Skip to content

Commit

Permalink
Sync to outsource repository
Browse files Browse the repository at this point in the history
  • Loading branch information
chengxiangdong committed Jul 23, 2024
2 parents 3be6f80 + 354d36d commit b65c043
Show file tree
Hide file tree
Showing 24 changed files with 380 additions and 360 deletions.
2 changes: 2 additions & 0 deletions docs/data-sources/vpc.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,5 +35,7 @@ filters must match exactly one VPC whose data will be exported as attributes.

* `enterprise_project_id` - (Optional, String) Specifies the enterprise project ID which the desired VPC belongs to.

* `secondary_cidrs` - The secondary CIDR blocks of the VPC.

## Attributes Reference

1 change: 1 addition & 0 deletions docs/data-sources/vpcs.md
Original file line number Diff line number Diff line change
Expand Up @@ -68,3 +68,4 @@ The `vpcs` block supports:
* `enterprise_project_id` - Indicates the the enterprise project ID of the VPC.
* `description` - Indicates the description of the VPC.
* `tags` - Indicates the key/value pairs which associated with the VPC.
* `secondary_cidrs` - The secondary CIDR blocks of the VPC.
1 change: 0 additions & 1 deletion docs/resources/dcs_instance.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,6 @@ Manages a DCS instance within HuaweiCloudStack.

!> **WARNING:** DCS for Memcached is about to become unavailable and is no longer sold in some regions.
You can use DCS for Redis 4.0, 5.0 or 6.0 instead. It is not possible to create Memcached instances through this resource.
You can use this resource to manage Memcached instances that exist in HuaweiCloud.

## Example Usage

Expand Down
254 changes: 0 additions & 254 deletions docs/resources/dws_cluster.md

This file was deleted.

4 changes: 2 additions & 2 deletions docs/resources/network_acl.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ resource "hcs_network_acl_rule" "rule_1" {
description = "drop TELNET traffic"
action = "deny"
protocol = "tcp"
destination_port = "23"
destination_ports= ["23"]
enabled = "true"
}
Expand All @@ -27,7 +27,7 @@ resource "hcs_network_acl_rule" "rule_2" {
description = "drop NTP traffic"
action = "deny"
protocol = "udp"
destination_port = "123"
destination_ports= ["123"]
enabled = "false"
}
Expand Down
8 changes: 4 additions & 4 deletions docs/resources/network_acl_rule.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,9 +14,9 @@ resource "hcs_network_acl_rule" "rule_1" {
protocol = "udp"
action = "deny"
source_ip_address = "1.2.3.4"
source_port = "444"
source_ports = ["444"]
destination_ip_address = "4.3.2.0/24"
destination_port = "555"
destination_ports = ["555"]
}
```

Expand Down Expand Up @@ -46,10 +46,10 @@ The following arguments are supported:
* `destination_ip_address` - (Optional, String) Specifies the destination IP address to which the traffic is allowed.
The default value is *0.0.0.0/0*. For example: xxx.xxx.xxx.xxx (IP address), xxx.xxx.xxx.0/24 (CIDR block).

* `source_port` - (Optional, String) Specifies the source port number or port number range. The value ranges from 1 to
* `source_ports` - (Optional, List) A list of Specifies the source port number or port number range. The value ranges from 1 to
65535. For a port number range, enter two port numbers connected by a colon(:). For example, 1:100.

* `destination_port` - (Optional, String) Specifies the destination port number or port number range. The value ranges
* `destination_ports` - (Optional, List) A list of Specifies the destination port number or port number range. The value ranges
from 1 to 65535. For a port number range, enter two port numbers connected by a colon(:). For example, 1:100.

* `enabled` - (Optional, Bool) Enabled status for the network ACL rule. Defaults to true.
Expand Down
6 changes: 0 additions & 6 deletions docs/resources/networking_secgroup_rule.md
Original file line number Diff line number Diff line change
Expand Up @@ -67,15 +67,9 @@ The following arguments are supported:

* `port_range_min` - (Optional, Int, ForceNew) Specifies the lower part of the allowed port range, valid integer value
needs to be between `1` and `65,535`. Changing this creates a new security group rule.
This parameter and `ports` are alternative.

* `port_range_max` - (Optional, Int, ForceNew) Specifies the higher part of the allowed port range, valid integer value
needs to be between `1` and `65,535`. Changing this creates a new security group rule.
This parameter and `ports` are alternative.

* `ports` - (Optional, String, ForceNew) Specifies the allowed port value range, which supports single port (80),
continuous port (1-30) and discontinous port (22, 3389, 80) The valid port values is range form `1` to `65,535`.
Changing this creates a new security group rule.

* `remote_ip_prefix` - (Optional, String, ForceNew) Specifies the remote CIDR, the value needs to be a valid CIDR (i.e.
192.168.0.0/16). Changing this creates a new security group rule.
Expand Down
8 changes: 8 additions & 0 deletions docs/resources/vpc.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,9 +17,14 @@ variable "vpc_cidr" {
default = "192.168.0.0/16"
}
variable "vpc_secondary_cidrs" {
default = ["192.182.0.0/24","192.183.0.0/24","192.184.0.0/24","192.185.0.0/24"]
}
resource "hcs_vpc" "vpc" {
name = var.vpc_name
cidr = var.vpc_cidr
secondary_cidrs = var.vpc_secondary_cidrs
}
```
Expand All @@ -39,6 +44,9 @@ The following arguments are supported:

* `enterprise_project_id` - (Optional, String) Specifies the enterprise project ID which the desired VPC belongs to.

* `secondary_cidrs` - (Optional, Set) Specifies the secondary CIDR blocks of the VPC.
Each VPC can have 4 secondary CIDR blocks.

## Attributes Reference

In addition to all arguments above, the following attributes are exported:
Expand Down
9 changes: 9 additions & 0 deletions docs/resources/vpc_peering.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,10 +9,16 @@ Provides a resource to manage a VPC Peering resource.
## Example Usage

```hcl
var peer_conn_name {}
var vpc_id {}
var accepter_vpc_id {}
var peer_region {}
resource "hcs_vpc_peering" "peering" {
name = var.peer_conn_name
vpc_id = var.vpc_id
peer_vpc_id = var.accepter_vpc_id
peer_region = var.peer_region
}
```

Expand All @@ -32,6 +38,9 @@ The following arguments are supported:
* `peer_vpc_id` - (Required, String, ForceNew) Specifies the VPC ID of the peering. Changing this creates a new
VPC peering.

* `peer_region` - (Optional, String, ForceNew) Specifies name of the project to which the peer VPC belongs. This parameter is
mandatory when the two VPCs are not in the same project.

## Attribute Reference

In addition to all arguments above, the following attributes are exported:
Expand Down
4 changes: 0 additions & 4 deletions docs/resources/vpcep_endpoint.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,6 @@ Provides a resource to manage a VPC endpoint resource.

## Example Usage

```
### Access to the vpcep service
```hcl
variable "service_vpc_id" {}
variable "vm_port" {}
Expand Down
Loading

0 comments on commit b65c043

Please sign in to comment.