Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: removed the opening of 0.0.0.0/0 in the default value for network acls rules #424

Merged
merged 11 commits into from
Mar 15, 2023

Conversation

jor2
Copy link
Member

@jor2 jor2 commented Mar 9, 2023

Description

Replace this text with a summary of the changes in this PR. Include why the changes are needed and context about the changes. List required dependencies. If there is a Git issue for the change, please link to it.

Types of changes in this PR

https://github.ibm.com/goldeneye/issues/issues/4122

No release required

  • Examples or tests (addition or updates of examples or tests)
  • Documentation update
  • CI-related update (pipeline, etc.)
  • Other changes that don't affect Terraform code

Release required

  • Bug fix (patch release (x.x.X): Change that fixes an issue and is compatible with earlier versions)
  • New feature (minor release (x.X.x): Change that adds functionality and is compatible with earlier versions)
  • Breaking change (major release (X.x.x): Change that is likely incompatible with previous versions)
Release notes content

Replace this text with information that users need to know about the bug fixes, features, and breaking changes. This information helps the merger write the commit message that is published in the release notes for the module.


Checklist for reviewers

  • If relevant, a test for the change is included or updated with this PR.
  • If relevant, documentation for the change is included or updated with this PR.

Merge actions for mergers

  • Merge by using "Squash and merge".

  • Use a relevant conventional commit message that is based on the PR contents and any release notes provided by the PR author.

    The commit message determines whether a new version of the module is needed, and if so, which semver increment to use (major, minor, or patch).

@jor2 jor2 self-assigned this Mar 9, 2023
main.tf Outdated
type = 1
}
}
}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think we want this in the root level module? There is a variable called network_acls that allows the consumers to pass in their ACL config

@@ -0,0 +1,3 @@
{
"scc_goals": []
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

you will need to ignore all of the COS goals (not relevant to the root module here, just the example)
As for the VPC ones, we may need to review each one as a team to decide what to do

@jor2 jor2 requested a review from ocofaigh March 14, 2023 11:13
@ocofaigh ocofaigh changed the title ci: enable cra scan fix: removed the opening of 0.0.0.0/0 in the default value for network acls rules Mar 15, 2023
@ocofaigh ocofaigh merged commit f11a0a9 into main Mar 15, 2023
@ocofaigh ocofaigh deleted the enable-cra branch March 15, 2023 13:22
@terraform-ibm-modules-ops
Copy link
Contributor

🎉 This PR is included in version 5.0.0 🎉

The release is available on:

Your semantic-release bot 📦🚀

gmendel pushed a commit to gmendel/landing-zone-vpc that referenced this pull request Mar 29, 2023
…k acls rules (terraform-ibm-modules#424)

BREAKING CHANGE: If you were consuming the module using the default value for var.network_acls and upgraded to this version, the `allow-all-443-inbound` and `allow-all-443-outbound` ACL rules will be removed since opening 0.0.0.0/0 is not FsCloud compliant.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants