-
Notifications
You must be signed in to change notification settings - Fork 150
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Interpolation issue when attaching aws_security_group_rule to aws_security_group created in module #190
Comments
Thanks for the issue 🎉 Security Group functionality is being re-written right now due to few more problems. I will also add this case as a test to ensure it will always work. Few more days please :) |
I have been investigating this bit while also refactoring the Security Groups module - which is nearly done, but it looks like the problem is not about the Security Groups, the problem is about resource mounting. Is it possible to share the HCL code for |
Here are the snippets of HCL code. I have a secgroup module (directory) with a main.tf and an outputs.tf file. modules/secgroup/main.tf:
modules/secgroup/outputs.tf:
Here is the relevant HCL code from my main.tf:
Please let me know if you need any additional information |
Hi @anthonycolon25, Can you please have a try with the new release ? 🎉 |
Closing the issue due to inactivity. Please do not hesitate to open a new issue if the problem still persists. Thanks! |
This issue's conversation is now locked. If you want to continue this discussion please open a new issue. |
Description :
I have a TF template which creates an aws_security_group within a module and outputs the security group id (sg_id). From my main TF template at am creating an aws_security_group_rule and associating it to the security group created within the module. I am trying to test that tcp port 22 is not open to 0.0.0.0/0. The tests always passes even when the CIDR block of the aws_security_group_rule is set to 0.0.0.0/0.
If I create the security group within my main TF template and associate the aws_security_group_rule it will correctly fail when set to 0.0.0.0/0.
It would seem that it is not associating the aws_security_group_rule to the module's aws_security_group. Any ideas.
To Reproduce
I am attaching my plan.json.
plan.out.json.txt
The text was updated successfully, but these errors were encountered: