@@ -388,7 +388,7 @@ def export_network(prim_options=[]):
388
388
# Update modified path list
389
389
regions_path = export_regions .copy ()
390
390
regions_path .append ("global" )
391
- service_dirs = [service_dir_network , service_dir_nsg , service_dir_vlan ,'rpc' ]
391
+ service_dirs = [service_dir_network , service_dir_seclist , service_dir_nsg , service_dir_vlan ,'rpc' ]
392
392
update_path_list (regions_path = regions_path , service_dirs = service_dirs )
393
393
394
394
def export_networking (inputfile , outdir ,config , signer , ct , export_regions ):
@@ -404,6 +404,7 @@ def export_networking(inputfile, outdir,config, signer, ct, export_regions):
404
404
405
405
options = [
406
406
Option (None , Network .create_terraform_dhcp_options , 'Processing DHCP Tab' ),
407
+ Option (None , Network .modify_terraform_secrules , 'Processing SecRulesinOCI Tab' ),
407
408
Option (None , Network .modify_terraform_routerules , 'Processing RouteRulesinOCI Tab' ),
408
409
Option (None , Network .modify_terraform_drg_routerules , 'Processing DRGRouteRulesinOCI Tab' ),
409
410
]
@@ -423,16 +424,9 @@ def export_networking(inputfile, outdir,config, signer, ct, export_regions):
423
424
424
425
options = [ Option (None , Network .create_terraform_nsg , 'Processing NSGs Tab' ), ]
425
426
execute_options (options , inputfile , outdir , service_dir_nsg , prefix , ct )
426
-
427
- options = [Option (None , Network .create_terraform_seclist , 'Processing SecRulesinOCI Tab' ), ]
428
- execute_options (options , inputfile , outdir , service_dir_seclist , prefix , ct , non_gf_tenancy )
429
-
430
- print (
431
- "\n \n Execute tf_import_commands_network_*_nonGF.sh script created under each region directory to synch TF with OCI Network objects\n " )
432
- for service in [service_dir_network , service_dir_vlan , service_dir_nsg , service_dir_seclist ]:
433
- if service not in service_dirs :
434
- service_dirs .append (service )
435
-
427
+ print ("\n \n Execute tf_import_commands_network_*_nonGF.sh script created under each region directory to synch TF with OCI Network objects\n " )
428
+ for service in [service_dir_network ,service_dir_vlan ,service_dir_nsg ]:
429
+ service_dirs .append (service_dir_network ) if service_dir_network not in service_dirs else service_dirs
436
430
437
431
def export_major_objects (inputfile , outdir , config , signer , ct , export_regions ):
438
432
compartments = ct .get_compartment_map (var_file ,'VCN Major Objects' )
@@ -466,11 +460,11 @@ def export_dhcp(inputfile, outdir,config,signer,ct,export_regions):
466
460
467
461
def export_secrules (inputfile , outdir ,config ,signer ,ct ,export_regions ):
468
462
compartments = ct .get_compartment_map (var_file ,'SecRulesInOCI' )
469
- Network .export_seclist (inputfile , outdir , service_dir_seclist , config , signer , ct , export_compartments = compartments , export_regions = export_regions , _tf_import_cmd = True )
463
+ Network .export_seclist (inputfile , outdir , service_dir_network , config , signer , ct , export_compartments = compartments , export_regions = export_regions , _tf_import_cmd = True )
470
464
options = [
471
465
Option (None , Network .modify_terraform_secrules , 'Processing SecRulesinOCI Tab' ),
472
466
]
473
- execute_options (options , inputfile , outdir ,service_dir_seclist , prefix , ct , non_gf_tenancy )
467
+ execute_options (options , inputfile , outdir ,service_dir_network , prefix , ct , non_gf_tenancy )
474
468
print ("\n \n Execute tf_import_commands_network_secrules_nonGF.sh script created under each region directory to synch TF with OCI Network objects\n " )
475
469
476
470
def export_routerules (inputfile , outdir ,config ,signer ,ct ,export_regions ):
@@ -883,9 +877,9 @@ def export_modify_security_rules(inputfile, outdir, service_dir, prefix, ct, non
883
877
options1 = []
884
878
options1 .append (option )
885
879
if (option .name == 'Export Security Rules (From OCI into SecRulesinOCI sheet)' ):
886
- execute_options (options1 , inputfile , outdir , service_dir_seclist , config , signer , ct , non_gf_tenancy = non_gf_tenancy )
880
+ execute_options (options1 , inputfile , outdir , service_dir_network , config , signer , ct , non_gf_tenancy = non_gf_tenancy )
887
881
elif (option .name == 'Add/Modify/Delete Security Rules (Reads SecRulesinOCI sheet)' ):
888
- execute_options (options1 , inputfile , outdir , service_dir_seclist , prefix , ct , non_gf_tenancy )
882
+ execute_options (options1 , inputfile , outdir , service_dir_network , prefix , ct , non_gf_tenancy )
889
883
890
884
891
885
def export_security_rules (inputfile , outdir , service_dir , config , signer , ct , non_gf_tenancy ):
@@ -1226,7 +1220,7 @@ def create_cis_features(prim_options=[]):
1226
1220
execute_options (options , outdir , prefix , config_file_path )
1227
1221
1228
1222
def run_utility (prim_options = []):
1229
- options = [Option ('CIS Compliance Checking Script' , initiate_cis_scan , 'CIS Compliance Check Script' ),
1223
+ options = [Option ('CIS Compliance Check Script' , initiate_cis_scan , 'CIS Compliance Check Script' ),
1230
1224
Option ('ShowOCI Report' , run_showoci , 'ShowOCI Report' )
1231
1225
]
1232
1226
if prim_options :
@@ -1715,7 +1709,7 @@ def create_firewall(inputfile, outdir, service_dir, prefix, ct,sub_options=[]):
1715
1709
Option ('Software-Defined Data Centers - OCVS' , create_sddc , 'Processing SDDC Tabs' ),
1716
1710
Option ('CIS Compliance Features' , create_cis_features , 'CIS Compliance Features' ),
1717
1711
Option ('CD3 Services' , cd3_services , 'CD3 Services' ),
1718
- Option ('Utility Services (Not Maintained By CD3) ' , run_utility ,'Utility Services' )
1712
+ Option ('3rd Party Services ' , run_utility ,'3rd Party Services' )
1719
1713
]
1720
1714
export_regions = ct .all_regions
1721
1715
0 commit comments