#pr-reviews (2024-11)
Pull Request Reviews for Cloud Posse Projects
2024-11-01
what
Add support of zonal shift config for the cluster. Closes #242
why
See linked ticket.
references
See linked ticket.
additional info
<br>
to <br/>
changes are caused by new version of terraform-docs
and are intended, see terraform-docs/terraform-docs#787
2024-11-04
2024-11-06
2024-11-07
2024-11-08
Hey all, please review https://github.com/cloudposse/terraform-aws-rds-cluster/pull/236
…new instance
what
• output instance endpoints • add aws_rds_cluster_instance attributes that force a new instance to the randmon_pet resource.
why
• I need the actual instance endpoints for the Datadog DMS integration, the default dashboards work better with the exact instance identifier. • Currently if any of these attributes change (db_subnet_group_name, engine) it will bypass the random_pet and attempt to create instances with the same identifier.
references
2024-11-10
2024-11-12
Hey all! Can I request some help / someone to look at Cloudposse’s terraform-aws-alb module, the CI is failing to release a new version after a most recent PR merge. It’s throwing an error about the README.md.gotmpl, but I’ve noticed that it hasn’t even been changed in the past 6 months. Hopefully someone with more context can help out? Here is the error https://github.com/cloudposse/terraform-aws-alb/pull/190#issuecomment-2470455978 - Thanks!
@Igor Rodionov
Cc @Gabriela Campana (Cloud Posse)
@Igor Rodionov please lmk when you address this
@Erik Osterman (Cloud Posse) May I have an approval https://github.com/cloudposse/build-harness/pull/390 ?
what
• Added explicit default value for README_INCLUDES
environment variables
why
• Starting from gomplate 4.2.0
includes required implicit definition starting with “./” or “/”
references
• https://sweetops.slack.com/archives/CUJPCP1K6/p1731416487743859 • https://github.com/cloudposse/terraform-aws-alb/actions/runs/11795616491/job/32869718771 • hairyhenderson/gomplate#2255
@Yangci Ou fixed and released https://github.com/cloudposse/terraform-aws-alb/releases/tag/v2.1.0
If you’re affected by this in any other repos, let us know and we can retrigger the builds
2024-11-13
Please review s3 replication role fix
https://github.com/cloudposse/terraform-aws-s3-bucket/pull/250
Thanks!
Please review correct usage of new destination.bucket
key
https://github.com/cloudposse/terraform-aws-s3-bucket/pull/256
Thank you!
Please review eventbridge support in event notifications
https://github.com/cloudposse/terraform-aws-s3-bucket/pull/255
Thank you!
2024-11-14
Please review fix for variable name
https://github.com/cloudposse/terraform-aws-s3-bucket/pull/258
Merge conflicts that must be resolved first
Thanks Veronika. I fixed the conflicts.
Before merging, i was hoping to chat with someone about this comment to see what the proper step is for this.
https://github.com/cloudposse/terraform-aws-s3-bucket/pull/258#pullrequestreview-2434928344
cc @Jeremy G (Cloud Posse) if you have a sec
@RB I would prefer to reject (or at least place on indefinite hold) this PR, because it is a breaking change that adds no new functionality
We can leave it open with do not merge
and incorporate it into the next major version update, but I don’t think it warrants a version update and breaking change on its own. I want to reserve those for new features that are incompatible with old features or removing deprecated features.
Yes i figured this but was wondering if we can do something like put the old var in variables-deprecated and if either is used, make it have the same impact, that way it would conform to cloudposse naming conventions without a breaking change, no?
It’s on my to-do list to document Cloud Posse’s policy on exactly that. @Erik Osterman (Cloud Posse) How do you want to handle this?
I think we need to use release branches and merge this into those future release branches
won’t adding the major
label have the same effect
@Erik Osterman (Cloud Posse) I meant, I would prefer to defer this change until we had more significant breaking changes, because I don’t have a problem with the current variable name. If you think it should go out now with a major version bump, then I will update the docs sooner rather than later about how to deprecate the old variable.
Couldn’t it go out without a major bump if the new var is added and the old vat is moved to variables-deprecated ?
Then later when the major release is ready, the variables-deprecated can be wiped ?
Please review s3 payment request config
https://github.com/cloudposse/terraform-aws-s3-bucket/pull/259
Thank you!
2024-11-15
2024-11-19
hey, remote-state module version bump: https://github.com/cloudposse-terraform-components/aws-spacelift-admin-stack/pull/4
we will merge this PR next week https://github.com/cloudposse-terraform-components/aws-spacelift-admin-stack/pull/4#issuecomment-2486671429
Hey all, Can I please have this PR reviewed https://github.com/cloudposse/terraform-aws-ec2-instance/pull/212
Currently blocking me and forcing me to go a longer way round to solve (adding resources on top of the localised module)
Thanks Gabriela, is there a possible timeline for when this can be reviewed and merged? thanks @Gabriela Campana (Cloud Posse) @Igor Rodionov
Hi @hamza-25 We can not promise on an ETA, as client work is prioritized over community support. I’ve tagged our engineers on the PRs. This is a best effort by a small team. We appreciate your persistence, and we’ll get to it when we can.
@hamza-25 thanks for your contribution. the PR merged and released https://github.com/cloudposse/terraform-aws-ec2-instance/releases/tag/v1.6.1
Thanks a lot, both of you!
I can now get rid of my own local changes much appreciated
2024-11-20
2024-11-22
Please review adding an option to use inline policies instead of managed policies for iam roles
https://github.com/cloudposse/terraform-aws-iam-role/pull/79
what
• support inline policies
why
• Most of the time users want to create a specific policy for a specific role and don’t realize that the same policy can be accidentally reused for another purpose which makes it difficult to delete the role and policy • Inline policies do not need to be tagged • If a managed policy is updated and is attached to multiple roles, now it will impact multiple roles
references
• closes #78
Thanks!
what
• support inline policies
why
• Most of the time users want to create a specific policy for a specific role and don’t realize that the same policy can be accidentally reused for another purpose which makes it difficult to delete the role and policy • Inline policies do not need to be tagged • If a managed policy is updated and is attached to multiple roles, now it will impact multiple roles
references
• closes #78
2024-11-26
https://github.com/cloudposse/terraform-aws-eks-cluster/pull/245 please
(feedback about ia bot review: it’s garbage and it wasted my time)
@Igor Rodionov
@z0rc3r these were absolutely not garbage; these were great recommendations. We should strive for better variable descriptions, so the user has everything they need to use the variable.
As merged, the descriptions are incomplete.
We are using these suggestions ourselves, and improving the code quality of #amtos https://github.com/cloudposse/atmos/pulls?q=is%3Apr+is%3Aclosed+is%3Amerged
Plus, CodeRabbit learns from feedback. If you have constructive criticism of why they are not good, you can share that.
Case in point:
- description = "Configuration block for the support policy to use for the cluster"
+ description = "Configuration block for the support policy to use for the cluster. The support_type can be set to 'Standard' or 'Extended' (default). For more information, see <https://docs.aws.amazon.com/eks/latest/userguide/service-quotas.html#service-quotas-eks-support>"
I prefer the second description over the first one.
I’m not dealing with llm recomndations
Feel free to close the pr
@z0rc3r ups. I merged it couple hours ago
Honestly, what’s bad about the recommendations? What’s trash about them?
Links are incorrect, recommended values use wrong capitalization. In the end they rehash the official aws docs in a slightly convoluted way.
Fair point about invalid links, if true. However, showing what the acceptable values are is
Hard disagree. My preference is to leave this on provider level, when module replicates behaviour from the provider. Which is the case here.
Thanks for sharing your views.
As an end user of other modules I often don’t care what is in variables description. I always read the code to understand it’s behaviour and how resources interact with each other.
General problem of any ai stuff that it can hallucinate things. So in the end it wastes the contributor’s time to do the fact checking. Plus it doesn’t add value. If you want to give more info just link to provider or aws docs.
Often terraform modules have such poor descriptions, reviewing the provider docs is required. But IMO a well-defined module has thoroughly documented variables, outputs, examples, terratests, and README. We often spend longer on everything else than the modules themselves.
@johncblandii
Could it be merged please? Test passed, @RB also approved it already
@johncblandii bumping this up
@Andriy Knysh (Cloud Posse)