You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Issue 4404: Add support for "icmpv6" protocol to ASGs (#4424)
* Issue 4404: Add support for "icmpv6" protocol to ASGs
* "icmpv6" can be used if "enable_ipv6" is configured
* "icmp" destinations may only consist of IPv4 addresses
* "icmpv6" destinations may only consist of IPv6 addresses
* Fix Rubocop findings
* Add test for icmpv6 with IPv6 address range
* and fix version check
* Spec for icmp with IPv4 address range
* Add "icmpv6" protocol to SecurityGroup class
* Update v3 security group docu with "icmpv6" protocol
add_rule_error("maximum destinations per rule exceeded - must be under #{MAX_DESTINATIONS_PER_RULE}",record,index)unlessdestinations.length <= MAX_DESTINATIONS_PER_RULE
error_message='destination must be a valid CIDR, IP address, or IP address range'
133
146
error_message='destination must contain valid CIDR(s), IP address(es), or IP address range(s)'ifCloudController::RuleValidator.comma_delimited_destinations_enabled?
134
147
add_rule_error('empty destination specified in comma-delimited list',record,index)ifdestination.empty?
Copy file name to clipboardExpand all lines: docs/v3/source/includes/resources/security_groups/_object.md.erb
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -25,8 +25,8 @@ Name | Type | Description
25
25
26
26
| Name | Type | Description | Required | Default
27
27
| ---- | ---- | ----------- | -------- | -------
28
-
| **protocol** | _string_ | Protocol type Valid values are `tcp`, `udp`, `icmp`, or `all` | yes | N/A |
29
-
| **destination** | _string_ | The destination where the rule applies. Must be a singular Valid CIDR, IP address, or IP address range unless `cc.security_groups.enable_comma_delimited_destinations` is enabled. Then, the destination can be a comma-delimited string of CIDRs, IP addresses, or IP address ranges. Octets within destinations cannot contain leading zeros; eg. `10.0.0.0/24` is valid, but `010.00.000.0/24` is *not*. | yes | N/A |
28
+
| **protocol** | _string_ | Protocol type Valid values are `tcp`, `udp`, `icmp`, `icmpv6` or `all` | yes | N/A |
29
+
| **destination** | _string_ | The destination where the rule applies. Must be a singular valid CIDR, IP address, or IP address range unless `cc.security_groups.enable_comma_delimited_destinations` is enabled. Then, the destination can be a comma-delimited string of CIDRs, IP addresses, or IP address ranges. Octets within destinations cannot contain leading zeros; eg. `10.0.0.0/24` is valid, but `010.00.000.0/24` is *not*. For `icmp`, only IPv4 addresses are allowed and for `icmpv6` only IPv6 addresses. | yes | N/A |
30
30
| **ports** | _string_ | Ports that the rule applies to; can be a single port (`9000`), a comma-separated list (`9000,9001`), or a range (`9000-9200`) | no | `null` |
31
31
| **type** | _integer_ |[Type](https://www.iana.org/assignments/icmp-parameters/icmp-parameters.xhtml#icmp-parameters-types) required for ICMP protocol; valid values are between -1 and 255 (inclusive), where -1 allows all | no | `null` |
32
32
| **code** | _integer_ |[Code](https://www.iana.org/assignments/icmp-parameters/icmp-parameters.xhtml#icmp-parameters-codes) required for ICMP protocol; valid values are between -1 and 255 (inclusive), where -1 allows all | no | `null` |
0 commit comments