#pr-reviews (2024-10)

Pull Request Reviews for Cloud Posse Projects

2024-10-01

2024-10-02

2024-10-04

RB avatar
#26 Bump the npm_and_yarn group with 2 updates

Bumps the npm_and_yarn group with 2 updates: webpack and undici.

Updates webpack from 5.90.1 to 5.94.0

Release notes

Sourced from webpack’s releases.

v5.94.0

Bug Fixes

• Added runtime condition for harmony reexport checked • Handle properly data/http/https protocols in source maps • Make bigint optimistic when browserslist not found • Move @​types/eslint-scope to dev deps • Related in asset stats is now always an array when no related found • Handle ASI for export declarations • Mangle destruction incorrect with export named default properly • Fixed unexpected asi generation with sequence expression • Fixed a lot of types

New Features

• Added new external type “module-import” • Support webpackIgnore for new URL() construction • [CSS] @import pathinfo support

Security

• Fixed DOM clobbering in auto public path

v5.93.0

Bug Fixes

• Generate correct relative path to runtime chunks • Makes DefinePlugin quieter under default log level • Fixed mangle destructuring default in namespace import • Fixed consumption of eager shared modules for module federation • Strip slash for pretty regexp • Calculate correct contenthash for CSS generator options

New Features

• Added the binary generator option for asset modules to explicitly keep source maps produced by loaders • Added the modern-module library value for tree shakable output • Added the overrideStrict option to override strict or non-strict mode for javascript modules

v5.92.1

Bug Fixes

• Doesn’t crash with an error when the css experiment is enabled and contenthash is used

v5.92.0

Bug Fixes

• Correct tidle range’s comutation for module federation • Consider runtime for pure expression dependency update hash • Return value in the subtractRuntime function for runtime logic

… (truncated)

Commits • eabf85d chore(release): 5.94.0 • 955e057 security: fix DOM clobbering in auto public path • 9822387 test: fix • cbb86ed test: fix • 5ac3d7f fix: unexpected asi generation with sequence expression • 2411661 security: fix DOM clobbering in auto public path • b8c03d4 fix: unexpected asi generation with sequence expression • f46a03c revert: do not use heuristic fallback for “module-import” • 60f1898 fix: do not use heuristic fallback for “module-import” • 66306aa Revert “fix: module-import get fallback from externalsPresets” • Additional commits viewable in compare view

Updates undici from 5.28.3 to 5.28.4

Release notes

Sourced from undici’s releases.

v5.28.4

:warning: Security Release :warning:

• Fixes <https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7 “GHSA-m4v8-wqvr-p9f7”GHSA-m4v8-wqvr-p9f7> CVE-2024-30260
• Fixes <https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672 “GHSA-9qxr-qj54-h672”GHSA-9qxr-qj54-h672> CVE-2024-30261

Full Changelog: nodejs/[email protected]…v5.28.4

Commits • fb98306 Bumped v5.28.4 • 2b39440 Merge pull request from https://github.com/advisories/GHSA-9qxr-qj54-h672 "GHSA-9qxr-qj54-h672"|GHSA-9qxr-qj54-h67264e3402 Merge pull request from https://github.com/advisories/GHSA-m4v8-wqvr-p9f7 "GHSA-m4v8-wqvr-p9f7"|GHSA-m4v8-wqvr-p9f7723c4e7 Revert “build(deps-dev): bump formdata-node from 4.4.1 to 6.0.3 (#2389)” • 0e9d54b skip failing test due to Node.js changes • See full diff in compare view

Dependabot will resolve any conflicts with this PR as long as you don’t alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

@dependabot rebase will rebase this PR • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it • @dependabot merge will merge this PR after your CI passes on it • @dependabot squash and merge will squash and merge this PR after your CI passes on it • @dependabot cancel merge will cancel a previously requested merge and block automerging • @dependabot reopen will reopen this PR if it is closed • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency’s major version (unless you unignore this specific dependency’s major version or upgrade to it yourself) • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency’s minor version (unless you unignore this specific dependency’s minor version or upgrade to it yourself) • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
You can disable automated security fix PRs for this repo from the Security Alerts page.

Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Igor Rodionov @Jeremy G (Cloud Posse)

#26 Bump the npm_and_yarn group with 2 updates

Bumps the npm_and_yarn group with 2 updates: webpack and undici.

Updates webpack from 5.90.1 to 5.94.0

Release notes

Sourced from webpack’s releases.

v5.94.0

Bug Fixes

• Added runtime condition for harmony reexport checked • Handle properly data/http/https protocols in source maps • Make bigint optimistic when browserslist not found • Move @​types/eslint-scope to dev deps • Related in asset stats is now always an array when no related found • Handle ASI for export declarations • Mangle destruction incorrect with export named default properly • Fixed unexpected asi generation with sequence expression • Fixed a lot of types

New Features

• Added new external type “module-import” • Support webpackIgnore for new URL() construction • [CSS] @import pathinfo support

Security

• Fixed DOM clobbering in auto public path

v5.93.0

Bug Fixes

• Generate correct relative path to runtime chunks • Makes DefinePlugin quieter under default log level • Fixed mangle destructuring default in namespace import • Fixed consumption of eager shared modules for module federation • Strip slash for pretty regexp • Calculate correct contenthash for CSS generator options

New Features

• Added the binary generator option for asset modules to explicitly keep source maps produced by loaders • Added the modern-module library value for tree shakable output • Added the overrideStrict option to override strict or non-strict mode for javascript modules

v5.92.1

Bug Fixes

• Doesn’t crash with an error when the css experiment is enabled and contenthash is used

v5.92.0

Bug Fixes

• Correct tidle range’s comutation for module federation • Consider runtime for pure expression dependency update hash • Return value in the subtractRuntime function for runtime logic

… (truncated)

Commits • eabf85d chore(release): 5.94.0 • 955e057 security: fix DOM clobbering in auto public path • 9822387 test: fix • cbb86ed test: fix • 5ac3d7f fix: unexpected asi generation with sequence expression • 2411661 security: fix DOM clobbering in auto public path • b8c03d4 fix: unexpected asi generation with sequence expression • f46a03c revert: do not use heuristic fallback for “module-import” • 60f1898 fix: do not use heuristic fallback for “module-import” • 66306aa Revert “fix: module-import get fallback from externalsPresets” • Additional commits viewable in compare view

Updates undici from 5.28.3 to 5.28.4

Release notes

Sourced from undici’s releases.

v5.28.4

:warning: Security Release :warning:

• Fixes <https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7 “GHSA-m4v8-wqvr-p9f7”GHSA-m4v8-wqvr-p9f7> CVE-2024-30260
• Fixes <https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672 “GHSA-9qxr-qj54-h672”GHSA-9qxr-qj54-h672> CVE-2024-30261

Full Changelog: nodejs/[email protected]…v5.28.4

Commits • fb98306 Bumped v5.28.4 • 2b39440 Merge pull request from https://github.com/advisories/GHSA-9qxr-qj54-h672 "GHSA-9qxr-qj54-h672"|GHSA-9qxr-qj54-h67264e3402 Merge pull request from https://github.com/advisories/GHSA-m4v8-wqvr-p9f7 "GHSA-m4v8-wqvr-p9f7"|GHSA-m4v8-wqvr-p9f7723c4e7 Revert “build(deps-dev): bump formdata-node from 4.4.1 to 6.0.3 (#2389)” • 0e9d54b skip failing test due to Node.js changes • See full diff in compare view

Dependabot will resolve any conflicts with this PR as long as you don’t alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

@dependabot rebase will rebase this PR • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it • @dependabot merge will merge this PR after your CI passes on it • @dependabot squash and merge will squash and merge this PR after your CI passes on it • @dependabot cancel merge will cancel a previously requested merge and block automerging • @dependabot reopen will reopen this PR if it is closed • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency’s major version (unless you unignore this specific dependency’s major version or upgrade to it yourself) • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency’s minor version (unless you unignore this specific dependency’s minor version or upgrade to it yourself) • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
You can disable automated security fix PRs for this repo from the Security Alerts page.

2024-10-07

Michael avatar
Michael

If it’s not too late to add this contribution to the AWS components, I can always hold of until after the migration (https://github.com/cloudposse/terraform-aws-components/pull/1143)

#1143 feat: add additional github repository options for argocd

what

• Add additional granular controls for ArgoCD repositories by supporting commit signing requirements and branch protection rules

why

• Add more flexibility and security into the existing Argo repo

testing

• This contribution is actively deployed within our downstream component library

1
Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Igor Rodionov @Ben Smith (Cloud Posse)

#1143 feat: add additional github repository options for argocd

what

• Add additional granular controls for ArgoCD repositories by supporting commit signing requirements and branch protection rules

why

• Add more flexibility and security into the existing Argo repo

testing

• This contribution is actively deployed within our downstream component library

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I don’t believe it’s too late

1
Michael avatar
Michael

Merged thanks to Igor! Appreciate it

2024-10-08

david avatar
#1149 feat: Add cross_origin_auth variable to auth0_client

what

• Adds the cross_origin_auth variable to the auth0_client resource

why

• Variable to allow cross-origin auth requests which is useful in CORS-heavy setups

references

https://registry.terraform.io/providers/auth0/auth0/latest/docs/resources/client#cross_origin_auth

1

2024-10-09

Ray Finch avatar
Ray Finch
#36 Add support for map_boolean_as_boolean

what

Implemented postgres_settings for map_boolean_as_boolean as well as map_jsonb_as_clob and map_long_varchar_as.

why

map_boolean_as_boolean defaults to false and this is not what we want for our DMS.

references

closes #35

1
Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Andriy Knysh (Cloud Posse)

#36 Add support for map_boolean_as_boolean

what

Implemented postgres_settings for map_boolean_as_boolean as well as map_jsonb_as_clob and map_long_varchar_as.

why

map_boolean_as_boolean defaults to false and this is not what we want for our DMS.

references

closes #35

1
Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Joe Niland @johncblandii

1
johncblandii avatar
johncblandii

a couple tests failed. I’m not sure if it is related to this PR, though.

https://github.com/cloudposse/terraform-aws-dms/actions/runs/11371070586/job/31632321574

Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Igor Rodionov any ideas why terratests are failing for this PR?

Igor Rodionov avatar
Igor Rodionov

@Ray Finch @johncblandii I fixed tests concurrency problem. now tests are runnung in seq

Igor Rodionov avatar
Igor Rodionov

but there is still error

Igor Rodionov avatar
Igor Rodionov
        	            	│ Error: creating DMS Replication Instance (eg-ue2-test-dms-de7dpr): operation error Database Migration Service: CreateReplicationInstance, https response error StatusCode: 400, RequestID: 17f6418c-bb50-4cfb-91e1-73785263c501, api error InvalidParameterValueException: No replication engine found with version: 3.4
Igor Rodionov avatar
Igor Rodionov

could you handle it ?

johncblandii avatar
johncblandii

i believe i saw that before. the issue was specific to not setting an engine version since they changed the API after 3.4. I don’t recall the specific fix, but I could check tomorrow

Ray Finch avatar
Ray Finch

hey @Igor Rodionov @johncblandii I updated the engine_version to 3.5 and did another push

Ray Finch avatar
Ray Finch

Any objection to adding a default to the engine_version variable?

Joe Niland avatar
Joe Niland

PR seems OK now. I think we can leave the engine_version variable as is, but I will defer to others with more knowledge of DMS

Ray Finch avatar
Ray Finch

So it’s all looking good. Time to merge?

Joe Niland avatar
Joe Niland

Seems fine - have merged it. If there are any issues we can cut a new version.

Joe Niland avatar
Joe Niland

Thanks for your contribution and patience @Ray Finch!

Ray Finch avatar
Ray Finch

Hey all, I found a bug which I submitted a new PR for https://github.com/cloudposse/terraform-aws-dms/pull/38

#38 fix map_long_varchar_as variable type (why isn't it a bool?)

what

Fix the map_long_varchar_as variable type. It’s actually type string not a bool.

why

The documentation implies it’s a bool but it’s actually a string.

references

AWS dms_endpoint

1

2024-10-10

2024-10-11

irl avatar

It’s been two weeks and I’m still waiting for a review on https://github.com/cloudposse/build-harness/pull/388. How long do reviews typically take?

#388 Allows overriding README_TEMPLATE_REPO_URL and README_ALLOWLIST_ORGS.

what

• Allows overriding README_TEMPLATE_REPO_URL and README_ALLOWLIST_ORGS.

why

• See #387 • tl;dr: unable to use this for non-CloudPosse organisations, and unable to use with GitLab

references

• Closes #387

1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I believe we made a conscious decision to not allow other organizations due to the potential supply chain attack vectors. We use this in all of our repos and the risk is too large.

#388 Allows overriding README_TEMPLATE_REPO_URL and README_ALLOWLIST_ORGS.

what

• Allows overriding README_TEMPLATE_REPO_URL and README_ALLOWLIST_ORGS.

why

• See #387 • tl;dr: unable to use this for non-CloudPosse organisations, and unable to use with GitLab

references

• Closes #387

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Cc @Jeremy G (Cloud Posse)

irl avatar

@Erik Osterman (Cloud Posse) Does that mean the concept of build-harness-extensions is dead then?

irl avatar

i.e. you don’t expect other organisations to reuse build-harness

irl avatar

If so, this part of the readme needs an update because you will now always need to fork build-harness if you want readme functionality, and why wouldn’t you want a readme. https://github.com/cloudposse/build-harness?tab=readme-ov-file#extending-build-harness-with-targets-from-another-repo

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Let me discuss this with @Jeremy G (Cloud Posse) and see what we can do

1
Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

I didn’t actually discuss with @Erik Osterman (Cloud Posse) yet, but his comment above was correct and I have closed/rejected the PR. It is a significant security risk that I do not want to detail in public.

If you want to pull a README template from some place other than Cloud Posse’s repos, you can fetch one externally in advance however you want and then set README_TEMPLATE_FILE to point to it.

irl avatar

Ok that implies the way we did it before with the template in the build-harness-extensions repo and setting that variable should still be working so I’ll have to dig into what’s breaking there. I’d assumed that variable didn’t work anymore since the template fetching code appeared and our setup broke at the same time.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Previously, the template file was cloned together with the repo. When we switched to GHE and introduced multiple github orgs, we needed a way to vary the template by org.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

If it doesn’t find the template, it tries to download it from the organizations .github configuration repo

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

What @Jeremy G (Cloud Posse) says should work. Just modify your Makefile to specify the path to a pre existing template, and it should continue to work.

Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

If you export README_TEMPLATE_FILE=/path/to/file.tmpl before running make readme it should use that template. If that is not working, then I would welcome a PR to fix it, or might fix it myself if you can explain what is broken.

readme/build: readme/deps $(README_TEMPLATE_FILE) $(README_DEPS)
	@gomplate --file $(README_TEMPLATE_FILE) --out $(README_FILE) --config $(BUILD_HARNESS_PATH)/configs/gomplate.yaml && \
	echo "Generated $(README_FILE) from $(README_TEMPLATE_FILE) probably using data from $${README_YAML}"
1
irl avatar

I’ll have another go on Monday and see if I can pin down the issue. Thanks for the detail.

Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

If I had to guess, it would be that you set README_TEMPLATE_FILE to a relative path that is relative to the wrong directory.

irl avatar

There were a few errors: • We use BUILD_HARNESS_EXTENSIONS_PATH in the README_TEMPLATE_FILE definition but were using it before it had been assigned • github_repo doesn’t exist in our README.yamls because we use gitlab_repo instead, which causes dirname to output errors when assigning the variables for fetching remote templates • README_INCLUDES stopped existing so that caused a crash when doing the template These did all have simple enough fixes in the end. • Fixed the order of variable assignments. • Setting README_TEMPLATE_REPO_ORG in our bootstrap Makefile means that it doesn’t go looking for github_repo , and as the README_TEMPLATE_FILE exists the org never gets looked at anyway so it can really be set to anything. • Switching to using env.GetEnv in the template fixed the missing README_INCLUDES issue. So in the end it did all work, it just needed some digging in to and I was distracted by the changes that made it seem like our use case wasn’t supported anymore when in fact it was, so thank you for the clarification that it was meant to be working as otherwise I’d probably have given up.

irl avatar

I have put a comment with similar content on the issue I had opened and closed that issue. https://github.com/cloudposse/build-harness/issues/387

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Thanks @irl for the update! Glad it all worked out.

Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

Yes, thank you @irl for the detailed set of fixes. I’m sure that will help others in the future.

irl avatar

This is a two character change.

2024-10-12

2024-10-14

2024-10-15

2024-10-16

2024-10-17

Markus avatar

It’s been a while since I last contributed, but I just created a small PR to allow specifying the environment for dns-delegated in the efs component. https://github.com/cloudposse/terraform-aws-components/pull/1164

Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Dan Miller (Cloud Posse)

Markus avatar
#1165 feat(elasticache-redis): allow specifying environment for dns-delegated component

what

Add dns_gbl_delegated_environment_name (used throughout components) to specify environment of dns-delegated component.

why

This change is necessary when deploying identical environments in multiple regions and using regional dns-delegated components rather than a single global one.

Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Jeremy G (Cloud Posse) @Dan Miller (Cloud Posse) @Andriy Knysh (Cloud Posse)

#1165 feat(elasticache-redis): allow specifying environment for dns-delegated component

what

Add dns_gbl_delegated_environment_name (used throughout components) to specify environment of dns-delegated component.

why

This change is necessary when deploying identical environments in multiple regions and using regional dns-delegated components rather than a single global one.

Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

@Markus Why are you using regional dns-delegated components? DNS is not regional in any way, and our architecture is set up for you to use a single dns-delegated component per account.

Markus avatar

Your dns-delegated component actually describes, that it can be deployed regionally.

Not all components are set up to do so, e.g. aurora-postgres which has no way to point to a regional endpoint. We need postgres-writer.euw1.our-infrastructure.cloud and postgres-writer.use1.our-infrastructure.cloud which are entirely separate environments. The component only provisions postgres-writer.our-infrastructure.cloud when provisioned with a global dns-delegated zone.

This is a change that is non-intrusive and has been made across components (e.g. aurora-postgres), which is much easier to do than to alter components, into setting custom DNS names.

  environment = var.dns_gbl_delegated_environment_name
Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

@Markus I don’t know why the dns-delegated component says it can be deployed regionally. Of course, the gbl region is not a real region, so it has to be deployed regionally in the sense that you have to use some regional endpoint to deploy it, but it has global effect. I will check but I think we should remove the guidance that it can be deployed regionally.

I think it is always a mistake to deploy it regionally, because it can cause the components to fight over what is actually the same resource.

In your case, you can set the regional designator in var.cluster_dns_name_part and var.reader_dns_name_part. Set var.cluster_dns_name_part to writer.euw1 or writer.use1 as appropriate (and likewise for reader), and continue to use a single global dns-delegated component.

1
Markus avatar

Edit: just saw the PR comments, thanks for clarifying. Appreciate all of your work and efforts to open-source these components.

Unfortunately, without access to the reference architecture (no budget for it), there’s a lot of guesswork on my part, how things should be and sometimes I misinterpret.

Dan Miller (Cloud Posse) avatar
Dan Miller (Cloud Posse)

@Markus did you know that the docs are now entirely public? https://docs.cloudposse.com/

Yes the jumpstart package / repo configuration itself is still private, but the rest is public! You should be able to make out quite a bit from here

The Cloud Posse Reference Architecture

The turnkey architecture for AWS, Datadog & GitHub Actions to get up and running quickly using the Atmos open source framework.

Markus avatar

Yes, worked through a lot of this in the last few weeks. You did an awesome job on this! Combined with the docs repo and the SweetOps Archive, you can piece together a lot of the reference architecture (e.g. from all the workflows).

I’ve been following Cloudposse since before the first office hours, so a lot of it are historic assumptions that might have been wrong from the start, especially because I had a few gaps due to me not working on infrastructure in my job.

Dan Miller (Cloud Posse) avatar
Dan Miller (Cloud Posse)

ah okay great! thanks for the support! We’ve also been using GitHub discussions more frequently lately, so if you see any issues or have any requests for docs, this would be a great place to create a topic: https://github.com/orgs/cloudposse/discussions

1

2024-10-18

Ray Finch avatar
Ray Finch

Hey all, looks like https://github.com/cloudposse/terraform-aws-dms/pull/36 is ready to go. Can we merge it?

#36 Add support for map_boolean_as_boolean

what

Implemented postgres_settings for map_boolean_as_boolean as well as map_jsonb_as_clob and map_long_varchar_as.

why

map_boolean_as_boolean defaults to false and this is not what we want for our DMS.

references

closes #35

1

2024-10-19

Markus avatar

~Small bugfix for the above PR to change an invalid parameter type: https://github.com/cloudposse/terraform-aws-dms/pull/37~eems like my contributions are not needed anymore since another PR got merged for this.

2024-10-21

Ray Finch avatar
Ray Finch

Hey all, a bugfix for the PR I submitted last week: https://github.com/cloudposse/terraform-aws-dms/pull/38

Michael avatar
Michael

Came across some interesting interplay between inspection levels and machine learning parameters in the WAF module today. Thought this code comment might be beneficial to the broader community utilizing these features: https://github.com/cloudposse/terraform-aws-waf/pull/104

And another to deprecate resource_collection_enabled in favor of extended_resource_collection_enabled in the Datadog Integration module: https://github.com/cloudposse/terraform-aws-datadog-integration/pull/66

2024-10-22

2024-10-23

Bob Berg avatar
Bob Berg
05:05:06 PM

Hello, I previously submitted a pull request for Cloud Posse Terraform Datadog Platform, https://github.com/cloudposse/terraform-datadog-platform/pull/107. May I get some eyes on it or be directed to where I may find an approval? It’s a simple one-line-change that fixes Advanced Scheduling for Synthetics Tests.

1
Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

@Bob Berg Thank you for this PR.

At the moment, the automated tests are failing. The test failures do not appear to be related to this PR, but still, we do not like to accept/merge PRs when the tests are failing. I am looking into it; no further action is required on your part at this time. However, because the failure involves Datadog rejecting what was previously a valid test, it will take quite a while to figure out.

Hello, I previously submitted a pull request for Cloud Posse Terraform Datadog Platform, https://github.com/cloudposse/terraform-datadog-platform/pull/107. May I get some eyes on it or be directed to where I may find an approval? It’s a simple one-line-change that fixes Advanced Scheduling for Synthetics Tests.

Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

@Bob Berg I was able to resolve the remaining issues. Your PR (with additions) has been approved, merged, and released in module version 1.4.2

Thank you again for your contribution and patience.

CC @Gabriela Campana (Cloud Posse)

1
Bob Berg avatar
Bob Berg

Thanks a bunch! I was able to successfully use the new release to provision Synthetics with Advanced Scheduling.

1

2024-10-24

2024-10-25

Michael avatar
Michael

Have been working on the Datadog Integration component recently and was wondering if I would be able to get a review on this PR to add additional IAM policies recommended by Datadog? https://github.com/cloudposse/terraform-aws-datadog-integration/pull/68

#68 feat: add additional Datadog integration permissions

what and why

• The current IAM policy for the Datadog Integration does not support additional permissions that could enrich the provided insights. This incorporates Datadog’s recommendations

policy_update

references

Integration Docs

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Note see the comment here

#68 feat: add additional Datadog integration permissions

what and why

• The current IAM policy for the Datadog Integration does not support additional permissions that could enrich the provided insights. This incorporates Datadog’s recommendations

policy_update

references

Integration Docs

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@Bob Berg Thank you for this PR.

At the moment, the automated tests are failing. The test failures do not appear to be related to this PR, but still, we do not like to accept/merge PRs when the tests are failing. I am looking into it; no further action is required on your part at this time. However, because the failure involves Datadog rejecting what was previously a valid test, it will take quite a while to figure out.

1

2024-10-28

RB avatar

Please review valkey support for elasticache-redis terraform component

https://github.com/cloudposse/terraform-aws-components/pull/1170

1
1
1
Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Jeremy G (Cloud Posse)

Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

Changes requested

RB avatar

Thanks for the initial review.

I addressed the feedback, please re-review.

Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

Approved and merged

RB avatar

Thank you!!

2024-10-29

2024-10-30

RB avatar

Please review snapshot retention limit support for elasticache-redis terraform component

https://github.com/cloudposse/terraform-aws-components/pull/1171

1
1
Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Jeremy G (Cloud Posse)

Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

Small change requested

RB avatar

I addressed the issue.

Thanks for catching it!

Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

Approved

RB avatar

Thanks!

2024-10-31

mihai.plesa avatar
mihai.plesa
#186 Add IPv6 ingress security group rules

what

• Added IPv6 support for ingress security groups • Added variable validation for http_ingress_cidr_blocks and https_ingress_cidr_blocks • Added variable validation for ip_address_type • Updated the http_ingress_cidr_blocks and https_ingress_cidr_blocks defaults values to include ::/0

why

The current implementation only configures IPv4 security group rules, causing IPv6 traffic to be dropped by default for dualstack ALBs

references

AWS Load Balancer dual-stack mode: https://docs.aws.amazon.com/elasticloadbalancing/latest/application/application-load-balancers.html#ip-address-type
AWS Security Group IPv6 support: https://docs.aws.amazon.com/vpc/latest/userguide/security-group-rules.html#security-group-rule-syntax
TF aws_security_group_rule resource: https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule#ipv6_cidr_blocks

1
Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Jeremy G (Cloud Posse)

#186 Add IPv6 ingress security group rules

what

• Added IPv6 support for ingress security groups • Added variable validation for http_ingress_cidr_blocks and https_ingress_cidr_blocks • Added variable validation for ip_address_type • Updated the http_ingress_cidr_blocks and https_ingress_cidr_blocks defaults values to include ::/0

why

The current implementation only configures IPv4 security group rules, causing IPv6 traffic to be dropped by default for dualstack ALBs

references

AWS Load Balancer dual-stack mode: https://docs.aws.amazon.com/elasticloadbalancing/latest/application/application-load-balancers.html#ip-address-type
AWS Security Group IPv6 support: https://docs.aws.amazon.com/vpc/latest/userguide/security-group-rules.html#security-group-rule-syntax
TF aws_security_group_rule resource: https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule#ipv6_cidr_blocks

mihai.plesa avatar
mihai.plesa

thank you Gabriela

np1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@Jeremy G (Cloud Posse) is out for the rest of the week. Let’s have him take a look next week @Gabriela Campana (Cloud Posse)

1
Moritz avatar

just rebased/regenerated docs to resolve the conflict

Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

@mihai.plesa PR approved, merged, released as v1.12.0

mihai.plesa avatar
mihai.plesa

excellent, we upgraded. thank you

Michael Dizon avatar
Michael Dizon
#124 fix(main.tf): handle enabled boolean in manage_rules

what

use enabled boolean in managed_rules variable

why

aws_config_config_rule resources were still being created despite enabled being set to false

1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@johncblandii since you are working on this right now, can you review

#124 fix(main.tf): handle enabled boolean in manage_rules

what

use enabled boolean in managed_rules variable

why

aws_config_config_rule resources were still being created despite enabled being set to false

1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Cc @Gabriela Campana (Cloud Posse)

Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@johncblandii bumping this up

Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@johncblandii approved it

1
Michael Dizon avatar
Michael Dizon

@Gabriela Campana (Cloud Posse) a few tests failed, do I need to do anything to resolve?

1
Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Igor Rodionov

    keyboard_arrow_up