Network Firewall Rule/RuleGroup Documentation: One of the examples doesn't apply to Pulumi's implementation #1998
Labels
area/docs
Improvements or additions to documentation
kind/bug
Some behavior is incorrect or out of spec
resolution/no-repro
This issue wasn't able to be reproduced
What happened?
This example: https://www.pulumi.com/registry/packages/aws/api-docs/networkfirewall/rulegroup/#stateful-inspection-for-permitting-packets-from-a-source-ip-address
shows the use of a "dynamic" property which doesn't exist in Pulumi.
From looking at the analogous terraform provider (https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/networkfirewall_rule_group#stateful-inspection-for-permitting-packets-from-a-source-ip-address), it appears this "dynamic" construct is provided in terraform to support a looping mechanism to declare multiple rules.
However, in Pulumi, this would be done using a standard for-loop for the given language and then creating rules ala the DROP example here: https://www.pulumi.com/registry/packages/aws/api-docs/networkfirewall/rulegroup/#stateful-inspection-for-blocking-packets-from-going-to-an-intended-destination
Steps to reproduce
Look at the docs.
Expected Behavior
The examples for the different languages should demonstrate the use of a language-specific for-loop to accomplish the intent of the example.
Actual Behavior
The "dynamic" property doesn't exist.
Versions used
No response
Additional context
You can work around this by using a for-loop over the dynamic property and create the Rule in the body of the for-loop.
Contributing
Vote on this issue by adding a 👍 reaction.
To contribute a fix for this issue, leave a comment (and link to your pull request, if you've opened one already).
The text was updated successfully, but these errors were encountered: