Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Split security groups #5

Merged
merged 3 commits into from
Jul 11, 2018
Merged

Split security groups #5

merged 3 commits into from
Jul 11, 2018

Conversation

joshuamkite
Copy link
Owner

This branch moves to using aws_security_group_rule for ingress and egress rules. This supports the use of conditional logic to evaluate creating a security group rule on ec2-host-sshd access. If a cidr range or list of ranges is given for cidr_blocks_whitelist_host then this rule will be created and appended to the security group. If no value is given then this rule will not be created. This resolves the undesirable behaviour where if no value was given for cidr_blocks_whitelist_host Terraform would want to recreate the security group each time. Although this worked it relied on silent failure which is inelegant and noisy.

@joshuamkite joshuamkite merged commit 1871bfc into master Jul 11, 2018
@joshuamkite joshuamkite deleted the split_security_groups branch July 11, 2018 08:58
joshuamkite pushed a commit that referenced this pull request Jan 27, 2022
…rough_bastions

Add unique target group name for bastion host elb
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant