-
Notifications
You must be signed in to change notification settings - Fork 37
Handling Cloudfront deletion #309
base: rename_schema_for_clarity
Are you sure you want to change the base?
Conversation
| case "DeleteDistribution": | ||
| return cf.analyzedeleteDistributionEntries() | ||
| default: | ||
| return &model.HijackableResourceChain{}, nil |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Needs a check here to see if its possible to create a cloud front distribution with an origin that points to a resource that doesnt exist. If this is possible, we need to check for this.
Need to check here to see if it is possible to create a distro that point to a resource that exists but we dont own.
Both cases need to have analysis code.
This may just need to be its own ticket.
| return hijackChain, nil | ||
| } | ||
|
|
||
| func (r *queryResolver) HijackChainByDomain(ctx context.Context, id string, domains []string, typeArg model.Type) (*model.HijackableResourceChain, error) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This method should have its params changed.
| PrimaryResource: rawChain.Resource.ID, | ||
| PrimaryAccountId: rawChain.Resource.Account, | ||
| PrimaryResourceType: rawChain.Resource.Type.String(), | ||
| PrimaryResource: root.RootResource.Account, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should be resource ID?
riot-jetaylor
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good @HTTP500
No description provided.