| STEP | CONFIG_FILE | STATE_FILE | TARGET_ENV(AWS) |
|---|---|---|---|
| manual | aws_instance.nginx | aws_instance.nginx = id-314122 | destroy > no resource |
apply #1 |
aws_instance.nginx | aws_instance.nginx = id-314122 | add > id-8675366 |
apply #2 |
aws_instance.nginx | change > aws_instance.nginx = id-8675366 | id-8675366 |
| STEP | CONFIG_FILE | STATE_FILE | TARGET_ENV(AWS) |
|---|---|---|---|
| manual | add > aws_instance.nginx | empty | no resource |
apply #1 |
aws_instance.nginx | empty | add id-314122 |
apply #2 |
aws_instance.nginx | add aws_instance.nginx = id-314122 | id-314122 |
| Policy Type | Description |
|---|---|
| 1. Identity-based | Attached to an IAM identity (user, group, or role). Specifies what that identity can do. |
| 2. Resource-based | Attached to a resource. Specifies who has access to the resource and what actions they can perform on it. |
| 3. Permissions Boundary | Uses a managed policy to set the maximum permissions that an identity-based policy can grant to an IAM entity. |
| 4. Organizations SCPs | Defines the maximum permissions for account members of an organization or organizational unit (OU). |
| 5. ACLs | Controls which principals in sother accounts can access the resource to which the ACL is attached. |
| 6. Session Policies | Passes ad |
| Engineering Practice | Typical Practice |
|---|---|
| Modular SQL | Monolithic SQL |
| Data testing | No data testing |
| Version control | No version control |
| Documentation | No documentation |
| Collaboration | Limited collaboration |
| Field | Value |
|---|---|
| Alias | pavol.kutaj.com |
| TTL | 3600 |
| Class | IN |
| Type | CNAME |
| Target | pkutaj.github.io |
| Code | Explanation |
|---|---|
with open("temp_schema.json", mode="rt", encoding="utf-8") as patched_schema: |
Opens the file in read mode with UTF-8 encoding |
schema_to_patch = patched_schema.read() |
Reads the contents of the file into a string |
schema_patcher_http_requestor.make_iglu_request(...) |
Calls the make_iglu_request function |
res = request_func(...) |
Makes an HTTP request using the requests library |
json=schema_to_patch |
Passes the conte |
| Change | Description |
|---|---|
| Update | The aws_security_group resource named public_sg in the module.redshift.module.cluster module will be updated in-place |
| Remove | Two ingress rules with descriptions "" and "sagemaker access" will be removed from the security group |
| Add | Two new ingress rules with descriptions null will be added to the security group |
| Change | The description field for some of the rules will be changed from an empty string to null |
| Reorder | Some of the rules will be reordered |
| Code | Explanation |
|---|---|
from contextlib import nullcontext |
Import the nullcontext context manager from the contextlib module. |
monkeypatch.setattr(schema_patcher, "handle_patching", lambda _: nullcontext()) |
Replace the handle_patching function with a lambda function that returns a nullcontext object. |
with push_and_pop_path(MODULE_PATH): schema_patcher.patch_schema(iglu) |
Call the patch_schema function within a with statement that uses the push_and_pop_path context manager. |
| Rule ID | Status | Noncurrent Version Expiration (days) | Transition Storage Class | Transition Days | Expiration Days |
|---|---|---|---|---|---|
| foo1 | Disabled | 90 | N/A | N/A | N/A |
| foo2 | Enabled | 90 | STANDARD_IA | 30 | 90 |