-
Notifications
You must be signed in to change notification settings - Fork 9.8k
Closed
Labels
bugAddresses a defect in current functionality.Addresses a defect in current functionality.service/ec2Issues and PRs that pertain to the ec2 service.Issues and PRs that pertain to the ec2 service.
Milestone
Description
This issue was originally opened by @BookOfGreg as hashicorp/terraform#17967. It was migrated here as a result of the provider split. The original body of the issue is below.
Terraform Version
Terraform v0.11.7
+ provider.aws v1.15.0
Terraform Configuration Files
Removing Ingress from a security group has no effect
Before:
resource "aws_security_group" "my_group" {
vpc_id = "${aws_vpc.my_vpc.id}"
name = "my_group"
description = "App security group"
ingress {
from_port = 80
to_port = 80
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
egress {
from_port = 0
to_port = 0
protocol = "-1"
cidr_blocks = ["0.0.0.0/0"]
}
}After:
resource "aws_security_group" "my_group" {
vpc_id = "${aws_vpc.my_vpc.id}"
name = "my_group"
description = "App security group"
egress {
from_port = 0
to_port = 0
protocol = "-1"
cidr_blocks = ["0.0.0.0/0"]
}
}Expected Behavior
My security group has no ingress on it
Actual Behavior
My security group still has port 80
References
I've seen issues with similar symptoms for tools written in Go, such as this K8s bug I found:
kubernetes/kubernetes#59482
Not sure if relevant or not, feel free to remove the link from this post if it's a red herring.
danieladams456, BookOfGreg, hoffmc, franciscoruiz, gmetzker and 19 more
Metadata
Metadata
Assignees
Labels
bugAddresses a defect in current functionality.Addresses a defect in current functionality.service/ec2Issues and PRs that pertain to the ec2 service.Issues and PRs that pertain to the ec2 service.