profile
viewpoint
Daniel Schroeder udondan @dbsystel Frankfurt am Main, Germany https://www.udondan.com/ Software Engineer @dbsystel

push eventudondan/www.udondan.com

Daniel Schroeder

commit sha cd2e9c3c7d3996371dce6bc694f94391b3562f36

Update config.toml

view details

push time in 2 days

startedApollon77/ioBroker.alexa2

started time in 4 days

startedioBroker/ioBroker

started time in 4 days

startedioBroker/ioBroker.vis-jqui-mfd

started time in 4 days

startedawslabs/awscli-aliases

started time in 8 days

push eventudondan/example-terraform-workspace-config

daniel.schroeder

commit sha c23ec345a95fdb1529885e894a7c99fa4477169e

adds link to config.tf

view details

push time in 21 days

push eventudondan/example-terraform-workspace-config

daniel.schroeder

commit sha 8dcd31c3952f768d405da9b05810cc80b3241ccf

adds links to code

view details

push time in 21 days

create barnchudondan/example-terraform-workspace-config

branch : master

created branch time in 21 days

created repositoryudondan/example-terraform-workspace-config

created time in 21 days

push eventudondan/udondan

Stackbit

commit sha 53e7a35cf2f188af7b2e2aa206c00d2198e471fc

Stackbit: Updated theme to version fea9280

view details

push time in 21 days

create barnchudondan/udondan

branch : stackbit-update-fea9280

created branch time in 21 days

create barnchudondan/udondan

branch : master

created branch time in 21 days

created repositoryudondan/udondan

created time in 21 days

push eventudondan/www.udondan.com

daniel.schroeder

commit sha 0f45505f0c43b90ec9d30ab7e2f1426f8d95ea4f

set assume role for new account

view details

daniel.schroeder

commit sha d5538290232b1b5d3ee83a5ea6f9dc0aef4c2b41

Merge branch 'master' of https://github.com/udondan/www.udondan.com

view details

push time in 22 days

push eventmkitso/goos-rpc

daniel.schroeder

commit sha 1f89863e1c1089ccccddf973001d0cd41665640b

checkoint

view details

push time in 22 days

issue commentmauve/vscode-terraform

terraform fmt on save not actually occurring

Can't figure it out... I just replaced the - now with document.fileName. Certainly not the way to do it and sometimes causes issues with vsc complaining the file it wants to save is newer than what it got. Better though than not formatting the code.

BTW, manually formatting the code works. It's only the format on save that doesn't do anything, event though the function is triggered and debugging output looks as if it worked.

PS: How do i have version 1.4.0 installed when the latest release here is 1.3.12?

asht0nium

comment created time in 23 days

issue commentmauve/vscode-terraform

terraform fmt on save not actually occurring

"-" usually means "read the input from STDIN". I'd expect that the extension is reading the file in, running the terraform format command terraform fmt - and piping the file contents into the process.

Yes, that's correct, that's what it's doing.

Debuggin it right now. The input is correct, the output even is the correctly formatted code. The problem is, this line doesn't change the document, even though the result of that line looks good to me.

{
    "range": [
        {
            "line": 0,
            "character": 0
        },
        {
            "line": 10,
            "character": 0
        }
    ],
    "newText": "resource \"aws_organizations_account\" \"this\" {\n  count    = local.env == \"master\" ? 0 : 1\n  provider = aws.master\n  name     = local.env\n  email    = local.config.account.email\n}\n\noutput \"account\" {\n  value = local.account\n}\n"
}

The newText is correctly formatted/indended and a newline is added to the end of the file, which I messed up for this test case.

asht0nium

comment created time in 23 days

issue commentmauve/vscode-terraform

terraform fmt on save not actually occurring

Anyone found a solution or knows the cause? I'm having this problem since some weeks and can't find a solution. The Terraform output window shows it is running but nothing happens with the document.

2019-11-18 09:01:37:238 [INFO ] formatting-provider: running 'terraform fmt' on '/path/to/file.tf'
2019-11-18 09:01:37:238 [INFO ] runner: Running terraform cwd='/' path='/usr/local/bin/terraform' (version: 0.12.15) args=[fmt, -]
2019-11-18 09:01:38:189 [INFO ] runner: Running terraform succeeded.

I'm confused about the args: args=[fmt, -]

Is the 2nd arg a placeholder for the filename? Or is that the issue?

asht0nium

comment created time in 23 days

startedbpineau/aws-iam-mfa

started time in 23 days

push eventudondan/www.udondan.com

daniel.schroeder

commit sha fc474344c2e077d97a5a250fb91977a461c64188

adds link to keybase

view details

push time in 23 days

started99designs/aws-vault

started time in 24 days

startedbroamski/aws-mfa

started time in 24 days

PublicEvent

push eventudondan/www.udondan.com

daniel.schroeder

commit sha 895abe8ba34ab7aafd0ad3d2eac4717501aaa021

adds readme

view details

daniel.schroeder

commit sha d061b2cbbbc1653eb1248ebe7f53623478e7f92e

Merge branch 'master' of https://github.com/udondan/www.udondan.com

view details

push time in a month

push eventudondan/www.udondan.com

daniel.schroeder

commit sha 44d355fdffb70c39b1e3eeb895a3093248fda05f

adds readme

view details

daniel.schroeder

commit sha 069097b78c0659f1c91699b91794c1e2c7b319bd

adds readme

view details

push time in a month

startedxriley/Orbit-Theme

started time in a month

created tagudondan/terraform-aws-s3-cloudfront-page

tagv0.3.0

Terraform module for publishing a static page via AWS CloudFront.

created time in a month

delete tag udondan/terraform-aws-s3-cloudfront-page

delete tag : v0.3.0

delete time in a month

created tagudondan/terraform-aws-s3-cloudfront-page

tagv0.3.0

Terraform module for publishing a static page via AWS CloudFront.

created time in a month

delete branch udondan/terraform-aws-s3-cloudfront-page

delete branch : no-wildcard-cert

delete time in a month

push eventudondan/terraform-aws-s3-cloudfront-page

Daniel Schroeder

commit sha a712ac81d82fd29c12c5eae0ad1b91cd0be59740

only trigger action on push to master (#2)

view details

push time in a month

push eventudondan/terraform-aws-s3-cloudfront-page

daniel.schroeder

commit sha eac821651d3fcb626bf338377c10781829e52a57

only trigger action on push to master

view details

daniel.schroeder

commit sha 6c0889486b763dd6b8df5c04ca300a088f40198e

fixes on def

view details

push time in a month

create barnchudondan/terraform-aws-s3-cloudfront-page

branch : no-wildcard-cert

created branch time in a month

delete branch udondan/terraform-aws-s3-cloudfront-page

delete branch : no-wildcard-cert

delete time in a month

push eventudondan/terraform-aws-s3-cloudfront-page

daniel.schroeder

commit sha f22ab2a8751f29eeb6aa468beab0b29c0457ffaf

no longer creates wildcard certificate

view details

Daniel Schroeder

commit sha 9be7cff17d2de67a01eb1ecf8c3acb7284516d64

Merge pull request #1 from udondan/no-wildcard-cert no longer creates wildcard certificate

view details

push time in a month

push eventudondan/terraform-aws-s3-cloudfront-page

daniel.schroeder

commit sha f22ab2a8751f29eeb6aa468beab0b29c0457ffaf

no longer creates wildcard certificate

view details

push time in a month

create barnchudondan/terraform-aws-s3-cloudfront-page

branch : no-wildcard-cert

created branch time in a month

push eventudondan/terraform-aws-s3-cloudfront-page

daniel.schroeder

commit sha 335c601da351b0eb55bb92798851ec3de10e55a1

adds action badge to readme

view details

push time in a month

push eventudondan/terraform-aws-s3-cloudfront-page

daniel.schroeder

commit sha c37aeef7b8b248daf18a6eda853f6d773ba149d8

adding mock credentials for aws provider

view details

push time in a month

push eventudondan/terraform-aws-s3-cloudfront-page

daniel.schroeder

commit sha fe0de2b487065f9642408d666b44bd2cc94944f7

fixing module path

view details

push time in a month

push eventudondan/terraform-aws-s3-cloudfront-page

daniel.schroeder

commit sha 1f5b2587098604ca8a71164817f9755c942d63e5

fix invalid version contraint

view details

push time in a month

push eventudondan/terraform-aws-s3-cloudfront-page

daniel.schroeder

commit sha 79b1298ad550b23ed432b3d8cf8da5f48f01c9b6

adds test dir

view details

push time in a month

push eventudondan/terraform-aws-s3-cloudfront-page

daniel.schroeder

commit sha be8d3f3c2a26ac3fb85e5c0bfd9617f4dff15110

adding gh action

view details

push time in a month

startedhashicorp/terraform-github-actions

started time in a month

created tagudondan/terraform-aws-s3-cloudfront-page

tagv0.2.0

Terraform module for publishing a static page via AWS CloudFront.

created time in a month

push eventudondan/terraform-aws-s3-cloudfront-page

daniel.schroeder

commit sha b7ec63067324258f6ebc7bf8172cc63b370ca998

rewriting module descirption

view details

daniel.schroeder

commit sha 9759b4a9f97da108fb1dad5c63af45586ccbb803

moving default_filetypes to locals

view details

daniel.schroeder

commit sha a6141b37203c7b004abaf2983420bd06a15d69e1

adds support for many more file extensions

view details

push time in a month

created tagudondan/terraform-aws-s3-cloudfront-page

tagv0.1.0

created time in a month

delete tag udondan/terraform-aws-s3-cloudfront-page

delete tag : v0.1.0

delete time in a month

push eventudondan/terraform-aws-s3-cloudfront-page

daniel.schroeder

commit sha 7f893f3d672a80f341a61c1798ad8aadce2d0314

align cloudfront domain name

view details

push time in a month

created tagudondan/terraform-aws-s3-cloudfront-page

tagv0.1.0

created time in a month

delete tag udondan/terraform-aws-s3-cloudfront-page

delete tag : v0.1.0

delete time in a month

push eventudondan/terraform-aws-s3-cloudfront-page

daniel.schroeder

commit sha dbe52959fc786a194c041bdd5886e67d44e4fdda

adds tooling

view details

daniel.schroeder

commit sha 4c1bd4f71bd4f7c4a804b3cde402f5921631b237

adds output to example

view details

push time in a month

created tagudondan/terraform-aws-s3-cloudfront-page

tagv0.1.0

created time in a month

delete tag udondan/terraform-aws-s3-cloudfront-page

delete tag : v0.1.0

delete time in a month

push eventudondan/terraform-aws-s3-cloudfront-page

daniel.schroeder

commit sha a59e9586f6255ac1cd06412b6171e010dfdb2180

updates module source paths

view details

push time in a month

created tagudondan/terraform-s3-cloudfront-page

tagv0.1.0

created time in a month

create barnchudondan/terraform-s3-cloudfront-page

branch : master

created branch time in a month

created repositoryudondan/terraform-s3-cloudfront-page

created time in a month

fork udondan/ansible-cloudwatch-agent

Ansible role to install AWS Cloudwatch Agent

fork in a month

pull request commentfifsky/html-to-pdf-action

Various improvements (options, server, re-using image)

thanks for merging :)

udondan

comment created time in a month

delete branch udondan/html-to-pdf-action

delete branch : improvements

delete time in a month

push eventudondan/html-to-pdf-action

daniel.schroeder

commit sha e486f605175f1a0b99a6a9004ed341a9f83e3a35

overriding dockerfile to be able to use action

view details

push time in a month

push eventudondan/html-to-pdf-action

daniel.schroeder

commit sha 5f8c1278a62a477ad0f7f8b687d974ebfa7cb322

re-uses buildkite/puppeteer image, popular and smaller image

view details

daniel.schroeder

commit sha 5d8f02e98d0c37c30ef0c6ce3a34085b28ae6cd1

various improvements

view details

Daniel Schroeder

commit sha fd5aa57c3a47262350d79cabd9b97df683679747

Merge pull request #1 from udondan/improvements Improvements

view details

push time in a month

PR merged udondan/html-to-pdf-action

Improvements
+56 -245

0 comment

8 changed files

udondan

pr closed time in a month

PR opened udondan/html-to-pdf-action

Improvements
+56 -245

0 comment

8 changed files

pr created time in a month

PR opened fifsky/html-to-pdf-action

Various improvements (options, server, re-using image)

Great action! I had to do some changes to make it work for me.

Sorry for not committing separate PR's. Customized it until it worked for me. 😃

  • Added pdfOptions input, so user can forward custom optons.
  • Replaced the custom written server with serve-static. The original server only served a single HTML page. I needed support for relative files: CSS, JS and custom fonts.
  • Replaced the custom base Docker image with buildkite/puppeteer. This one seems maintained, popular and only is 286MB in size. I think yours was 479MB.
  • Removed some code that did not make sense to me (e.g. legacyOptions). Wasn't passed from main.js.
  • Removed the includeAssets() function. That seemd very custom to a specific setup. Now with the new http server, serving all files in the root, css files included in the HTML document (print styles) can be used

Let me know if anything conflicts with your setup. I tested your example.html file and it renders nicely.

+56 -244

0 comment

8 changed files

pr created time in a month

push eventudondan/html-to-pdf-action

daniel.schroeder

commit sha 5d8f02e98d0c37c30ef0c6ce3a34085b28ae6cd1

various improvements

view details

push time in a month

create barnchudondan/html-to-pdf-action

branch : improvements

created branch time in a month

push eventudondan/html-to-pdf-action

daniel.schroeder

commit sha e3f592486a8d6748123ae9ee654247fde8be20d0

changing path to inspect pdf

view details

push time in a month

push eventudondan/html-to-pdf-action

daniel.schroeder

commit sha 384e9802a5118bb1cd731fa67348bdaa7d95b843

waiting for screenshot to ensure external fonts have loaded

view details

push time in a month

fork udondan/html-to-pdf-action

HTML to PDF for github actions

fork in a month

startedGoogleChrome/puppeteer

started time in a month

startedfifsky/html-to-pdf-action

started time in a month

startedpeaceiris/actions-hugo

started time in a month

startedad-m/github-push-action

started time in a month

issue commentcloud-custodian/cloud-custodian

0.8.45.0 and 0.8.45.1 Releases Break Lambda

Just checked, on the failing policy I got this defined:

      execution-options:
        log_group: /aws/lambda/custodian-auto-terminator

Indeed, the working policies have no log_group defined.

MrDweebus

comment created time in a month

issue commentcloud-custodian/cloud-custodian

0.8.45.0 and 0.8.45.1 Releases Break Lambda

Having this issue too. But somehow it doesn't happen on all lambdas. I have one policy that deletes unused SG's, works fine. Another policy should terminate untagged ec2's which fails with above issue.

Version 0.8.45.1

Invoking command is very simple:

custodian run --cache-period=0 --policies a -policies b -policies c

I'm not really having a clue how the changes from #4809 can be used. But I wonder, if self.ctx.options.log_group isn't missing somewhere? I mean, if I do not use the this netloc thing, I think it should use the previous log_group? But then again, some lambdas do work, so it probably isn't that.

I also tried to change line 237 to

self.log_group = self.config.get('netloc', self.ctx.options.log_group)

But having the same result...

MrDweebus

comment created time in a month

push eventudondan/cloud-custodian

Daniel Schroeder

commit sha 925e1ae9aa987c867a0556dfa03ed6672542dfd5

cli - run add support for multiple --policies and --resource arguments (#4897)

view details

Kapil Thangavelu

commit sha 61491f90308086739077bb7494d255336ca53e9b

tools/c7n_mailer - update dependencies (#4910)

view details

erwelch

commit sha 47f81ec28bdd233dd7c13b59ac38750a8bc793c1

tools/c7n-mailer, azure - update templates to use full path (#4913) * update templates to use full path

view details

Kirill Logachev

commit sha c4a2cc426db07627f28980c3c132b73802bd52e1

azure - test regressions(#4914)

view details

Winston Frick

commit sha 68dc5f4ba61820e6b6a68aa30002f85303df34c9

azure - doc updates (#4883)

view details

Kapil Thangavelu

commit sha d593034386fdc3ee4c19db493c318219b031eaa6

tests - test infra pytest support fixture for non unittest based tests (#4919)

view details

erwelch

commit sha 0d720f9a63b0384afb07a45c4f294a7c31a0957d

azure - event resource type validation (#4923)

view details

Kapil Thangavelu

commit sha 3497de4f53e4828e8cbbcbd9b870fa259b1e4c8f

tools - automatic dependency pinning (#4901)

view details

Darcy Laycock

commit sha 86d6ceab57a43ae9d9a3bc4f079dce7dfa6a90b3

aws - storage gateway tagging augment bug fix (#4933)

view details

Kirill Logachev

commit sha 3dc482b4406c952055ad2cbfa16f46b567ef4ca1

azure - update AppServicePlan & Subscription tests (#4928)

view details

Kapil Thangavelu

commit sha d3d726fa3240ffb05b0352d6c8eb8efb8c33f0e8

ci - change additional schema validation to py3.7 runner only (#4925)

view details

Winston Frick

commit sha 95eecbc6a5fe639a42e7c14bb5f40ef5450e7c02

azure - Added documentation on using resource tags (#4917)

view details

Kapil Thangavelu

commit sha 50875548d2df8c26a425ccecbdd76d3757038aea

release - 0.8.45.1 (#4898)

view details

Darcy Laycock

commit sha 71a6f86d23175643e695892fa27ce69acbc8583d

core - value filter add a version value type (#4936)

view details

Andy Luong

commit sha b5d3928fddb99ed82a2762e39d2c8df3c70e2fb6

azure - add azure resource graph as a query provider (#4924)

view details

Kapil Thangavelu

commit sha 122fd55becb40a53a80300f1ce11387a7a041296

core - webhook action - use date aware json serializer (#4951)

view details

Kapil Thangavelu

commit sha 73ebc955a7c421669f23e07fc54ca11144a2afff

aws - eks tag normalization (#4947)

view details

erwelch

commit sha 14b721c6c09333119e76f3d926b6250fd8d86098

azure - arm resource type validation (#4935)

view details

Karol Lassak

commit sha 37c4e4615cc1fa4b6d53e39f1142e484b9914b05

gcp - fix disk snapshot action and add option to delete disks (#4930)

view details

Stefan Gordon

commit sha 0fdb437c5b5cac939022b862bdf42b7d492835a9

build - publish docker nightly after functionals (#4932)

view details

push time in a month

issue commentintegrii/flaggy

Proposal: Adding support for environment vars

One thing to keep in mind is, that with var myFlag = os.Getenv("MY_FLAG"), the help message would show the value of the env var as default value. This might be confusing, since it is a not a fixed default.

On the other hand this might also be used to the users advantage, e.g.

var flagLang = os.Getenv("LANG")
var flagTime = os.Getenv("LC_TIME")
...
udondan

comment created time in a month

issue commentintegrii/flaggy

Proposal: Adding support for environment vars

var myFlag = os.Getenv("MY_FLAG")

Oh dear, I tend to overcomplicate things. Indeed, it is that simple to accomplish. 🤦‍♂

However, this still needs added to a help message as a prepend and isn't noted in the help output at all.

I don't know, not necessarily. I actually am not aware of any program that indicates env var counterparts for flags in the hep message. That's something that can be added to the documentation, or prepend/append help message. Or if the customer wants it in the flag description, it can be simply added to its desc.

I agree with everything you wrote, wrt to flaggy.StringSliceEnv() and an additional parameter for defining the flag name. Makes all sense. But I'm no longer sure it is worth the effort now that you made me realize how simple it is with the default value.

Save travels! 😸

udondan

comment created time in a month

push eventudondan/terraform

daniel.schroeder

commit sha e7c27561657af781c428af5bccd262fbf5d3fedf

adds documentation for type functions

view details

push time in a month

push eventudondan/flaggy

daniel.schroeder

commit sha b0db1745324785182dee764be238e566abe659f8

adds example for custom template

view details

push time in a month

push eventudondan/terraform

daniel.schroeder

commit sha 292f16277eca2283747f89b1eb00a9289280a553

adds missing tests for type functions

view details

push time in a month

PR opened hashicorp/terraform

Adds functions for checking the type of variables

Fixes #23070 <- Description and use case can be found in that issue.

My Terraform test code:

locals {
  bool   = false
  list   = list(1, 2, 3)
  map    = map("foo", 112)
  number = 6
  object = { foo : "bar" }
  set    = toset([1, 2, 5])
  string = "foo"
  tuple  = [1, 2, 3]
}

output "type" {
  value = {
    bool   = type(local.bool)
    list   = type(local.list)
    map    = type(local.map)
    null   = type(null)
    number = type(local.number)
    object = type(local.object)
    set    = type(local.set)
    string = type(local.string)
    tuple  = type(local.tuple)
  }
}
output "is" {
  value = {
    bool   = isbool(local.bool)
    list   = islist(local.list)
    map    = ismap(local.map)
    null   = isnull(null)
    number = isnumber(local.number)
    object = isobject(local.object)
    set    = isset(local.set)
    string = isstring(local.string)
    tuple  = istuple(local.tuple)
  }
}

output "isNot" {
  value = {
    bool   = isbool(local.number)
    list   = islist(local.map)
    map    = ismap(local.list)
    null   = isnull(local.number)
    number = isnumber(null)
    object = isobject(local.set)
    set    = isset(local.object)
    string = isstring(local.tuple)
    tuple  = istuple(local.string)
  }
}

Applying above code results in this output:

Apply complete! Resources: 0 added, 0 changed, 0 destroyed.

Outputs:

is = {
  "bool" = true
  "list" = true
  "map" = true
  "null" = true
  "number" = true
  "object" = true
  "set" = true
  "string" = true
  "tuple" = true
}
isNot = {
  "bool" = false
  "list" = false
  "map" = false
  "null" = false
  "number" = false
  "object" = false
  "set" = false
  "string" = false
  "tuple" = false
}
type = {
  "bool" = "bool"
  "list" = "list"
  "map" = "map"
  "null" = "null"
  "number" = "number"
  "object" = "object"
  "set" = "set"
  "string" = "string"
  "tuple" = "tuple"
}
+192 -0

0 comment

3 changed files

pr created time in a month

push eventudondan/terraform

daniel.schroeder

commit sha 9eaa310ad06b705e70a1a30524f3aee405e03b7a

adds functions for checking the type of variables

view details

push time in a month

push eventudondan/terraform

daniel.schroeder

commit sha 38285021320a364493025b7ce372f1eb859ce9c1

adds functions for checking the type of variables

view details

push time in a month

create barnchudondan/terraform

branch : type-functions

created branch time in a month

push eventudondan/terraform

Luis Silva

commit sha f6c90c1d96016f3e2f04a1396aa1dd192d70ab29

Add OAuth2 token support for GCS backend

view details

Luis Silva

commit sha 0aae6283f964106a9f3fdca52856115d9fc32c64

update version

view details

Luis Silva

commit sha f22c9231ffb916e818e0c1f546a499636c25a0f8

Revert "update version" This reverts commit 0aae6283f964106a9f3fdca52856115d9fc32c64.

view details

Brian Williams

commit sha 5e3c3bafb8ec53a1106a0c41eeb1181b1021b25e

Add support for SSE-C to S3 backend These changes add support for encrypting terraform remote-state in S3 using customer-supplied encryption keys (SSE-C).

view details

Jeff Bachtel

commit sha 4ad7907b0cd41541266eb1c81a3eb992345d367d

fix, use extended flags for terraform console Allows -var and -var-file flags as expected

view details

Mark

commit sha 3031aca971e24459239b43e538e4139750f65252

Add SSH cert authentication method for connection via Bastion

view details

Pam Selle

commit sha cd83e6108d621d209ad4a5ddb59b6ae6efe86b85

Fixes issue where attribute in nested is not of list type/is invalid and would panic

view details

Pam Selle

commit sha 234c1c482a7bfc74a389da8d0f550ec88185ebce

Add a comment

view details

Brian Flad

commit sha 48624255cedf1a89c8e8a17feb8956a43c12ba0b

docs/commands: Show count and for_each resource address examples for commands Verified on Mac OS 10.14.6 and Windows 10.

view details

Brian Flad

commit sha 3ad05e50a4f8a0250c545ffaa3ec1890e5520a8c

docs/internal/resource-addressing: Add for_each information

view details

Brian Flad

commit sha 3a1a39bed3b8d5e072300b83679c569f4c8b37ab

docs/commands: Switch using count/for_each to configured with count/for_each Reference: https://github.com/hashicorp/terraform/pull/22318#discussion_r310587243

view details

Justin Campbell

commit sha bb52552c176cee890573dbdff6bb10704d768ca9

registry/response: Remove unused verified bool

view details

Brian Flad

commit sha 720b062d555c3b39e92bd68e518ca147cee51998

Apply suggestions from code review Co-Authored-By: Nick Fagerlund <nick@hashicorp.com>

view details

Brian Flad

commit sha cea149340cb77e82faeccd42c9069d1bee6dc201

docs/internal/resource-addressing: Omit for_each full splat example for now

view details

Kostas Theodorakopoulos

commit sha 3f56a7f71f9eb73b4f26d303dab32e3903062242

bump version

view details

Luis Silva

commit sha f9ee0021ac6a8de5fbb76bc2afcbee0a88ab2acd

Merge pull request #1 from kostas-theo/21680/GCS_OAUTH Bump terraform version to 0.12.6

view details

Kristin Laemmert

commit sha 1442ff047df6959feffa9a52ea097e5a37c4627b

website/docs: document providers schema output format (#22361) * website/docs: document providers schema output format * Update website/docs/commands/providers/schema.html.md Co-Authored-By: Nick Fagerlund <nick@hashicorp.com>

view details

James Bardin

commit sha 554cedab8a6ce7ba4ab1927ce11421e24aeeea39

don't validate Min/Max block vals in CoerceValue A provider may not have the data to fill in required block values in all cases during the resource Read operation. This is more common in import, because there is no initial configuration or state, and it's possible some values are only provided in the configuration. The original intent of MinItems and MaxItems in the schema was to enforce configuration constraints, not to enforce what the resource could save in the state. Since the configuration is already statically validated, and the Schema is validated against the configuration in a separate step, we can drop these extra validation constraints in CoerceValue and relax it to only ensure the types conform to what is expected.

view details

Brian Flad

commit sha 0d19465ada7d8330859c0d3873dc9ea88a1da05a

Merge pull request #22318 from hashicorp/d-cli-quote-resource-addresses docs: Additional for_each commands and resource addressing documentation

view details

Pam Selle

commit sha 901ec990ed403bd00a0bc14c2753ba43cb9c7260

Merge pull request #22156 from binlab/feature/bastion-ca-ssh Add SSH certificate authentication method for connection via Bastion

view details

push time in a month

issue openedintegrii/flaggy

Proposal: Adding support for environment vars

I'm planning to integrate flaggy into an existing project, replacing the currently used urfave/cli package. This existing program also provides the option to pass in options via environment variables. The env part now could be solved on its own. But I was thinking if it wasn't a cool feature for flaggy itself?

It could look something like this:

flaggy.DefaultParser.EnableEnvFlags()
flaggy.String(&stringFlag, "f", "flag", "A test string flag")

If --flag was not passed to the program, we would use the env var FLAG if it is set.

or

flaggy.DefaultParser.EnableEnvFlagsWithPrefix("MYAPP")
flaggy.String(&stringFlag, "f", "flag", "A test string flag")

With a prefix we would look for MYAPP_FLAG.

Precedence should be clear:

  1. The passed --flag
  2. ENV var FLAG
  3. Default value of the flag

Lowercase flags would always relate to UPPERCASE env vars. Hyphens would be replaced with underscores. CamelCase will be split into separate words. So --someFlag would relate to SOME_FLAG.

By default the feature should be disabled, as I can see it could cause problems in some situations, where flags are named like common bash vars, e.g. HOME, TERM, etc

I'm not sure about subcommand flags. For my use case I would only need to add support for global flags - for functionality that would trigger special functionality on a global level, like MYAPP_DEBUG=1. But IF we want that feature as well for subcommand flags, I guess it will make sense to include the subcommand name into the env var name, to avoid conflicts with flags from other subcommands.

flaggy.DefaultParser.EnableEnvFlagsWithPrefix("MYAPP")
flaggy.String(&stringFlagA, "a", "flagA", "A test string flag (A)")
subcommand := flaggy.NewSubcommand("subcommandExample")
subcommand.String(&stringFlagB, "b", "flagB", "A test string flag (B)")

Corresponding env vars would be:

  • MYAPP_FLAG_A
  • MYAPP_SUBCOMMAND_EXAMPLE_FLAG_B

Happy to work on this. Just wanted to check if you were interested in this feature or would reject it.


I also do like the way the urfave/cli has support for custom env vars per flag. But I don't see how we could implement this in a backwards compatible way into flaggy. The function signature of all flag functions would change.

created time in a month

PR opened integrii/flaggy

Adds example for custom template

Fixes #9.

+39 -0

0 comment

1 changed file

pr created time in a month

push eventudondan/flaggy

daniel.schroeder

commit sha 2277ed5381c4b8374b50eb7537348a457f1de369

adds example for custom template

view details

push time in a month

create barnchudondan/flaggy

branch : template-example

created branch time in a month

pull request commentintegrii/flaggy

Aligns flag description

Awesome, thanks! 😸

udondan

comment created time in a month

issue commenthashicorp/terraform

"Warning: Value for undeclared variable"

The whole thing should not be in your tfvars. You have to export it outside of tf.

jmervine

comment created time in 2 months

issue commenthashicorp/terraform

"Warning: Value for undeclared variable"

fixed this error\warning message and run the script?

It only is a warning not an error (yet). So your code is still working. It might not in some future version of terraform.

export TF_VAR_MY_VAR1 = "toto"
export TF_VAR_MY_VAR2 = "tata"

This would not go into your terraform files. You need to export these vars before calling terraform, like so:

export TF_VAR_MY_VAR1="toto"
export TF_VAR_MY_VAR2="tata"
terraform plan ....

or putting it right in front of the tf call:

TF_VAR_MY_VAR1="toto" TF_VAR_MY_VAR2="tata" terraform plan ....
jmervine

comment created time in 2 months

pull request commentintegrii/flaggy

Aligns flag description

Np, we're all busy. 😸 Thanks for considering the PR.

udondan

comment created time in 2 months

more