Skip to content

Commit 10f401a

Browse files
0x2b3bfa0restyled-commitsdacbd
authored
Search for security group identifiers instead of names if they start with sg- (#364)
* Accept security group identifiers * Restyled by gofmt * HasPrefix Co-authored-by: Restyled.io <commits@restyled.io> Co-authored-by: Daniel Barnes <dabarnes2b@gmail.com>
1 parent c3f1bd2 commit 10f401a

File tree

1 file changed

+17
-9
lines changed

1 file changed

+17
-9
lines changed

iterative/aws/provider.go

Lines changed: 17 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -178,16 +178,24 @@ func ResourceMachineCreate(ctx context.Context, d *schema.ResourceData, m interf
178178
}
179179
}
180180

181+
sgFilters := []types.Filter{}
182+
if strings.HasPrefix(securityGroup, "sg-") {
183+
sgFilters = append(sgFilters, types.Filter{
184+
Name: aws.String("group-id"),
185+
Values: []string{securityGroup},
186+
})
187+
} else {
188+
sgFilters = append(sgFilters, types.Filter{
189+
Name: aws.String("group-name"),
190+
Values: []string{
191+
securityGroup,
192+
strings.Title(securityGroup),
193+
strings.ToUpper(securityGroup)},
194+
})
195+
}
196+
181197
sgDesc, err := svc.DescribeSecurityGroups(ctx, &ec2.DescribeSecurityGroupsInput{
182-
Filters: []types.Filter{
183-
{
184-
Name: aws.String("group-name"),
185-
Values: []string{
186-
securityGroup,
187-
strings.Title(securityGroup),
188-
strings.ToUpper(securityGroup)},
189-
},
190-
},
198+
Filters: sgFilters,
191199
})
192200
if err != nil {
193201
return decodeAWSError(region, err)

0 commit comments

Comments
 (0)