Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

acceptance test failure: TestAccAWSSecurityGroup_vpc #1631

Closed
phinze opened this issue Apr 22, 2015 · 4 comments
Closed

acceptance test failure: TestAccAWSSecurityGroup_vpc #1631

phinze opened this issue Apr 22, 2015 · 4 comments

Comments

@phinze
Copy link
Contributor

phinze commented Apr 22, 2015

On latest master:

--- FAIL: TestAccAWSSecurityGroup_vpc (4.38s)
        testing.go:131: Step 0 error: After applying this step, the plan was not empty:

                DIFF:

                UPDATE: aws_security_group.web
                  egress.#:                            "2" => "1"
                  egress.3629188364.cidr_blocks.#:     "1" => "1"
                  egress.3629188364.cidr_blocks.0:     "10.0.0.0/8" => "10.0.0.0/8"
                  egress.3629188364.from_port:         "80" => "80"
                  egress.3629188364.protocol:          "tcp" => "tcp"
                  egress.3629188364.security_groups.#: "0" => "0"
                  egress.3629188364.self:              "0" => "0"
                  egress.3629188364.to_port:           "8000" => "8000"

                STATE:

                aws_security_group.web:
                  ID = sg-5a3b353f
                  description = Used in the terraform acceptance tests
                  egress.# = 2
                  egress.3629188364.cidr_blocks.# = 1
                  egress.3629188364.cidr_blocks.0 = 10.0.0.0/8
                  egress.3629188364.from_port = 80
                  egress.3629188364.protocol = tcp
                  egress.3629188364.security_groups.# = 0
                  egress.3629188364.self = false
                  egress.3629188364.to_port = 8000
                  egress.482069346.cidr_blocks.# = 1
                  egress.482069346.cidr_blocks.0 = 0.0.0.0/0
                  egress.482069346.from_port = 0
                  egress.482069346.protocol = -1
                  egress.482069346.security_groups.# = 0
                  egress.482069346.self = false
                  egress.482069346.to_port = 0
                  ingress.# = 1
                  ingress.3629188364.cidr_blocks.# = 1
                  ingress.3629188364.cidr_blocks.0 = 10.0.0.0/8
                  ingress.3629188364.from_port = 80
                  ingress.3629188364.protocol = tcp
                  ingress.3629188364.security_groups.# = 0
                  ingress.3629188364.self = false
                  ingress.3629188364.to_port = 8000
                  name = terraform_acceptance_test_example
                  owner_id = 762203914556
                  vpc_id = vpc-160e8b73

                  Dependencies:
                    aws_vpc.foo
                aws_vpc.foo:
                  ID = vpc-160e8b73
                  cidr_block = 10.1.0.0/16
                  default_network_acl_id = acl-a67dfcc3
                  default_security_group_id = sg-5c3b3539
                  main_route_table_id = rtb-e3a92686
@catsby
Copy link
Contributor

catsby commented Apr 29, 2015

The state file has this for egress:

"egress.#": "2",
"egress.3629188364.cidr_blocks.#": "1",
"egress.3629188364.cidr_blocks.0": "10.0.0.0/8",
"egress.3629188364.from_port": "80",
"egress.3629188364.protocol": "tcp",
"egress.3629188364.security_groups.#": "0",
"egress.3629188364.self": "false",
"egress.3629188364.to_port": "8000",
"egress.482069346.cidr_blocks.#": "1",
"egress.482069346.cidr_blocks.0": "0.0.0.0/0",
"egress.482069346.from_port": "0",
"egress.482069346.protocol": "-1",
"egress.482069346.security_groups.#": "0",
"egress.482069346.self": "false",
"egress.482069346.to_port": "0",

I believe 482069346 is the default egress block you get when you create a security group

dzzm5eumrn9cj_xgy244f79rivn-vc9vnrq9r-jmlgq

Not sure what to do about that...

@catsby
Copy link
Contributor

catsby commented Apr 30, 2015

Proposing #1765 as a fix to this

@catsby
Copy link
Contributor

catsby commented May 15, 2015

OH HEY PAUL WE FIXED THIS

hooray

@catsby catsby closed this as completed May 15, 2015
@ghost
Copy link

ghost commented May 2, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@ghost ghost locked and limited conversation to collaborators May 2, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants