This message was deleted.
# aws
s
This message was deleted.
b
I don't think this will work and I think you should be using
aws.ec2.SecurityGroupRule
to add rules to an
aws.ec2.SecurityGroup
that you have already declared
s
Aha!
Okay, thanks - you've saved me another N days of bashing my head 🙂
🙌 1
b
yes, to clarify on what Joshua said, the SecurityGroup API call used here is immutable, so if you make changed it'll delete/replace. If you use securitygroup rule it can be updated without impact
✅ 1
s
My team is coming from CDK - is it safe to say that most "mutations" of pre-existing resources are done by declaring new, additional resources (sort of like PolicyRoleAttachment in IAM?)
b
yes that's right
s
Awesome. Thanks!
b
btw, would love to get some feedback and thoughts about the migration when you're happy to chat about it!
s
You're probably already hearing from us, somebody else on my team had a video call with somebody at pulumi yesterday 🙂
b
awesome to hear!
f
👋 I am that other person 😂
👀 1
b
I know you chatted with Cam and Robby yesterday, but would love to chat with you about your experience with CDK and Pulumi when you get chance! lmk if you're open to it!
f
My personal experience with CDK consists of moving away from it 😂 That being said, it seems like there is a bit more "magic" in CDK than Pulumi, which has made Pulumi much more comprehensible (for me, at least).
but I'm down for a chat anytime
s
One ask is: If these fields are genuinely immutable, could we remove the @property setters on them (or at least document that they're for internal use only?)