Closed luhhujbb closed 3 years ago
Hey @luhhujbb, thanks for submitting this PR. I will take a look at it over the holidays!
Tests pass with USE_AWS_CREDENTIALS=true in the following condition:
This is looking good @luhhujbb. I will test this out tomorrow and try to get a private VPC working in my environment. I think I need to setup a NAT gateway to enable the private VPC to still talk to the outside world.
Do you mind if I push some commits to your branch? It will mostly be to tweak some method names or message text that is sent to the user. I've been very slow with the review feedback, so for small things I'd like to spare you the time and just do them myself.
If you're OK with that, let me know and just make sure that the "Allow edits from maintainers" checkbox is enabled in the right side-bar.
Hi, @nchammas, of course you can edit, the box "Allow edits from maintainers" is checked.
I've successfully created a private subnet that accesses the Internet via a NAT gateway on a public subnet in the same VPC. I've also successfully tested out this PR by launching a cluster in that environment. So far so good. 👍
I've pushed the latest changes from master onto your fork, @luhhujbb, and my next steps will be to retest your PR given the recent changes introduced by #285. I will also push some edits as noted in my previous comment.
(By the way, for the future you may want to make contributions from a branch on your fork, as opposed to from master. It will make pulling updates from the upstream source easier down the line.)
Any update on when this might get merged
Hello @kedar700. Sorry, I haven't been able to look at this PR recently.
I think this PR has the right implementation but, before it can be merged in, it needs some tweaks and needs merge conflicts to be resolved.
It's my fault for leaving this PR in limbo for so long. (Sorry @luhhujbb!)
I've rebase from master. The python 3.5 compatibility was difficult to handle. Maybe it should be dropped since python 3.5 reaches its end of life.
authorize-access-from
is now an array of configurable security-group/network cidr, it allows flexible configuration in a private environment.
Thank you for updating this PR @luhhujbb. I've dropped Python 3.5 support in #329 and will take a look at your updates here later this week. Hopefully we can get this merged in this time around!
@nchammas I've just rebase. Waiting for your review. Thanks for your time.
@luhhujbb - I made some changes to the PR to tweak the wording or style in various places, and also to refactor how we are validating the CLI input. I also think I fixed some bugs, like .appends -> .append
. I tested my changes by launching a cluster into a private VPC with both Hadoop and Spark installed.
@nchammas First of all many thanks for your time !
Thanks for persisting through the lengthy review/refactor process! I'm glad we got this in.
This PR makes the following changes:
Default behaviour remains identical except that it logs when flintrock detect private mode instead of raising an exception. Fixes #14