-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix remaining Terraform for production and demo #849
Conversation
This changeset adjusts our Terraform for the production and demo environments so that the new delete_recursive_allowed with the Cloud Foundry Cloud Controller is set to false. It also updates the shared modules to all explicitly account for this property so that we can set the flag easily. Signed-off-by: Carlo Costino <carlo.costino@gsa.gov>
Terraform Format and Style: success Show Plan
Pusher: @ccostino, Action: |
Signed-off-by: Carlo Costino <carlo.costino@gsa.gov>
Terraform Format and Style: success Show Plan
Pusher: @ccostino, Action: |
Signed-off-by: Carlo Costino <carlo.costino@gsa.gov>
Terraform Format and Style: success Show Plan
Pusher: @ccostino, Action: |
Signed-off-by: Carlo Costino <carlo.costino@gsa.gov>
Terraform Format and Style: success Show Plan
Pusher: @ccostino, Action: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
This will also ensure any drift is picked up by our infrastructure verification checks Signed-off-by: Carlo Costino <carlo.costino@gsa.gov>
Terraform Format and Style: success Show Plan
Pusher: @ccostino, Action: |
The SES and SNS modules are strictly for services that are instantiated within a space, while the egress_space is creating a separate space. The shift of the recursive delete from being on a service to being at the space level means that the SES and SNS modules do not have to track it at all, it should only be handled at the space level. The same goes for the allow_ssh flag. Signed-off-by: Carlo Costino <carlo.costino@gsa.gov>
Terraform Format and Style: success Show Plan
Pusher: @ccostino, Action: |
Signed-off-by: Carlo Costino <carlo.costino@gsa.gov>
Terraform Format and Style: success Show Plan
Pusher: @ccostino, Action: |
A note to PR reviewers: it may be helpful to review our code review documentation to know what to keep in mind while reviewing pull requests.
Description
This changeset adjusts our Terraform for the production and demo environments so that the new delete_recursive_allowed with the Cloud Foundry Cloud Controller is set to false. It also updates the shared modules to all explicitly account for this property so that we can set the flag easily.
Security Considerations
demo
andproduction
environments.