0
0
mirror of https://github.com/bpg/terraform-provider-proxmox.git synced 2025-06-30 18:42:58 +00:00
terraform-provider-proxmox/example/resource_virtual_environment_firewall_ipset.tf
Pavel Boldyrev 98e1cff7fe
feat: Add firewall resources (#246)
* refactoring existing cluster / firewall API for better composition

* add basic security groups API
fix linter errors

* add rules API

* fix after renaming resourceVirtualEnvironmentClusterIPSet

* fix linter errors

* make linter happy

* even more refactoring

* tidy up datasources

* in refactoring spree

* update examples

* fix firewall resource/datasource & client error handling

* add ipset(s) datasource

* update docs

* add security group resource with rules

* docs

* fix security group update, TODO: rule update

* fix after rebase

* add rule update, extract common rule schema, refactor group

* fix linter  errors

* bump linter for ci

* make alias and ipset reusable

* make security group reusable

* refactor datasources

* add security group datasources

* fix linter errors

* update docs

TODO: documentation for group datasources

* add sg docs, update doc index

* minor cleanup

* fix examples & tests

* stub for firewall-level options and rules

* extract firewall interface

* add firewall options and rules on the cluster level

TODO: issues with rule list management

* refactor all resources format AGAIN, now more flat, without complex subresources

* sort out hierarchy of APIs and remove duplication in API wrappers

* bring back security group

* finally, working rules

* restore cluster firewall option

* add containers support

* add options

* move rules back under security group, update docs

* fix vm_id / container_id attrs

* add examples

* cleanup

* more cleanup


Release-As: 0.17.0-rc1
2023-04-02 18:01:10 -04:00

71 lines
1.6 KiB
HCL

resource "proxmox_virtual_environment_firewall_ipset" "cluster_ipset" {
name = "cluster-ipset"
comment = "Managed by Terraform"
cidr {
name = "192.168.0.1"
comment = "Server 1"
nomatch = true
}
cidr {
name = "192.168.0.2"
comment = "Server 2"
}
}
resource "proxmox_virtual_environment_firewall_ipset" "vm_ipset" {
depends_on = [proxmox_virtual_environment_vm.example]
node_name = proxmox_virtual_environment_vm.example.node_name
vm_id = proxmox_virtual_environment_vm.example.vm_id
name = "vm-ipset"
comment = "Managed by Terraform"
cidr {
name = "192.168.1.1"
comment = "Server 1"
nomatch = true
}
cidr {
name = "192.168.1.2"
comment = "Server 2"
}
}
resource "proxmox_virtual_environment_firewall_ipset" "container_ipset" {
depends_on = [proxmox_virtual_environment_container.example]
node_name = proxmox_virtual_environment_container.example.node_name
container_id = proxmox_virtual_environment_container.example.vm_id
name = "container-ipset"
comment = "Managed by Terraform"
cidr {
name = "192.168.2.1"
comment = "Server 1"
nomatch = true
}
cidr {
name = "192.168.2.2"
comment = "Server 2"
}
}
output "resource_proxmox_virtual_environment_firewall_ipset_cluster" {
value = proxmox_virtual_environment_firewall_ipset.cluster_ipset
}
output "resource_proxmox_virtual_environment_firewall_ipset_vm" {
value = proxmox_virtual_environment_firewall_ipset.vm_ipset
}
output "resource_proxmox_virtual_environment_firewall_ipset_container" {
value = proxmox_virtual_environment_firewall_ipset.container_ipset
}