python-openstackclient/doc/source/command-objects/security-group-rule.rst
Huanxuan Ao 8e2f49fbf2 Support bulk deletion for commands that exist in both network and compute.
Some delete commands in networkv2 are exist in both network
and compute, They can use NetworkAndComputeDeleteclass to
supprot bulk deletion and error handling and the codes are
similar, so I change them all in this patch. The changed
commands including:
1.floating ip delete
2.security group delete
3.security group rule delete
Also, I update unit tests and docs for these commands in this patch.

Change-Id: I6c94c3d10ba579ddd9b14d17673c821e3481fd8a
Partially-Implements: blueprint multi-argument-network
2016-06-15 17:23:39 +08:00

3.5 KiB

security group rule

A security group rule specifies the network access rules for servers and other resources on the network.

Compute v2, Network v2

security group rule create

Create a new security group rule

security group rule create

os security group rule create
    [--src-ip <ip-address> | --src-group <group>]
    [--dst-port <port-range> | [--icmp-type <icmp-type> [--icmp-code <icmp-code>]]]
    [--protocol <protocol>]
    [--ingress | --egress]
    [--ethertype <ethertype>]
    [--project <project> [--project-domain <project-domain>]]
    <group>

--src-ip <ip-address>

Source IP address block (may use CIDR notation; default for IPv4 rule: 0.0.0.0/0)

--src-group <group>

Source security group (name or ID)

--dst-port <port-range>

Destination port, may be a single port or a starting and ending port range: 137:139. Required for IP protocols TCP and UDP. Ignored for ICMP IP protocols.

--icmp-type <icmp-type>

ICMP type for ICMP IP protocols

Network version 2 only

--icmp-code <icmp-code>

ICMP code for ICMP IP protocols

Network version 2 only

--protocol <protocol>

IP protocol (icmp, tcp, udp; default: tcp)

Compute version 2

IP protocol (ah, dccp, egp, esp, gre, icmp, igmp, ipv6-encap, ipv6-frag, ipv6-icmp, ipv6-nonxt, ipv6-opts, ipv6-route, ospf, pgm, rsvp, sctp, tcp, udp, udplite, vrrp and integer representations [0-255]; default: tcp)

Network version 2

--ingress

Rule applies to incoming network traffic (default)

Network version 2 only

--egress

Rule applies to outgoing network traffic

Network version 2 only

--ethertype <ethertype>

Ethertype of network traffic (IPv4, IPv6; default: based on IP protocol)

Network version 2 only

--project <project>

Owner's project (name or ID)

Network version 2 only

--project-domain <project-domain>

Domain the project belongs to (name or ID). This can be used in case collisions between project names exist.

Network version 2 only

<group>

Create rule in this security group (name or ID)

security group rule delete

Delete security group rule(s)

security group rule delete

os security group rule delete
    <rule> [<rule> ...]

<rule>

Security group rule(s) to delete (ID only)

security group rule list

List security group rules

security group rule list

os security group rule list
    [--all-projects]
    [--long]
    [<group>]

--all-projects

Display information from all projects (admin only)

Network version 2 ignores this option and will always display information for all projects (admin only).

--long

List additional fields in output

Compute version 2 does not have additional fields to display.

<group>

List all rules in this security group (name or ID)

security group rule show

Display security group rule details

security group rule show

os security group rule show
    <rule>

<rule>

Security group rule to display (ID only)