Skip to content

Conversation

@burythehammer
Copy link
Collaborator

@burythehammer burythehammer commented Nov 10, 2025

Added

  • Added support for database version for Essentials databases.
  • Added aws_account_id attribute to Pro and Active-Active subscription resources and data sources.
  • Added region_id to the attribute reference documentation for rediscloud_active_active_subscription_regions data source.
  • Added region_id attribute to rediscloud_regions data source.
  • Added db_id to the attribute reference documentation for rediscloud_database data source.

burythehammer and others added 30 commits August 15, 2025 09:53
fix: workflow file incorrectly formatted
…n-version

Fix: Revert removal subscription version
…db-versions

OPCR-34: Adding redis_version support to the pro and AA database data sources
…oning-support

OPCR-33 aa database versioning support
v2.3.0 - Redis Database version support
docs: updating changelog to also include other changes
Copy link

@jit-ci jit-ci bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

❌ Jit has detected 1 important finding in this PR that you should review.
The finding is detailed below as a comment.
It’s highly recommended that you fix this security issue before merge.

Repository Risks:

  • Database Integration: Connects to a database, often involving sensitive data that must be securely managed.
  • Internally Accessible: Accessible only within the internal network, reducing exposure to external threats but still requiring proper controls.

Repository Context:

graph LR
    GitHub$Repository_U23_RedisLabs/terraform_U2D_provider_U2D_rediscloud["GitHub Repository<br/>RedisLabs/terraform-provider-rediscloud"]:::GitHub$Repository
    Team_U23_SecurityManagers["Team<br/>SecurityManagers"]:::Team
    DBIntegration_U23_redis["DBIntegration<br/>redis"]:::DBIntegration
    Team_U23_SecurityManagers -- "Owns" --> GitHub$Repository_U23_RedisLabs/terraform_U2D_provider_U2D_rediscloud
    GitHub$Repository_U23_RedisLabs/terraform_U2D_provider_U2D_rediscloud -- "Is accessible to" --> DBIntegration_U23_redis
Loading

package.json Outdated
@@ -0,0 +1,5 @@
{
"dependencies": {
"@anthropic-ai/claude-code": "^2.0.36"
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: License Compliance Checker

License Compliance Violation

Found 6 violations in @anthropic-ai/claude-code (Apache-2.0 AND LGPL-3.0-or-later, LGPL-3.0-or-later):

@anthropic-ai/claude-code -> @img/sharp-darwin-arm64 -> @img/sharp-libvips-darwin-arm64 (LGPL-3.0-or-later)

@anthropic-ai/claude-code -> @img/sharp-darwin-x64 -> @img/sharp-libvips-darwin-x64 (LGPL-3.0-or-later)

@anthropic-ai/claude-code -> @img/sharp-linux-arm -> @img/sharp-libvips-linux-arm (LGPL-3.0-or-later)

@anthropic-ai/claude-code -> @img/sharp-linux-arm64 -> @img/sharp-libvips-linux-arm64 (LGPL-3.0-or-later)

@anthropic-ai/claude-code -> @img/sharp-linux-x64 -> @img/sharp-libvips-linux-x64 (LGPL-3.0-or-later)

@anthropic-ai/claude-code -> @img/sharp-win32-x64 (Apache-2.0 AND LGPL-3.0-or-later)

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "License Compliance Violation" in package.json; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

@burythehammer burythehammer changed the title Feat/subscriptions aws account Essentials DB version, aws_account_id, region_id, db_id Nov 10, 2025
@burythehammer burythehammer force-pushed the feat/subscriptions-aws-account-id-v2 branch from 1c84767 to 21b80bb Compare November 10, 2025 12:47
@burythehammer burythehammer deleted the feat/subscriptions-aws-account-id-v2 branch November 10, 2025 12:49
@burythehammer burythehammer restored the feat/subscriptions-aws-account-id-v2 branch November 10, 2025 12:49
@burythehammer burythehammer deleted the feat/subscriptions-aws-account-id-v2 branch November 10, 2025 12:50
@burythehammer burythehammer restored the feat/subscriptions-aws-account-id-v2 branch November 10, 2025 12:58
@burythehammer burythehammer deleted the feat/subscriptions-aws-account-id-v2 branch November 10, 2025 12:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants