mirror of
https://github.com/ansible-collections/google.cloud.git
synced 2025-08-02 12:14:33 -07:00
* Move ipsec interconnect to ga * Remove beta only docs note Signed-off-by: Modular Magician <magic-modules@google.com>
This commit is contained in:
parent
20b59f84ee
commit
7498507389
4 changed files with 149 additions and 9 deletions
|
@ -144,6 +144,38 @@ options:
|
|||
PARTNER type this will be managed upstream.
|
||||
required: false
|
||||
type: int
|
||||
ipsec_internal_addresses:
|
||||
description:
|
||||
- URL of addresses that have been reserved for the interconnect attachment, Used
|
||||
only for interconnect attachment that has the encryption option as IPSEC.
|
||||
- The addresses must be RFC 1918 IP address ranges. When creating HA VPN gateway
|
||||
over the interconnect attachment, if the attachment is configured to use an
|
||||
RFC 1918 IP address, then the VPN gateway's IP address will be allocated from
|
||||
the IP address range specified here.
|
||||
- For example, if the HA VPN gateway's interface 0 is paired to this interconnect
|
||||
attachment, then an RFC 1918 IP address for the VPN gateway interface 0 will
|
||||
be allocated from the IP address specified for this interconnect attachment.
|
||||
- If this field is not specified for interconnect attachment that has encryption
|
||||
option as IPSEC, later on when creating HA VPN gateway on this interconnect
|
||||
attachment, the HA VPN gateway's IP address will be allocated from regional
|
||||
external IP address pool.
|
||||
elements: dict
|
||||
required: false
|
||||
type: list
|
||||
encryption:
|
||||
description:
|
||||
- 'Indicates the user-supplied encryption option of this interconnect attachment:
|
||||
NONE is the default value, which means that the attachment carries unencrypted
|
||||
traffic. VMs can send traffic to, or receive traffic from, this type of attachment.'
|
||||
- IPSEC indicates that the attachment carries only traffic encrypted by an IPsec
|
||||
device such as an HA VPN gateway. VMs cannot directly send traffic to, or receive
|
||||
traffic from, such an attachment. To use IPsec-encrypted Cloud Interconnect
|
||||
create the attachment using this option.
|
||||
- Not currently available publicly.
|
||||
- 'Some valid choices include: "NONE", "IPSEC"'
|
||||
required: false
|
||||
default: NONE
|
||||
type: str
|
||||
region:
|
||||
description:
|
||||
- Region where the regional interconnect attachment resides.
|
||||
|
@ -348,6 +380,35 @@ vlanTag8021q:
|
|||
PARTNER type this will be managed upstream.
|
||||
returned: success
|
||||
type: int
|
||||
ipsecInternalAddresses:
|
||||
description:
|
||||
- URL of addresses that have been reserved for the interconnect attachment, Used
|
||||
only for interconnect attachment that has the encryption option as IPSEC.
|
||||
- The addresses must be RFC 1918 IP address ranges. When creating HA VPN gateway
|
||||
over the interconnect attachment, if the attachment is configured to use an RFC
|
||||
1918 IP address, then the VPN gateway's IP address will be allocated from the
|
||||
IP address range specified here.
|
||||
- For example, if the HA VPN gateway's interface 0 is paired to this interconnect
|
||||
attachment, then an RFC 1918 IP address for the VPN gateway interface 0 will be
|
||||
allocated from the IP address specified for this interconnect attachment.
|
||||
- If this field is not specified for interconnect attachment that has encryption
|
||||
option as IPSEC, later on when creating HA VPN gateway on this interconnect attachment,
|
||||
the HA VPN gateway's IP address will be allocated from regional external IP address
|
||||
pool.
|
||||
returned: success
|
||||
type: list
|
||||
encryption:
|
||||
description:
|
||||
- 'Indicates the user-supplied encryption option of this interconnect attachment:
|
||||
NONE is the default value, which means that the attachment carries unencrypted
|
||||
traffic. VMs can send traffic to, or receive traffic from, this type of attachment.'
|
||||
- IPSEC indicates that the attachment carries only traffic encrypted by an IPsec
|
||||
device such as an HA VPN gateway. VMs cannot directly send traffic to, or receive
|
||||
traffic from, such an attachment. To use IPsec-encrypted Cloud Interconnect create
|
||||
the attachment using this option.
|
||||
- Not currently available publicly.
|
||||
returned: success
|
||||
type: str
|
||||
region:
|
||||
description:
|
||||
- Region where the regional interconnect attachment resides.
|
||||
|
@ -393,6 +454,8 @@ def main():
|
|||
name=dict(required=True, type='str'),
|
||||
candidate_subnets=dict(type='list', elements='str'),
|
||||
vlan_tag8021q=dict(type='int'),
|
||||
ipsec_internal_addresses=dict(type='list', elements='dict'),
|
||||
encryption=dict(default='NONE', type='str'),
|
||||
region=dict(required=True, type='str'),
|
||||
)
|
||||
)
|
||||
|
@ -457,6 +520,8 @@ def resource_to_request(module):
|
|||
u'name': module.params.get('name'),
|
||||
u'candidateSubnets': module.params.get('candidate_subnets'),
|
||||
u'vlanTag8021q': module.params.get('vlan_tag8021q'),
|
||||
u'ipsecInternalAddresses': replace_resource_dict(module.params.get('ipsec_internal_addresses', []), 'selfLink'),
|
||||
u'encryption': module.params.get('encryption'),
|
||||
}
|
||||
return_vals = {}
|
||||
for k, v in request.items():
|
||||
|
@ -542,6 +607,8 @@ def response_to_hash(module, response):
|
|||
u'name': module.params.get('name'),
|
||||
u'candidateSubnets': module.params.get('candidate_subnets'),
|
||||
u'vlanTag8021q': module.params.get('vlan_tag8021q'),
|
||||
u'ipsecInternalAddresses': replace_resource_dict(module.params.get('ipsec_internal_addresses', []), 'selfLink'),
|
||||
u'encryption': module.params.get('encryption'),
|
||||
}
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue