ec2_group failing when there is already a rule defined from another AWS account #770
Comments
still in devel |
#709 fixes this |
@ansible, ping. This issue is still waiting on your response. |
@ansible, ping. This issue is still waiting on your response. |
@ansible, ping. This issue is still waiting on your response. |
2 similar comments
@ansible, ping. This issue is still waiting on your response. |
@ansible, ping. This issue is still waiting on your response. |
@ansible, ping. This issue is still waiting on your response. |
This repository has been locked. All new issues and pull requests should be filed in https://github.com/ansible/ansible Please read through the repomerge page in the dev guide. The guide contains links to tools which automatically move your issue or pull request to the ansible/ansible repo. |
This issue was migrated to ansible/ansible#30177 |
Issue Type:
Bug Report
Ansible Version:
ansible --version
ansible 1.8.2
configured module search path = /usr/share/ansible
boto 2.36.0
Environment:
CentOS release 6.5
OSX 10.10.1
Summary:
When there is a firewall rule already defined that gives access to a existing security group from another AWS account the ec2_group task fails.
Steps To Reproduce:
Have 2 different AWS accounts A and B and defined the bellow :
AWS account A ( #262444421265)
Create a security group named SGA , it doesn't matter if i has any rules or not.
AWS account B
Create a security group SGB that gives access to the security group SGA in AWS account A (#262444421265) , for example :
security_grups.yml :
Expected Results:
Ansible should create SGB if doesn't exist with the defined port open.
Actual Results:
Ansible fails to execute the task:
ansible-playbook security_grups.yml -t this -vvvvvv
The text was updated successfully, but these errors were encountered: