Skip to content

Commit a7eaf9b

Browse files
Bump, oxide.json to omicron:9e58f1bb (#764)
Co-authored-by: oxide-reflector-bot[bot] <130185838+oxide-reflector-bot[bot]@users.noreply.github.com>
1 parent 579c3d8 commit a7eaf9b

File tree

4 files changed

+9
-7
lines changed

4 files changed

+9
-7
lines changed

cli/docs/cli.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4176,7 +4176,7 @@
41764176
{
41774177
"name": "update",
41784178
"about": "Replace firewall rules",
4179-
"long_about": "The maximum number of rules per VPC is 1024.\nTargets are used to specify the set of instances to which a firewall rule applies. You can target instances directly by name, or specify a VPC, VPC subnet, IP, or IP subnet, which will apply the rule to traffic going to all matching instances. Targets are additive: the rule applies to instances matching ANY target. The maximum number of targets is 256.\nFilters reduce the scope of a firewall rule. Without filters, the rule applies to all packets to the targets (or from the targets, if it's an outbound rule). With multiple filters, the rule applies only to packets matching ALL filters. The maximum number of each type of filter is 256.",
4179+
"long_about": "The maximum number of rules per VPC is 1024.\n\nTargets are used to specify the set of instances to which a firewall rule applies. You can target instances directly by name, or specify a VPC, VPC subnet, IP, or IP subnet, which will apply the rule to traffic going to all matching instances. Targets are additive: the rule applies to instances matching ANY target. The maximum number of targets is 256.\n\nFilters reduce the scope of a firewall rule. Without filters, the rule applies to all packets to the targets (or from the targets, if it's an outbound rule). With multiple filters, the rule applies only to packets matching ALL filters. The maximum number of each type of filter is 256.",
41804180
"args": [
41814181
{
41824182
"long": "json-body",

cli/src/generated_cli.rs

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5075,15 +5075,15 @@ impl<T: CliConfig> Cli<T> {
50755075
)
50765076
.about("Replace firewall rules")
50775077
.long_about(
5078-
"The maximum number of rules per VPC is 1024.\nTargets are used to specify the \
5078+
"The maximum number of rules per VPC is 1024.\n\nTargets are used to specify the \
50795079
set of instances to which a firewall rule applies. You can target instances \
50805080
directly by name, or specify a VPC, VPC subnet, IP, or IP subnet, which will \
50815081
apply the rule to traffic going to all matching instances. Targets are additive: \
50825082
the rule applies to instances matching ANY target. The maximum number of targets \
5083-
is 256.\nFilters reduce the scope of a firewall rule. Without filters, the rule \
5084-
applies to all packets to the targets (or from the targets, if it's an outbound \
5085-
rule). With multiple filters, the rule applies only to packets matching ALL \
5086-
filters. The maximum number of each type of filter is 256.",
5083+
is 256.\n\nFilters reduce the scope of a firewall rule. Without filters, the \
5084+
rule applies to all packets to the targets (or from the targets, if it's an \
5085+
outbound rule). With multiple filters, the rule applies only to packets matching \
5086+
ALL filters. The maximum number of each type of filter is 256.",
50875087
)
50885088
}
50895089

oxide.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8297,7 +8297,7 @@
82978297
"vpcs"
82988298
],
82998299
"summary": "Replace firewall rules",
8300-
"description": "The maximum number of rules per VPC is 1024.\nTargets are used to specify the set of instances to which a firewall rule applies. You can target instances directly by name, or specify a VPC, VPC subnet, IP, or IP subnet, which will apply the rule to traffic going to all matching instances. Targets are additive: the rule applies to instances matching ANY target. The maximum number of targets is 256.\nFilters reduce the scope of a firewall rule. Without filters, the rule applies to all packets to the targets (or from the targets, if it's an outbound rule). With multiple filters, the rule applies only to packets matching ALL filters. The maximum number of each type of filter is 256.",
8300+
"description": "The maximum number of rules per VPC is 1024.\n\nTargets are used to specify the set of instances to which a firewall rule applies. You can target instances directly by name, or specify a VPC, VPC subnet, IP, or IP subnet, which will apply the rule to traffic going to all matching instances. Targets are additive: the rule applies to instances matching ANY target. The maximum number of targets is 256.\n\nFilters reduce the scope of a firewall rule. Without filters, the rule applies to all packets to the targets (or from the targets, if it's an outbound rule). With multiple filters, the rule applies only to packets matching ALL filters. The maximum number of each type of filter is 256.",
83018301
"operationId": "vpc_firewall_rules_update",
83028302
"parameters": [
83038303
{

sdk/src/generated_sdk.rs

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49397,11 +49397,13 @@ pub trait ClientVpcsExt {
4939749397
/// Replace firewall rules
4939849398
///
4939949399
/// The maximum number of rules per VPC is 1024.
49400+
///
4940049401
/// Targets are used to specify the set of instances to which a firewall
4940149402
/// rule applies. You can target instances directly by name, or specify a
4940249403
/// VPC, VPC subnet, IP, or IP subnet, which will apply the rule to traffic
4940349404
/// going to all matching instances. Targets are additive: the rule applies
4940449405
/// to instances matching ANY target. The maximum number of targets is 256.
49406+
///
4940549407
/// Filters reduce the scope of a firewall rule. Without filters, the rule
4940649408
/// applies to all packets to the targets (or from the targets, if it's an
4940749409
/// outbound rule). With multiple filters, the rule applies only to packets

0 commit comments

Comments
 (0)