-
Notifications
You must be signed in to change notification settings - Fork 3
[DEV-14468] Update modules to handle customer IAM restrictions #551
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -197,7 +197,7 @@ module "security-group" { | |
| module "s3-storage" { | ||
| count = var.load_environment == "" ? 1 : 0 | ||
| source = "app.terraform.io/indico/indico-aws-buckets/mod" | ||
| version = "4.6.0" | ||
| version = "4.6.3" | ||
| force_destroy = true # allows terraform to destroy non-empty buckets. | ||
| label = var.label | ||
| kms_key_arn = local.environment_kms_key_arn | ||
|
|
@@ -216,6 +216,8 @@ module "s3-storage" { | |
| enable_loki_logging = var.enable_loki_logging | ||
| cleanup_noncurrent_days = var.s3_cleanup_noncurrent_days | ||
| retain_backup_days = var.s3_retain_backup_days | ||
| include_pgbackup = var.include_pgbackup | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. pgbackup bucket created when intake/insights both disabledMedium Severity The |
||
| enable_public_access_block = var.s3_enable_public_access_block | ||
| } | ||
|
|
||
|
|
||
|
|
@@ -286,7 +288,7 @@ module "efs-storage" { | |
| module "fsx-storage" { | ||
| count = var.include_fsx == true && var.load_environment == "" ? 1 : 0 | ||
| source = "app.terraform.io/indico/indico-aws-fsx/mod" | ||
| version = "2.0.0" | ||
| version = "2.0.4" | ||
| label = var.label | ||
| additional_tags = var.additional_tags | ||
| region = var.region | ||
|
|
@@ -308,6 +310,7 @@ module "fsx-storage" { | |
| fsx_rwx_arn = var.fsx_rwx_arn | ||
| fsx_rox_id = var.fsx_rox_id | ||
| fsx_rox_arn = var.fsx_rox_arn | ||
| enable_backup_lambda = var.enable_backup_lambda | ||
| } | ||
|
|
||
| module "iam" { | ||
|
|
@@ -352,7 +355,7 @@ module "iam" { | |
| module "cluster" { | ||
| count = var.multitenant_enabled == false ? 1 : 0 | ||
| source = "app.terraform.io/indico/indico-aws-eks-cluster/mod" | ||
| version = "10.0.2" | ||
| version = "10.0.6" | ||
| label = var.multitenant_enabled ? var.tenant_cluster_name : var.label | ||
| region = var.region | ||
| cluster_version = var.k8s_version | ||
|
|
@@ -372,13 +375,16 @@ module "cluster" { | |
| instance_volume_size = var.instance_volume_size | ||
| instance_volume_type = var.instance_volume_type | ||
|
|
||
| additional_users = var.additional_users | ||
| enable_additional_access_entries = var.enable_additional_access_entries | ||
|
|
||
| public_endpoint_enabled = var.cluster_api_endpoint_public == true ? true : false | ||
| private_endpoint_enabled = var.network_allow_public == true ? false : true | ||
|
|
||
| create_cluster_security_group = var.create_cluster_security_group | ||
| cluster_security_group_id = local.environment_all_subnets_sg_id | ||
| cluster_additional_security_group_ids = [local.environment_all_subnets_sg_id] | ||
| create_node_security_group = var.create_node_security_group | ||
| node_security_group_id = local.environment_all_subnets_sg_id | ||
| http_tokens = var.http_tokens | ||
| } | ||
|
|
||
|
|
||


There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Disabling pgbackup now breaks pgBackRest S3 bucket reference
Medium Severity
Passing
include_pgbackupto thes3-storagemodule is new — previously the module always created the pgbackup bucket regardless of this flag. Now wheninclude_pgbackup = false, the bucket won't be created, butapplication.tfunconditionally configures crunchy-postgrespgBackRestConfigwithlocal.environment_pgbackup_s3_bucket_name(which becomes the string"null"viacoalesce). This means PostgreSQL backups will silently target a nonexistent bucket, causing backup failures with no corresponding config guard.Additional Locations (1)
variables.tf#L552-L556There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This only applies if either intake or insights are enabled