diff options
| author | Brian Haley <bhaley@redhat.com> | 2017-11-30 17:53:29 -0500 |
|---|---|---|
| committer | Brian Haley <bhaley@redhat.com> | 2019-07-15 22:35:49 -0400 |
| commit | 969e6abd20570ae64b3d1fd049da1521fa148b5c (patch) | |
| tree | f1d563ff95ac7a71be07b2c32e81db7f7c927aa1 /doc/source/cli/command-objects | |
| parent | b41d7518c381a453a66f3c09d38752f85b57b7e0 (diff) | |
| download | python-openstackclient-969e6abd20570ae64b3d1fd049da1521fa148b5c.tar.gz | |
Support IPv6 addresses better
When adding a security group rule, if no IP address is given
we will use '0.0.0.0/0', but if the ethertype is IPv6 we will
leave it as None. Change this to be '::/0' to match what we
do for IPv4 - use the "any" address. The neutron server
treats them both the same when checking for duplicates.
Because there are most likely entries in the DB using None
for the IP, print them as '0.0.0.0/0' or '::/0' so it is more
obvious what address they are actually referring to.
Also change to display the Ethertype column by default
instead of with --long, since easily knowing IPv4 or IPv6
is useful.
Change-Id: Ic396fc23caa66b6b0034c5d30b27c6ed499de5a6
Closes-bug: #1735575
Diffstat (limited to 'doc/source/cli/command-objects')
| -rw-r--r-- | doc/source/cli/command-objects/security-group-rule.rst | 13 |
1 files changed, 10 insertions, 3 deletions
diff --git a/doc/source/cli/command-objects/security-group-rule.rst b/doc/source/cli/command-objects/security-group-rule.rst index 5809e002..5a2d8342 100644 --- a/doc/source/cli/command-objects/security-group-rule.rst +++ b/doc/source/cli/command-objects/security-group-rule.rst @@ -27,8 +27,9 @@ Create a new security group rule .. option:: --remote-ip <ip-address> - Remote IP address block - (may use CIDR notation; default for IPv4 rule: 0.0.0.0/0) + Remote IP address block (may use CIDR notation; + default for IPv4 rule: 0.0.0.0/0, + default for IPv6 rule: ::/0) .. option:: --remote-group <group> @@ -134,6 +135,7 @@ List security group rules openstack security group rule list [--all-projects] [--protocol <protocol>] + [--ethertype <ethertype>] [--ingress | --egress] [--long] [<group>] @@ -151,7 +153,6 @@ List security group rules *Compute version 2 does not have additional fields to display.* - .. option:: --protocol List rules by the IP protocol (ah, dhcp, egp, esp, gre, icmp, igmp, @@ -161,6 +162,12 @@ List security group rules *Network version 2* +.. option:: --ethertype + + List rules by the Ethertype (IPv4 or IPv6) + + *Network version 2* + .. option:: --ingress List rules applied to incoming network traffic |
