Skip to content

Conversation

@shreyasms07
Copy link
Collaborator

Community Note

  • Please vote on this pull request by adding a 👍 reaction to the original pull request comment to help the community and maintainers prioritize this request
  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for pull request followers and do not help prioritize the request

Relates OR Closes #0000

Output from acceptance testing:

$ make testacc TESTARGS='-run=TestAccXXX'

...

@shreyasms07 shreyasms07 requested a review from uibm as a code owner August 17, 2025 15:12
- `local` - (String) The local IP address or range of local IP addresses to which this rule will allow inbound traffic (or from which, for outbound traffic). A CIDR block of 0.0.0.0/0 allows traffic to all local IP addresses (or from all local IP addresses, for outbound rules). an IP address, a `CIDR` block.
- `ip_version` - (Optional, String) The IP version to enforce. The format of local.address, remote.address, local.cidr_block or remote.cidr_block must match this property, if they are used. If remote references a security group, then this rule only applies to IP addresses (network interfaces) in that group matching this IP version. Supported value is [`ipv4`].
- `icmp` - (Optional, List) A nested block describes the `icmp` protocol of this security group rule.
- `name` - (String) The name for this security group rule. The name must not be used by another rule in the security group.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it should be optional as well ?

-arch="${XC_ARCH}" \
-osarch="${XC_EXCLUDE_OSARCH}" \
-ldflags "${LD_FLAGS}" \
-output "pkg/{{.OS}}_{{.Arch}}/terraform-provider-ibm" \
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

not required

isVPCSecurityGroupRuleRemote = "remote"
isVPCSecurityGroupRuleType = "type"
isVPCSecurityGroupRuleCode = "code"
isVPCSecurityGroupRuleName = "name"
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this has no code changes for rule name ?

Computed: true,
},

isVPCSecurityGroupRuleName: {
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

test changes for this

if securityGroupRule.Code != nil {
icmpProtocol["code"] = *securityGroupRule.Code
}
if securityGroupRule.Name != nil {
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why is rule name set to protocol ?

@shreyasms07 shreyasms07 force-pushed the security-group-rule-name branch from 4b70c7b to c4e3c46 Compare December 9, 2025 15:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants