-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for "ipv6_cidr_block" to "aws_default_network_acl" and "aws_default_security_group" resources #1096
Comments
Fixes: #1096 default_security_group already has support for ipv6_cidr_block. ``` % make testacc TEST=./aws TESTARGS='-run=TestAccAWSDefaultNetworkAcl_withIpv6Ingress' ==> Checking that code complies with gofmt requirements... TF_ACC=1 go test ./aws -v -run=TestAccAWSDefaultNetworkAcl_withIpv6Ingress -timeout 120m === RUN TestAccAWSDefaultNetworkAcl_withIpv6Ingress --- PASS: TestAccAWSDefaultNetworkAcl_withIpv6Ingress (53.45s) PASS ok github.com/terraform-providers/terraform-provider-aws/aws 53.511s ```
Fixes: #1096 default_security_group already has support for ipv6_cidr_block. ``` % make testacc TEST=./aws TESTARGS='-run=TestAccAWSDefaultNetworkAcl_withIpv6Ingress' ==> Checking that code complies with gofmt requirements... TF_ACC=1 go test ./aws -v -run=TestAccAWSDefaultNetworkAcl_withIpv6Ingress -timeout 120m === RUN TestAccAWSDefaultNetworkAcl_withIpv6Ingress --- PASS: TestAccAWSDefaultNetworkAcl_withIpv6Ingress (53.45s) PASS ok github.com/terraform-providers/terraform-provider-aws/aws 53.511s ```
@stack72 🥇 Is this a candidate for inclusion in 0.1.3? |
Hi
I'm afraid this will only be part of the 0.10 release - this doesn't
qualify as a regression requiring a point release
Sorry!
Paul
…On Tue, 11 Jul 2017 at 22:18, Tyler Tidman ***@***.***> wrote:
@stack72 <https://github.com/stack72> 🥇 Is this a candidate for
inclusion in 0.9.12 or 0.10.0?
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#1096 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AAN57zf2puek1CbHQH_3PxM5J0dbC-9kks5sM8p6gaJpZM4OTH9E>
.
|
@stack72 not a problem. Thankfully, this isn't a blocker for me at the moment so I don't need to worry about building my own yet. Thanks for the quick turn-around 👍 . |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
I'm just starting out using Terraform and am very happy with it.
Lots of lovely IPv6 support was added to the "aws_network_acl" and "aws_security_group" resources in v0.9.9.
However, the "aws_default_network_acl" and "aws_default_security_group" resources still do not have support for the "ipv6_cidr_block" arguments (at least, not according to the https://www.terraform.io/docs/providers/aws/r/default_network_acl.html and https://www.terraform.io/docs/providers/aws/r/default_security_group.html pages).
Terraform Version
v0.9.11
Affected Resource(s)
Terraform Configuration Files
Make sure you created a VPC with "assign_generated_ipv6_cidr_block = true" and then try to tag the default acl and security groups that got created...
Debug Output
N/A; enhancement
Panic Output
N/A; enhancement
Expected Behavior
It would be really swell if the "aws_default_network_acl" and "aws_default_security_group" resources supported the same set of arguments as their corresponding counterparts; "aws_network_acl" and "aws_security_group", respectively.
Actual Behavior
At the moment, if you choose to tag your default ACL and SG, you'll lose the default allow rules for "::/0".
Steps to Reproduce
N/A; enhancement
Important Factoids
N/A; enhancement
References
N/A; enhancement
The text was updated successfully, but these errors were encountered: