-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: removed unnecessary conditional in private access security group #915
fix: removed unnecessary conditional in private access security group #915
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for your PR
hello Even worse, because I have a limited access to the underlying AWS account, I'm stuck with this error:
Can you please revert this breaking change? |
@anthonydahanne This PR "corrects" an incorrect behavior. The SG creation doesn't have any relation with the But maybe the correct one should use |
thanks @barryib for your comment! Indeed, it seems more natural to use the variable named It's not because users have a private EKS endpoint that they necessarily need the creation of security groups. I don't think it's uncommon to have users, like me, interacting with an AWS account that has most VPC resources already in place, without any rights to create additional ones. Shall I go ahead and create an issue and corresponding PR ? |
Yes please. |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
PR o'clock
Description
Issue: #914
This fix corrects an incorrect behavior, in which the module requires the user to have enable
manage_aws_auth
variable for the creation of a security_group with the ingress rules necessary to access the private endpoint of the EKS cluster.Checklist