-
-
Notifications
You must be signed in to change notification settings - Fork 1
Fixed missing provider configuration for SSM data sources in the notifications module. #47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fixed missing provider configuration for SSM data sources in the notifications module. #47
Conversation
WalkthroughTwo Terraform data sources in the notifications configuration are updated to explicitly use the Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~8 minutes
Poem
Pre-merge checks and finishing touches❌ Failed checks (1 warning)
✅ Passed checks (2 passed)
✨ Finishing touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 0
🧹 Nitpick comments (2)
src/notifications.tf (2)
1-7: Align provider attribute placement withslack_notificationsdata source for consistency.The
providerattribute is placed after other arguments (line 6), while theslack_notificationsdata source (line 10) places it earlier in the block. Per Terraform conventions, meta-arguments likeproviderandcount/for_eachshould be grouped together early in the block for readability and consistency across the file.Consider reordering the attributes to place
providerimmediately afterfor_each:data "aws_ssm_parameters_by_path" "argocd_notifications" { for_each = local.notifications_notifiers_ssm_path - path = each.value - with_decryption = true - provider = aws.config_secrets + path = each.value + with_decryption = true }
17-23: Align provider attribute placement withslack_notificationsdata source for consistency.The
providerattribute is placed after other arguments (line 22), while theslack_notificationsdata source (line 10) places it earlier in the block. Standardize placement by movingproviderto appear directly aftercount:data "aws_ssm_parameter" "github_notifications_app_private_key" { count = local.github_notifications_enabled && var.github_notifications_app_enabled ? 1 : 0 + provider = aws.config_secrets name = var.ssm_github_notifications_app_private_key with_decryption = true - - provider = aws.config_secrets }
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (1)
src/notifications.tf(2 hunks)
🧰 Additional context used
📓 Path-based instructions (1)
**/*.tf
📄 CodeRabbit inference engine (AGENTS.md)
**/*.tf: Use 2-space indentation for all Terraform files
In Terraform, prefer lower_snake_case for variables and locals; keep resource and data source names descriptive and aligned with Cloud Posse null-label patterns
Run terraform fmt and do not commit formatting violations
Adhere to TFLint rules defined in .tflint.hcl; do not commit lint violations
Files:
src/notifications.tf
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (1)
- GitHub Check: Summary
|
/terratest |
|
This looks good to me, but another set of eyes @cloudposse-terraform-components/contributors would be awesome |
gberenice
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
|
Thanks @Musthaq101 for creating this pull request! A maintainer will review your changes shortly. Please don't be discouraged if it takes a while. While you wait, make sure to review our contributor guidelines. Tip Need help or want to ask for a PR review to be expedited?Join us on Slack in the |
12b6691
|
These changes were released in v2.4.0. |
what
provider = aws.config_secretstodata.aws_ssm_parameters_by_path.argocd_notificationsprovider = aws.config_secretstodata.aws_ssm_parameter.github_notifications_app_private_keywhy
All encrypted SSM parameter data sources in this component should use the
aws.config_secretsprovider alias to enable cross-account access to the secrets store.references
closes #123, if this PR closes a GitHub issue#123Summary by CodeRabbit