Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

provider/aws: Add Security Group Rule as a top level resource #1620

Merged
merged 1 commit into from
May 5, 2015

Conversation

catsby
Copy link
Contributor

@catsby catsby commented Apr 21, 2015

First attempt at making Security Group Rules (ingress, egress) top level resources.

This is raw, like sushi, and probably needs refinement, but it's a good start.

Missing:

  • documentation

cc @phinze

@geofffranks
Copy link

Any ETA on when this will be merged/released? Will fix an issue I'm running into very similar to #539

Tried out dev binaries from this branch and it works great, just looking to see when I can expect this from upstream. Thanks!

@catsby
Copy link
Contributor Author

catsby commented Apr 29, 2015

cc @phinze or @mitchellh for feedback when you can

@phinze
Copy link
Contributor

phinze commented Apr 30, 2015

Code looks great!

Trying to think out the behavior here for SGs that have some rules defined nested and others not. Perhaps that's just something we solve with documentation at this point?

Basically a user who wants to use the top-level rules needs to not define any nested rules. Yeah?

(Eventually we'll build in a first-class concept of nested resources so we can express the nested ones as just "versions" of these top level ones.)

@geofffranks
Copy link

FWIW, my use case has rules defined both in the SG and in an SGR (in different modules) and it worked great in my (albeit only one) test.

Sent from my iPhone

On Apr 30, 2015, at 5:38 PM, Paul Hinze notifications@github.com wrote:

Code looks great!

Trying to think out the behavior here for SGs that have some rules defined nested and others not. Perhaps that's just something we solve with documentation at this point?

Basically a user who wants to use the top-level rules needs to not define any nested rules. Yeah?

(Eventually we'll build in a first-class concept of nested resources so we can express the nested ones as just "versions" of these top level ones.)


Reply to this email directly or view it on GitHub.

@catsby
Copy link
Contributor Author

catsby commented May 1, 2015

Basically a user who wants to use the top-level rules needs to not define any nested rules. Yeah?

@phinze great question... I'll have to think on that and tinker with it... but I believe we'd want to solve that with documentation at this point.

@catsby
Copy link
Contributor Author

catsby commented May 1, 2015

@phinze tested it out – if a user has egress rules in a SG config, and also a SG_RULE resource, the two will conflict. Updates to the SG will destroy the RULE.

Seems like Documentation is the way to "solve" this for now 😦

@catsby catsby force-pushed the f-aws-security-group-rule-resource branch 3 times, most recently from 4f745ce to 8556b6f Compare May 5, 2015 21:55
- document conflict with sg rules and sg in-line rules
- for this to work, ingress rules need to be computed
@catsby catsby force-pushed the f-aws-security-group-rule-resource branch from 8556b6f to 885efa0 Compare May 5, 2015 21:56
catsby added a commit that referenced this pull request May 5, 2015
…ource

provider/aws: Add Security Group Rule as a top level resource
@catsby catsby merged commit 9510c71 into master May 5, 2015
@catsby catsby deleted the f-aws-security-group-rule-resource branch May 5, 2015 22:12
catsby added a commit that referenced this pull request May 5, 2015
provider/aws: Add Security Group Rule as a top level resource #1620

# aws\_security\_group\_rule

Provides a security group rule resource. Represents a signle `ingress` or
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

single

@ghost
Copy link

ghost commented May 3, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@ghost ghost locked and limited conversation to collaborators May 3, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants