#pr-reviews (2024-11)

Pull Request Reviews for Cloud Posse Projects

2024-11-01

z0rc3r avatar
#243 Add support for zonal shift configuration

what

Add support of zonal shift config for the cluster. Closes #242

why

See linked ticket.

references

See linked ticket.

additional info

<br> to <br/> changes are caused by new version of terraform-docs and are intended, see terraform-docs/terraform-docs#787

1

2024-11-04

2024-11-06

2024-11-07

2024-11-08

Ray Finch avatar
Ray Finch
#236 output instance endpoints, add attributes to random_pet that force a …

…new instance

what

• output instance endpoints • add aws_rds_cluster_instance attributes that force a new instance to the randmon_pet resource.

why

• I need the actual instance endpoints for the Datadog DMS integration, the default dashboards work better with the exact instance identifier. • Currently if any of these attributes change (db_subnet_group_name, engine) it will bypass the random_pet and attempt to create instances with the same identifier.

references

1

2024-11-10

2024-11-12

Yangci Ou avatar
Yangci Ou

Hey all! Can I request some help / someone to look at Cloudposse’s terraform-aws-alb module, the CI is failing to release a new version after a most recent PR merge. It’s throwing an error about the README.md.gotmpl, but I’ve noticed that it hasn’t even been changed in the past 6 months. Hopefully someone with more context can help out? Here is the error https://github.com/cloudposse/terraform-aws-alb/pull/190#issuecomment-2470455978 - Thanks!

1
1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@Igor Rodionov

Cc @Gabriela Campana (Cloud Posse)

1
1
Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Igor Rodionov please lmk when you address this

Igor Rodionov avatar
Igor Rodionov

@Erik Osterman (Cloud Posse) May I have an approval https://github.com/cloudposse/build-harness/pull/390 ?

#390 [readme] Fix includes

what

• Added explicit default value for README_INCLUDES environment variables

why

• Starting from gomplate 4.2.0 includes required implicit definition starting with “./” or “/”

references

https://sweetops.slack.com/archives/CUJPCP1K6/p1731416487743859https://github.com/cloudposse/terraform-aws-alb/actions/runs/11795616491/job/32869718771hairyhenderson/gomplate#2255

1
Yangci Ou avatar
Yangci Ou

awesome, thanks so much! appreciate the quick help!!

1
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

If you’re affected by this in any other repos, let us know and we can retrigger the builds

1
1
1
Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

Please tag me, if it happens once again, @Yangci Ou

1
1

2024-11-13

RB avatar

Please review correct usage of new destination.bucket key

https://github.com/cloudposse/terraform-aws-s3-bucket/pull/256

1
RB avatar

Thank you!

RB avatar

Please review eventbridge support in event notifications

https://github.com/cloudposse/terraform-aws-s3-bucket/pull/255

1
RB avatar

Thank you!

2024-11-14

RB avatar
Veronika Gnilitska avatar
Veronika Gnilitska

Merge conflicts that must be resolved first

RB avatar

Thanks Veronika. I fixed the conflicts.

Before merging, i was hoping to chat with someone about this comment to see what the proper step is for this.

https://github.com/cloudposse/terraform-aws-s3-bucket/pull/258#pullrequestreview-2434928344

cc @Jeremy G (Cloud Posse) if you have a sec

Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

@RB I would prefer to reject (or at least place on indefinite hold) this PR, because it is a breaking change that adds no new functionality

We can leave it open with do not merge and incorporate it into the next major version update, but I don’t think it warrants a version update and breaking change on its own. I want to reserve those for new features that are incompatible with old features or removing deprecated features.

RB avatar

Yes i figured this but was wondering if we can do something like put the old var in variables-deprecated and if either is used, make it have the same impact, that way it would conform to cloudposse naming conventions without a breaking change, no?

Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

It’s on my to-do list to document Cloud Posse’s policy on exactly that. @Erik Osterman (Cloud Posse) How do you want to handle this?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I think we need to use release branches and merge this into those future release branches

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

won’t adding the major label have the same effect

Jeremy G (Cloud Posse) avatar
Jeremy G (Cloud Posse)

@Erik Osterman (Cloud Posse) I meant, I would prefer to defer this change until we had more significant breaking changes, because I don’t have a problem with the current variable name. If you think it should go out now with a major version bump, then I will update the docs sooner rather than later about how to deprecate the old variable.

RB avatar

Couldn’t it go out without a major bump if the new var is added and the old vat is moved to variables-deprecated ?

Then later when the major release is ready, the variables-deprecated can be wiped ?

RB avatar
1
RB avatar

Thank you!

2024-11-15

2024-11-19

Michal Tomaszek avatar
Michal Tomaszek
Michal Tomaszek avatar
Michal Tomaszek

np, got this info from Igor already thanks!

1
hamza-25 avatar
hamza-25

Hey all, Can I please have this PR reviewed https://github.com/cloudposse/terraform-aws-ec2-instance/pull/212

Currently blocking me and forcing me to go a longer way round to solve (adding resources on top of the localised module)

1
Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Igor Rodionov

1
hamza-25 avatar
hamza-25

Thanks Gabriela, is there a possible timeline for when this can be reviewed and merged? thanks @Gabriela Campana (Cloud Posse) @Igor Rodionov

Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

Hi @hamza-25 We can not promise on an ETA, as client work is prioritized over community support. I’ve tagged our engineers on the PRs. This is a best effort by a small team. We appreciate your persistence, and we’ll get to it when we can.

1
Igor Rodionov avatar
Igor Rodionov

@hamza-25 thanks for your contribution. the PR merged and released https://github.com/cloudposse/terraform-aws-ec2-instance/releases/tag/v1.6.1

1
hamza-25 avatar
hamza-25

Thanks a lot, both of you!

I can now get rid of my own local changes much appreciated

1

2024-11-20

2024-11-22

RB avatar

Please review adding an option to use inline policies instead of managed policies for iam roles

https://github.com/cloudposse/terraform-aws-iam-role/pull/79

#79 feat: support inline policies

what

• support inline policies

why

• Most of the time users want to create a specific policy for a specific role and don’t realize that the same policy can be accidentally reused for another purpose which makes it difficult to delete the role and policy • Inline policies do not need to be tagged • If a managed policy is updated and is attached to multiple roles, now it will impact multiple roles

references

• closes #78

1
1
RB avatar

Thanks!

#79 feat: support inline policies

what

• support inline policies

why

• Most of the time users want to create a specific policy for a specific role and don’t realize that the same policy can be accidentally reused for another purpose which makes it difficult to delete the role and policy • Inline policies do not need to be tagged • If a managed policy is updated and is attached to multiple roles, now it will impact multiple roles

references

• closes #78

2024-11-26

z0rc3r avatar

https://github.com/cloudposse/terraform-aws-eks-cluster/pull/245 please

(feedback about ia bot review: it’s garbage and it wasted my time)

1
Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Igor Rodionov

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@z0rc3r these were absolutely not garbage; these were great recommendations. We should strive for better variable descriptions, so the user has everything they need to use the variable.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

As merged, the descriptions are incomplete.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

We are using these suggestions ourselves, and improving the code quality of #amtos https://github.com/cloudposse/atmos/pulls?q=is%3Apr+is%3Aclosed+is%3Amerged

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Plus, CodeRabbit learns from feedback. If you have constructive criticism of why they are not good, you can share that.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Case in point:

-  description = "Configuration block for the support policy to use for the cluster"
+  description = "Configuration block for the support policy to use for the cluster. The support_type can be set to 'Standard' or 'Extended' (default). For more information, see <https://docs.aws.amazon.com/eks/latest/userguide/service-quotas.html#service-quotas-eks-support>"
Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

I prefer the second description over the first one.

z0rc3r avatar

one man’s trash is another man’s treasure

1
z0rc3r avatar

I’m not dealing with llm recomndations

z0rc3r avatar

Feel free to close the pr

Igor Rodionov avatar
Igor Rodionov

@z0rc3r ups. I merged it couple hours ago

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Honestly, what’s bad about the recommendations? What’s trash about them?

z0rc3r avatar

Links are incorrect, recommended values use wrong capitalization. In the end they rehash the official aws docs in a slightly convoluted way.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Fair point about invalid links, if true. However, showing what the acceptable values are is

z0rc3r avatar

Hard disagree. My preference is to leave this on provider level, when module replicates behaviour from the provider. Which is the case here.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Thanks for sharing your views.

z0rc3r avatar

As an end user of other modules I often don’t care what is in variables description. I always read the code to understand it’s behaviour and how resources interact with each other.

z0rc3r avatar

General problem of any ai stuff that it can hallucinate things. So in the end it wastes the contributor’s time to do the fact checking. Plus it doesn’t add value. If you want to give more info just link to provider or aws docs.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Often terraform modules have such poor descriptions, reviewing the provider docs is required. But IMO a well-defined module has thoroughly documented variables, outputs, examples, terratests, and README. We often spend longer on everything else than the modules themselves.

Moritz avatar
Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@johncblandii

Moritz avatar

Could it be merged please? Test passed, @RB also approved it already

Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@johncblandii bumping this up

Gabriela Campana (Cloud Posse) avatar
Gabriela Campana (Cloud Posse)

@Andriy Knysh (Cloud Posse)

2024-11-27

2024-11-28

2024-11-29

    keyboard_arrow_up