From cd65a477b9beed6f27dd7fb608071ed085f9163a Mon Sep 17 00:00:00 2001 From: anmolnagpal Date: Mon, 12 Jun 2023 14:30:01 +0530 Subject: [PATCH] feat: added sg description --- _example/redis/example.tf | 1 - main.tf | 1 + 2 files changed, 1 insertion(+), 1 deletion(-) diff --git a/_example/redis/example.tf b/_example/redis/example.tf index 935c629..77cbcd3 100644 --- a/_example/redis/example.tf +++ b/_example/redis/example.tf @@ -52,7 +52,6 @@ module "redis" { ####---------------------------------------------------------------------------------- ## Below A security group controls the traffic that is allowed to reach and leave the resources that it is associated with. ####---------------------------------------------------------------------------------- - #tfsec:ignore:aws-ec2-add-description-to-security-group-rule vpc_id = module.vpc.vpc_id allowed_ip = [module.vpc.vpc_cidr_block] allowed_ports = [6379] diff --git a/main.tf b/main.tf index 19ce5e5..7d719cb 100644 --- a/main.tf +++ b/main.tf @@ -51,6 +51,7 @@ resource "aws_security_group_rule" "egress" { security_group_id = join("", aws_security_group.default.*.id) } #tfsec:ignore:aws-ec2-no-public-egress-sgr +#tfsec:ignore:aws-ec2-add-description-to-security-group-rule resource "aws_security_group_rule" "egress_ipv6" { count = (var.enable_security_group == true && length(var.sg_ids) < 1 && var.is_external == false) && var.egress_rule == true ? 1 : 0