Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Allow more than 5 CIDRs in whitelist_unauthenticated_cidr_blocks #220

Conversation

luggage66
Copy link
Contributor

@luggage66 luggage66 commented Sep 4, 2021

Description

Allow more than 5 CIDRs for the whitelist_unauthenticated_cidr_blocks field by splitting into groups of 5 (AWS's limit)

Motivation and Context

Bitbucket has 15 IPs that webhooks may come from. See: https://support.atlassian.com/organization-administration/docs/ip-addresses-and-domains-for-atlassian-cloud-products/#AtlassiancloudIPrangesanddomains-OutgoingConnections

Breaking Changes

The additional aws_lb_listener_rule entries will get priority + count.index so could collide with other listeners if the user uses those priority values.

How Has This Been Tested?

I deployed this using a slightly modified github-complete from this repo, then tested upgrading to my fork and no state changes were needed. Then I added more than 5 CIDRS and confirmed correct behavior.

Copy link
Member

@antonbabenko antonbabenko left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Copy link
Member

@bryantbiggs bryantbiggs left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

validated on my end, looks good to go @antonbabenko 👍🏽

thanks @luggage66

@antonbabenko antonbabenko changed the title feat: allow more than 5 CIDRs in whitelist_unauthenticated_cidr_blocks feat: Allow more than 5 CIDRs in whitelist_unauthenticated_cidr_blocks Jan 7, 2022
@antonbabenko antonbabenko merged commit df10f7b into terraform-aws-modules:master Jan 7, 2022
antonbabenko pushed a commit that referenced this pull request Jan 7, 2022
## [3.6.0](v3.5.3...v3.6.0) (2022-01-07)

### Features

* Allow more than 5 CIDRs in whitelist_unauthenticated_cidr_blocks ([#220](#220)) ([df10f7b](df10f7b))
@antonbabenko
Copy link
Member

This PR is included in version 3.6.0 🎉

@github-actions
Copy link

github-actions bot commented Nov 9, 2022

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Nov 9, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants