# November 9th 2021
# C7n Community Meeting Minutes
###### tags: `Templates` `Meeting`
:::info
- **URL:** meet.blah
- **Date:** Novermber 9th, 2021 (3:00 PM (ET) / 12:00 PM (PT) / 7PM (UTC))
- **[Timezone Converter (Click me)](https://www.timeanddate.com/worldclock/converter.html?iso=20210629T190000&p1=tz_et&p2=tz_pt&p3=22&p4=240&p5=136&p6=176&p7=37&p8=248)**
- **Agenda**
1. Intros `10m`
1. Agenda Items `20m`
1. PR Party `30m`
- **Meeting Contact:** Jorge: <jorge@stacklet.io>
- **Host:** Jorge Castro
- **Permalink:**
- **Video URL:** https://youtu.be/2KswOCQ3DsU
:::
## Agenda Items
- reInvent
- Who's going?
- If you're going let us know, we're getting together Tuesday night
- [https://stacklet.io/aws-reinvent](https://stacklet.io/aws-reinvent)
- **Important** [#6969](https://github.com/cloud-custodian/cloud-custodian/pull/6969): Wait for 'updated' state before lambda deploy
* New release incoming, we will announce as soon as we can.
* 0.9.14 is happening NEXT week (week of 15 November), if you're on AWS we strongly recommend upgrading.
* After Dec 6, lambas updated in place will fail.
* You will **need** to upgrade c7n before Dec 6th.
* Without this fix you will get errors during policy provisioning.
* We won't be bumping semver as we're not making changes to c7n, we're just fixing a bug.
* As usual, your policies will not need any changes, we try hard to make sure you don't need to change your policies.
* Blog post from AWS with more information on the change: [Coming soon: Expansion of AWS Lambda states to all functions](https://aws.amazon.com/blogs/compute/coming-soon-expansion-of-aws-lambda-states-to-all-functions/)
- [Azure SDK trimming](https://github.com/cloud-custodian/cloud-custodian/pull/6987) - Docker image size is reduced from 700 to 500 megabytes, work still in progress
:dart: Goals
---
- Identify tasks that can help us raise conversion rate
## Weekly Stats
| | Opened this week| Closed this week|
|--|---|-----|
|Issues| 16 | 5|
|PR's| 10 | 7|
| | |
|--|--|
| New stars | 0|
| New forks | 0|
## PR's Closed
* [#6984](https://github.com/cloud-custodian/cloud-custodian/pull/6984): dep update 2021 11
* [#6983](https://github.com/cloud-custodian/cloud-custodian/pull/6983): aws - pipeline id capture
* [#6982](https://github.com/cloud-custodian/cloud-custodian/pull/6982): Add Azure custom resources/filters
* [#6974](https://github.com/cloud-custodian/cloud-custodian/pull/6974): output permissions
* [#6973](https://github.com/cloud-custodian/cloud-custodian/pull/6973): Mattheidelbaugh output permissions with action schema
* [#6972](https://github.com/cloud-custodian/cloud-custodian/pull/6972): allow multiple whitelist urls
* [#6971](https://github.com/cloud-custodian/cloud-custodian/pull/6971): output permissions with action schema
## PR's Opened
* [#6986](https://github.com/cloud-custodian/cloud-custodian/pull/6986): aws - check-permissions - gracefully handle non-existent iam entities
* [#6985](https://github.com/cloud-custodian/cloud-custodian/pull/6985): security - refactor azure test code to not use insecure tempfile methods.
* [#6984](https://github.com/cloud-custodian/cloud-custodian/pull/6984): dep update 2021 11
* [#6983](https://github.com/cloud-custodian/cloud-custodian/pull/6983): aws - pipeline id capture
* [#6982](https://github.com/cloud-custodian/cloud-custodian/pull/6982): Add Azure custom resources/filters
* [#6974](https://github.com/cloud-custodian/cloud-custodian/pull/6974): output permissions
* [#6973](https://github.com/cloud-custodian/cloud-custodian/pull/6973): Mattheidelbaugh output permissions with action schema
* [#6972](https://github.com/cloud-custodian/cloud-custodian/pull/6972): allow multiple whitelist urls
* [#6971](https://github.com/cloud-custodian/cloud-custodian/pull/6971): output permissions with action schema
## Issues Opened
* [#6981](https://github.com/cloud-custodian/cloud-custodian/issues/6981): 'InvalidParameterException' when calling remove-tag action on kinesis video stream
* [#6980](https://github.com/cloud-custodian/cloud-custodian/issues/6980): Off hours EC2 stop/Start
* [#6979](https://github.com/cloud-custodian/cloud-custodian/issues/6979): AWS: Enhancement to compare user_creation_time with access_key_creation_date
* [#6978](https://github.com/cloud-custodian/cloud-custodian/issues/6978): aws vpc flow-logs Action Tag
* [#6977](https://github.com/cloud-custodian/cloud-custodian/issues/6977): waf-enabled filter doesn't etect waf v2
* [#6976](https://github.com/cloud-custodian/cloud-custodian/issues/6976): Creating an EC2 Resource for Capacity Reservations
* [#6975](https://github.com/cloud-custodian/cloud-custodian/issues/6975): setting MinimumProtocolVersion in Cloudfront distribution fails
* [#6970](https://github.com/cloud-custodian/cloud-custodian/issues/6970): Output necessary permissions with action schema
* [#6968](https://github.com/cloud-custodian/cloud-custodian/issues/6968): Expansion of AWS Lambda states to all functions
* [#6967](https://github.com/cloud-custodian/cloud-custodian/issues/6967): Feature to mark EBS volumes with no AttachVolume event in cloud trail history
* [#6965](https://github.com/cloud-custodian/cloud-custodian/issues/6965): GCP - c7n-org - Some projects not being processed unless they are at the top of the config file.
* [#6964](https://github.com/cloud-custodian/cloud-custodian/issues/6964): Unable to load up certain aws.service-quota Service Codes with Cloud Custodian
* [#6963](https://github.com/cloud-custodian/cloud-custodian/issues/6963): `aws.lambda` `check-permissions` filter fails if a function's role has been deleted
* [#6962](https://github.com/cloud-custodian/cloud-custodian/issues/6962): phd mode errors for no event pattern
* [#6961](https://github.com/cloud-custodian/cloud-custodian/issues/6961): setting MinimumProtocolVersion in Cloudfront distribution
* [#6960](https://github.com/cloud-custodian/cloud-custodian/issues/6960): c7n-org not deleting snapshots
## Issues Closed
* [#6980](https://github.com/cloud-custodian/cloud-custodian/issues/6980): Off hours EC2 stop/Start
* [#6968](https://github.com/cloud-custodian/cloud-custodian/issues/6968): Expansion of AWS Lambda states to all functions
* [#6967](https://github.com/cloud-custodian/cloud-custodian/issues/6967): Feature to mark EBS volumes with no AttachVolume event in cloud trail history
* [#6960](https://github.com/cloud-custodian/cloud-custodian/issues/6960): c7n-org not deleting snapshots
* [#6919](https://github.com/cloud-custodian/cloud-custodian/issues/6919): datapipeline resource error while using CLI 0.9.13
:books: Backlog
---
- Email invite feature
- Interview users
- Contributor Guide [@liz-acosta]
- https://cloudcustodian.io/docs/contribute.html
- Should we make a video for local dev environment?
- Priority backlog for the cloud providers. [@kapilt]
- Enhancements/Feature Process [@kapilt]
- Rename master->main in github [@kapilt]
- https://github.com/github/renaming#renaming-existing-branches
- GitHub how supports this, we can try this now.
- afaict it's low risk, I'll keep investigating.
- No progress this week, kapil will sanity check it this week if he can.
- Make-gitter-easier [@castrojo]
- More to report in the future.
- Todd: drone.io just recently switched from gitter to slack and introduced a proposal github repo for this same problem set: https://github.com/drone/proposal
- Recommend [pipx](https://pypa.github.io/pipx/) for non-contributor installs? [@ajkerrigan]
- Do we [support brew](https://formulae.brew.sh/formula/c7n)?
- Version is old, should we consider updating that?
- Jorge to file an issue, see if there's a volunteer person who's into this.
- Policy Testing ([spec](https://github.com/cloud-custodian/cloud-custodian/issues/6407)) [@marcoceppi]
- Soliciting feedback, please check it out and comment on the issue!
- New initiatives and experiments we want to start improving
:closed_book: Action Items
--
Items roll over into next meeting unless resolved.
- [ ] [@castrojo] Foo
- [ ] [@marcoceppi] Bar
- [ ] [@kapilt] Baz
## Notes
00:00:51.023,00:00:54.023
Jorge Castro: https://hackmd.io/o_ztzX1GQB66-YU9s3bv3Q
00:03:19.427,00:03:22.427
Umair Khan: https://stacklet.io/aws-reinvent
00:04:39.178,00:04:42.178
Rohit Khare: +1 to re:Invent