-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fixing some edge cases with AWS SG Rules #1969
Conversation
hmm this actually doesn't work as expected. It seems self=True and security_group_id are mutually exclusive. If they are both set then no single permission will match so it won't be able to find the perm after creation. |
Hey @nevins-b – is there a sample config I can use to see this? Omit secrets of course :) I modified the title to reflect that this is in Security Group Rules. Please correct me if I'm mistaken. |
@catsby Here's the smallest example I could come up with:
|
Could this issue potentially be causing behaviour like this? Effectively the replacement of an existing SG rule with the same thing again, when using self=true?
Seems like the X.Y.0.0/16 rule is being removed and readded effectively... |
Just a note this patch will need some manual tweaks before it can be considered for merging. I did manage to tweak it locally to get it working (can post an updated PR on request), but it fails 2 acceptance tests:
|
Going to close as I believe this is superseded by #3019 |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
This fixes two possible issues: