provider/openstack: Add to support protocols for resourceNetworkingSecGroupRuleV2
This commit is contained in:
parent
58ccbbeca1
commit
7ec662b243
|
@ -236,6 +236,42 @@ func resourceNetworkingSecGroupRuleV2DetermineProtocol(v string) rules.RuleProto
|
||||||
protocol = rules.ProtocolUDP
|
protocol = rules.ProtocolUDP
|
||||||
case "icmp":
|
case "icmp":
|
||||||
protocol = rules.ProtocolICMP
|
protocol = rules.ProtocolICMP
|
||||||
|
case "ah":
|
||||||
|
protocol = rules.ProtocolAH
|
||||||
|
case "dccp":
|
||||||
|
protocol = rules.ProtocolDCCP
|
||||||
|
case "egp":
|
||||||
|
protocol = rules.ProtocolEGP
|
||||||
|
case "esp":
|
||||||
|
protocol = rules.ProtocolESP
|
||||||
|
case "gre":
|
||||||
|
protocol = rules.ProtocolGRE
|
||||||
|
case "igmp":
|
||||||
|
protocol = rules.ProtocolIGMP
|
||||||
|
case "ipv6-encap":
|
||||||
|
protocol = rules.ProtocolIPv6Encap
|
||||||
|
case "ipv6-frag":
|
||||||
|
protocol = rules.ProtocolIPv6Frag
|
||||||
|
case "ipv6-icmp":
|
||||||
|
protocol = rules.ProtocolIPv6ICMP
|
||||||
|
case "ipv6-nonxt":
|
||||||
|
protocol = rules.ProtocolIPv6NoNxt
|
||||||
|
case "ipv6-opts":
|
||||||
|
protocol = rules.ProtocolIPv6Opts
|
||||||
|
case "ipv6-route":
|
||||||
|
protocol = rules.ProtocolIPv6Route
|
||||||
|
case "ospf":
|
||||||
|
protocol = rules.ProtocolOSPF
|
||||||
|
case "pgm":
|
||||||
|
protocol = rules.ProtocolPGM
|
||||||
|
case "rsvp":
|
||||||
|
protocol = rules.ProtocolRSVP
|
||||||
|
case "sctp":
|
||||||
|
protocol = rules.ProtocolSCTP
|
||||||
|
case "udplite":
|
||||||
|
protocol = rules.ProtocolUDPLite
|
||||||
|
case "vrrp":
|
||||||
|
protocol = rules.ProtocolVRRP
|
||||||
}
|
}
|
||||||
|
|
||||||
return protocol
|
return protocol
|
||||||
|
|
|
@ -46,9 +46,28 @@ The following arguments are supported:
|
||||||
* `ethertype` - (Required) The layer 3 protocol type, valid values are __IPv4__
|
* `ethertype` - (Required) The layer 3 protocol type, valid values are __IPv4__
|
||||||
or __IPv6__. Changing this creates a new security group rule.
|
or __IPv6__. Changing this creates a new security group rule.
|
||||||
|
|
||||||
* `protocol` - (Optional) The layer 4 protocol type, valid values are __tcp__,
|
* `protocol` - (Optional) The layer 4 protocol type, valid values are following. Changing this creates a new security group rule. This is required if you want to specify a port range.
|
||||||
__udp__ or __icmp__. This is required if you want to specify a port range.
|
* __tcp__
|
||||||
Changing this creates a new security group rule.
|
* __udp__
|
||||||
|
* __icmp__
|
||||||
|
* __ah__
|
||||||
|
* __dccp__
|
||||||
|
* __egp__
|
||||||
|
* __esp__
|
||||||
|
* __gre__
|
||||||
|
* __igmp__
|
||||||
|
* __ipv6-encap__
|
||||||
|
* __ipv6-frag__
|
||||||
|
* __ipv6-icmp__
|
||||||
|
* __ipv6-nonxt__
|
||||||
|
* __ipv6-opts__
|
||||||
|
* __ipv6-route__
|
||||||
|
* __ospf__
|
||||||
|
* __pgm__
|
||||||
|
* __rsvp__
|
||||||
|
* __sctp__
|
||||||
|
* __udplite__
|
||||||
|
* __vrrp__
|
||||||
|
|
||||||
* `port_range_min` - (Optional) The lower part of the allowed port range, valid
|
* `port_range_min` - (Optional) The lower part of the allowed port range, valid
|
||||||
integer value needs to be between 1 and 65535. Changing this creates a new
|
integer value needs to be between 1 and 65535. Changing this creates a new
|
||||||
|
|
Loading…
Reference in New Issue