# November 9th 2021 # C7n Community Meeting Minutes ###### tags: `Templates` `Meeting` :::info - **URL:** meet.blah - **Date:** Novermber 9th, 2021 (3:00 PM (ET) / 12:00 PM (PT) / 7PM (UTC)) - **[Timezone Converter (Click me)](https://www.timeanddate.com/worldclock/converter.html?iso=20210629T190000&p1=tz_et&p2=tz_pt&p3=22&p4=240&p5=136&p6=176&p7=37&p8=248)** - **Agenda** 1. Intros `10m` 1. Agenda Items `20m` 1. PR Party `30m` - **Meeting Contact:** Jorge: <jorge@stacklet.io> - **Host:** Jorge Castro - **Permalink:** - **Video URL:** https://youtu.be/2KswOCQ3DsU ::: ## Agenda Items - reInvent - Who's going? - If you're going let us know, we're getting together Tuesday night - [https://stacklet.io/aws-reinvent](https://stacklet.io/aws-reinvent) - **Important** [#6969](https://github.com/cloud-custodian/cloud-custodian/pull/6969): Wait for 'updated' state before lambda deploy * New release incoming, we will announce as soon as we can. * 0.9.14 is happening NEXT week (week of 15 November), if you're on AWS we strongly recommend upgrading. * After Dec 6, lambas updated in place will fail. * You will **need** to upgrade c7n before Dec 6th. * Without this fix you will get errors during policy provisioning. * We won't be bumping semver as we're not making changes to c7n, we're just fixing a bug. * As usual, your policies will not need any changes, we try hard to make sure you don't need to change your policies. * Blog post from AWS with more information on the change: [Coming soon: Expansion of AWS Lambda states to all functions](https://aws.amazon.com/blogs/compute/coming-soon-expansion-of-aws-lambda-states-to-all-functions/) - [Azure SDK trimming](https://github.com/cloud-custodian/cloud-custodian/pull/6987) - Docker image size is reduced from 700 to 500 megabytes, work still in progress :dart: Goals --- - Identify tasks that can help us raise conversion rate ## Weekly Stats | | Opened this week| Closed this week| |--|---|-----| |Issues| 16 | 5| |PR's| 10 | 7| | | | |--|--| | New stars | 0| | New forks | 0| ## PR's Closed * [#6984](https://github.com/cloud-custodian/cloud-custodian/pull/6984): dep update 2021 11 * [#6983](https://github.com/cloud-custodian/cloud-custodian/pull/6983): aws - pipeline id capture * [#6982](https://github.com/cloud-custodian/cloud-custodian/pull/6982): Add Azure custom resources/filters * [#6974](https://github.com/cloud-custodian/cloud-custodian/pull/6974): output permissions * [#6973](https://github.com/cloud-custodian/cloud-custodian/pull/6973): Mattheidelbaugh output permissions with action schema * [#6972](https://github.com/cloud-custodian/cloud-custodian/pull/6972): allow multiple whitelist urls * [#6971](https://github.com/cloud-custodian/cloud-custodian/pull/6971): output permissions with action schema ## PR's Opened * [#6986](https://github.com/cloud-custodian/cloud-custodian/pull/6986): aws - check-permissions - gracefully handle non-existent iam entities * [#6985](https://github.com/cloud-custodian/cloud-custodian/pull/6985): security - refactor azure test code to not use insecure tempfile methods. * [#6984](https://github.com/cloud-custodian/cloud-custodian/pull/6984): dep update 2021 11 * [#6983](https://github.com/cloud-custodian/cloud-custodian/pull/6983): aws - pipeline id capture * [#6982](https://github.com/cloud-custodian/cloud-custodian/pull/6982): Add Azure custom resources/filters * [#6974](https://github.com/cloud-custodian/cloud-custodian/pull/6974): output permissions * [#6973](https://github.com/cloud-custodian/cloud-custodian/pull/6973): Mattheidelbaugh output permissions with action schema * [#6972](https://github.com/cloud-custodian/cloud-custodian/pull/6972): allow multiple whitelist urls * [#6971](https://github.com/cloud-custodian/cloud-custodian/pull/6971): output permissions with action schema ## Issues Opened * [#6981](https://github.com/cloud-custodian/cloud-custodian/issues/6981): 'InvalidParameterException' when calling remove-tag action on kinesis video stream * [#6980](https://github.com/cloud-custodian/cloud-custodian/issues/6980): Off hours EC2 stop/Start * [#6979](https://github.com/cloud-custodian/cloud-custodian/issues/6979): AWS: Enhancement to compare user_creation_time with access_key_creation_date * [#6978](https://github.com/cloud-custodian/cloud-custodian/issues/6978): aws vpc flow-logs Action Tag * [#6977](https://github.com/cloud-custodian/cloud-custodian/issues/6977): waf-enabled filter doesn't etect waf v2 * [#6976](https://github.com/cloud-custodian/cloud-custodian/issues/6976): Creating an EC2 Resource for Capacity Reservations * [#6975](https://github.com/cloud-custodian/cloud-custodian/issues/6975): setting MinimumProtocolVersion in Cloudfront distribution fails * [#6970](https://github.com/cloud-custodian/cloud-custodian/issues/6970): Output necessary permissions with action schema * [#6968](https://github.com/cloud-custodian/cloud-custodian/issues/6968): Expansion of AWS Lambda states to all functions * [#6967](https://github.com/cloud-custodian/cloud-custodian/issues/6967): Feature to mark EBS volumes with no AttachVolume event in cloud trail history * [#6965](https://github.com/cloud-custodian/cloud-custodian/issues/6965): GCP - c7n-org - Some projects not being processed unless they are at the top of the config file. * [#6964](https://github.com/cloud-custodian/cloud-custodian/issues/6964): Unable to load up certain aws.service-quota Service Codes with Cloud Custodian * [#6963](https://github.com/cloud-custodian/cloud-custodian/issues/6963): `aws.lambda` `check-permissions` filter fails if a function's role has been deleted * [#6962](https://github.com/cloud-custodian/cloud-custodian/issues/6962): phd mode errors for no event pattern * [#6961](https://github.com/cloud-custodian/cloud-custodian/issues/6961): setting MinimumProtocolVersion in Cloudfront distribution * [#6960](https://github.com/cloud-custodian/cloud-custodian/issues/6960): c7n-org not deleting snapshots ## Issues Closed * [#6980](https://github.com/cloud-custodian/cloud-custodian/issues/6980): Off hours EC2 stop/Start * [#6968](https://github.com/cloud-custodian/cloud-custodian/issues/6968): Expansion of AWS Lambda states to all functions * [#6967](https://github.com/cloud-custodian/cloud-custodian/issues/6967): Feature to mark EBS volumes with no AttachVolume event in cloud trail history * [#6960](https://github.com/cloud-custodian/cloud-custodian/issues/6960): c7n-org not deleting snapshots * [#6919](https://github.com/cloud-custodian/cloud-custodian/issues/6919): datapipeline resource error while using CLI 0.9.13 :books: Backlog --- - Email invite feature - Interview users - Contributor Guide [@liz-acosta] - https://cloudcustodian.io/docs/contribute.html - Should we make a video for local dev environment? - Priority backlog for the cloud providers. [@kapilt] - Enhancements/Feature Process [@kapilt] - Rename master->main in github [@kapilt] - https://github.com/github/renaming#renaming-existing-branches - GitHub how supports this, we can try this now. - afaict it's low risk, I'll keep investigating. - No progress this week, kapil will sanity check it this week if he can. - Make-gitter-easier [@castrojo] - More to report in the future. - Todd: drone.io just recently switched from gitter to slack and introduced a proposal github repo for this same problem set: https://github.com/drone/proposal - Recommend [pipx](https://pypa.github.io/pipx/) for non-contributor installs? [@ajkerrigan] - Do we [support brew](https://formulae.brew.sh/formula/c7n)? - Version is old, should we consider updating that? - Jorge to file an issue, see if there's a volunteer person who's into this. - Policy Testing ([spec](https://github.com/cloud-custodian/cloud-custodian/issues/6407)) [@marcoceppi] - Soliciting feedback, please check it out and comment on the issue! - New initiatives and experiments we want to start improving :closed_book: Action Items -- Items roll over into next meeting unless resolved. - [ ] [@castrojo] Foo - [ ] [@marcoceppi] Bar - [ ] [@kapilt] Baz ## Notes 00:00:51.023,00:00:54.023 Jorge Castro: https://hackmd.io/o_ztzX1GQB66-YU9s3bv3Q 00:03:19.427,00:03:22.427 Umair Khan: https://stacklet.io/aws-reinvent 00:04:39.178,00:04:42.178 Rohit Khare: +1 to re:Invent