-
Notifications
You must be signed in to change notification settings - Fork 37
Handling Cloudfront deletion #309
base: rename_schema_for_clarity
Are you sure you want to change the base?
Conversation
case "DeleteDistribution": | ||
return cf.analyzedeleteDistributionEntries() | ||
default: | ||
return &model.HijackableResourceChain{}, nil |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Needs a check here to see if its possible to create a cloud front distribution with an origin that points to a resource that doesnt exist. If this is possible, we need to check for this.
Need to check here to see if it is possible to create a distro that point to a resource that exists but we dont own.
Both cases need to have analysis code.
This may just need to be its own ticket.
@@ -554,6 +599,40 @@ func (r *queryResolver) GetElasticbeanstalkUpstreamHijack(ctx context.Context, e | |||
|
|||
func (r *queryResolver) HijackChainByDomain(ctx context.Context, id string, domains []string, typeArg model.Type) (*model.HijackableResourceChain, error) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This method should have its params changed.
PrimaryResource: rawChain.Resource.ID, | ||
PrimaryAccountId: rawChain.Resource.Account, | ||
PrimaryResourceType: rawChain.Resource.Type.String(), | ||
PrimaryResource: root.RootResource.Account, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should be resource ID?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good @HTTP500
No description provided.