Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

provider/aws: Fix issue in Security Groups with empty IPRanges #1612

Merged
merged 1 commit into from
Apr 21, 2015

Conversation

catsby
Copy link
Contributor

@catsby catsby commented Apr 21, 2015

Either a change in the API, or how the aws-sdk-go library handles things (since moving to upstream), has caused a break in creating Security Groups with self or just a security_groups attribute, as demonstrated in #1600.

This PR changes the behavior to not allocate an empty slice of []*ec2.IPRange if there are no cidr_blocks present. As a result, we correctly send an IPPermission struct with []*ec2.IPRange(nil) in this situation.

Fixes #1600

@phinze
Copy link
Contributor

phinze commented Apr 21, 2015

Solid. LGTM 🚢

catsby added a commit that referenced this pull request Apr 21, 2015
provider/aws: Fix issue in Security Groups with empty IPRanges
@catsby catsby merged commit f44964f into master Apr 21, 2015
@catsby catsby deleted the b-aws-fix-sg-self-rule branch April 21, 2015 16:14
@ghost
Copy link

ghost commented May 3, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@ghost ghost locked and limited conversation to collaborators May 3, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

aws_security_group: ingress w/ security_groups or self=true doesn't work
2 participants