Commit Graph

20 Commits

Author SHA1 Message Date
Sander van Harmelen
1619a8138f provider/cloudstack: enhance security groups and rules (#9645)
* govendor: update go-cloudstack dependency

* Separate security groups and rules

This commit separates the creation and management of security groups and security group rules.

It extends the `icmp` options so you can supply `icmp_type` and `icmp_code` to enbale more specific configs.

And it adds lifecycle management of security group rules, so that security groups do not have to be recreated when rules are added or removed.

This is particulary helpful since the `cloudstack_instance` cannot update a security group without having to recreate the instance.

In CloudStack >= 4.9.0 it is possible to update security groups of existing instances, but as that is just added to the latest version it seems a bit too soon to start using this (causing backwards incompatibility issues for people or service providers running older versions).

* Add and update documentation

* Add acceptance tests
2016-10-27 11:10:15 +02:00
Sander van Harmelen
29ce2df873 Fix refresing ACL rules when the ACL is deleted 2016-07-12 21:11:22 +02:00
Sander van Harmelen
c14aa6336e Delete all deprecated parameters before the 0.7 release
Updated the docs accordingly and also executed all the acceptance tests
after making the changes…
2016-06-27 11:13:48 +02:00
Sander van Harmelen
815c8840a7 Refactor the use of names vs IDs for parameters referencing other TF resources
We have a curtesy function in place allowing you to specify both a
`name` of `ID`. But in order for the graph to be build correctly when
you recreate or taint stuff that other resources depend on, we need to
reference the `ID` and *not* the `name`.

So in order to enforce this and by that help people to not make this
mistake unknowingly, I deprecated all the parameters this allies to and
changed the logic, docs and tests accordingly.
2016-04-11 17:14:28 +02:00
Sander van Harmelen
3385100f56 Make the concurrence for applying rules configurable 2016-01-21 21:30:54 +01:00
Sander van Harmelen
20901a6478 Add a check to see if the port value is valid
Without this additional check it could happen that one of the firewall
resources would panic is given an unexpected port value.
2016-01-21 09:38:14 +01:00
Sander van Harmelen
b8f3417e79 Change all firewall related resources to take a cidr_list
Also some additional tweaks to improve performance and add in a little
concurrency to speed things up a little.
2015-12-03 15:34:53 +01:00
Sander van Harmelen
84645bd8b5 More tweaks to improve performance 2015-12-01 00:36:33 +01:00
Sander van Harmelen
a3eae45b32 Improve performance all firewall related resources 2015-11-24 18:27:52 +01:00
Sander van Harmelen
350b8e2df2 Small refactor of the UUID/UnlimitedResourceID logic
This makes things a little more generic and robust.
2015-10-05 14:05:21 +02:00
Anthony Scalisi
198e1a5186 remove various typos 2015-09-11 11:56:20 -07:00
Sander van Harmelen
28b7b53be6 Updates and tweaks 2015-07-16 17:40:11 +02:00
Sander van Harmelen
764bdbcac9 Merge pull request #1711 from jeroendekorte/b-cloudstack-aclrule
Provider/Cloudstack: Fixed the acl rules to support protocol all and icmp
2015-04-28 18:39:21 +02:00
Jeroen de Korte
92128b48a8 Added support for protocol all and fixed the hash diff for icmp and all 2015-04-28 17:05:43 +02:00
Trevor Pounds
fe62312617 Fix comment typos. 2015-04-24 10:25:19 -07:00
Sander van Harmelen
033cee31f3 Fixing a small bug in the ACL rule hash function
Since the default value is not available in the initial config (when
`action` or `traffic_type` is omitted), the result would be `nil`
instead of a string when trying to access one of these the values.
2015-03-03 13:40:28 +01:00
Sander van Harmelen
8f223c020b Extending the managed firewall option
It’s now also possible to don’t give any rules, when the firewall is
configured with `managed = true`. This will in effect mean; make sure
no rules exist at all for the firewall.
2015-01-16 13:26:43 +01:00
Sander van Harmelen
19776ba402 Updating some logic and tests
These fixes are needed to make the provider work with master again.
These are still some issues, but they seem not to be related to the
provider, but the changes in `helper/schema`.
2015-01-15 11:29:04 +01:00
Sander van Harmelen
3898098c78 Adding the ability to manage the whole firewall
This goes for the normal firewall, the egress firewall and the network
ACL.

USE WITH CAUTION! When setting `managed = true` in your config, it
means it will delete all firewall rules that are not in your config, so
unknown to TF.

Also adding the new `cloudstack_egress_firewall` resource with this
commit and updating go-cloudstack to the latest API version (v4.4)
2015-01-15 10:04:09 +01:00
Sander van Harmelen
4910423d83 First release of a provider for CloudStack
Of course not all resources are covered by this first release, but
there should be enough resources available to handle most common
operations.

Tests and docs are included.
2014-12-10 22:20:52 +01:00