You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: openapi.yaml
+80-49Lines changed: 80 additions & 49 deletions
Original file line number
Diff line number
Diff line change
@@ -9973,14 +9973,12 @@ paths:
9973
9973
Firewall to a Linode service. Currently, Firewalls can only be assigned to Linode
9974
9974
instances.
9975
9975
9976
-
A Firewall can be assigned to multiple Linode services, and up to five active Firewalls
9977
-
can be assigned to a single Linode service.
9976
+
A Firewall can be assigned to a single Linode service at a time.
9978
9977
9979
9978
A `firewall_create` Event is generated when this endpoint returns successfully.
9980
9979
9981
9980
This endpoint is in **beta**.
9982
9981
9983
-
9984
9982
* Gain access to [Linode Cloud Firewall](https://www.linode.com/products/firewall/) by signing up for our [Greenlight Beta program](https://www.linode.com/green-light/#sign-up-form).
9985
9983
* During the beta, Cloud Firewall is not available in every [data center region](/docs/api/regions). For the current list of availability, see the [Cloud Firewall Product Documentation](https://www.linode.com/docs/products/networking/cloud-firewall/).
A Firewall Device assigns a Firewall to a Linode service. Currently, Firewalls
10016
10012
can only be assigned to Linode instances.
10017
10013
10018
-
* A Firewall can be assigned to multiple Linode services, and up to five active Firewalls can
10019
-
be assigned to a single Linode service.
10014
+
* A Firewall can be assigned to a single Linode service at a time.
10020
10015
10021
10016
* Additional disabled Firewalls can be assigned to a service, but they cannot be enabled if five other active Firewalls
10022
10017
are already assigned to the same service.
@@ -10052,41 +10047,46 @@ paths:
10052
10047
-X POST -d '{
10053
10048
"label": "firewall123",
10054
10049
"rules": {
10050
+
"inbound_policy": "DROP",
10055
10051
"inbound": [
10056
10052
{
10057
10053
"protocol": "TCP",
10058
10054
"ports": "22, 80, 443",
10059
10055
"addresses": {
10060
10056
"ipv4": [
10061
-
"192.0.2.1",
10062
10057
"192.0.2.0/24"
10063
10058
],
10064
10059
"ipv6": [
10065
10060
"2001:DB8::/32"
10066
10061
]
10067
-
}
10062
+
},
10063
+
"action": "ACCEPT",
10064
+
"label": "inbound-rule123",
10065
+
"description": "An example inbound rule description."
10068
10066
}
10069
10067
],
10068
+
"outbound_policy": "DROP"
10070
10069
"outbound": [
10071
10070
{
10072
10071
"protocol": "TCP",
10073
10072
"ports": "49152-65535",
10074
10073
"addresses": {
10075
10074
"ipv4": [
10076
-
"192.0.2.1",
10077
10075
"192.0.2.0/24"
10078
10076
],
10079
10077
"ipv6": [
10080
10078
"2001:DB8::/32"
10081
10079
]
10082
-
}
10080
+
},
10081
+
"action": "ACCEPT",
10082
+
"label": "outbound-rule123",
10083
+
"description": "An example outbound rule description."
10083
10084
}
10084
10085
]
10085
10086
},
10086
10087
"devices": {
10087
10088
"linodes": [
10088
-
123,
10089
-
456
10089
+
123
10090
10090
]
10091
10091
},
10092
10092
"tags": [
@@ -10358,10 +10358,9 @@ paths:
10358
10358
description: |
10359
10359
Creates a Firewall Device, which assigns a Firewall to a Linode service (referred to
10360
10360
as the Device's `entity`). Currently, only Devices with an entity of type `linode` are accepted.
10361
-
A Firewall can be assigned to multiple Linode services, and up to five active Firewalls can
10362
-
be assigned to a single Linode service. Additional disabled Firewalls can be
10363
-
assigned to a service, but they cannot be enabled if five other active Firewalls
10364
-
are already assigned to the same service.
10361
+
A Firewall can be assigned a single Linode service at a time. Additional disabled Firewalls can be
10362
+
assigned to a service, but they cannot be enabled if another active Firewall
10363
+
is already assigned to the same service.
10365
10364
10366
10365
Creating a Firewall Device will apply the Rules from a Firewall to a Linode service.
10367
10366
A `firewall_device_add` Event is generated when the Firewall Device is added successfully.
@@ -10629,34 +10628,40 @@ paths:
10629
10628
curl -H "Content-Type: application/json" \
10630
10629
-H "Authorization: Bearer $TOKEN" \
10631
10630
-X PUT -d '{
10631
+
"inbound_policy": "DROP",
10632
10632
"inbound": [
10633
10633
{
10634
10634
"protocol": "TCP",
10635
10635
"ports": "22, 80, 443",
10636
-
"addresses": {
10636
+
"addresses": {
10637
10637
"ipv4": [
10638
-
"192.0.2.1",
10639
10638
"192.0.2.0/24"
10640
10639
],
10641
10640
"ipv6": [
10642
10641
"2001:DB8::/32"
10643
10642
]
10644
-
}
10643
+
},
10644
+
"action": "ACCEPT",
10645
+
"label": "inbound-rule123",
10646
+
"description": "An example inbound rule description."
10645
10647
}
10646
10648
],
10649
+
"outbound_policy": "DROP"
10647
10650
"outbound": [
10648
10651
{
10649
10652
"protocol": "TCP",
10650
10653
"ports": "49152-65535",
10651
10654
"addresses": {
10652
10655
"ipv4": [
10653
-
"192.0.2.1",
10654
10656
"192.0.2.0/24"
10655
10657
],
10656
10658
"ipv6": [
10657
10659
"2001:DB8::/32"
10658
10660
]
10659
-
}
10661
+
},
10662
+
"action": "ACCEPT",
10663
+
"label": "outbound-rule123",
10664
+
"description": "An example outbound rule description."
10660
10665
}
10661
10666
]
10662
10667
}' \
@@ -16708,8 +16713,7 @@ components:
16708
16713
Firewall:
16709
16714
type: object
16710
16715
description: >
16711
-
A resource that controls incoming and outgoing network traffic to a Linode service. A Firewall can
16712
-
be assigned to multiple Linode services, and up to five active Firewalls can be assigned to a single Linode service.
16716
+
A resource that controls incoming and outgoing network traffic to a Linode service. Only one Firewall can be attached to a Linode at any given time.
16713
16717
[Create a Firewall Device](/docs/api/networking/#firewall-create)
16714
16718
to assign a Firewall to a Linode service. Currently, Firewalls can only be assigned to Linode instances.
16715
16719
properties:
@@ -16724,7 +16728,7 @@ components:
16724
16728
label:
16725
16729
x-linode-filterable: true
16726
16730
type: string
16727
-
description: >
16731
+
description: |
16728
16732
The Firewall's label, for display purposes only.
16729
16733
16730
16734
Firewall labels have the following constraints:
@@ -16763,7 +16767,7 @@ components:
16763
16767
The status of this Firewall.
16764
16768
16765
16769
* When a Firewall is first created its status is `enabled`.
16766
-
* Use the [Update Firewall](/docs/api/networking/#firewall-update) endpoint to set a Firewall's status to `enbaled` or `disabled`.
16770
+
* Use the [Update Firewall](/docs/api/networking/#firewall-update) endpoint to set a Firewall's status to `enabled` or `disabled`.
16767
16771
* Use the [Delete Firewall](/docs/api/networking/#firewall-delete) endpoint to delete a Firewall.
16768
16772
enum:
16769
16773
- enabled
@@ -16776,13 +16780,6 @@ components:
16776
16780
description: |
16777
16781
The inbound and outbound access rules to apply to the Firewall.
16778
16782
16779
-
* A minimum of one open inbound rule is required. Any inbound
16780
-
traffic that is not permitted by your rules will be blocked.
16781
-
* Outbound rules are optional. When no outbound rules are specified,
16782
-
all outbound traffic is allowed. If one or more outbound rules are
16783
-
specified, all outbound traffic that is not permitted by your rules
16784
-
will be blocked.
16785
-
16786
16783
A Firewall may have up to 25 rules across its inbound and outbound rulesets.
16787
16784
properties:
16788
16785
inbound:
@@ -16793,8 +16790,22 @@ components:
16793
16790
type: array
16794
16791
items:
16795
16792
$ref: '#/components/schemas/FirewallRuleConfig'
16796
-
required:
16797
-
- inbound
16793
+
inbound_policy:
16794
+
type: string
16795
+
enum:
16796
+
- ACCEPT
16797
+
- DROP
16798
+
description: |
16799
+
The default behavior for inbound traffic. This setting can be overridden by [updating](/docs/api/networking/#firewall-rules-update) the `inbound.action` property of the Firewall Rule.
16800
+
example: DROP
16801
+
outbound_policy:
16802
+
type: string
16803
+
enum:
16804
+
- ACCEPT
16805
+
- DROP
16806
+
description: |
16807
+
The default behavior for outbound traffic. This setting can be overridden by [updating](/docs/api/networking/#firewall-rules-update) the `action` property for an individual Firewall Rule.
16808
+
example: DROP
16798
16809
tags:
16799
16810
x-linode-filterable: true
16800
16811
description: >
@@ -16847,28 +16858,48 @@ components:
16847
16858
are treated as equivalent when accounting for this limit.
16848
16859
properties:
16849
16860
ipv4:
16850
-
description: A list of IPv4 addresses or networks.
16861
+
description: A list of IPv4 addresses or networks. Must be in IP/mask format.
16851
16862
type: array
16852
16863
items:
16853
16864
type: string
16854
16865
example:
16855
-
- 192.0.2.1
16856
16866
- 192.0.2.0/24
16857
16867
ipv6:
16858
-
description: A list of IPv6 addresses or networks.
16868
+
description: A list of IPv6 addresses or networks. Must be in IP/mask format.
16859
16869
type: array
16860
16870
items:
16861
16871
type: string
16862
16872
example:
16863
16873
- 2001:DB8::/32
16874
+
action:
16875
+
type: string
16876
+
enum:
16877
+
- ACCEPT
16878
+
- DROP
16879
+
description: |
16880
+
Controls whether traffic is accepted or dropped by this rule. Overrides the Firewall's `inbound_policy` if this is an inbound rule, or the `outbound_policy` if this is an outbound rule.
16881
+
example: ACCEPT
16882
+
label:
16883
+
type: string
16884
+
description: |
16885
+
Used to identify this rule. For display purposes only.
16886
+
example: firewallrule123
16887
+
minLength: 3
16888
+
maxLength: 32
16889
+
description:
16890
+
type: string
16891
+
description: |
16892
+
Used to describe this rule. For display purposes only.
16893
+
example: 'An example firewall rule description.'
16894
+
minLength: 1
16895
+
maxLength: 100
16864
16896
FirewallDevices:
16865
16897
type: object
16866
16898
description: >
16867
16899
Associates a Firewall with a Linode service. A Firewall can be assigned
16868
-
to multiple Linode services, and up to five active Firewalls can
16869
-
be assigned to a single Linode service. Additional disabled Firewalls can be
16870
-
assigned to a service, but they cannot be enabled if five other active Firewalls
16871
-
are already assigned to the same service.
16900
+
to a single Linode service at a time. Additional disabled Firewalls can be
16901
+
assigned to a service, but they cannot be enabled if another active Firewall
0 commit comments