Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updating SecurityGroup / Ingress Spec #27

Merged
5 commits merged into from
Mar 20, 2018
Merged

Conversation

bjsemrad
Copy link
Contributor

Updating SecurityGroup / Ingress Spec to allow From/To to be conditional per AWS CFT Specs. Resolved submitted issue #25.

Supporting Documentation:
https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-security-group-ingress.html

See IP protocol on:
https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_AuthorizeSecurityGroupIngress.html

-1 is a valid IP protocol which then makes from/to no longer required on security group ingress and egress configuration.

@bjsemrad
Copy link
Contributor Author

@erickascic can this be merged?

@ghost
Copy link

ghost commented Mar 19, 2018

promise to work through it tomorrow morning. wanted to review this weekend but the Parameter eval took up all my available time.

@bjsemrad
Copy link
Contributor Author

bjsemrad commented Mar 19, 2018

@erickascic Thanks, I merged due to conflicts from Parameter eval, let me know if something doesn't look right, I ran all unit tests again, looks good to me.

@ghost
Copy link

ghost commented Mar 20, 2018

Special thanks for the example templates... I think the CloudFormation specs are still saying ports are required required for the standalone xgress rules but.... it's definitely accepting these and opening things up in a way that cfn-nag should flag them.

@ghost ghost merged commit c10a6b5 into stelligent:master Mar 20, 2018
@bjsemrad
Copy link
Contributor Author

@erickascic Thanks for merging, for standalone ingress its not required when IPProtocol is -1, we use it a lot for one of our VPC's. For egress the documentation is less clear, but we also use this model for one or two things and From/To are not required (or at least cloud formation accepts it).

This pull request was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants