diff --git a/terraform/main.tf b/terraform/main.tf index ff1b8bff8dc487f3914aa177b8ff13e57b4eb0b6..a4fdf2e1f61d4f8ed0026923629e5eff18fce7a2 100644 --- a/terraform/main.tf +++ b/terraform/main.tf @@ -67,11 +67,7 @@ resource "openstack_networking_port_v2" "net1" { network_id = openstack_networking_network_v2.net1.id admin_state_up = true security_group_ids = [ - openstack_compute_secgroup_v2.icmp.id, - openstack_compute_secgroup_v2.http.id, - openstack_compute_secgroup_v2.https.id, - openstack_compute_secgroup_v2.ssh.id, - + openstack_compute_secgroup_v2.nginx.id, ] fixed_ip { subnet_id = openstack_networking_subnet_v2.net1_subnet.id @@ -105,42 +101,27 @@ resource "openstack_compute_keypair_v2" "user1" { # CREATING SECURITY_GROUP -resource "openstack_compute_secgroup_v2" "icmp" { - name = "icmp" - description = "Security group rule for port -1" +resource "openstack_compute_secgroup_v2" "nginx" { + name = "nginx" + description = "Security group rule for port 80" rule { from_port = -1 to_port = -1 ip_protocol = "icmp" cidr = "0.0.0.0/0" } -} - -resource "openstack_compute_secgroup_v2" "http" { - name = "http" - description = "Security group rule for port 80" rule { from_port = 80 to_port = 80 ip_protocol = "tcp" cidr = "0.0.0.0/0" } -} - -resource "openstack_compute_secgroup_v2" "https" { - name = "https" - description = "Security group rule for port 443" rule { from_port = 443 to_port = 443 ip_protocol = "tcp" cidr = "0.0.0.0/0" } -} - -resource "openstack_compute_secgroup_v2" "ssh" { - name = "ssh" - description = "Security group rule for port 22" rule { from_port = 22 to_port = 22