Skip to content

Commit 0d8d5ba

Browse files
committed
Fixed inaccuracies regarding FirewallRulesConfig
1 parent 8fe702d commit 0d8d5ba

File tree

1 file changed

+29
-24
lines changed

1 file changed

+29
-24
lines changed

openapi.yaml

Lines changed: 29 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -13062,10 +13062,10 @@ paths:
1306213062
"ports": "22, 80, 443",
1306313063
"addresses": {
1306413064
"ipv4": [
13065-
"192.0.2.0/24"
13065+
"192.0.2.2/32"
1306613066
],
1306713067
"ipv6": [
13068-
"2001:DB8::/32"
13068+
"2001:DB8::/128"
1306913069
]
1307013070
},
1307113071
"action": "ACCEPT",
@@ -13080,10 +13080,10 @@ paths:
1308013080
"ports": "49152-65535",
1308113081
"addresses": {
1308213082
"ipv4": [
13083-
"192.0.2.0/24"
13083+
"192.0.2.2/32"
1308413084
],
1308513085
"ipv6": [
13086-
"2001:DB8::/32"
13086+
"2001:DB8::/128"
1308713087
]
1308813088
},
1308913089
"action": "ACCEPT",
@@ -13109,8 +13109,8 @@ paths:
1310913109
--label example-firewall \
1311013110
--rules.outbound_policy ACCEPT \
1311113111
--rules.inbound_policy DROP \
13112-
--rules.inbound '[{"protocol": "TCP", "ports": "22, 80, 8080, 443", "addresses": {"ipv4": ["192.0.2.1", "192.0.2.0/24"], "ipv6": ["2001:DB8::/32"]}, "action": "ACCEPT"}]' \
13113-
--rules.outbound '[{"protocol": "TCP", "ports": "49152-65535", "addresses": {"ipv4": ["192.0.2.0/24"],"ipv6": ["2001:DB8::/32"]}, "action": "DROP", "label": "outbound-rule123", "description": "An example outbound rule description."}]'
13112+
--rules.inbound '[{"protocol": "TCP", "ports": "22, 80, 8080, 443", "addresses": {"ipv4": ["192.0.2.1/32", "192.0.2.2/32"], "ipv6": ["2001:DB8::/128"]}, "action": "ACCEPT"}]' \
13113+
--rules.outbound '[{"protocol": "TCP", "ports": "49152-65535", "addresses": {"ipv4": ["192.0.2.2/32"],"ipv6": ["2001:DB8::/128"]}, "action": "DROP", "label": "outbound-rule123", "description": "An example outbound rule description."}]'
1311413114
/networking/firewalls/{firewallId}:
1311513115
parameters:
1311613116
- name: firewallId
@@ -13581,10 +13581,10 @@ paths:
1358113581
"ports": "22, 80, 443",
1358213582
"addresses": {
1358313583
"ipv4": [
13584-
"192.0.2.0/24"
13584+
"192.0.2.2/32"
1358513585
],
1358613586
"ipv6": [
13587-
"2001:DB8::/32"
13587+
"2001:DB8::/128"
1358813588
]
1358913589
},
1359013590
"action": "ACCEPT",
@@ -13599,10 +13599,10 @@ paths:
1359913599
"ports": "49152-65535",
1360013600
"addresses": {
1360113601
"ipv4": [
13602-
"192.0.2.0/24"
13602+
"192.0.2.2/32"
1360313603
],
1360413604
"ipv6": [
13605-
"2001:DB8::/32"
13605+
"2001:DB8::/128"
1360613606
]
1360713607
},
1360813608
"action": "ACCEPT",
@@ -13615,8 +13615,8 @@ paths:
1361513615
- lang: CLI
1361613616
source: >
1361713617
linode-cli firewalls rules-update 123 \
13618-
--inbound '[{"action":"ACCEPT", "protocol": "TCP", "ports": "22, 80, 8080, 443", "addresses": {"ipv4": ["192.0.2.1/32", "192.0.2.0/24"], "ipv6": ["2001:DB8::/32"]}}]' \
13619-
--outbound '[{"action":"DROP","protocol": "TCP", "ports": "49152-65535", "addresses": {"ipv4": ["192.0.2.1/32", "192.0.2.0/24"], "ipv6": ["2001:DB8::/32"]}}]'
13618+
--inbound '[{"action":"ACCEPT", "protocol": "TCP", "ports": "22, 80, 8080, 443", "addresses": {"ipv4": ["192.0.2.1/32", "192.0.2.2/32"], "ipv6": ["2001:DB8::/128"]}}]' \
13619+
--outbound '[{"action":"DROP","protocol": "TCP", "ports": "49152-65535", "addresses": {"ipv4": ["192.0.2.1/32", "192.0.2.2/32"], "ipv6": ["2001:DB8::/128`"]}}]'
1362013620
/networking/vlans:
1362113621
x-linode-cli-command: vlans
1362213622
get:
@@ -20998,41 +20998,46 @@ components:
2099820998
- ICMP
2099920999
- IPENCAP
2100021000
description: >
21001-
The type of network traffic to allow.
21001+
The type of network traffic affected by this rule.
2100221002
example: TCP
2100321003
ports:
2100421004
type: string
2100521005
description: |
21006-
A string representing the port or ports on which traffic will be allowed:
21006+
A string representing the port or ports affected by this rule:
2100721007

2100821008
- The string may be a single port, a range of ports, or a comma-separated list of single ports and port ranges. A space is permitted following each comma.
2100921009
- A range of ports is inclusive of the start and end values for the range. The end value of the range must be greater than the start value.
2101021010
- Ports must be within 1 and 65535, and may not contain any leading zeroes. For example, port "080" is not allowed.
21011-
- Ports may not be specified if a rule's protocol is `ICMP` or `IPENCAP`.
21012-
- At least one port must be specified if a rule's protocol is `TCP` or `UDP`.
2101321011
- The ports string can have up to 15 *pieces*, where a single port is treated as one piece, and a port range is treated as two pieces. For example, the string "22-24, 80, 443" has four pieces.
21012+
- If no ports are configured, all ports are affected.
2101421013
example: '22-24, 80, 443'
2101521014
addresses:
2101621015
type: object
21017-
description: >
21018-
Allowed IPv4 or IPv6 addresses. A Rule can have up to 255 addresses
21019-
or networks listed across its IPv4 and IPv6 arrays. A network and a single IP
21020-
are treated as equivalent when accounting for this limit.
21016+
description: |
21017+
The IPv4 and/or IPv6 addresses affected by this rule. A Rule can have up to 255 total addresses or networks listed across its IPv4 and IPv6 arrays. A network and a single IP are treated as equivalent when accounting for this limit.
21018+
21019+
Must contain `ipv4`, `ipv6`, or both.
2102121020
properties:
2102221021
ipv4:
21023-
description: A list of IPv4 addresses or networks. Must be in IP/mask format.
21022+
description: |
21023+
A list of IPv4 addresses or networks. Must be in IP/mask format.
21024+
21025+
If "0.0.0.0/0" is included in this list, all IPv4 addresses are affected by this rule.
2102421026
type: array
2102521027
items:
2102621028
type: string
2102721029
example:
21028-
- 192.0.2.0/24
21030+
- 192.0.2.2/32
2102921031
ipv6:
21030-
description: A list of IPv6 addresses or networks. Must be in IP/mask format.
21032+
description: |
21033+
A list of IPv6 addresses or networks. Must be in IP/mask format.
21034+
21035+
If "::/0" is included in this list, all IPv6 addresses are affected by this rule.
2103121036
type: array
2103221037
items:
2103321038
type: string
2103421039
example:
21035-
- 2001:DB8::/32
21040+
- 2001:DB8::/128
2103621041
action:
2103721042
type: string
2103821043
enum:

0 commit comments

Comments
 (0)