Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for new resources #10

Merged
merged 56 commits into from
Nov 3, 2020
Merged

Add support for new resources #10

merged 56 commits into from
Nov 3, 2020

Conversation

lccheun
Copy link

@lccheun lccheun commented Oct 22, 2020

  • Merge in latest version of rebuy-de/aws-nuke from master:
  • Add Egress Only Internet Gateway resource
  • Add Kinesis Analytics Application V2 resource
  • Add WAF global rule predicates resource
  • Add EMR disable termination protection flag
  • Upgrade to go 1.15
  • Upgrade to aws sdk version v1.34.12

eschwartz and others added 30 commits February 6, 2020 14:04
* Upgrade to aws sdk version 1.28.12
* added eks fargate profile resource
* added eks nodegroup as resource
…ction (rebuy-de#481)

* rebuy-de#430 - cloudformation support for disabling termination protection
* Disable Security Hub

See rebuy-de#452

Add the ability to detect regions with Security Hub enabled and disable it if a
"hub" resource is returned.

* Rename property of SecurityHub hub Arn
Replace the wildcard to ** to allow recurside sublevel directories in
the nuke process.

Co-authored-by: Bruno Paiuca <bruno.paiuca@wildlifestudios.com>
* add tag support to ec2 security groups

* add tag support to iam roles

* add tag support to elastic ip addresses

* fix code alignment

Co-Authored-By: Philipp Trulson <der-eismann@users.noreply.github.com>

* Capitalise ID for consistency

Co-Authored-By: Sven Walter <sven@wltr.eu>

* go fmt changes

Co-authored-by: Philipp Trulson <der-eismann@users.noreply.github.com>
Co-authored-by: Sven Walter <sven@wltr.eu>
* rebuy-de#324 - initial POC of filtering based on dates

* rebuy-de#324 - initial POC of filtering based on dates

* support additional date format

* update documentation to include date formats

* Updates based on PR feedback:
* change name to be more clear
* apply offset to field time, not current time, as it is easier to understand
* Update documentation to be more clear
* add tag support to acmpca
* add tag support to acm certificates
* add tag support to ssm parameters
There was a typo, using `presets.common.filter` instead of `presets.common.filters` actually fails to parse.
* add firewall manager resources

* add support for Properties interface to firewall manager resources

* Use golang property style names

Co-authored-by: Björn Häuser <bjoernhaeuser@gmail.com>
* Generate mocks before building

* Fix quay URL in readme
Co-authored-by: Tom Neyland <tcneyland@gmail.com>
Co-authored-by: Matt Shipman <undermybed@undermybed.info>

Co-authored-by: Tom Neyland <tcneyland@gmail.com>
Co-authored-by: Matt Shipman <undermybed@undermybed.info>
Co-authored-by: Joey Davenport <jrsdav@users.noreply.github.com>
* added image builder support

* oops, figured out difference between image version and image build version, same for component
* added global accelerator resources

* Update resources/ga-listeners.go

Co-authored-by: Björn Häuser <bjoernhaeuser@gmail.com>

* Update resources/ga-endpoints.go

Co-authored-by: Björn Häuser <bjoernhaeuser@gmail.com>

* Update resources/ga-accelerators.go

Co-authored-by: Björn Häuser <bjoernhaeuser@gmail.com>

* refactoring type names

Co-authored-by: Björn Häuser <bjoernhaeuser@gmail.com>
…e#540)

* Add properties to old API GW resources

* Add API Gateway v2 VPC Link resource
oliver-schoenherr and others added 25 commits August 28, 2020 16:44
* add support for CloudWatchLogsResourcePolicy

* add Properties()
anonymous structs require one to specify the whole struct signature when
setting the flags
* Add properties for KMS aliases

* Add tags to KMS keys
* feat: adding route53 resolver resource

Co-authored-by: Tom Neyland <tcneyland@gmail.com>
Co-authored-by: Max Krieg <maxwell.krieg@gmail.com>

* feat: adding route53 traffic policies

Co-authored-by: Ryan Swanson <ryan.a.swanson@gmail.com>
Co-authored-by: Russell Centanni <russell.centanni@gmail.com>

* fix: fixing traffic policy and instance deletion

* Code review changes and NextToken checks (rebuy-de#508)

* Removed unused types
* Renamed resources to singular form
* Updated return values
* Updated loops to keep going until NextToken is nil

* Code review change spelling fix (rebuy-de#508)

* Moving passed
 • roles that can be listed, but not retrieved.
 • role policies that that fail to list.

Co-authored-by: Tom Neyland <tcneyland@gmail.com>
Co-authored-by: Max Krieg <maxwell.krieg@gmail.com>
Co-authored-by: Tom Neyland <tom-neyland@pluralsight.com>
Co-authored-by: Russell Centanni <russell.centanni@gmail.com>
* Add CodeStar Notification Rules resource

* Force removal of cloudwatch event target
@bytebounder bytebounder self-requested a review November 3, 2020 20:12
@Optum Optum deleted a comment from CLAassistant Nov 3, 2020
@bytebounder bytebounder merged commit c0b45a7 into Optum:master Nov 3, 2020
@CLAassistant
Copy link

CLAassistant commented Nov 13, 2020

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you all sign our Contributor License Agreement before we can accept your contribution.
1 out of 19 committers have signed the CLA.

✅ wrschneider
❌ eschwartz
❌ tylersouthwick
❌ jami
❌ matthagenbuch
❌ Brian-Williams
❌ gebailey
❌ rwhelan
❌ jcarter3
❌ brunopaiuca
❌ lcheung5
❌ svenwltr
❌ sjpalf
❌ reegnz
❌ hligit
❌ der-eismann
❌ zerbitx
❌ icholy
❌ oliver-schoenherr


lcheung5 seems not to be a GitHub user. You need a GitHub account to be able to sign the CLA. If you have already a GitHub account, please add the email address used for this commit to your account.
You have signed the CLA already but the status is still pending? Let us recheck it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet