-
Notifications
You must be signed in to change notification settings - Fork 152
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
When its property seems to be broken #248
Comments
Thanks for the issue 🎉 . Fixed the problem. It looks like we also need to extend the Security Group step (e.g. |
Just enabled Security Group related step to process Security Group Rules also. Scenario: Ensure ECS Task SGR has tcp/443 defined for public network
Given I have aws_security_group_rule defined
When its security_group_id reference is "aws_security_group.ecs_task"
And its type is egress
And its from_port is 443
Then it must have tcp protocol and port 443 for 0.0.0.0/0' even, you can check your all egress traffic for that specific ecs_task like ; Scenario: Ensure ECS Task SGR has only tcp/443 for public network
Given I have aws_security_group_rule defined
When its security_group_id reference is "aws_security_group.ecs_task"
And its type is egress
Then it must have tcp protocol and port 443 for 0.0.0.0/0' will release this today. |
This issue's conversation is now locked. If you want to continue this discussion please open a new issue. |
Description :
The following when condition doesn't seem to work
When its property is true
When its property is int
To Reproduce
terraform
code, or yourterraform plan
file if it doesn't have any confidential information>-f features
Expected behavior :
All above tests passed
Tested versions :
Additional context
Add any other context about the problem here.
The text was updated successfully, but these errors were encountered: