-
-
Notifications
You must be signed in to change notification settings - Fork 2
component has a bug where it doesn't specify the provider for reading GitHub API key #46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
component has a bug where it doesn't specify the provider for reading GitHub API key #46
Conversation
data.tf and notifications.tf already use the same provider = aws.config_secrets pattern
WalkthroughAdds a provider alias override (aws.config_secrets) to two AWS SSM Parameter data sources in src/provider-github.tf. No other logic or flow changes. Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~10 minutes Poem
Pre-merge checks and finishing touches✅ Passed checks (3 passed)
✨ Finishing touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 1
🧹 Nitpick comments (1)
src/provider-github.tf (1)
51-53: Optional: avoid unnecessary SSM read when token override is providedIf github_token_override is set, you can skip the SSM fetch to reduce external calls.
Apply:
data "aws_ssm_parameter" "github_api_key" { - count = !var.github_app_enabled ? 1 : 0 + count = (!var.github_app_enabled && var.github_token_override == null) ? 1 : 0 name = var.ssm_github_api_key with_decryption = true
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (1)
src/provider-github.tf(1 hunks)
🧰 Additional context used
📓 Path-based instructions (1)
**/*.tf
📄 CodeRabbit inference engine (AGENTS.md)
**/*.tf: Use 2-space indentation for all Terraform files
In Terraform, prefer lower_snake_case for variables and locals; keep resource and data source names descriptive and aligned with Cloud Posse null-label patterns
Run terraform fmt and do not commit formatting violations
Adhere to TFLint rules defined in .tflint.hcl; do not commit lint violations
Files:
src/provider-github.tf
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (1)
- GitHub Check: Summary
🔇 Additional comments (1)
src/provider-github.tf (1)
63-65: Also correct: alias for GitHub App private keyUsing aws.config_secrets here is consistent and necessary. LGTM.
Please confirm the alias is configured (provider "aws" { alias = "config_secrets" ... }) and points to the secrets account/region.
|
/terratest |
RoseSecurity
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a great finding. Thank you
|
Thanks @Musthaq101 for creating this pull request! A maintainer will review your changes shortly. Please don't be discouraged if it takes a while. While you wait, make sure to review our contributor guidelines. Tip Need help or want to ask for a PR review to be expedited?Join us on Slack in the |
065ab5d
|
These changes were released in v2.3.0. |
what
why
references
closes #123, if this PR closes a GitHub issue#123Summary by CodeRabbit
Bug Fixes
Chores