You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: cli/docs/cli.json
+1Lines changed: 1 addition & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -4176,6 +4176,7 @@
4176
4176
{
4177
4177
"name": "update",
4178
4178
"about": "Replace firewall rules",
4179
+
"long_about": "The maximum number of rules per VPC is 1024.\nTargets are used to specify the set of instances to which a firewall rule applies. You can target instances directly by name, or specify a VPC, VPC subnet, IP, or IP subnet, which will apply the rule to traffic going to all matching instances. Targets are additive: the rule applies to instances matching ANY target. The maximum number of targets is 256.\nFilters reduce the scope of a firewall rule. Without filters, the rule applies to all packets to the targets (or from the targets, if it's an outbound rule). With multiple filters, the rule applies only to packets matching ALL filters. The maximum number of each type of filter is 256.",
Copy file name to clipboardExpand all lines: oxide.json
+51-34Lines changed: 51 additions & 34 deletions
Original file line number
Diff line number
Diff line change
@@ -8297,6 +8297,7 @@
8297
8297
"vpcs"
8298
8298
],
8299
8299
"summary": "Replace firewall rules",
8300
+
"description": "The maximum number of rules per VPC is 1024.\nTargets are used to specify the set of instances to which a firewall rule applies. You can target instances directly by name, or specify a VPC, VPC subnet, IP, or IP subnet, which will apply the rule to traffic going to all matching instances. Targets are additive: the rule applies to instances matching ANY target. The maximum number of targets is 256.\nFilters reduce the scope of a firewall rule. Without filters, the rule applies to all packets to the targets (or from the targets, if it's an outbound rule). With multiple filters, the rule applies only to packets matching ALL filters. The maximum number of each type of filter is 256.",
8300
8301
"operationId": "vpc_firewall_rules_update",
8301
8302
"parameters": [
8302
8303
{
@@ -16026,7 +16027,7 @@
16026
16027
"L4PortRange": {
16027
16028
"example": "22",
16028
16029
"title": "A range of IP ports",
16029
-
"description": "An inclusive-inclusive range of IP ports. The second port may be omitted to represent a single port",
16030
+
"description": "An inclusive-inclusive range of IP ports. The second port may be omitted to represent a single port.",
16030
16031
"type": "string",
16031
16032
"pattern": "^[0-9]{1,5}(-[0-9]{1,5})?$",
16032
16033
"minLength": 1,
@@ -19797,12 +19798,23 @@
19797
19798
},
19798
19799
"Units": {
19799
19800
"description": "Measurement units for timeseries samples.",
19800
-
"type": "string",
19801
-
"enum": [
19802
-
"count",
19803
-
"bytes",
19804
-
"seconds",
19805
-
"nanoseconds"
19801
+
"oneOf": [
19802
+
{
19803
+
"type": "string",
19804
+
"enum": [
19805
+
"count",
19806
+
"bytes",
19807
+
"seconds",
19808
+
"nanoseconds"
19809
+
]
19810
+
},
19811
+
{
19812
+
"description": "No meaningful units, e.g. a dimensionless quanity.",
19813
+
"type": "string",
19814
+
"enum": [
19815
+
"none"
19816
+
]
19817
+
}
19806
19818
]
19807
19819
},
19808
19820
"User": {
@@ -19917,8 +19929,8 @@
19917
19929
]
19918
19930
},
19919
19931
"UserId": {
19920
-
"title": "A name unique within the parent collection",
19921
-
"description": "Names must begin with a lower case ASCII letter, be composed exclusively of lowercase ASCII, uppercase ASCII, numbers, and '-', and may not end with a '-'. Names cannot be a UUID, but they may contain a UUID. They can be at most 63 characters long.",
19932
+
"title": "A username for a local-only user",
19933
+
"description": "Usernames must begin with a lower case ASCII letter, be composed exclusively of lowercase ASCII, uppercase ASCII, numbers, and '-', and may not end with a '-'. Usernames cannot be a UUID, but they may contain a UUID. They can be at most 63 characters long.",
"description": "the VPC to which this rule belongs",
20418
+
"description": "The VPC to which this rule belongs",
20407
20419
"type": "string",
20408
20420
"format": "uuid"
20409
20421
}
@@ -20438,32 +20450,35 @@
20438
20450
]
20439
20451
},
20440
20452
"VpcFirewallRuleFilter": {
20441
-
"description": "Filter for a firewall rule. A given packet must match every field that is present for the rule to apply to it. A packet matches a field if any entry in that field matches the packet.",
20453
+
"description": "Filters reduce the scope of a firewall rule. Without filters, the rule applies to all packets to the targets (or from the targets, if it's an outbound rule). With multiple filters, the rule applies only to packets matching ALL filters. The maximum number of each type of filter is 256.",
20442
20454
"type": "object",
20443
20455
"properties": {
20444
20456
"hosts": {
20445
20457
"nullable": true,
20446
-
"description": "If present, the sources (if incoming) or destinations (if outgoing) this rule applies to.",
20458
+
"description": "If present, host filters match the \"other end\" of traffic from the target’s perspective: for an inbound rule, they match the source of traffic. For an outbound rule, they match the destination.",
"description": "A `VpcFirewallRuleTarget` is used to specify the set of `Instance`s to which a firewall rule applies.",
20603
+
"description": "A `VpcFirewallRuleTarget` is used to specify the set of instances to which a firewall rule applies. You can target instances directly by name, or specify a VPC, VPC subnet, IP, or IP subnet, which will apply the rule to traffic going to all matching instances. Targets are additive: the rule applies to instances matching ANY target.",
20589
20604
"oneOf": [
20590
20605
{
20591
20606
"description": "The rule applies to all instances in the VPC",
@@ -20690,61 +20705,62 @@
20690
20705
"type": "object",
20691
20706
"properties": {
20692
20707
"action": {
20693
-
"description": "whether traffic matching the rule should be allowed or dropped",
20708
+
"description": "Whether traffic matching the rule should be allowed or dropped",
"description": "Updateable properties of a `Vpc`'s firewall Note that VpcFirewallRules are implicitly created along with a Vpc, so there is no explicit creation.",
20778
+
"description": "Updated list of firewall rules. Will replace all existing rules.",
0 commit comments