terraform/ecc-openstack-023-unrestricted_outbound_traffic/green/network.tf (49 lines of code) (raw):
resource "openstack_networking_secgroup_v2" "this" {
name = "023-security_group-green"
description = "023-security_group-green"
delete_default_rules = true
tags = [
"CustodianRule = ecc-openstack-023-unrestricted_outbound_traffic",
"ComplianceStatus = Green"
]
}
resource "openstack_networking_secgroup_rule_v2" "secgroup_rule_1" {
direction = "egress"
ethertype = "IPv6"
protocol = "tcp"
port_range_min = 2
port_range_max = 65535
remote_ip_prefix = "1111:0000:0000:0000:0000:0000:0000:0000/0"
security_group_id = openstack_networking_secgroup_v2.this.id
}
resource "openstack_networking_secgroup_rule_v2" "secgroup_rule_2" {
direction = "egress"
ethertype = "IPv4"
protocol = "tcp"
port_range_min = 22
port_range_max = 22
remote_group_id = data.openstack_networking_secgroup_v2.this.id
security_group_id = openstack_networking_secgroup_v2.this.id
}
resource "openstack_networking_secgroup_rule_v2" "secgroup_rule_3" {
direction = "egress"
ethertype = "IPv4"
protocol = "tcp"
port_range_min = 80
port_range_max = 80
remote_ip_prefix = "10.0.0.0/16"
security_group_id = openstack_networking_secgroup_v2.this.id
}
resource "openstack_networking_secgroup_rule_v2" "secgroup_rule_4" {
direction = "egress"
ethertype = "IPv4"
remote_group_id = data.openstack_networking_secgroup_v2.this.id
security_group_id = openstack_networking_secgroup_v2.this.id
}
data "openstack_networking_secgroup_v2" "this" {
name = "default"
tenant_id = data.openstack_identity_project_v3.this.id
}
data "openstack_identity_project_v3" "this" {
name = var.project_name
}