-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws_lambda_end_of_life #154
aws_lambda_end_of_life #154
Conversation
I decided I should probably add an end of support warning as well. I am not sure if it should be an error instead since you can't create resources that are at end of support, but you can still update them. |
Nice! I think these are very useful rules. I have some suggestions. First of all, what do you think about changing both severities to warning? A runtime that has reached EOL can certainly not be created or updated, but the existing function is clearly valid if it does not change. If you agree with this suggestion, it's probably best to combine the rules into one and name it something like |
I see where you are coming from with it not being an error. Deep down in me cringes at the thought of just putting a warning though. I see three use cases while using one of these runtimes:
As a general rule would we want to take the lesser or greater severity when alerting the users? With all that said. I do see your point, and if you still want me to I will make the requested changes. I just thought I would share my thoughts first. |
Thank you for sharing your thought. As you said, the case 1 and 2 are clearly errors. However, TFLint cannot control the severity depending on the changes, so we have to choose between warning and error. In such cases, I design to minimize false positives as much as possible. TFLint is designed to prefer avoiding false positives over false negatives. In the use cases, putting a warning for the case 1 and 2 is a false negative, but I prefer to avoid putting an error for the case 3 as a false positive. |
@wata727 Makes sense to me. I will get those updated when I can. thank you for hearing me out. |
…aws into aws_lambda_end_of_life
@wata727 Would we want a rule with a severity of INFO for runtimes that are set to be deprecated in say 30 days or so? Just to try to give warning? |
In my opinion, It's enough to issue a warning according to the runtime support policy in the AWS documentation. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good. I will merge as soon as you update the branch and resolve the conflict.
…aws into aws_lambda_end_of_life
👍 |
wonder if this rule could read directly from https://github.com/aws-cloudformation/cfn-lint/blob/main/src/cfnlint/data/AdditionalSpecs/LmbdRuntimeLifecycle.json so the list only needs to be maintained in one spot |
This should fix #30 and is based on Phase 2 of this list