-
Notifications
You must be signed in to change notification settings - Fork 97
Module/single-port-sg: Support source_security_group #307
Conversation
|
Is there a way to use this without a targeted apply? I'm running into this situation that I think is stemming from the changes in the PR: |
I feel like this is a dep issue. I got this while destroying resources again. The source SG was gone (and this rule), but TF says it cannot calculate the count. The reason I do it this way is that, @ketzacoatl Do you have any better idea? If not, I'd have to cancel this change. |
ketzacoatl
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall, this LGTM, I'd just like to separate the "enable" logic to locals so that is more obvious and harder to make a bug in the future.
|
@Magicloud please update the above, TY! |
01b5273 to
1e2e816
Compare
This is a fork version of single-port-sg module to support source_security_group.
|
Updated new design. Tested in PR #304. |
ketzacoatl
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As a separate module, this LGTM!
cc @mcgirr / @Magicloud do we have any branch references to update?
name: Pull request template
about: Make a PR to terraform-aws-foundation
Please include the following in your PR:
Please also note that these are not hard requirements, but merely serve to define
what maintainers are looking for in PR's. Including these will more likely lead
to your PR being reviewed and accepted.
- For new
modulesthis would entail example code for how to use the module or some explanation in the module readme.- For new examples please provide a README explaining how to run the example. It's also ideal to provide a basic makefile to use the example as well.