Skip to content

Disallow passing a vpc.securityGroup with external security group rules#7030

Merged
cPu1 merged 2 commits intoeksctl-io:mainfrom
cPu1:fix-unowned-sg
Sep 5, 2023
Merged

Disallow passing a vpc.securityGroup with external security group rules#7030
cPu1 merged 2 commits intoeksctl-io:mainfrom
cPu1:fix-unowned-sg

Conversation

@cPu1
Copy link
Contributor

@cPu1 cPu1 commented Aug 31, 2023

Description

This changelist adds validation to disallow passing a vpc.securityGroup with external security group rules.

Closes #6455

Checklist

  • Added tests that cover your change (if possible)
  • Added/modified documentation as required (such as the README.md, or the userdocs directory)
  • Manually tested
  • Made sure the title of the PR is a good description that can go into the release notes
  • (Core team) Added labels for change area (e.g. area/nodegroup) and kind (e.g. kind/improvement)

BONUS POINTS checklist: complete for good vibes and maybe prizes?! 🤯

  • Backfilled missing tests for code in same general area 🎉
  • Refactored something and made the world a better place 🌟

@cPu1 cPu1 added the kind/bug label Aug 31, 2023
@cPu1 cPu1 force-pushed the fix-unowned-sg branch 2 times, most recently from 6f82046 to 8a3934f Compare August 31, 2023 12:04
@cPu1 cPu1 marked this pull request as ready for review August 31, 2023 12:19
@cPu1 cPu1 force-pushed the fix-unowned-sg branch 4 times, most recently from 0b0e3e6 to 5d082c7 Compare September 4, 2023 14:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Bug] eksctl removed the "allow all" outbound rule of the control plane security group

2 participants