-
Notifications
You must be signed in to change notification settings - Fork 97
Module/single-port-sg: Support source_security_group #307
Conversation
Is there a way to use this without a targeted apply? I'm running into this situation that I think is stemming from the changes in the PR:
|
I feel like this is a dep issue. I got this while destroying resources again. The source SG was gone (and this rule), but TF says it cannot calculate the count. The reason I do it this way is that, @ketzacoatl Do you have any better idea? If not, I'd have to cancel this change. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall, this LGTM, I'd just like to separate the "enable" logic to locals
so that is more obvious and harder to make a bug in the future.
@Magicloud please update the above, TY! |
01b5273
to
1e2e816
Compare
This is a fork version of single-port-sg module to support source_security_group.
Updated new design. Tested in PR #304. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As a separate module, this LGTM!
cc @mcgirr / @Magicloud do we have any branch references to update?
name: Pull request template
about: Make a PR to terraform-aws-foundation
Please include the following in your PR:
Please also note that these are not hard requirements, but merely serve to define
what maintainers are looking for in PR's. Including these will more likely lead
to your PR being reviewed and accepted.
- For new
modules
this would entail example code for how to use the module or some explanation in the module readme.- For new examples please provide a README explaining how to run the example. It's also ideal to provide a basic makefile to use the example as well.