123456789101112131415161718192021222324252627282930313233 |
- resource "aws_security_group" "allow_access" {
- name_prefix = local.unique_id
- description = "Allow inbound traffic"
- vpc_id = aws_vpc.main.id
- ingress {
- description = "Allow all inbound."
- from_port = 0
- to_port = 0
- protocol = "-1"
- cidr_blocks = [aws_vpc.main.cidr_block]
- }
- egress {
- description = "Allow all outbound."
- from_port = 0
- to_port = 0
- protocol = "-1"
- # tfsec:ignore:aws-ec2-no-public-egress-sgr For the lab, all outbound is fine.
- cidr_blocks = ["0.0.0.0/0"]
- }
- depends_on = [aws_subnet.main]
- lifecycle {
- ignore_changes = [
- ingress,
- egress,
- ]
- }
- tags = local.tags
- }
|