-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
provider/openstack: Security Group Rule fixes #3857
provider/openstack: Security Group Rule fixes #3857
Conversation
"to_port": sgr.ToPort, | ||
"ip_protocol": sgr.IPProtocol, | ||
"cidr": sgr.IPRange.CIDR, | ||
"from_group_id": sgr.Group.Name, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this change exercised in any of the tests?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah - it's not. Thanks!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Well, that escalated quickly!
@jtopjian this looks to be the same scenario so I think we're okay to skip the state migration. Code LGTM with one inline question. 👌 |
3d16bb9
to
9b57a82
Compare
This commit fixes an issue with security group rules where the rules were not being correctly computed due to a typo in the rule map. Once rules were successfully computed, the rules then needed to be converted into a Set so they can be correctly ordered.
9b57a82
to
3db7922
Compare
There seems to be some issue with (I didn't test with last commit though): terraform tries to delete SG from the instance, deletes it (it's no associated any more) but fails and shows "Faield to remove". But the weird part is that it happens during |
Ignore last comment, it seems to be no related to this PR. |
More info:
Here it has name in state file, id passed in and then it explodes.
|
Yeah, the places where to specify a security group name and ID are very inconsistent in OpenStack. The Nova instances expect security group names. Neutron Ports expect IDs. The Nova security group rules expect an ID, but will return a name and not the ID. Unfortunately there's not a lot that can be done here besides documentation. I tried doing some workarounds to enable security group IDs in the |
Yes, after using names instead of IDs everything started working as expected Best regards, On Fri, Nov 13, 2015 at 6:02 AM, Joe Topjian notifications@github.com
|
@jtopjian This is looking good! Merge at will. 👍 |
@jtopjian Sorry for the slow response... It has been one of "those weeks". I will test and report back later this morning but please don't hold up merging on my account. |
…le-fix2 provider/openstack: Security Group Rule fixes
…ticache_cluster-customizediff-start resource/aws_elasticache_cluster: Introduce initial CustomizeDiff
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
This commit fixes an issue with security group rules where the rules
were not being correctly computed due to a typo in the rule map.
Once rules were successfully computed, the rules then needed to be
converted into a Set so they can be correctly ordered.
Fixes #3788
Fixes #3816