We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
rules
When deploying the provided template you will get the errorInvalid value for portRange. Must specify both from and to ports with ICMP
Invalid value for portRange. Must specify both from and to ports with ICMP
When using tcp, udp, and icmp a port range must be specified.
tcp
udp
icmp
Resources: IngressRule: Type: AWS::EC2::SecurityGroup Properties: GroupDescription: 'Security Group Vpc' VpcId: "vpc-redacted" SecurityGroupIngress: - IpProtocol: 1 SourceSecurityGroupName: default
Docs: https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-securitygroup-ingress.html#cfn-ec2-securitygroup-ingress-ipprotocol
The text was updated successfully, but these errors were encountered:
IpProtocol of 1, icmp, icmpv6 can use FromPort to -1 and ToPort to -1 if one of the values is -1 the other one has to be -1
IpProtocol
FromPort
ToPort
Sorry, something went wrong.
In this example to and from ports are ignored. This should be warning. The same holds for IpProtocol when it isn't icmp,icmpv6,tcp,udp
Resources: SG1: Type: AWS::EC2::SecurityGroup Properties: GroupDescription: "some_group_desc" VpcId: vpc-0a3447fff60767d73 SecurityGroupIngress: - IpProtocol: -1 CidrIp: 10.0.0.0/8 FromPort: 1 ToPort: 65535
No branches or pull requests
Is this feature request related to a new rule or cfn-lint capabilities?
rules
Describe the feature you'd like to request
When deploying the provided template you will get the error
Invalid value for portRange. Must specify both from and to ports with ICMP
Describe the solution you'd like
When using
tcp
,udp
, andicmp
a port range must be specified.Additional context
Docs: https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-securitygroup-ingress.html#cfn-ec2-securitygroup-ingress-ipprotocol
Is this something that you'd be interested in working on?
Would this feature include a breaking change?
The text was updated successfully, but these errors were encountered: