Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

provider/aws: Fix issue in Classic env with external Security Groups #2644

Merged
merged 1 commit into from
Jul 8, 2015

Conversation

catsby
Copy link
Contributor

@catsby catsby commented Jul 7, 2015

Linking a security group from another account requires setting the UserID, which
we were stripping out

Example usage:

provider "aws" {
  region = "us-east-1"
}

resource "aws_security_group" "tf_test_self" {
  name = "tf_test_self"
  description = "tf_test_self"

  ingress {
    from_port = 80
    to_port = 80
    protocol = "tcp"
    security_groups = ["1111111111111/hi-clint", "default"]
  }

  tags {
    Name = "tf_test_self"
  }
}

Linking a security group from another account requires setting the UserID, which
we were stripping out
@phinze
Copy link
Contributor

phinze commented Jul 8, 2015

LGTM

catsby added a commit that referenced this pull request Jul 8, 2015
provider/aws: Fix issue in Classic env with external Security Groups
@catsby catsby merged commit f2ff63d into master Jul 8, 2015
@catsby catsby deleted the b-aws-sg-account-update branch July 8, 2015 18:29
@ghost
Copy link

ghost commented May 1, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@ghost ghost locked and limited conversation to collaborators May 1, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants