{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":274625369,"defaultBranch":"master","name":"infracost","ownerLogin":"infracost","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2020-06-24T09:11:56.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/68374653?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1716538217.0","currentOid":""},"activityList":{"items":[{"before":"02abe5c9143d1c6dfb38964d29fe5ff379693e24","after":null,"ref":"refs/heads/fix/data-resource-context","pushedAt":"2024-05-24T08:10:17.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"}},{"before":"f2485a4dda95bf28108d27d0a6cc334766575b94","after":"f45e8fa93fbed6787ef8885135b27c964ffee14b","ref":"refs/heads/master","pushedAt":"2024-05-24T08:10:15.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"},"commit":{"message":"fix: don't use existing context when evaluating resources, data or provider blocks\n\nThe SetByDot function handles the merging anyway, so we don't need to pull out the existing values. I've left the old functionality in the `evaluateResource` and `evaluatorProvider` functions because the legacy evaluator needs it.\n\nThis also fixes an issue where the data blocks were using `e.ctx.Get(b.TypeLabel())` which was getting the wrong context. The correct functionality would have been to use `e.ctx.Get(\"data\")`. Otherwise, this caused issues where the type of a data block matched the name of a resource, e.g. `data.aws_lb.anything` and `aws_lb.aws_lb`. In this case it would pull the context of the resource, which could cause a panic if the resource had been expanded, because it would be an array instead of the expected map.","shortMessageHtmlLink":"fix: don't use existing context when evaluating resources, data or pr…"}},{"before":"4938f49dc93f144d1d5bfbaf6bcd4e2e73d38d39","after":"02abe5c9143d1c6dfb38964d29fe5ff379693e24","ref":"refs/heads/fix/data-resource-context","pushedAt":"2024-05-24T07:54:11.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"},"commit":{"message":"fix: don't use existing context when evaluating resources, data or provider blocks\n\nThe SetByDot function handles the merging anyway, so we don't need to pull out the existing values. I've left the old functionality in the `evaluateResource` and `evaluatorProvider` functions because the legacy evaluator needs it.\n\nThis also fixes an issue where the data blocks were using `e.ctx.Get(b.TypeLabel())` which was getting the wrong context. The correct functionality would have been to use `e.ctx.Get(\"data\")`. Otherwise, this caused issues where the type of a data block matched the name of a resource, e.g. `data.aws_lb.anything` and `aws_lb.aws_lb`. In this case it would pull the context of the resource, which could cause a panic if the resource had been expanded, because it would be an array instead of the expected map.","shortMessageHtmlLink":"fix: don't use existing context when evaluating resources, data or pr…"}},{"before":null,"after":"4938f49dc93f144d1d5bfbaf6bcd4e2e73d38d39","ref":"refs/heads/fix/data-resource-context","pushedAt":"2024-05-23T17:39:46.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"},"commit":{"message":"fix: don't use existing context when evaluating resources, data or provider blocks\n\nThe SetByDot function handles the merging anyway, so we don't need to pull out the existing values. I've left the old functionality in the `evaluateResource` and `evaluatorProvider` functions because the legacy evaluator needs it.\n\nThis also fixes an issue where the data blocks were using `e.ctx.Get(b.TypeLabel())` which was getting the wrong context. The correct functionality would have been to use `e.ctx.Get(\"data\")`. Otherwise, this caused issues where the type of a data block matched the name of a resource, e.g. `data.aws_lb.anything` and `aws_lb.aws_lb`. In this case it would pull the context of the resource, which could cause a panic if the resource had been expanded, because it would be an array instead of the expected map.","shortMessageHtmlLink":"fix: don't use existing context when evaluating resources, data or pr…"}},{"before":"fe8cfb86c93f7b1653ac59de79746c85160b4312","after":"ddd8541b5029bba7eb7943c50b7958be6d125c16","ref":"refs/heads/debug-panic","pushedAt":"2024-05-23T10:33:49.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"},"commit":{"message":"test","shortMessageHtmlLink":"test"}},{"before":null,"after":"fe8cfb86c93f7b1653ac59de79746c85160b4312","ref":"refs/heads/debug-panic","pushedAt":"2024-05-23T10:27:09.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"},"commit":{"message":"test","shortMessageHtmlLink":"test"}},{"before":"a470a1b594f425ae976c8748a3f4d57eafdfd3e2","after":"f2485a4dda95bf28108d27d0a6cc334766575b94","ref":"refs/heads/master","pushedAt":"2024-05-22T15:07:16.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"},"commit":{"message":"fix: add the project path as a dependency in generated output (#3074)\n\nAdds the project path to the generated project `dependency_paths`. This is\r\nbecause `dependency_paths` are treated as a change detection override. Meaning\r\nthat prior to this change Infracost hosted runners would only see a project as\r\nchanged if a folder in its `dependency_paths` changed.","shortMessageHtmlLink":"fix: add the project path as a dependency in generated output (#3074)"}},{"before":null,"after":"f323f5b21bca54f47a87fb92aac1461bb076db5f","ref":"refs/heads/fix/dependency-paths","pushedAt":"2024-05-22T15:01:11.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"},"commit":{"message":"fix: add the project path as a dependency in generated output\n\nAdds the project path to the generated project `dependency_paths`. This is\nbecause `dependency_paths` are treated as a change detection override. Meaning\nthat prior to this change Infracost hosted runners would only see a project as\nchanged if a folder in its `dependency_paths` changed.","shortMessageHtmlLink":"fix: add the project path as a dependency in generated output"}},{"before":"a799c5cd82021ab4cf911fbed65ac484213d00cf","after":null,"ref":"refs/heads/IC-1150","pushedAt":"2024-05-22T12:18:17.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"}},{"before":"c3a7eb979863ad9c67549e0939fe9aa34ccaee27","after":"a470a1b594f425ae976c8748a3f4d57eafdfd3e2","ref":"refs/heads/master","pushedAt":"2024-05-22T12:18:12.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"},"commit":{"message":"fix: propagate default provider tags to volume tags (#3070)\n\n* fix: propagate default provider tags to volume tags\r\n\r\nFixes issue where provider tags were not being used as defaults in volume\r\ntags. We now first add these defaults with the `volume_tags` prefix if fetching\r\ntags for an applicable resource (`aws_instance`).\r\n\r\n* fix: add a version constraint check for 5.39 for the volume_tags behaviour","shortMessageHtmlLink":"fix: propagate default provider tags to volume tags (#3070)"}},{"before":"a38f301b38407ce92ddadd9a0580149701135397","after":null,"ref":"refs/heads/fix/index-expr-mocking","pushedAt":"2024-05-22T11:31:49.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"}},{"before":"073cf4838ec7e09ce2ef3d2e1f8e51284fe7dfb9","after":"c3a7eb979863ad9c67549e0939fe9aa34ccaee27","ref":"refs/heads/master","pushedAt":"2024-05-22T11:31:46.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"},"commit":{"message":"fix: index expression mocking\n\nBefore when we mocked index expressions, we would get an 'Invalid index' diagnostic, since we'd mock the key to value that was never in the collection.\n\nThis updates it to first check if the mocking causes an 'Invalid index' diagnostic, and if it does we return the first element from the collection. This may be the incorrect value, but seems the safest since at least the value returned will be the expected type.\n\nIf we see other diagnostics we return an empty string value. This may cause issues if the collection isn't meant to be a list of strings, but since we can't evaluate it this seems the safest.","shortMessageHtmlLink":"fix: index expression mocking"}},{"before":"336da9500b3eaaa48f67a8174ff31ca43e6a081c","after":"a38f301b38407ce92ddadd9a0580149701135397","ref":"refs/heads/fix/index-expr-mocking","pushedAt":"2024-05-22T11:18:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"},"commit":{"message":"fix: index expression mocking\n\nBefore when we mocked index expressions, we would get an 'Invalid index' diagnostic, since we'd mock the key to value that was never in the collection.\n\nThis updates it to first check if the mocking causes an 'Invalid index' diagnostic, and if it does we return the first element from the collection. This may be the incorrect value, but seems the safest since at least the value returned will be the expected type.\n\nIf we see other diagnostics we return an empty string value. This may cause issues if the collection isn't meant to be a list of strings, but since we can't evaluate it this seems the safest.","shortMessageHtmlLink":"fix: index expression mocking"}},{"before":null,"after":"336da9500b3eaaa48f67a8174ff31ca43e6a081c","ref":"refs/heads/fix/index-expr-mocking","pushedAt":"2024-05-22T09:44:49.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"},"commit":{"message":"fix: index expression mocking\n\nBefore when we mocked index expressions, we would get an 'Invalid index' diagnostic, since we'd mock the key to value that was never in the collection.\n\nThis updates it to first check if the mocking causes an 'Invalid index' diagnostic, and if it does we return the first element from the collection. This may be the incorrect value, but seems the safest since at least the value returned will be the expected type.\n\nIf we see other diagnostics we return an empty string value. This may cause issues if the collection isn't meant to be a list of strings, but since we can't evaluate it this seems the safest.","shortMessageHtmlLink":"fix: index expression mocking"}},{"before":"0c7647aaaa2edd4e59103d0756d3043230c07670","after":"a799c5cd82021ab4cf911fbed65ac484213d00cf","ref":"refs/heads/IC-1150","pushedAt":"2024-05-21T14:39:40.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"},"commit":{"message":"fix: add a version constraint check for 5.39 for the volume_tags behaviour","shortMessageHtmlLink":"fix: add a version constraint check for 5.39 for the volume_tags beha…"}},{"before":"afbcf13f3a405c001ca0e2dd96016d0336899bff","after":"0c7647aaaa2edd4e59103d0756d3043230c07670","ref":"refs/heads/IC-1150","pushedAt":"2024-05-21T14:07:42.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"},"commit":{"message":"fix: add a version constraint check for 5.39 for the volume_tags behaviour","shortMessageHtmlLink":"fix: add a version constraint check for 5.39 for the volume_tags beha…"}},{"before":"e9de02e4a8e9faea3f51e2255b1feb7c249d4a61","after":null,"ref":"refs/heads/fix/support-hidden-dirs-in-include-dirs","pushedAt":"2024-05-21T09:08:33.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"}},{"before":"5df9774b92e4dee4b0bff58f7c959c199f25e0f2","after":"073cf4838ec7e09ce2ef3d2e1f8e51284fe7dfb9","ref":"refs/heads/master","pushedAt":"2024-05-21T09:08:30.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"},"commit":{"message":"chore: fix lint","shortMessageHtmlLink":"chore: fix lint"}},{"before":"cc362764c31f4659f8f8cf3b7a904bc4a1db04e8","after":"e9de02e4a8e9faea3f51e2255b1feb7c249d4a61","ref":"refs/heads/fix/support-hidden-dirs-in-include-dirs","pushedAt":"2024-05-20T14:29:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"},"commit":{"message":"chore: fix lint","shortMessageHtmlLink":"chore: fix lint"}},{"before":"cd2820ff0558048655630a07685d46423e7ed9c7","after":"cc362764c31f4659f8f8cf3b7a904bc4a1db04e8","ref":"refs/heads/fix/support-hidden-dirs-in-include-dirs","pushedAt":"2024-05-20T13:22:33.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"},"commit":{"message":"fix: support hidden directories in autodetect\n\nIf we specify a hidden directory in `include_dirs` in the autodetect config, it should be detected correctly.\n\nBy default, hidden directories will still be excluded.","shortMessageHtmlLink":"fix: support hidden directories in autodetect"}},{"before":null,"after":"cd2820ff0558048655630a07685d46423e7ed9c7","ref":"refs/heads/fix/support-hidden-dirs-in-include-dirs","pushedAt":"2024-05-20T13:22:06.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"aliscott","name":"Alistair Scott","path":"/aliscott","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/158824?s=80&v=4"},"commit":{"message":"fix: support hidden directories in autodetect\n\nIf we specify a hidden directory in `include_dirs` in the autodetect config, it should be detected correctly.\n\nBy default, hidden directories will still be excluded.","shortMessageHtmlLink":"fix: support hidden directories in autodetect"}},{"before":null,"after":"afbcf13f3a405c001ca0e2dd96016d0336899bff","ref":"refs/heads/IC-1150","pushedAt":"2024-05-20T07:23:55.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"},"commit":{"message":"fix: propagate default provider tags to volume tags\n\nFixes issue where provider tags were not being used as defaults in volume\ntags. We now first add these defaults with the `volume_tags` prefix if fetching\ntags for an applicable resource (`aws_instance`).","shortMessageHtmlLink":"fix: propagate default provider tags to volume tags"}},{"before":"afbcf13f3a405c001ca0e2dd96016d0336899bff","after":null,"ref":"refs/heads/IC-1150","pushedAt":"2024-05-20T06:46:41.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"}},{"before":"646b576a99e85c7e764b11852c812711164dbf03","after":"afbcf13f3a405c001ca0e2dd96016d0336899bff","ref":"refs/heads/IC-1150","pushedAt":"2024-05-17T12:07:04.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"},"commit":{"message":"fix: propagate default provider tags to volume tags\n\nFixes issue where provider tags were not being used as defaults in volume\ntags. We now first add these defaults with the `volume_tags` prefix if fetching\ntags for an applicable resource (`aws_instance`).","shortMessageHtmlLink":"fix: propagate default provider tags to volume tags"}},{"before":"5c83711fa6f310e843d6ff7e86cf13d1aa5dfa40","after":"646b576a99e85c7e764b11852c812711164dbf03","ref":"refs/heads/IC-1150","pushedAt":"2024-05-17T11:46:42.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"},"commit":{"message":"fix: propagate default provider tags to volume tags\n\nFixes issue where provider tags were not being used as defaults in volume\ntags. We now first add these defaults with the `volume_tags` prefix if fetching\ntags for an applicable resource (`aws_instance`).","shortMessageHtmlLink":"fix: propagate default provider tags to volume tags"}},{"before":null,"after":"5c83711fa6f310e843d6ff7e86cf13d1aa5dfa40","ref":"refs/heads/IC-1150","pushedAt":"2024-05-17T11:46:14.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"},"commit":{"message":"fix: propagate default provider tags to volume tags\n\nFixes issue where provider tags were not being used as defaults in volume\ntags. We now first add these defaults with the `volume_tags` prefix if fetching\ntags for an applicable resource (`aws_instance`).","shortMessageHtmlLink":"fix: propagate default provider tags to volume tags"}},{"before":"754b0b481987ee435be162b733041e21f9dca4ff","after":null,"ref":"refs/heads/IC-1144","pushedAt":"2024-05-15T15:15:56.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"}},{"before":"33fea2056f2cfd79204f50e24d0458761a80e375","after":"5df9774b92e4dee4b0bff58f7c959c199f25e0f2","ref":"refs/heads/master","pushedAt":"2024-05-15T15:15:53.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"},"commit":{"message":"fix: support launch templates references which use `prefix` (#3069)\n\nThis PR adds support for launch templates which are referenced by `name` in\r\na resource but use a `prefix` to launch. This means that the `name` attribute\r\ncan be `null` and prior to this change, references would not work. This change\r\nadds a Infracost generated `name` if it is detected that the `launch_template`\r\nhas a `null` name.","shortMessageHtmlLink":"fix: support launch templates references which use prefix (#3069)"}},{"before":"1bc616f9b43e578c761f496c2a55354444a29f82","after":"754b0b481987ee435be162b733041e21f9dca4ff","ref":"refs/heads/IC-1144","pushedAt":"2024-05-15T10:25:54.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"},"commit":{"message":"fix: support launch templates references which use `prefix`\n\nThis PR adds support for launch templates which are referenced by `name` in\na resource but use a `prefix` to launch. This means that the `name` attribute\ncan be `null` and prior to this change, references would not work. This change\nadds a Infracost generated `name` if it is detected that the `launch_template`\nhas a `null` name.","shortMessageHtmlLink":"fix: support launch templates references which use prefix"}},{"before":null,"after":"1bc616f9b43e578c761f496c2a55354444a29f82","ref":"refs/heads/IC-1144","pushedAt":"2024-05-15T10:23:32.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"hugorut","name":"Hugo Rut","path":"/hugorut","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/6455139?s=80&v=4"},"commit":{"message":"fix: support launch templates references which use `prefix`\n\nThis PR adds support for launch templates which are referenced by `name` in\na resource but use a `prefix` to launch. This means that the `name` attribute\ncan be `null` and prior to this change, references would not work. This change\nadds a Infracost generated `name` if it is detected that the `launch_template`\nhas a `null` name.","shortMessageHtmlLink":"fix: support launch templates references which use prefix"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEUsxtVgA","startCursor":null,"endCursor":null}},"title":"Activity · infracost/infracost"}