|
437 | 437 |
|
438 | 438 | - `tenancy` (string) - Deprecated: Use Placement Tenancy instead. |
439 | 439 |
|
440 | | -- `temporary_security_group_source_cidrs` ([]string) - A list of IPv4 CIDR blocks to be authorized access to the instance, when |
| 440 | +- `temporary_security_group_source_cidrs` ([]string) - A list of IPv4/IPv6 CIDR blocks to be authorized access to the instance, when |
441 | 441 | packer is creating a temporary security group. |
442 | 442 |
|
443 | | - The default is [`0.0.0.0/0`] (i.e., allow any IPv4 source). |
| 443 | + The default is [`0.0.0.0/0`] (i.e., allow any IPv4 source) and if ssh_interface is set as "ipv6" the default is [`::/0`] (i.e., allow any IPv6 source). |
444 | 444 | Use `temporary_security_group_source_public_ip` to allow current host's |
445 | 445 | public IP instead of any IPv4 source. |
446 | 446 | This is only used when `security_group_id` or `security_group_ids` is not |
|
516 | 516 |
|
517 | 517 | - `metadata_options` (MetadataOptions) - [Metadata Settings](#metadata-settings) |
518 | 518 |
|
519 | | -- `ssh_interface` (string) - One of `public_ip`, `private_ip`, `public_dns`, `private_dns` or `session_manager`. |
| 519 | +- `ssh_interface` (string) - One of `public_ip`, `private_ip`, `public_dns`, `private_dns`, `ipv6` or `session_manager`. |
520 | 520 | If set, either the public IP address, private IP address, public DNS name |
521 | 521 | or private DNS name will be used as the host for SSH. The default behaviour |
522 | 522 | if inside a VPC is to use the public IP address if available, otherwise |
|
528 | 528 | `<region>.compute.internal` included in the `NO_PROXY` environment |
529 | 529 | variable. |
530 | 530 |
|
| 531 | + When using `ipv6` the VPC and subnet must be configured to support IPv6. |
| 532 | + The default VPC and subnets do not have ipv6 configured by default. |
| 533 | + Refer: https://docs.aws.amazon.com/vpc/latest/userguide/vpc-migrate-ipv6-add.html |
| 534 | + |
531 | 535 | When using `session_manager` the machine running Packer must have |
532 | 536 | the AWS Session Manager Plugin installed and within the users' system path. |
533 | 537 | Connectivity via the `session_manager` interface establishes a secure tunnel |
|
0 commit comments