Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Using self false icw cidr_blocks should be allowed #1839

Merged
merged 1 commit into from
Oct 16, 2017
Merged

Using self false icw cidr_blocks should be allowed #1839

merged 1 commit into from
Oct 16, 2017

Conversation

svanharmelen
Copy link
Contributor

It’s a valid combination to set self false and using cidr_blocks. So changing the validation to reflect this as currently this gives you a validation error.

It’s a valid combination to set `self false` and `cidr_blocks`. So changing the validation to reflect this as currently you cannot actively set `self` to `false` without getting a validation error.
@radeksimko radeksimko added the bug Addresses a defect in current functionality. label Oct 9, 2017
Copy link
Member

@radeksimko radeksimko left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks.

@radeksimko radeksimko merged commit 1492516 into hashicorp:master Oct 16, 2017
@svanharmelen svanharmelen deleted the f-security-group-rule branch November 15, 2017 11:16
@ghost
Copy link

ghost commented Apr 10, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks!

@ghost ghost locked and limited conversation to collaborators Apr 10, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
bug Addresses a defect in current functionality.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants