terraform/ecc-openstack-023-unrestricted_outbound_traffic/green/network.tf (49 lines of code) (raw):

resource "openstack_networking_secgroup_v2" "this" { name = "023-security_group-green" description = "023-security_group-green" delete_default_rules = true tags = [ "CustodianRule = ecc-openstack-023-unrestricted_outbound_traffic", "ComplianceStatus = Green" ] } resource "openstack_networking_secgroup_rule_v2" "secgroup_rule_1" { direction = "egress" ethertype = "IPv6" protocol = "tcp" port_range_min = 2 port_range_max = 65535 remote_ip_prefix = "1111:0000:0000:0000:0000:0000:0000:0000/0" security_group_id = openstack_networking_secgroup_v2.this.id } resource "openstack_networking_secgroup_rule_v2" "secgroup_rule_2" { direction = "egress" ethertype = "IPv4" protocol = "tcp" port_range_min = 22 port_range_max = 22 remote_group_id = data.openstack_networking_secgroup_v2.this.id security_group_id = openstack_networking_secgroup_v2.this.id } resource "openstack_networking_secgroup_rule_v2" "secgroup_rule_3" { direction = "egress" ethertype = "IPv4" protocol = "tcp" port_range_min = 80 port_range_max = 80 remote_ip_prefix = "10.0.0.0/16" security_group_id = openstack_networking_secgroup_v2.this.id } resource "openstack_networking_secgroup_rule_v2" "secgroup_rule_4" { direction = "egress" ethertype = "IPv4" remote_group_id = data.openstack_networking_secgroup_v2.this.id security_group_id = openstack_networking_secgroup_v2.this.id } data "openstack_networking_secgroup_v2" "this" { name = "default" tenant_id = data.openstack_identity_project_v3.this.id } data "openstack_identity_project_v3" "this" { name = var.project_name }