Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[breaking] Fix aws-redis-node security groups #149

Merged
merged 2 commits into from
Oct 17, 2019
Merged

Conversation

mbarrien
Copy link
Contributor

aws-redis-node (and its predecessor in shared-infra, redis-node) had a bug (or at least a naming bug), where the variable named "ingress_security_groups" which ostensibly controlled which security groups were allowed to access the cache, instead assigned the security group that were assigned to Elasticache. In all cases in CZI repos so far, this was set to be the security group assigned to the worker nodes, which happened to allow access to all traffic.

The PR makes this module match the description of ingress_security_group by introducing a new security group in between, assigning the cache the new security group and allowing ingress into that security group from the input security groups, only to the port Redis is listening on.

This PR is breaking because we now need the vpc_id as a new input to be able to create the new intermediate security group. It is also breaking (although not used in this way anywhere in CZI's code base) since it now requires service to be provided, and does not provide a default.

@mbarrien mbarrien requested a review from a team as a code owner October 16, 2019 00:51
@mbarrien mbarrien force-pushed the mbarrien/redis-sg branch 3 times, most recently from 22be77b to f87e7bb Compare October 16, 2019 20:38
@czimergebot czimergebot merged commit cf65285 into master Oct 17, 2019
@czimergebot czimergebot deleted the mbarrien/redis-sg branch October 17, 2019 21:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants