-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws_security_group: no way to delete egress rule #660
Comments
the last comment on the original issue (hashicorp/terraform#13314) included the following:
I would like to +1 the usefulness of containing all security group rules into a resource that would enforce something like "these rules, and only these rules" - we initially started to use Terraform specifically for this feature, which seemed to work when all the rules were inline. Turns out that it doesn't work, and moving rules to their own resources doesn't work either (because new rules created via GUI are not detected by terraform) |
I've found a workaround; set |
Is anyone who commented on the original (@grubernaut @apparentlymart @catsby) still looking into implementing this? I'm looking for much the same as @yn-academia for infosec / audit compliance - I want to apply a set of ingress/egress rules and have them 100% clobber anything that's out there without having to manually taint every security group before applying them. For my case I will always have at least one ingress and one egress, so I will always have "something" to set the state explicitly, versus trying to apply an empty state. I got surprised yesterday when one of my SGs was more permissive than it should be immediately after doing a full |
@007 apart from the issue of "no egress" or "no ingress" not being applied without the |
Just want to bring this issue to your attention, @grubernaut @apparentlymart . Don't forget it please. |
Marking this issue as stale due to inactivity. This helps our maintainers find and focus on the active issues. If this issue receives no comments in the next 30 days it will automatically be closed. Maintainers can also remove the stale label. If this issue was automatically closed and you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thank you! |
Reproduced in #20046 for 1.x and 3.47 so likely still valid? |
This functionality has been released in v5.8.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
This issue was originally opened by @lra as hashicorp/terraform#13314. It was migrated here as part of the provider split. The original body of the issue is below.
Terraform Version
Terraform v0.9.2
Affected Resource(s)
aws_security_group
Terraform Configuration Files
Expected Behavior
When commenting out the egress rule, I except terraform to delete the egress rule on apply
Actual Behavior
When I comment out the egress rule, terraform applies no change.
Steps to Reproduce
terraform apply
terraform apply
Workaround
I can taint the security group and apply.
The text was updated successfully, but these errors were encountered: