Skip to content

Commit

Permalink
Update compute_security_policy docs to match src_ip_ranges constraints (
Browse files Browse the repository at this point in the history
#3808)

The limit of 5 IP ranges per rule was increased to 10 in #3516. This commit updates the
related documentation.
  • Loading branch information
reinoudk authored Aug 3, 2020
1 parent 93e618f commit 3e642c3
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -90,7 +90,7 @@ func resourceComputeSecurityPolicy() *schema.Resource {
MinItems: 1,
MaxItems: 10,
Elem: &schema.Schema{Type: schema.TypeString},
Description: `Set of IP addresses or ranges (IPV4 or IPV6) in CIDR notation to match against inbound traffic. There is a limit of 5 IP ranges per rule. A value of '*' matches all IPs (can be used to override the default behavior).`,
Description: `Set of IP addresses or ranges (IPV4 or IPV6) in CIDR notation to match against inbound traffic. There is a limit of 10 IP ranges per rule. A value of '*' matches all IPs (can be used to override the default behavior).`,
},
},
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -98,7 +98,7 @@ The `match` block supports:
The `config` block supports:

* `src_ip_ranges` - (Required) Set of IP addresses or ranges (IPV4 or IPV6) in CIDR notation
to match against inbound traffic. There is a limit of 5 IP ranges per rule. A value of '\*' matches all IPs
to match against inbound traffic. There is a limit of 10 IP ranges per rule. A value of '\*' matches all IPs
(can be used to override the default behavior).

The `expr` block supports:
Expand Down

0 comments on commit 3e642c3

Please sign in to comment.