Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: allow aws_cloudfront_origin_access_identity to be toggled on/off #127

Merged
merged 3 commits into from
Apr 11, 2024
Merged

feat: allow aws_cloudfront_origin_access_identity to be toggled on/off #127

merged 3 commits into from
Apr 11, 2024

Conversation

venkatamutyala
Copy link
Contributor

what

Even when i'm using an external origin (ex. a GCP IP) it appears aws_cloudfront_origin_access_identity always gets created. This is to provide a toggle to disable it.

why

The aws_cloudfront_origin_access_identity resource isn't required for all use cases Ex. using cloudfront in front of non-AWS resources.

references

https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_origin_access_identity

@venkatamutyala venkatamutyala requested review from a team as code owners April 10, 2024 23:39
@mergify mergify bot added the triage Needs triage label Apr 10, 2024
Copy link
Member

@Gowiem Gowiem left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM 👍

@Gowiem
Copy link
Member

Gowiem commented Apr 11, 2024

/terratest

@Gowiem Gowiem added enhancement New feature or request minor New features that do not break anything labels Apr 11, 2024
@mergify mergify bot removed the triage Needs triage label Apr 11, 2024
@Gowiem Gowiem enabled auto-merge (squash) April 11, 2024 03:59
@Gowiem Gowiem merged commit 70d58a8 into cloudposse:main Apr 11, 2024
21 of 33 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request minor New features that do not break anything
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants