Skip to content

Commit d8daeae

Browse files
Update compute_security_policy docs to match src_ip_ranges constraints (#3808) (#2326)
The limit of 5 IP ranges per rule was increased to 10 in #3516. This commit updates the related documentation. Signed-off-by: Modular Magician <[email protected]>
1 parent f14ef45 commit d8daeae

File tree

3 files changed

+5
-2
lines changed

3 files changed

+5
-2
lines changed

.changelog/3808.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
```release-note:none
2+
This only updates the description and website documentation. The functionality was already implemented and added to the release notes. No further mention in the release notes is necessary.
3+
```

google-beta/resource_compute_security_policy.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ func resourceComputeSecurityPolicy() *schema.Resource {
8989
MinItems: 1,
9090
MaxItems: 10,
9191
Elem: &schema.Schema{Type: schema.TypeString},
92-
Description: `Set of IP addresses or ranges (IPV4 or IPV6) in CIDR notation to match against inbound traffic. There is a limit of 5 IP ranges per rule. A value of '*' matches all IPs (can be used to override the default behavior).`,
92+
Description: `Set of IP addresses or ranges (IPV4 or IPV6) in CIDR notation to match against inbound traffic. There is a limit of 10 IP ranges per rule. A value of '*' matches all IPs (can be used to override the default behavior).`,
9393
},
9494
},
9595
},

website/docs/r/compute_security_policy.html.markdown

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ The `match` block supports:
9898
The `config` block supports:
9999

100100
* `src_ip_ranges` - (Required) Set of IP addresses or ranges (IPV4 or IPV6) in CIDR notation
101-
to match against inbound traffic. There is a limit of 5 IP ranges per rule. A value of '\*' matches all IPs
101+
to match against inbound traffic. There is a limit of 10 IP ranges per rule. A value of '\*' matches all IPs
102102
(can be used to override the default behavior).
103103

104104
The `expr` block supports:

0 commit comments

Comments
 (0)