Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Added optional revoke_rules_on_delete functionality (required for EMR) #179

Merged
merged 5 commits into from
Jul 3, 2020

Conversation

Ferg3
Copy link
Contributor

@Ferg3 Ferg3 commented Jun 26, 2020

Description

A new optional boolean variable was created in the variables.tf to allow revoke_rules_on_delete to be set.
Within the main.tf, this new variable was used to set the attribute on Security Group creation.
The README has been updated to include the details on the new

Motivation and Context

While using this module in collaboration with AWS EMR, some issues were found on doing a destroy of the entire stack. AWS EMR creates additional rules in the SG's and in my experience seemed to create a circular dependency where rules in one SG referenced another SG and vice versa. The only resolution appeared to be manual intervention to remove the rules from the SG's and then re-run a destroy to allow a teardown of resources.

Breaking Changes

This has no breaking changes as the variable has been added with a default value of false, so anyone wishing to utilise this capability would only need to pass in the variable with the true value.

How Has This Been Tested?

I was initially using the module as is and was encountering the failure on destroy where an EMR was provisioned. I branched off the repo in our local environment and made the changes to add the new variable & apply it to the resources for SG creation. When using this branch I was successfully able to create the necessary resources and then run an E2E destroy of all components which were spun up from Terraform without any manual intervention.

Ferg3 and others added 5 commits June 26, 2020 15:21
Added the revoke_rules_on_delete attribute to the aws_security_group resources as issues discovered using the module with EMR.
Added the variable to use for allowing the revoke_rules_on_delete attribute to be enabled
Updated the README for the revoke_rules_on_delete details
Update the README.md to add correct variable name
@antonbabenko antonbabenko changed the title Added optional Revoke Rules on delete functionality feat: Added optional revoke_rules_on_delete functionality (required for EMR) Jul 3, 2020
@antonbabenko antonbabenko merged commit 7519948 into terraform-aws-modules:master Jul 3, 2020
@antonbabenko
Copy link
Member

Thanks @Ferg3 !

v3.12.0 has been just released.

hoylemd added a commit to pixlee/terraform-aws-security-group that referenced this pull request Oct 14, 2020
* upstream/master:
  Updated CHANGELOG
  chore: Fixed formatting
  feat: Allow custom Name tag for security group (terraform-aws-modules#187)
  Updated CHANGELOG
  feat: Add JMX and Node exporter TCP ports for Kafka (terraform-aws-modules#186)
  Updated CHANGELOG
  feat: aws-provider version bump to >= 2.42, < 4.0 (terraform-aws-modules#184)
  Updated CHANGELOG
  feat: Add support for Solr (terraform-aws-modules#181)
  Updated CHANGELOG
  feat: Added optional revoke_rules_on_delete functionality (required for EMR) (terraform-aws-modules#179)
  Updated CHANGELOG
  feat: Updated version requirements to support Terraform 0.13 (terraform-aws-modules#178)
  Updated CHANGELOG
  fix: Fixed MinIO rules formatting
  feat: Adding support for MinIO (terraform-aws-modules#174)
@github-actions
Copy link

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Nov 15, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants