-
Notifications
You must be signed in to change notification settings - Fork 104
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow full control of security groups for ApplicationListener #361
Comments
It is also problematic because the created security group assumes that a target's port is the same as a listener port, i.e. ingress |
I actually expect |
I need this |
The ethos is fine, but not allowing a way to override is naive and irresponsible, as it narrows the ability to use this library to "happy paths" only since there's no way for you to guess all scenarios your users will try to apply I'm really worried about having picked Pulumi for orchestration for the project my company is working on as we have already invested a lot of time migrating and from what I read there's no workaround to set custom SecurityGroups for our services, which is a must for us. |
I need this. |
ApplicationListener
seems to have two modes when it comes to security groups:external == true
, assume control of the associated load balancer's security groups and open up to the entire public internet. This also setsscheme
tointernet-facing
when calling AWS.external == false
, assume no control of the associated load balancer's security group and setscheme
tointernal
.Part of this logic is at
pulumi-awsx/nodejs/awsx/elasticloadbalancingv2/application.ts
Lines 222 to 234 in a8cab4b
This does not allow for users to fully control the security groups of their load balancers and forces them to pick one of two options that might not fit their needs.
I suggest that if a security group is provided that it is used without modification. In this scenario, the user should be knowledgable enough to fully control the security group's rules.
Additionally the
ApplicationListener
modifying the associated load balancer's security groups provides a confusing "misdirection" when trying to understand this behavior. I'd like it if we could separate this somehow so that when a user is working with aApplicationListener
, the scope of what they're working on is clear and constrained.The text was updated successfully, but these errors were encountered: