@@ -222,15 +222,15 @@ resource "aws_iam_role_policy" "ecs_exec" {
222
222
# Service
223
223
# # Security Groups
224
224
resource "aws_security_group" "ecs_service" {
225
- count = var. enabled ? 1 : 0
225
+ count = var. enabled && var . create_service_security_group ? 1 : 0
226
226
vpc_id = var. vpc_id
227
227
name = module. service_label . id
228
228
description = " Allow ALL egress from ECS service"
229
229
tags = module. service_label . tags
230
230
}
231
231
232
232
resource "aws_security_group_rule" "allow_all_egress" {
233
- count = var. enabled && var. enable_all_egress_rule ? 1 : 0
233
+ count = var. enabled && var. create_service_security_group && var . enable_all_egress_rule ? 1 : 0
234
234
type = " egress"
235
235
from_port = 0
236
236
to_port = 0
@@ -240,7 +240,7 @@ resource "aws_security_group_rule" "allow_all_egress" {
240
240
}
241
241
242
242
resource "aws_security_group_rule" "allow_icmp_ingress" {
243
- count = var. enabled && var. enable_icmp_rule ? 1 : 0
243
+ count = var. enabled && var. create_service_security_group && var . enable_icmp_rule ? 1 : 0
244
244
description = " Enables ping command from anywhere, see https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-rules-reference.html#sg-rules-ping"
245
245
type = " ingress"
246
246
from_port = 8
@@ -251,7 +251,7 @@ resource "aws_security_group_rule" "allow_icmp_ingress" {
251
251
}
252
252
253
253
resource "aws_security_group_rule" "alb" {
254
- count = var. enabled && var. use_alb_security_group ? 1 : 0
254
+ count = var. enabled && var. create_service_security_group && var . use_alb_security_group ? 1 : 0
255
255
type = " ingress"
256
256
from_port = var. container_port
257
257
to_port = var. container_port
@@ -261,7 +261,7 @@ resource "aws_security_group_rule" "alb" {
261
261
}
262
262
263
263
resource "aws_security_group_rule" "nlb" {
264
- count = var. enabled && var. use_nlb_cidr_blocks ? 1 : 0
264
+ count = var. enabled && var. create_service_security_group && var . use_nlb_cidr_blocks ? 1 : 0
265
265
type = " ingress"
266
266
from_port = var. nlb_container_port
267
267
to_port = var. nlb_container_port
@@ -341,7 +341,7 @@ resource "aws_ecs_service" "ignore_changes_task_definition" {
341
341
dynamic "network_configuration" {
342
342
for_each = var. network_mode == " awsvpc" ? [" true" ] : []
343
343
content {
344
- security_groups = compact (concat (var. security_group_ids , aws_security_group. ecs_service . * . id ))
344
+ security_groups = var . create_service_security_group ? compact (concat (var. security_group_ids , aws_security_group. ecs_service . * . id )) : var . security_group_ids
345
345
subnets = var. subnet_ids
346
346
assign_public_ip = var. assign_public_ip
347
347
}
@@ -423,7 +423,7 @@ resource "aws_ecs_service" "default" {
423
423
dynamic "network_configuration" {
424
424
for_each = var. network_mode == " awsvpc" ? [" true" ] : []
425
425
content {
426
- security_groups = compact (concat (var. security_group_ids , aws_security_group. ecs_service . * . id ))
426
+ security_groups = var . create_service_security_group ? compact (concat (var. security_group_ids , aws_security_group. ecs_service . * . id )) : var . security_group_ids
427
427
subnets = var. subnet_ids
428
428
assign_public_ip = var. assign_public_ip
429
429
}
0 commit comments