Skip to content

Commit

Permalink
Merge pull request #636 from vmware/fix-300
Browse files Browse the repository at this point in the history
Fix provider to still support NSX 3.0 line
  • Loading branch information
annakhm authored Jun 10, 2021
2 parents 7810519 + eaa6188 commit 43dd799
Show file tree
Hide file tree
Showing 24 changed files with 51 additions and 33 deletions.
7 changes: 5 additions & 2 deletions nsxt/gateway_common.go
Original file line number Diff line number Diff line change
Expand Up @@ -520,8 +520,11 @@ func setLocaleServiceRedistributionConfig(redistributionConfigs []interface{}, s
rulesConfig := redistributionConfig["rule"].([]interface{})

redistributionStruct := model.Tier0RouteRedistributionConfig{
BgpEnabled: &bgpEnabled,
OspfEnabled: &ospfEnabled,
BgpEnabled: &bgpEnabled,
}

if nsxVersionHigherOrEqual("3.1.0") {
redistributionStruct.OspfEnabled = &ospfEnabled
}

setLocaleServiceRedistributionRulesConfig(rulesConfig, &redistributionStruct)
Expand Down
6 changes: 3 additions & 3 deletions nsxt/resource_nsxt_policy_evpn_config_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ func TestAccResourceNsxtPolicyEvpnConfig_inline(t *testing.T) {
updatedDescription := "terraform updated"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t) },
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
if err := testAccDataSourceNsxtPolicyVniPoolConfigDelete(); err != nil {
Expand Down Expand Up @@ -76,7 +76,7 @@ func TestAccResourceNsxtPolicyEvpnConfig_routeServer(t *testing.T) {
updatedDescription := "terraform updated"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t) },
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
if err := testAccDataSourceNsxtPolicyVniPoolConfigDelete(); err != nil {
Expand Down Expand Up @@ -130,7 +130,7 @@ func TestAccResourceNsxtPolicyEvpnConfig_importBasic(t *testing.T) {
testResourceName := "nsxt_policy_evpn_config.test"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t) },
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
if err := testAccDataSourceNsxtPolicyVniPoolConfigDelete(); err != nil {
Expand Down
4 changes: 2 additions & 2 deletions nsxt/resource_nsxt_policy_evpn_tenant_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ func TestAccResourceNsxtPolicyEvpnTenant_basic(t *testing.T) {
testResourceName := "nsxt_policy_evpn_tenant.test"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t) },
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
if err := testAccDataSourceNsxtPolicyVniPoolConfigDelete(); err != nil {
Expand Down Expand Up @@ -79,7 +79,7 @@ func TestAccResourceNsxtPolicyEvpnTenant_importBasic(t *testing.T) {
testResourceName := "nsxt_policy_evpn_tenant.test"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t) },
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
if err := testAccDataSourceNsxtPolicyVniPoolConfigDelete(); err != nil {
Expand Down
4 changes: 2 additions & 2 deletions nsxt/resource_nsxt_policy_evpn_tunnel_endpoint_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ func TestAccResourceNsxtPolicyEvpnTunnelEndpoint_basic(t *testing.T) {
testResourceName := "nsxt_policy_evpn_tunnel_endpoint.test"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t) },
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
if err := testAccDataSourceNsxtPolicyVniPoolConfigDelete(); err != nil {
Expand Down Expand Up @@ -84,7 +84,7 @@ func TestAccResourceNsxtPolicyEvpnTunnelEndpoint_importBasic(t *testing.T) {
testResourceName := "nsxt_policy_evpn_tunnel_endpoint.test"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t) },
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
if err := testAccDataSourceNsxtPolicyVniPoolConfigDelete(); err != nil {
Expand Down
7 changes: 5 additions & 2 deletions nsxt/resource_nsxt_policy_gateway_redistribution_config.go
Original file line number Diff line number Diff line change
Expand Up @@ -69,8 +69,11 @@ func policyGatewayRedistributionConfigPatch(d *schema.ResourceData, m interface{
rulesConfig := d.Get("rule").([]interface{})

redistributionStruct := model.Tier0RouteRedistributionConfig{
BgpEnabled: &bgpEnabled,
OspfEnabled: &ospfEnabled,
BgpEnabled: &bgpEnabled,
}

if nsxVersionHigherOrEqual("3.1.0") {
redistributionStruct.OspfEnabled = &ospfEnabled
}

setLocaleServiceRedistributionRulesConfig(rulesConfig, &redistributionStruct)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ func TestAccResourceNsxtPolicyGatewayRedistributionConfig_basic(t *testing.T) {
testResourceName := "nsxt_policy_gateway_redistribution_config.test"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.0.0") },
PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: testAccNsxtPolicyTier0CheckNoRedistribution(testAccNsxtPolicyGatewayRedistributionHelperName),
Steps: []resource.TestStep{
Expand Down Expand Up @@ -66,7 +66,7 @@ func TestAccResourceNsxtPolicyGatewayRedistributionConfig_importBasic(t *testing
testResourceName := "nsxt_policy_gateway_redistribution_config.test"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.0.0") },
PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: testAccNsxtPolicyTier0CheckNoRedistribution(testAccNsxtPolicyGatewayRedistributionHelperName),
Steps: []resource.TestStep{
Expand Down
6 changes: 3 additions & 3 deletions nsxt/resource_nsxt_policy_intrusion_service_policy_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ func TestAccResourceNsxtPolicyIntrusionServicePolicy_basic(t *testing.T) {
tag2 := "def"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.0.0") },
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
return testAccNsxtPolicyIntrusionServicePolicyCheckDestroy(state, updatedName, defaultDomain)
Expand Down Expand Up @@ -118,7 +118,7 @@ func TestAccResourceNsxtPolicyIntrusionServicePolicy_withDependencies(t *testing
defaultProtocol := "IPV4_IPV6"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.0.0") },
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
return testAccNsxtPolicyIntrusionServicePolicyCheckDestroy(state, name, defaultDomain)
Expand Down Expand Up @@ -193,7 +193,7 @@ func TestAccResourceNsxtPolicyIntrusionServicePolicy_importBasic(t *testing.T) {
testResourceName := "nsxt_policy_intrusion_service_policy.test"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.0.0") },
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
return testAccNsxtPolicyIntrusionServicePolicyCheckDestroy(state, name, defaultDomain)
Expand Down
4 changes: 2 additions & 2 deletions nsxt/resource_nsxt_policy_intrusion_service_profile_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ func TestAccResourceNsxtPolicyIntrusionServiceProfile_basic(t *testing.T) {
testResourceName := "nsxt_policy_intrusion_service_profile.test"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.0.0") },
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
return testAccNsxtPolicyIntrusionServiceProfileCheckDestroy(state, updatedName)
Expand Down Expand Up @@ -82,7 +82,7 @@ func TestAccResourceNsxtPolicyIntrusionServiceProfile_importBasic(t *testing.T)
testResourceName := "nsxt_policy_intrusion_service_profile.test"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.0.0") },
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
return testAccNsxtPolicyIntrusionServiceProfileCheckDestroy(state, name)
Expand Down
4 changes: 2 additions & 2 deletions nsxt/resource_nsxt_policy_ospf_area_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ func TestAccResourceNsxtPolicyOspfArea_basic(t *testing.T) {
testResourceName := "nsxt_policy_ospf_area.test"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t) },
PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
return testAccNsxtPolicyOspfAreaCheckDestroy(state, accTestPolicyOspfAreaCreateAttributes["display_name"])
Expand Down Expand Up @@ -96,7 +96,7 @@ func TestAccResourceNsxtPolicyOspfArea_importBasic(t *testing.T) {
testResourceName := "nsxt_policy_ospf_area.test"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t) },
PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
return testAccNsxtPolicyOspfAreaCheckDestroy(state, name)
Expand Down
4 changes: 2 additions & 2 deletions nsxt/resource_nsxt_policy_ospf_config_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ func TestAccResourceNsxtPolicyOspfConfig_basic(t *testing.T) {
testResourceName := "nsxt_policy_ospf_config.test"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t) },
PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
Steps: []resource.TestStep{
{
Expand Down Expand Up @@ -93,7 +93,7 @@ func TestAccResourceNsxtPolicyOspfConfig_minimalistic(t *testing.T) {
testResourceName := "nsxt_policy_ospf_config.test"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t) },
PreCheck: func() { testAccOnlyLocalManager(t); testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
Steps: []resource.TestStep{
{
Expand Down
2 changes: 1 addition & 1 deletion nsxt/resource_nsxt_policy_security_policy_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -150,7 +150,7 @@ func TestAccResourceNsxtPolicySecurityPolicy_withDependencies(t *testing.T) {
defaultProtocol := "IPV4_IPV6"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
return testAccNsxtPolicySecurityPolicyCheckDestroy(state, name, defaultDomain)
Expand Down
4 changes: 2 additions & 2 deletions nsxt/resource_nsxt_policy_static_route_bfd_peer_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ func TestAccResourceNsxtPolicyStaticRouteBfdPeer_basic(t *testing.T) {
testResourceName := "nsxt_policy_static_route_bfd_peer.test"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
return testAccNsxtPolicyStaticRouteBfdPeerCheckDestroy(state, accTestPolicyStaticRouteBfdPeerUpdateAttributes["display_name"])
Expand Down Expand Up @@ -87,7 +87,7 @@ func TestAccResourceNsxtPolicyStaticRouteBfdPeer_importBasic(t *testing.T) {
testResourceName := "nsxt_policy_static_route_bfd_peer.test"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
return testAccNsxtPolicyStaticRouteBfdPeerCheckDestroy(state, name)
Expand Down
2 changes: 1 addition & 1 deletion nsxt/resource_nsxt_policy_tier0_gateway_interface_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -274,7 +274,7 @@ func TestAccResourceNsxtPolicyTier0GatewayInterface_ospf(t *testing.T) {
enablePim := "false"

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.0.0") },
PreCheck: func() { testAccPreCheck(t); testAccOnlyLocalManager(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
return testAccNsxtPolicyTier0InterfaceCheckDestroy(state, updatedName)
Expand Down
2 changes: 1 addition & 1 deletion nsxt/resource_nsxt_policy_vlan_segment_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,7 @@ func TestAccResourceNsxtPolicyVlanSegment_updateAdvConfig(t *testing.T) {
testResourceName := "nsxt_policy_vlan_segment.test"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
PreCheck: func() { testAccPreCheck(t); testAccNSXVersion(t, "3.1.0") },
Providers: testAccProviders,
CheckDestroy: func(state *terraform.State) error {
return testAccNsxtPolicyVlanSegmentCheckDestroy(state, name)
Expand Down
11 changes: 9 additions & 2 deletions nsxt/segment_common.go
Original file line number Diff line number Diff line change
Expand Up @@ -757,8 +757,10 @@ func policySegmentResourceToInfraStruct(id string, d *schema.ResourceData, isVla
advConfigStruct.UplinkTeamingPolicyName = &teamingPolicy
}

urpfMode := advConfigMap["urpf_mode"].(string)
advConfigStruct.UrpfMode = &urpfMode
if nsxVersionHigherOrEqual("3.1.0") {
urpfMode := advConfigMap["urpf_mode"].(string)
advConfigStruct.UrpfMode = &urpfMode
}
}
obj.AdvancedConfig = &advConfigStruct
}
Expand Down Expand Up @@ -1309,6 +1311,11 @@ func nsxtPolicySegmentRead(d *schema.ResourceData, m interface{}, isVlan bool, i
}
if obj.AdvancedConfig.UrpfMode != nil {
advConfig["urpf_mode"] = *obj.AdvancedConfig.UrpfMode
} else {
if nsxVersionLower("3.1.0") {
// set to default in early versions
advConfig["urpf_mode"] = model.SegmentAdvancedConfig_URPF_MODE_STRICT
}
}
// This is a list with 1 element
var advConfigList []map[string]interface{}
Expand Down
1 change: 1 addition & 0 deletions website/docs/r/policy_evpn_config.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ description: A resource to configure EVPN Settings of Tier0 Gateway.
This resource provides a method to configure EVPN on T0 Gateway. A single resource should be configured per Gateway.

This resource is applicable to NSX Policy Manager only.
This resource is supported with NSX 3.1.0 onwards.

## Example Usage

Expand Down
1 change: 1 addition & 0 deletions website/docs/r/policy_evpn_tenant.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ description: A resource to configure EVPN Tenant in NSX Policy manager.
This resource provides a method for the management of EVPN Tenant.

This resource is applicable to NSX Policy Manager.
This resource is supported with NSX 3.1.0 onwards.

## Example Usage

Expand Down
1 change: 1 addition & 0 deletions website/docs/r/policy_evpn_tunnel_endpoint.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ description: A resource to configure EVPN Tunnel Endpoint in NSX Policy manager.
This resource provides a method for the management of EVPN Tunnel Endpoint.

This resource is applicable to NSX Policy Manager.
This resource is supported with NSX 3.1.0 onwards.

## Example Usage

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ The following arguments are supported:
* `gateway_path` - (Required) Policy path to Tier0 Gateway.
* `site_path` - (Optional) Policy path to Global Manager site (domain). This attribute is required for NSX Global Manager and not applicable otherwise.
* `bgp_enabled` - (Optional) Enable route redistribution for BGP. Defaults to `true`.
* `ospf_enabled` - (Optional) Enable route redistribution for OSPF. Defaults to `false`.
* `ospf_enabled` - (Optional) Enable route redistribution for OSPF. Defaults to `false`. Applicable from NSX 3.1.0 onwards.
* `rule` - (Optional) List of redistribution rules.
* `name` - (Optional) Rule name.
* `route_map_path` - (Optional) Route map to be associated with the redistribution rule.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ description: A resource to configure Intrusion Service Policy and its rules.

This resource provides a method for the management of Intrusion Service (IDS) Policy and rules under it.

This resource is applicable to NSX Policy Manager and VMC (NSX version 3.0.0 and up).
This resource is applicable to NSX Policy Manager and VMC (NSX version 3.1.0 and up).

## Example Usage

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ description: A resource to configure Intrusion Service Profile.

This resource provides a method for the management of Intrusion Service (IDS) Profile.

This resource is applicable to NSX Policy Manager and VMC (NSX version 3.0.0 and up).
This resource is applicable to NSX Policy Manager and VMC (NSX version 3.1.0 and up).

## Example Usage

Expand Down
1 change: 1 addition & 0 deletions website/docs/r/policy_ospf_area.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ description: A resource to configure a OSPF Area.
This resource provides a method for the management of OSPF Area. Only a single area is supported so far per Tier-0 Gateway OSPF Config.

This resource is applicable to NSX Policy Manager only.
This resource is supported with NSX 3.1.0 onwards.

## Example Usage

Expand Down
1 change: 1 addition & 0 deletions website/docs/r/policy_ospf_config.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ description: A resource to configure OSPF Settings of Tier0 Gateway on NSX Polic
This resource provides a method for the management of OSPF for T0 Gateway on default locale service. A single resource should be specified per T0 Gateway. Edge Cluster is expected to be configured on the Gateway.

This resource is applicable to NSX Policy Manager only.
This resource is supported with NSX 3.1.0 onwards.

~> **NOTE:** NSX does not support deleting OSPF config on gateway, therefore this resource will update NSX object, but never delete it. To undo OSPF configuration, please disable it within the resource.

Expand Down
2 changes: 1 addition & 1 deletion website/docs/r/policy_tier0_gateway.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -170,7 +170,7 @@ The following arguments are supported:
* `fallback_site_paths` - (Optional) Fallback sites to be used as new primary site on current primary site failure.
* `redistribution_config` - (Deprecated) Route redistribution properties. This setting is for local manager only. This setting is deprecated, please use `nsxt_policy_gateway_redistribution_config` resource instead.
* `enabled` - Enable route redistribution for BGP. Defaults to `true`.
* `ospf_enabled` - (Optional) Enable route redistribution for OSPF. Defaults to `false`.
* `ospf_enabled` - (Optional) Enable route redistribution for OSPF. Defaults to `false`. Applicable from NSX 3.1.0 onwards.
* `rule` - (Optional) List of redistribution rules.
* `name` - (Optional) Rule name.
* `route_map_path` - (Optional) Route map to be associated with the redistribution rule.
Expand Down

0 comments on commit 43dd799

Please sign in to comment.