Skip to content

Commit d51f581

Browse files
committed
add feedback from luca
1 parent 085f422 commit d51f581

File tree

2 files changed

+9
-11
lines changed

2 files changed

+9
-11
lines changed

packages/aws-cdk-lib/aws-elasticloadbalancingv2/README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,8 @@ listener.addTargets('AppFleet', {
260260
### Enforce security group inbound rules on PrivateLink traffic for a Network Load Balancer
261261

262262
You can indicate whether to evaluate inbound security group rules for traffic
263-
sent to a Network Load Balancer through AWS PrivateLink. The default is `on`.
263+
sent to a Network Load Balancer through AWS PrivateLink.
264+
The evaluation is enabled by default.
264265

265266
```ts
266267
declare const vpc: ec2.Vpc;

packages/aws-cdk-lib/aws-elasticloadbalancingv2/lib/nlb/network-load-balancer.ts

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ export interface NetworkLoadBalancerProps extends BaseLoadBalancerProps {
4141
/**
4242
* Indicates whether to evaluate inbound security group rules for traffic sent to a Network Load Balancer through AWS PrivateLink.
4343
*
44-
* @default on
44+
* @default true
4545
*/
4646
readonly enforceSecurityGroupInboundRulesOnPrivateLinkTraffic?: boolean;
4747
}
@@ -208,8 +208,8 @@ export class NetworkLoadBalancer extends BaseLoadBalancer implements INetworkLoa
208208
public readonly metrics: INetworkLoadBalancerMetrics;
209209
public readonly ipAddressType?: IpAddressType;
210210
public readonly connections: ec2.Connections;
211-
public readonly enforceSecurityGroupInboundRulesOnPrivateLinkTraffic?: string;
212211
private readonly isSecurityGroupsPropertyDefined: boolean;
212+
private readonly _enforceSecurityGroupInboundRulesOnPrivateLinkTraffic?: boolean;
213213

214214
/**
215215
* After the implementation of `IConnectable` (see https://github.com/aws/aws-cdk/pull/28494), the default
@@ -229,7 +229,7 @@ export class NetworkLoadBalancer extends BaseLoadBalancer implements INetworkLoa
229229
securityGroups: Lazy.list({ produce: () => this.securityGroups }),
230230
ipAddressType: props.ipAddressType,
231231
enforceSecurityGroupInboundRulesOnPrivateLinkTraffic: Lazy.string({
232-
produce: () => this.transformEnforceSecurityGroupInboundRulesOnPrivateLinkTraffic(props.enforceSecurityGroupInboundRulesOnPrivateLinkTraffic),
232+
produce: () => this.enforceSecurityGroupInboundRulesOnPrivateLinkTraffic,
233233
}),
234234
});
235235

@@ -238,15 +238,12 @@ export class NetworkLoadBalancer extends BaseLoadBalancer implements INetworkLoa
238238
this.connections = new ec2.Connections({ securityGroups: props.securityGroups });
239239
this.ipAddressType = props.ipAddressType ?? IpAddressType.IPV4;
240240
if (props.crossZoneEnabled) { this.setAttribute('load_balancing.cross_zone.enabled', 'true'); }
241-
this.enforceSecurityGroupInboundRulesOnPrivateLinkTraffic =
242-
this.transformEnforceSecurityGroupInboundRulesOnPrivateLinkTraffic(props.enforceSecurityGroupInboundRulesOnPrivateLinkTraffic);
241+
this._enforceSecurityGroupInboundRulesOnPrivateLinkTraffic = props.enforceSecurityGroupInboundRulesOnPrivateLinkTraffic;
243242
}
244243

245-
private transformEnforceSecurityGroupInboundRulesOnPrivateLinkTraffic(value: boolean | undefined): string | undefined {
246-
if (value !== undefined) {
247-
return value ? 'on' : 'off';
248-
}
249-
return undefined;
244+
public get enforceSecurityGroupInboundRulesOnPrivateLinkTraffic(): string | undefined {
245+
if (this._enforceSecurityGroupInboundRulesOnPrivateLinkTraffic === undefined) return undefined;
246+
return this._enforceSecurityGroupInboundRulesOnPrivateLinkTraffic ? 'on' : 'off';
250247
}
251248

252249
/**

0 commit comments

Comments
 (0)