Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Expose VPC endpoint private IP on aws_vpc_endpoint resource #633

Closed
pearsonhenri opened this issue Apr 16, 2021 · 1 comment · Fixed by #635
Closed

Expose VPC endpoint private IP on aws_vpc_endpoint resource #633

pearsonhenri opened this issue Apr 16, 2021 · 1 comment · Fixed by #635

Comments

@pearsonhenri
Copy link

Is your request related to a problem? Please describe.

I want to dynamically create security group egress rules that exclusively permit access to the CIDR of a VPC endpoint. However, the CIDR of the VPC endpoint is not exposed on the Terraform resource: https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/vpc_endpoint#argument-reference

As a result, I end up creating egress rules that just whitelist all traffic in my VPC, simply to allow them to hit the (unknown to Terraform) internal IP of the VPC endpoint.

Describe the solution you'd like.

Just expose the CIDR of the resource, pls :)

Describe alternatives you've considered.

Hardcoding the IP as a variable :(

Additional context

This would probably require modifying the way the associated subnets of the resource are exposed, since an IP is assigned for each subnet the endpoint is deployed in.

@github-actions
Copy link

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Oct 30, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
1 participant