provider/openstack: Add to support protocols for resourceNetworkingSecGroupRuleV2
This commit is contained in:
parent
58ccbbeca1
commit
7ec662b243
|
@ -236,6 +236,42 @@ func resourceNetworkingSecGroupRuleV2DetermineProtocol(v string) rules.RuleProto
|
|||
protocol = rules.ProtocolUDP
|
||||
case "icmp":
|
||||
protocol = rules.ProtocolICMP
|
||||
case "ah":
|
||||
protocol = rules.ProtocolAH
|
||||
case "dccp":
|
||||
protocol = rules.ProtocolDCCP
|
||||
case "egp":
|
||||
protocol = rules.ProtocolEGP
|
||||
case "esp":
|
||||
protocol = rules.ProtocolESP
|
||||
case "gre":
|
||||
protocol = rules.ProtocolGRE
|
||||
case "igmp":
|
||||
protocol = rules.ProtocolIGMP
|
||||
case "ipv6-encap":
|
||||
protocol = rules.ProtocolIPv6Encap
|
||||
case "ipv6-frag":
|
||||
protocol = rules.ProtocolIPv6Frag
|
||||
case "ipv6-icmp":
|
||||
protocol = rules.ProtocolIPv6ICMP
|
||||
case "ipv6-nonxt":
|
||||
protocol = rules.ProtocolIPv6NoNxt
|
||||
case "ipv6-opts":
|
||||
protocol = rules.ProtocolIPv6Opts
|
||||
case "ipv6-route":
|
||||
protocol = rules.ProtocolIPv6Route
|
||||
case "ospf":
|
||||
protocol = rules.ProtocolOSPF
|
||||
case "pgm":
|
||||
protocol = rules.ProtocolPGM
|
||||
case "rsvp":
|
||||
protocol = rules.ProtocolRSVP
|
||||
case "sctp":
|
||||
protocol = rules.ProtocolSCTP
|
||||
case "udplite":
|
||||
protocol = rules.ProtocolUDPLite
|
||||
case "vrrp":
|
||||
protocol = rules.ProtocolVRRP
|
||||
}
|
||||
|
||||
return protocol
|
||||
|
|
|
@ -46,9 +46,28 @@ The following arguments are supported:
|
|||
* `ethertype` - (Required) The layer 3 protocol type, valid values are __IPv4__
|
||||
or __IPv6__. Changing this creates a new security group rule.
|
||||
|
||||
* `protocol` - (Optional) The layer 4 protocol type, valid values are __tcp__,
|
||||
__udp__ or __icmp__. This is required if you want to specify a port range.
|
||||
Changing this creates a new security group rule.
|
||||
* `protocol` - (Optional) The layer 4 protocol type, valid values are following. Changing this creates a new security group rule. This is required if you want to specify a port range.
|
||||
* __tcp__
|
||||
* __udp__
|
||||
* __icmp__
|
||||
* __ah__
|
||||
* __dccp__
|
||||
* __egp__
|
||||
* __esp__
|
||||
* __gre__
|
||||
* __igmp__
|
||||
* __ipv6-encap__
|
||||
* __ipv6-frag__
|
||||
* __ipv6-icmp__
|
||||
* __ipv6-nonxt__
|
||||
* __ipv6-opts__
|
||||
* __ipv6-route__
|
||||
* __ospf__
|
||||
* __pgm__
|
||||
* __rsvp__
|
||||
* __sctp__
|
||||
* __udplite__
|
||||
* __vrrp__
|
||||
|
||||
* `port_range_min` - (Optional) The lower part of the allowed port range, valid
|
||||
integer value needs to be between 1 and 65535. Changing this creates a new
|
||||
|
|
Loading…
Reference in New Issue