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
• @dependabot unignore <dependency name>
will remove all of the ignore conditions of the specified dependency
• @dependabot unignore <dependency name> <ignore condition>
will remove the ignore condition of the specified dependency and ignore conditions
You can disable automated security fix PRs for this repo from the Security Alerts page.
2024-10-07
If it’s not too late to add this contribution to the AWS components, I can always hold of until after the migration (https://github.com/cloudposse/terraform-aws-components/pull/1143)
what
• Add additional granular controls for ArgoCD repositories by supporting commit signing requirements and branch protection rules
why
• Add more flexibility and security into the existing Argo repo
testing
• This contribution is actively deployed within our downstream component library
@Igor Rodionov @Ben Smith (Cloud Posse)
what
• Add additional granular controls for ArgoCD repositories by supporting commit signing requirements and branch protection rules
why
• Add more flexibility and security into the existing Argo repo
testing
• This contribution is actively deployed within our downstream component library
Merged thanks to Igor! Appreciate it
2024-10-08
May I get a review on https://github.com/cloudposse/terraform-aws-components/pull/1149
what
• Adds the cross_origin_auth
variable to the auth0_client
resource
why
• Variable to allow cross-origin auth requests which is useful in CORS-heavy setups
references
• https://registry.terraform.io/providers/auth0/auth0/latest/docs/resources/client#cross_origin_auth
2024-10-09
Hey all, can I get a review of https://github.com/cloudposse/terraform-aws-dms/pull/36?
what
Implemented postgres_settings for map_boolean_as_boolean as well as map_jsonb_as_clob and map_long_varchar_as.
why
map_boolean_as_boolean defaults to false and this is not what we want for our DMS.
references
closes #35
@Andriy Knysh (Cloud Posse)
what
Implemented postgres_settings for map_boolean_as_boolean as well as map_jsonb_as_clob and map_long_varchar_as.
why
map_boolean_as_boolean defaults to false and this is not what we want for our DMS.
references
closes #35
a couple tests failed. I’m not sure if it is related to this PR, though.
https://github.com/cloudposse/terraform-aws-dms/actions/runs/11371070586/job/31632321574
@Igor Rodionov any ideas why terratests are failing for this PR?
@Ray Finch @johncblandii I fixed tests concurrency problem. now tests are runnung in seq
but there is still error
│ Error: creating DMS Replication Instance (eg-ue2-test-dms-de7dpr): operation error Database Migration Service: CreateReplicationInstance, https response error StatusCode: 400, RequestID: 17f6418c-bb50-4cfb-91e1-73785263c501, api error InvalidParameterValueException: No replication engine found with version: 3.4
could you handle it ?
i believe i saw that before. the issue was specific to not setting an engine version since they changed the API after 3.4. I don’t recall the specific fix, but I could check tomorrow
hey @Igor Rodionov @johncblandii I updated the engine_version to 3.5 and did another push
Any objection to adding a default to the engine_version variable?
PR seems OK now. I think we can leave the engine_version variable as is, but I will defer to others with more knowledge of DMS
So it’s all looking good. Time to merge?
Seems fine - have merged it. If there are any issues we can cut a new version.
Thanks for your contribution and patience @Ray Finch!
Hey all, I found a bug which I submitted a new PR for https://github.com/cloudposse/terraform-aws-dms/pull/38
what
Fix the map_long_varchar_as variable type. It’s actually type string not a bool.
why
The documentation implies it’s a bool but it’s actually a string.
references
2024-10-10
2024-10-11
It’s been two weeks and I’m still waiting for a review on https://github.com/cloudposse/build-harness/pull/388. How long do reviews typically take?
what
• Allows overriding README_TEMPLATE_REPO_URL and README_ALLOWLIST_ORGS.
why
• See #387 • tl;dr: unable to use this for non-CloudPosse organisations, and unable to use with GitLab
references
• Closes #387
I believe we made a conscious decision to not allow other organizations due to the potential supply chain attack vectors. We use this in all of our repos and the risk is too large.
what
• Allows overriding README_TEMPLATE_REPO_URL and README_ALLOWLIST_ORGS.
why
• See #387 • tl;dr: unable to use this for non-CloudPosse organisations, and unable to use with GitLab
references
• Closes #387
Cc @Jeremy G (Cloud Posse)
@Erik Osterman (Cloud Posse) Does that mean the concept of build-harness-extensions is dead then?
i.e. you don’t expect other organisations to reuse build-harness
If so, this part of the readme needs an update because you will now always need to fork build-harness if you want readme functionality, and why wouldn’t you want a readme. https://github.com/cloudposse/build-harness?tab=readme-ov-file#extending-build-harness-with-targets-from-another-repo
Let me discuss this with @Jeremy G (Cloud Posse) and see what we can do
I didn’t actually discuss with @Erik Osterman (Cloud Posse) yet, but his comment above was correct and I have closed/rejected the PR. It is a significant security risk that I do not want to detail in public.
If you want to pull a README template from some place other than Cloud Posse’s repos, you can fetch one externally in advance however you want and then set README_TEMPLATE_FILE
to point to it.
Ok that implies the way we did it before with the template in the build-harness-extensions repo and setting that variable should still be working so I’ll have to dig into what’s breaking there. I’d assumed that variable didn’t work anymore since the template fetching code appeared and our setup broke at the same time.
Previously, the template file was cloned together with the repo. When we switched to GHE and introduced multiple github orgs, we needed a way to vary the template by org.
If it doesn’t find the template, it tries to download it from the organizations .github configuration repo
What @Jeremy G (Cloud Posse) says should work. Just modify your Makefile to specify the path to a pre existing template, and it should continue to work.
If you export README_TEMPLATE_FILE=/path/to/file.tmpl
before running make readme
it should use that template. If that is not working, then I would welcome a PR to fix it, or might fix it myself if you can explain what is broken.
readme/build: readme/deps $(README_TEMPLATE_FILE) $(README_DEPS)
@gomplate --file $(README_TEMPLATE_FILE) --out $(README_FILE) --config $(BUILD_HARNESS_PATH)/configs/gomplate.yaml && \
echo "Generated $(README_FILE) from $(README_TEMPLATE_FILE) probably using data from $${README_YAML}"
I’ll have another go on Monday and see if I can pin down the issue. Thanks for the detail.
If I had to guess, it would be that you set README_TEMPLATE_FILE
to a relative path that is relative to the wrong directory.
There were a few errors:
• We use BUILD_HARNESS_EXTENSIONS_PATH
in the README_TEMPLATE_FILE
definition but were using it before it had been assigned
• github_repo
doesn’t exist in our README.yaml
s because we use gitlab_repo
instead, which causes dirname
to output errors when assigning the variables for fetching remote templates
• README_INCLUDES
stopped existing so that caused a crash when doing the template
These did all have simple enough fixes in the end.
• Fixed the order of variable assignments.
• Setting README_TEMPLATE_REPO_ORG
in our bootstrap Makefile means that it doesn’t go looking for github_repo
, and as the README_TEMPLATE_FILE
exists the org never gets looked at anyway so it can really be set to anything.
• Switching to using env.GetEnv
in the template fixed the missing README_INCLUDES
issue.
So in the end it did all work, it just needed some digging in to and I was distracted by the changes that made it seem like our use case wasn’t supported anymore when in fact it was, so thank you for the clarification that it was meant to be working as otherwise I’d probably have given up.
I have put a comment with similar content on the issue I had opened and closed that issue. https://github.com/cloudposse/build-harness/issues/387
Thanks @irl for the update! Glad it all worked out.
Yes, thank you @irl for the detailed set of fixes. I’m sure that will help others in the future.
This is a two character change.
2024-10-12
2024-10-14
2024-10-15
2024-10-16
2024-10-17
It’s been a while since I last contributed, but I just created a small PR to allow specifying the environment for dns-delegated
in the efs
component. https://github.com/cloudposse/terraform-aws-components/pull/1164
@Dan Miller (Cloud Posse)
Same for elasticache-redis: https://github.com/cloudposse/terraform-aws-components/pull/1165
what
Add dns_gbl_delegated_environment_name
(used throughout components) to specify environment of dns-delegated
component.
why
This change is necessary when deploying identical environments in multiple regions and using regional dns-delegated
components rather than a single global one.
@Jeremy G (Cloud Posse) @Dan Miller (Cloud Posse) @Andriy Knysh (Cloud Posse)
what
Add dns_gbl_delegated_environment_name
(used throughout components) to specify environment of dns-delegated
component.
why
This change is necessary when deploying identical environments in multiple regions and using regional dns-delegated
components rather than a single global one.
@Markus Why are you using regional dns-delegated
components? DNS is not regional in any way, and our architecture is set up for you to use a single dns-delegated
component per account.
Your dns-delegated
component actually describes, that it can be deployed regionally.
Not all components are set up to do so, e.g. aurora-postgres
which has no way to point to a regional endpoint. We need postgres-writer.euw1.our-infrastructure.cloud
and postgres-writer.use1.our-infrastructure.cloud
which are entirely separate environments. The component only provisions postgres-writer.our-infrastructure.cloud
when provisioned with a global dns-delegated
zone.
This is a change that is non-intrusive and has been made across components (e.g. aurora-postgres), which is much easier to do than to alter components, into setting custom DNS names.
environment = var.dns_gbl_delegated_environment_name
@Markus I don’t know why the dns-delegated
component says it can be deployed regionally. Of course, the gbl
region is not a real region, so it has to be deployed regionally in the sense that you have to use some regional endpoint to deploy it, but it has global effect. I will check but I think we should remove the guidance that it can be deployed regionally.
I think it is always a mistake to deploy it regionally, because it can cause the components to fight over what is actually the same resource.
In your case, you can set the regional designator in var.cluster_dns_name_part
and var.reader_dns_name_part
. Set var.cluster_dns_name_part
to writer.euw1
or writer.use1
as appropriate (and likewise for reader), and continue to use a single global dns-delegated
component.
Edit: just saw the PR comments, thanks for clarifying. Appreciate all of your work and efforts to open-source these components.
Unfortunately, without access to the reference architecture (no budget for it), there’s a lot of guesswork on my part, how things should be and sometimes I misinterpret.
@Markus did you know that the docs are now entirely public? https://docs.cloudposse.com/
Yes the jumpstart package / repo configuration itself is still private, but the rest is public! You should be able to make out quite a bit from here
The turnkey architecture for AWS, Datadog & GitHub Actions to get up and running quickly using the Atmos open source framework.
Yes, worked through a lot of this in the last few weeks. You did an awesome job on this! Combined with the docs repo and the SweetOps Archive, you can piece together a lot of the reference architecture (e.g. from all the workflows).
I’ve been following Cloudposse since before the first office hours, so a lot of it are historic assumptions that might have been wrong from the start, especially because I had a few gaps due to me not working on infrastructure in my job.
ah okay great! thanks for the support! We’ve also been using GitHub discussions more frequently lately, so if you see any issues or have any requests for docs, this would be a great place to create a topic: https://github.com/orgs/cloudposse/discussions
2024-10-18
Hey all, looks like https://github.com/cloudposse/terraform-aws-dms/pull/36 is ready to go. Can we merge it?
what
Implemented postgres_settings for map_boolean_as_boolean as well as map_jsonb_as_clob and map_long_varchar_as.
why
map_boolean_as_boolean defaults to false and this is not what we want for our DMS.
references
closes #35
2024-10-19
~Small bugfix for the above PR to change an invalid parameter type: https://github.com/cloudposse/terraform-aws-dms/pull/37~eems like my contributions are not needed anymore since another PR got merged for this.
2024-10-21
Hey all, a bugfix for the PR I submitted last week: https://github.com/cloudposse/terraform-aws-dms/pull/38
Came across some interesting interplay between inspection levels and machine learning parameters in the WAF module today. Thought this code comment might be beneficial to the broader community utilizing these features: https://github.com/cloudposse/terraform-aws-waf/pull/104
And another to deprecate resource_collection_enabled
in favor of extended_resource_collection_enabled
in the Datadog Integration module: https://github.com/cloudposse/terraform-aws-datadog-integration/pull/66
2024-10-22
2024-10-23
Hello, I previously submitted a pull request for Cloud Posse Terraform Datadog Platform, https://github.com/cloudposse/terraform-datadog-platform/pull/107. May I get some eyes on it or be directed to where I may find an approval? It’s a simple one-line-change that fixes Advanced Scheduling for Synthetics Tests.
@Bob Berg Thank you for this PR.
At the moment, the automated tests are failing. The test failures do not appear to be related to this PR, but still, we do not like to accept/merge PRs when the tests are failing. I am looking into it; no further action is required on your part at this time. However, because the failure involves Datadog rejecting what was previously a valid test, it will take quite a while to figure out.
Hello, I previously submitted a pull request for Cloud Posse Terraform Datadog Platform, https://github.com/cloudposse/terraform-datadog-platform/pull/107. May I get some eyes on it or be directed to where I may find an approval? It’s a simple one-line-change that fixes Advanced Scheduling for Synthetics Tests.
@Bob Berg I was able to resolve the remaining issues. Your PR (with additions) has been approved, merged, and released in module version 1.4.2
Thank you again for your contribution and patience.
CC @Gabriela Campana (Cloud Posse)
Thanks a bunch! I was able to successfully use the new release to provision Synthetics with Advanced Scheduling.
2024-10-24
2024-10-25
Have been working on the Datadog Integration component recently and was wondering if I would be able to get a review on this PR to add additional IAM policies recommended by Datadog? https://github.com/cloudposse/terraform-aws-datadog-integration/pull/68
what and why
• The current IAM policy for the Datadog Integration does not support additional permissions that could enrich the provided insights. This incorporates Datadog’s recommendations
references
Note see the comment here
what and why
• The current IAM policy for the Datadog Integration does not support additional permissions that could enrich the provided insights. This incorporates Datadog’s recommendations
references
@Bob Berg Thank you for this PR.
At the moment, the automated tests are failing. The test failures do not appear to be related to this PR, but still, we do not like to accept/merge PRs when the tests are failing. I am looking into it; no further action is required on your part at this time. However, because the failure involves Datadog rejecting what was previously a valid test, it will take quite a while to figure out.
2024-10-28
Please review valkey support for elasticache-redis terraform component
https://github.com/cloudposse/terraform-aws-components/pull/1170
what
• add engine input for valkey support
why
• Valkey is far cheaper than redis
references
• https://github.com/cloudposse/terraform-aws-elasticache-redis/releases/tag/v1.7.0 • https://aws.amazon.com/blogs/opensource/why-aws-supports-valkey/ • https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/elasticache_replication_group#engine
valkey seems to be a cheaper and fully open source alternative to redis
what
• add engine input for valkey support
why
• Valkey is far cheaper than redis
references
• https://github.com/cloudposse/terraform-aws-elasticache-redis/releases/tag/v1.7.0 • https://aws.amazon.com/blogs/opensource/why-aws-supports-valkey/ • https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/elasticache_replication_group#engine
@Jeremy G (Cloud Posse)
Changes requested
Thanks for the initial review.
I addressed the feedback, please re-review.
Approved and merged
Thank you!!
2024-10-29
2024-10-30
Please review snapshot retention limit support for elasticache-redis terraform component
https://github.com/cloudposse/terraform-aws-components/pull/1171
@Jeremy G (Cloud Posse)
Small change requested
I addressed the issue.
Thanks for catching it!
Approved
Thanks!
2024-10-31
what
• Added IPv6 support for ingress security groups
• Added variable validation for http_ingress_cidr_blocks
and https_ingress_cidr_blocks
• Added variable validation for ip_address_type
• Updated the http_ingress_cidr_blocks
and https_ingress_cidr_blocks
defaults values to include ::/0
why
The current implementation only configures IPv4 security group rules, causing IPv6 traffic to be dropped by default for dualstack ALBs
references
AWS Load Balancer dual-stack mode: https://docs.aws.amazon.com/elasticloadbalancing/latest/application/application-load-balancers.html#ip-address-type
AWS Security Group IPv6 support: https://docs.aws.amazon.com/vpc/latest/userguide/security-group-rules.html#security-group-rule-syntax
TF aws_security_group_rule
resource: https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule#ipv6_cidr_blocks
@Jeremy G (Cloud Posse)
what
• Added IPv6 support for ingress security groups
• Added variable validation for http_ingress_cidr_blocks
and https_ingress_cidr_blocks
• Added variable validation for ip_address_type
• Updated the http_ingress_cidr_blocks
and https_ingress_cidr_blocks
defaults values to include ::/0
why
The current implementation only configures IPv4 security group rules, causing IPv6 traffic to be dropped by default for dualstack ALBs
references
AWS Load Balancer dual-stack mode: https://docs.aws.amazon.com/elasticloadbalancing/latest/application/application-load-balancers.html#ip-address-type
AWS Security Group IPv6 support: https://docs.aws.amazon.com/vpc/latest/userguide/security-group-rules.html#security-group-rule-syntax
TF aws_security_group_rule
resource: https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule#ipv6_cidr_blocks
@Jeremy G (Cloud Posse) is out for the rest of the week. Let’s have him take a look next week @Gabriela Campana (Cloud Posse)
just rebased/regenerated docs to resolve the conflict
@mihai.plesa PR approved, merged, released as v1.12.0
excellent, we upgraded. thank you
what
use enabled
boolean in managed_rules
variable
why
aws_config_config_rule
resources were still being created despite enabled
being set to false
@johncblandii since you are working on this right now, can you review
what
use enabled
boolean in managed_rules
variable
why
aws_config_config_rule
resources were still being created despite enabled
being set to false
Cc @Gabriela Campana (Cloud Posse)
@johncblandii bumping this up
@Gabriela Campana (Cloud Posse) a few tests failed, do I need to do anything to resolve?
@Igor Rodionov