cds-snc / simplify-privacy-statements-V2

starter-app repo based version of privacy app.
https://simplify-privacy-statements.alpha.canada.ca
MIT License
5 stars 1 forks source link

bug/updated-lambda-egress #249

Closed omartehsin1 closed 1 year ago

omartehsin1 commented 1 year ago

Summary | Résumé

Added new lambda egress rule to allow Lambda security group to be able to communicate with EFS.

github-actions[bot] commented 1 year ago

Production: vpc

✅   Terraform Format: success ✅   Terraform Plan: success ✅   Conftest: success

Plan: 1 to add, 0 to change, 0 to destroy
Show plan ```terraform Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # aws_security_group_rule.lambda_egress_efs will be created + resource "aws_security_group_rule" "lambda_egress_efs" { + description = "Allows outbound connections to the EFS" + from_port = 2049 + id = (known after apply) + protocol = "tcp" + security_group_id = "sg-078714ea1197f9904" + security_group_rule_id = (known after apply) + self = false + source_security_group_id = "sg-03097253ad9dae1d8" + to_port = 2049 + type = "egress" } Plan: 1 to add, 0 to change, 0 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: plan.tfplan To perform exactly these actions, run the following command to apply: terraform apply "plan.tfplan" Releasing state lock. This may take a few moments... ```
Show Conftest results ```sh WARN - plan.json - main - Missing Common Tags: ["aws_security_group.efs_access_sg"] WARN - plan.json - main - Missing Common Tags: ["aws_security_group.lambda_access_sg"] 19 tests, 17 passed, 2 warnings, 0 failures, 0 exceptions ```