-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Add support for AWS provider 5.0 #126
Conversation
Hi @MaxymVlasov thank you for submitted this PR. @jrobison-sb has the same change with a different approach to version pinning. The previous approach we took was to change version pinning to |
@dmurray-lacework I suggest taking a look at https://semver.org/ and https://developer.hashicorp.com/terraform/language/expressions/version-constraints#terraform-core-and-provider-versions Because mentioned approach violate both of them |
Hey @MaxymVlasov - We really appreciate your help with these PR's, I see we are talking about two different things here;
We like the approach you are suggesting, but before moving forward with it, we have one more scenario where we would like your opinion on. Say we accept this change and;
|
@afiune Usually AWS provider first deprecates some fields/resources and provides replacement during one of the minor releases, and only the next major version removes deprecated stuff. So in that case, if you still have some deprecated stuff, you do next:
And let's imagine that we are unlucky and the AWS provider for some resource/field made breaking changes, without any "graceful migration period" - that's really bad but time to time happens. For that, we use the same algorithm above and release breaking change. Now, when we described all these conditions, here simpler to answer why in the situation specified at the end of your comment, we just need to release a patch version - because it (p3.1) just Fix module to current users, which:
That should decrease maintenance work from the maintainers' side and decrease struggle from the users' side in most cases. Here is the only one vote for specifying a higher constraint for child/reusable modules that I could imagine - when your users are both noobs in TF and programming best practices and had terrible search skills when they can find module repo and open issues where they just copy-paste error, but not able to open and read the documentation. If that too bothers you - then yes, better specify higher constraint preventively with the hope that it will decrease the number of issues |
|
@MaxymVlasov You are spot on! We completely agree with the process you described above, thank you for such a detailed response. We Again, thank you for your help! 💯 |
Make it so (run the pipeline) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Summary
We'd like to use AWS provider 5.0
Remove higher limit, as specified in TF best practices for this case.
How did you test this change?
terraform plan
for our infrastructureIssue
Relates to lacework/terraform-aws-config#65
Close #124
Close #125