Skip to content

Commit a559017

Browse files
committed
api/additionalPorts: don't create UDP rules
When providing additional ports to open on the control plane security group, we'll only open TCP from now as it was initially documented. Opening UDP by default might not be desired for security reasons.
1 parent fc47622 commit a559017

File tree

1 file changed

+0
-6
lines changed

1 file changed

+0
-6
lines changed

pkg/cloud/services/networking/securitygroups_rules.go

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -222,12 +222,6 @@ func getSGControlPlaneAdditionalPorts(ports []int) []resolvedSecurityGroupRuleSp
222222
EtherType: "IPv4",
223223
Protocol: "tcp",
224224
},
225-
{
226-
Description: "Additional ports",
227-
Direction: "ingress",
228-
EtherType: "IPv4",
229-
Protocol: "udp",
230-
},
231225
}
232226
for _, p := range ports {
233227
r[0].PortRangeMin = p

0 commit comments

Comments
 (0)