Skip to content

Commit

Permalink
fix(test): introduced new security group rules
Browse files Browse the repository at this point in the history
  • Loading branch information
maximumG committed May 2, 2023
1 parent 4e38127 commit b35b7a9
Show file tree
Hide file tree
Showing 8 changed files with 70 additions and 16 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -1020,21 +1020,21 @@ resource "aws_security_group_rule" "from-nodes-minimal-ipv6-example-com-egress-a
type = "egress"
}

resource "aws_security_group_rule" "from-nodes-minimal-ipv6-example-com-ingress-4-0to0-masters-minimal-ipv6-example-com" {
resource "aws_security_group_rule" "from-nodes-minimal-ipv6-example-com-ingress-all-0to0-nodes-minimal-ipv6-example-com" {
from_port = 0
protocol = "4"
security_group_id = aws_security_group.masters-minimal-ipv6-example-com.id
protocol = "-1"
security_group_id = aws_security_group.nodes-minimal-ipv6-example-com.id
source_security_group_id = aws_security_group.nodes-minimal-ipv6-example-com.id
to_port = 65535
to_port = 0
type = "ingress"
}

resource "aws_security_group_rule" "from-nodes-minimal-ipv6-example-com-ingress-all-0to0-nodes-minimal-ipv6-example-com" {
resource "aws_security_group_rule" "from-nodes-minimal-ipv6-example-com-ingress-ipip-0to0-masters-minimal-ipv6-example-com" {
from_port = 0
protocol = "-1"
security_group_id = aws_security_group.nodes-minimal-ipv6-example-com.id
protocol = "ipip"
security_group_id = aws_security_group.masters-minimal-ipv6-example-com.id
source_security_group_id = aws_security_group.nodes-minimal-ipv6-example-com.id
to_port = 0
to_port = 65535
type = "ingress"
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1029,6 +1029,15 @@ resource "aws_security_group_rule" "from-nodes-minimal-ipv6-example-com-ingress-
type = "ingress"
}

resource "aws_security_group_rule" "from-nodes-minimal-ipv6-example-com-ingress-icmp-8to8-masters-minimal-ipv6-example-com" {
from_port = 8
protocol = "icmp"
security_group_id = aws_security_group.masters-minimal-ipv6-example-com.id
source_security_group_id = aws_security_group.nodes-minimal-ipv6-example-com.id
to_port = 8
type = "ingress"
}

resource "aws_security_group_rule" "from-nodes-minimal-ipv6-example-com-ingress-tcp-1to2379-masters-minimal-ipv6-example-com" {
from_port = 1
protocol = "tcp"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -761,6 +761,15 @@ resource "aws_security_group_rule" "from-nodes-minimal-warmpool-example-com-ingr
type = "ingress"
}

resource "aws_security_group_rule" "from-nodes-minimal-warmpool-example-com-ingress-icmp-8to8-masters-minimal-warmpool-example-com" {
from_port = 8
protocol = "icmp"
security_group_id = aws_security_group.masters-minimal-warmpool-example-com.id
source_security_group_id = aws_security_group.nodes-minimal-warmpool-example-com.id
to_port = 8
type = "ingress"
}

resource "aws_security_group_rule" "from-nodes-minimal-warmpool-example-com-ingress-tcp-1to2379-masters-minimal-warmpool-example-com" {
from_port = 1
protocol = "tcp"
Expand Down
16 changes: 8 additions & 8 deletions tests/integration/update_cluster/privatecalico/kubernetes.tf
Original file line number Diff line number Diff line change
Expand Up @@ -1134,21 +1134,21 @@ resource "aws_security_group_rule" "from-nodes-privatecalico-example-com-egress-
type = "egress"
}

resource "aws_security_group_rule" "from-nodes-privatecalico-example-com-ingress-4-0to0-masters-privatecalico-example-com" {
resource "aws_security_group_rule" "from-nodes-privatecalico-example-com-ingress-all-0to0-nodes-privatecalico-example-com" {
from_port = 0
protocol = "4"
security_group_id = aws_security_group.masters-privatecalico-example-com.id
protocol = "-1"
security_group_id = aws_security_group.nodes-privatecalico-example-com.id
source_security_group_id = aws_security_group.nodes-privatecalico-example-com.id
to_port = 65535
to_port = 0
type = "ingress"
}

resource "aws_security_group_rule" "from-nodes-privatecalico-example-com-ingress-all-0to0-nodes-privatecalico-example-com" {
resource "aws_security_group_rule" "from-nodes-privatecalico-example-com-ingress-ipip-0to0-masters-privatecalico-example-com" {
from_port = 0
protocol = "-1"
security_group_id = aws_security_group.nodes-privatecalico-example-com.id
protocol = "ipip"
security_group_id = aws_security_group.masters-privatecalico-example-com.id
source_security_group_id = aws_security_group.nodes-privatecalico-example-com.id
to_port = 0
to_port = 65535
type = "ingress"
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1121,6 +1121,15 @@ resource "aws_security_group_rule" "from-nodes-privatecilium-example-com-ingress
type = "ingress"
}

resource "aws_security_group_rule" "from-nodes-privatecilium-example-com-ingress-icmp-8to8-masters-privatecilium-example-com" {
from_port = 8
protocol = "icmp"
security_group_id = aws_security_group.masters-privatecilium-example-com.id
source_security_group_id = aws_security_group.nodes-privatecilium-example-com.id
to_port = 8
type = "ingress"
}

resource "aws_security_group_rule" "from-nodes-privatecilium-example-com-ingress-tcp-1to2379-masters-privatecilium-example-com" {
from_port = 1
protocol = "tcp"
Expand Down
9 changes: 9 additions & 0 deletions tests/integration/update_cluster/privatecilium/kubernetes.tf
Original file line number Diff line number Diff line change
Expand Up @@ -1121,6 +1121,15 @@ resource "aws_security_group_rule" "from-nodes-privatecilium-example-com-ingress
type = "ingress"
}

resource "aws_security_group_rule" "from-nodes-privatecilium-example-com-ingress-icmp-8to8-masters-privatecilium-example-com" {
from_port = 8
protocol = "icmp"
security_group_id = aws_security_group.masters-privatecilium-example-com.id
source_security_group_id = aws_security_group.nodes-privatecilium-example-com.id
to_port = 8
type = "ingress"
}

resource "aws_security_group_rule" "from-nodes-privatecilium-example-com-ingress-tcp-1to2379-masters-privatecilium-example-com" {
from_port = 1
protocol = "tcp"
Expand Down
9 changes: 9 additions & 0 deletions tests/integration/update_cluster/privatecilium2/kubernetes.tf
Original file line number Diff line number Diff line change
Expand Up @@ -1137,6 +1137,15 @@ resource "aws_security_group_rule" "from-nodes-privatecilium-example-com-ingress
type = "ingress"
}

resource "aws_security_group_rule" "from-nodes-privatecilium-example-com-ingress-icmp-8to8-masters-privatecilium-example-com" {
from_port = 8
protocol = "icmp"
security_group_id = aws_security_group.masters-privatecilium-example-com.id
source_security_group_id = aws_security_group.nodes-privatecilium-example-com.id
to_port = 8
type = "ingress"
}

resource "aws_security_group_rule" "from-nodes-privatecilium-example-com-ingress-tcp-1to2379-masters-privatecilium-example-com" {
from_port = 1
protocol = "tcp"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1154,6 +1154,15 @@ resource "aws_security_group_rule" "from-nodes-privateciliumadvanced-example-com
type = "ingress"
}

resource "aws_security_group_rule" "from-nodes-privateciliumadvanced-example-com-ingress-icmp-8to8-masters-privateciliumadvanced-example-com" {
from_port = 8
protocol = "icmp"
security_group_id = aws_security_group.masters-privateciliumadvanced-example-com.id
source_security_group_id = aws_security_group.nodes-privateciliumadvanced-example-com.id
to_port = 8
type = "ingress"
}

resource "aws_security_group_rule" "from-nodes-privateciliumadvanced-example-com-ingress-tcp-1to2379-masters-privateciliumadvanced-example-com" {
from_port = 1
protocol = "tcp"
Expand Down

0 comments on commit b35b7a9

Please sign in to comment.