Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

feature: added ability to set the attributes block_public_acls and ig…#323

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Open
Faris96Hub wants to merge2 commits intocloudposse:main
base:main
Choose a base branch
Loading
fromFaris96Hub:main

Conversation

Faris96Hub
Copy link

…nore_public_acls for the origin bucket

what

  • added optional variables block_public_acls and ignore_public_acls to be able to set those attributes in the resource "aws_s3_bucket_public_access_block". The default is set to true to match the current module config.

why

  • Needed to be able to make the origin bucket optionally publicly accessable

references

@Faris96HubFaris96Hub requested review froma team ascode ownersSeptember 12, 2024 10:15
@mergifymergifybot added the triageNeeds triage labelSep 12, 2024
@coderabbitaicoderabbitai
Copy link

coderabbitaibot commentedFeb 25, 2025
edited
Loading

📝 Walkthrough

Walkthrough

This pull request updates the S3 bucket public access configuration by replacing hardcoded boolean values with variable references. In the main configuration file, the public access block now uses variables for ACL settings. Additionally, the changes introduce two new boolean variables in the variables file to enable external control over the public ACL behavior for the S3 origin bucket.

Changes

FileChange Summary
main.tfUpdated theaws_s3_bucket_public_access_block resource by replacing hardcoded ACL values (true) with variable references (var.block_public_acls andvar.ignore_public_acls), and updated the accompanying comment for clarity.
variables.tfAdded two new boolean variables,block_public_acls andignore_public_acls, each with a default value oftrue and descriptions explaining their roles in controlling public ACL settings.

📜 Recent review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between8853705 andc68019a.

📒 Files selected for processing (2)
  • main.tf (1 hunks)
  • variables.tf (1 hunks)
🔇 Additional comments (2)
variables.tf (1)

564-575:New Public Access Variables Added

The addition of theblock_public_acls andignore_public_acls variables provides the desired flexibility, allowing users to configure whether the S3 origin bucket should block or consider public ACLs. The default values oftrue maintain a secure configuration by default. Consider a minor nit: refining the descriptions (e.g., "When set tofalse, the S3 origin bucket permits public ACLs") for improved clarity.

main.tf (1)

389-392:Configurable ACL Settings in Public Access Block Resource

Replacing the hardcoded boolean values withvar.block_public_acls andvar.ignore_public_acls in theaws_s3_bucket_public_access_block resource correctly exposes configuration control to the user. This change aligns with the PR’s goal of providing optional overrides for ACL settings. It would be beneficial to ensure that the module documentation is updated to reflect this new flexibility.


Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat withCodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag@coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag@coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings togenerate docstrings for this PR. (Beta)
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add@coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add@coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add@coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a.coderabbit.yaml file to the root of your repository.
  • Please see theconfiguration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation:# yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit ourDocumentation for detailed information on how to use CodeRabbit.
  • Join ourDiscord Community to get help, request features, and share feedback.
  • Follow us onX/Twitter for updates and announcements.

@RoseSecurity
Copy link
Contributor

Cloud Posse modules are designed to be secure by default. However, I’m curious about the use cases for toggling these parameters to false. I’m trying to understand the security implications of this and whether it’s worth exposing these options.

Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

@GowiemGowiemAwaiting requested review from GowiemGowiem is a code owner automatically assigned from cloudposse/contributors

@RoseSecurityRoseSecurityAwaiting requested review from RoseSecurityRoseSecurity is a code owner automatically assigned from cloudposse/contributors

At least 1 approving review is required to merge this pull request.

Assignees

No one assigned

Labels

triageNeeds triage

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

3 participants

@Faris96Hub@RoseSecurity@joe-niland

[8]ページ先頭

©2009-2025 Movatter.jp