@@ -9007,8 +9007,7 @@ paths:
9007
9007
"inbound": [
9008
9008
{
9009
9009
"protocol": "TCP",
9010
- "start_port": 20,
9011
- "end_port": 22,
9010
+ "ports": "22, 80, 443",
9012
9011
"addresses": {
9013
9012
"ipv4": [
9014
9013
"192.0.2.1",
@@ -9022,8 +9021,7 @@ paths:
9022
9021
],
9023
9022
"outbound": [
9024
9023
"protocol": "TCP",
9025
- "start_port": 20,
9026
- "end_port": 22,
9024
+ "ports": "49152-65535",
9027
9025
"addresses": {
9028
9026
"ipv4": [
9029
9027
"192.0.2.1",
@@ -9122,7 +9120,7 @@ paths:
9122
9120
[Update Firewall Rules](http://developers.linode.com/api/v4/networking-firewalls-firewall-id-rules/#put)
9123
9121
endpoint to update your Rules.
9124
9122
9125
- - A Firewall's status can be set by this endpoint, but it cannot be
9123
+ - A Firewall's status can be set to `enabled` or `disabled` by this endpoint, but it cannot be
9126
9124
set to `deleted`. Instead, use the
9127
9125
[Delete Firewall](http://developers.linode.com/api/v4/networking-firewalls-firewall-id/#delete)
9128
9126
endpoint to delete a Firewall.
@@ -9190,7 +9188,7 @@ paths:
9190
9188
- firewall:read_write
9191
9189
description: |
9192
9190
Delete a Firewall resource by its ID. This will remove all of the Firewall's Rules
9193
- from any Linode services that it was assigned to.
9191
+ from any Linode services that the Firewall was assigned to.
9194
9192
9195
9193
A `firewall_delete` Event is generated when this endpoint returns successfully.
9196
9194
@@ -9474,7 +9472,8 @@ paths:
9474
9472
- Networking
9475
9473
summary: Update Firewall Rules
9476
9474
description: |
9477
- Updates the inbound and outbound Rules for a Firewall.
9475
+ Updates the inbound and outbound Rules for a Firewall. Using this endpoint will
9476
+ replace all of a Firewall's ruleset with the Rules specified in your request.
9478
9477
9479
9478
**Beta**: This endpoint is in beta. Please make sure to prepend all requests with
9480
9479
`/v4beta` instead of `/v4`, and be aware that this endpoint may receive breaking
@@ -9510,7 +9509,7 @@ paths:
9510
9509
"inbound": [
9511
9510
{
9512
9511
"protocol": "TCP",
9513
- "start_port ": 80,
9512
+ "ports ": "22, 80, 8080, 443"
9514
9513
"addresses": {
9515
9514
"ipv4": [
9516
9515
"192.0.2.1",
@@ -9524,8 +9523,7 @@ paths:
9524
9523
],
9525
9524
"outbound": [
9526
9525
"protocol": "TCP",
9527
- "start_port": 20,
9528
- "end_port": 22,
9526
+ "ports": "49152-65535"
9529
9527
"addresses": {
9530
9528
"ipv4": [
9531
9529
"192.0.2.1",
@@ -9542,8 +9540,8 @@ paths:
9542
9540
- lang: CLI
9543
9541
source: >
9544
9542
linode-cli firewalls rules-update 123 \
9545
- --inbound '[{"protocol": "TCP", "start_port ": 80 , "addresses": {"ipv4": ["192.0.2.1", "192.0.2.0/24"], "ipv6": ["2001:DB8::/32"]}}]' \
9546
- --outbound '[{"protocol": "TCP", "start_port ": 20 , "addresses": {"ipv4": ["192.0.2.1", "192.0.2.0/24"], "ipv6": ["2001:DB8::/32"]}}]'
9543
+ --inbound '[{"protocol": "TCP", "ports ": "22, 80, 8080, 443" , "addresses": {"ipv4": ["192.0.2.1", "192.0.2.0/24"], "ipv6": ["2001:DB8::/32"]}}]' \
9544
+ --outbound '[{"protocol": "TCP", "ports ": "49152-65535" , "addresses": {"ipv4": ["192.0.2.1", "192.0.2.0/24"], "ipv6": ["2001:DB8::/32"]}}]'
9547
9545
/nodebalancers:
9548
9546
x-linode-cli-command: nodebalancers
9549
9547
get:
@@ -15067,11 +15065,12 @@ components:
15067
15065
description: >
15068
15066
The inbound and outbound access rules to apply to the Firewall.
15069
15067
15070
- * A minimum of one open inbound port is required. Any inbound
15071
- port that is not open will be blocked.
15072
- * Outbound rules are optional. When no outbound ports are open, all outbound
15073
- ports are allowed. If you open one outbound port or more, all
15074
- remaining outbound ports will be blocked.
15068
+ * A minimum of one open inbound rule is required. Any inbound
15069
+ traffic that is not permitted by your rules will be blocked.
15070
+ * Outbound rules are optional. When no outbound rules are specified,
15071
+ all outbound traffic is allowed. If one or more outbound rules are
15072
+ specified, all outbound traffic that is not permitted by your rules
15073
+ will be blocked.
15075
15074
properties:
15076
15075
inbound:
15077
15076
type: array
@@ -15097,33 +15096,33 @@ components:
15097
15096
FirewallRuleConfig:
15098
15097
type: object
15099
15098
description: >
15100
- This Firewall's access rules. To open traffic on a range of ports
15101
- specify a `start_port` and an `end_port` .
15099
+ One of a Firewall's inbound or outbound access rules. The ` ports` property
15100
+ can be used to allow traffic on a comma-separated list of different ports .
15102
15101
required:
15103
15102
- protocol
15104
- - start_port
15105
15103
properties:
15106
15104
protocol:
15107
15105
type: string
15108
15106
enum:
15109
- - ALL
15110
15107
- TCP
15111
15108
- UDP
15112
15109
- ICMP
15113
15110
description: >
15114
15111
The type of network traffic to allow.
15115
15112
example: TCP
15116
- start_port:
15117
- type: integer
15118
- description: >
15119
- The port on which traffic will be allowed. Must be a value of `1-65535`.
15120
- example: 20
15121
- end_port:
15122
- type: integer
15123
- description: >
15124
- The end port for a range of ports on which traffic will be allowed. This port must be greater than or equal to the `start_port`
15125
- and must be a value of `1-65535`.
15126
- example: 22
15113
+ ports:
15114
+ type: string
15115
+ description: |
15116
+ A string representing the port or ports on which traffic will be allowed:
15117
+
15118
+ - The string may be a single port, a range of ports, or a comma-separated list
15119
+ of single ports and port ranges. A space is permitted following each comma.
15120
+ - A range of ports is inclusive of the start and end values for the range. The
15121
+ end value of the range must be greater than the start value.
15122
+ - Ports must be within 1 and 65535.
15123
+ - Ports may not be specified if a rule's protocol is `ICMP`. At least one port
15124
+ must be specified if a rule's protocol is `TCP` or `UDP`.
15125
+ example: '22-24, 80, 443'
15127
15126
addresses:
15128
15127
type: object
15129
15128
description: >
0 commit comments