-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(ec2): support all Security Group protocols #13497
Conversation
Title does not follow the guidelines of Conventional Commits. Please adjust title before merge. |
Great. This is the info I'm looking for. I think that |
But are you going to make functions for every protocol? It seems unnecessary, users can just construct a Port as needed for all these obscure protocols:
|
here are two commits to clean up the cruft from my original pr if you want to swipe them for your PR. First one removes the tests there were added and the second adds the protocols to the list of ignored docs in |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Build fails
Protocol numbers must be used for all but a handful of protocols. See https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-security-group-rule-1.html#cfn-ec2-security-group-rule-ipprotocol
I don't have access to the failed logs so I don't know why build is failing |
@rectalogic the comment above includes the a link to the logs. |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
It's failing because I removed the APIs added by the previous botched merge
|
It's addressed in #13593. Sorry for the confusion |
I think this PR is no longer necessary, right? |
right |
Protocol numbers must be used for all but a handful of protocols.
Issue #13403 was closed with an incorrect PR merge #13471. According to CFN docs only a handful of protocol names are supported, protocol numbers must be used for the rest.
https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-security-group-rule-1.html#cfn-ec2-security-group-rule-ipprotocol
This adds all protocol numbers to the enum.
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license