Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added two new policy templates for SSM Parameter Store. #625

Merged
merged 11 commits into from
Feb 1, 2019

Conversation

RobRoseKnows
Copy link
Contributor

Issue #: #603

Description of changes: Added two new policy templates: DecodeSSMParameterPolicy and DecodeSSMParameterCustomKeyPolicy. Also added parameters for the SQS queue and Splunk environment variables in two of the example apps. Kinda forgot I did that. 😅

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

- Added parameters for the environment variables in Splunk Example apps.
- Added parameter for the SQS Poller queue url in that example app.
- Per issue aws#603
- Added it to all_policy_template test as well.
- Updated examples/apps/sqs-poller to add the .com.cn domain into the
  regex.
- Added GetParameter to the policy templates. I'm not sure what the
  difference between GetParameter and GetParameters is, but they both
  seem to be used for different calls.
Copy link
Contributor

@jlhood jlhood left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@RobRoseKnows really appreciate you submitting this PR! We've needed a policy template for retrieving SSM parameters for a little while now. Please merge in the latest changes from the develop branch and address my comments and we'll get this merged in. Thanks so much!

samtranslator/policy_templates_data/policy_templates.json Outdated Show resolved Hide resolved
samtranslator/policy_templates_data/policy_templates.json Outdated Show resolved Hide resolved
samtranslator/policy_templates_data/policy_templates.json Outdated Show resolved Hide resolved
- Renamed DecodeSSMParameterPolicy to SSMParameterReadPolicy
- Removed DecodeSSMParameterCusomKeyPolicy
@RobRoseKnows
Copy link
Contributor Author

RobRoseKnows commented Jan 30, 2019

@jlhood Merged in develop in e89a714. I removed the second policy and the second statement in 8eedad6. Looks like the Travis check failed on something related to Flake8, so I fixed the warnings it gave for a couple things.

@codecov-io
Copy link

Codecov Report

Merging #625 into develop will decrease coverage by 0.48%.
The diff coverage is 50%.

Impacted file tree graph

@@             Coverage Diff             @@
##           develop     #625      +/-   ##
===========================================
- Coverage    94.71%   94.22%   -0.49%     
===========================================
  Files           67       67              
  Lines         2950     2685     -265     
  Branches       578      478     -100     
===========================================
- Hits          2794     2530     -264     
- Misses          78       80       +2     
+ Partials        78       75       -3
Impacted Files Coverage Δ
samtranslator/model/s3_utils/uri_parser.py 71.42% <0%> (ø) ⬆️
samtranslator/translator/translator.py 99.02% <100%> (ø) ⬆️
samtranslator/model/eventsources/push.py 86.06% <0%> (-4.24%) ⬇️
samtranslator/model/sam_resources.py 95.72% <0%> (-1.25%) ⬇️
samtranslator/model/api/api_generator.py 96.08% <0%> (-0.39%) ⬇️
samtranslator/model/eventsources/cloudwatchlogs.py 100% <0%> (ø) ⬆️
samtranslator/model/eventsources/pull.py 91.66% <0%> (+0.14%) ⬆️
samtranslator/model/__init__.py 96.85% <0%> (+0.36%) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 7cf48bd...2d08fcd. Read the comment docs.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants