@@ -8812,8 +8812,7 @@ paths:
8812
8812
"inbound": [
8813
8813
{
8814
8814
"protocol": "TCP",
8815
- "start_port": 20,
8816
- "end_port": 22,
8815
+ "ports": "22, 80, 443",
8817
8816
"addresses": {
8818
8817
"ipv4": [
8819
8818
"192.0.2.1",
@@ -8827,8 +8826,7 @@ paths:
8827
8826
],
8828
8827
"outbound": [
8829
8828
"protocol": "TCP",
8830
- "start_port": 20,
8831
- "end_port": 22,
8829
+ "ports": "49152-65535",
8832
8830
"addresses": {
8833
8831
"ipv4": [
8834
8832
"192.0.2.1",
@@ -8927,7 +8925,7 @@ paths:
8927
8925
[Update Firewall Rules](http://developers.linode.com/api/v4/networking-firewalls-firewall-id-rules/#put)
8928
8926
endpoint to update your Rules.
8929
8927
8930
- - A Firewall's status can be set by this endpoint, but it cannot be
8928
+ - A Firewall's status can be set to `enabled` or `disabled` by this endpoint, but it cannot be
8931
8929
set to `deleted`. Instead, use the
8932
8930
[Delete Firewall](http://developers.linode.com/api/v4/networking-firewalls-firewall-id/#delete)
8933
8931
endpoint to delete a Firewall.
@@ -8995,7 +8993,7 @@ paths:
8995
8993
- firewall:read_write
8996
8994
description: |
8997
8995
Delete a Firewall resource by its ID. This will remove all of the Firewall's Rules
8998
- from any Linode services that it was assigned to.
8996
+ from any Linode services that the Firewall was assigned to.
8999
8997
9000
8998
A `firewall_delete` Event is generated when this endpoint returns successfully.
9001
8999
@@ -9279,7 +9277,8 @@ paths:
9279
9277
- Networking
9280
9278
summary: Update Firewall Rules
9281
9279
description: |
9282
- Updates the inbound and outbound Rules for a Firewall.
9280
+ Updates the inbound and outbound Rules for a Firewall. Using this endpoint will
9281
+ replace all of a Firewall's ruleset with the Rules specified in your request.
9283
9282
9284
9283
**Beta**: This endpoint is in beta. Please make sure to prepend all requests with
9285
9284
`/v4beta` instead of `/v4`, and be aware that this endpoint may receive breaking
@@ -9315,7 +9314,7 @@ paths:
9315
9314
"inbound": [
9316
9315
{
9317
9316
"protocol": "TCP",
9318
- "start_port ": 80,
9317
+ "ports ": "22, 80, 8080, 443"
9319
9318
"addresses": {
9320
9319
"ipv4": [
9321
9320
"192.0.2.1",
@@ -9329,8 +9328,7 @@ paths:
9329
9328
],
9330
9329
"outbound": [
9331
9330
"protocol": "TCP",
9332
- "start_port": 20,
9333
- "end_port": 22,
9331
+ "ports": "49152-65535"
9334
9332
"addresses": {
9335
9333
"ipv4": [
9336
9334
"192.0.2.1",
@@ -9347,8 +9345,8 @@ paths:
9347
9345
- lang: CLI
9348
9346
source: >
9349
9347
linode-cli firewalls rules-update 123 \
9350
- --inbound '[{"protocol": "TCP", "start_port ": 80 , "addresses": {"ipv4": ["192.0.2.1", "192.0.2.0/24"], "ipv6": ["2001:DB8::/32"]}}]' \
9351
- --outbound '[{"protocol": "TCP", "start_port ": 20 , "addresses": {"ipv4": ["192.0.2.1", "192.0.2.0/24"], "ipv6": ["2001:DB8::/32"]}}]'
9348
+ --inbound '[{"protocol": "TCP", "ports ": "22, 80, 8080, 443" , "addresses": {"ipv4": ["192.0.2.1", "192.0.2.0/24"], "ipv6": ["2001:DB8::/32"]}}]' \
9349
+ --outbound '[{"protocol": "TCP", "ports ": "49152-65535" , "addresses": {"ipv4": ["192.0.2.1", "192.0.2.0/24"], "ipv6": ["2001:DB8::/32"]}}]'
9352
9350
/nodebalancers:
9353
9351
x-linode-cli-command: nodebalancers
9354
9352
get:
@@ -14785,11 +14783,12 @@ components:
14785
14783
description: >
14786
14784
The inbound and outbound access rules to apply to the Firewall.
14787
14785
14788
- * A minimum of one open inbound port is required. Any inbound
14789
- port that is not open will be blocked.
14790
- * Outbound rules are optional. When no outbound ports are open, all outbound
14791
- ports are allowed. If you open one outbound port or more, all
14792
- remaining outbound ports will be blocked.
14786
+ * A minimum of one open inbound rule is required. Any inbound
14787
+ traffic that is not permitted by your rules will be blocked.
14788
+ * Outbound rules are optional. When no outbound rules are specified,
14789
+ all outbound traffic is allowed. If one or more outbound rules are
14790
+ specified, all outbound traffic that is not permitted by your rules
14791
+ will be blocked.
14793
14792
properties:
14794
14793
inbound:
14795
14794
type: array
@@ -14815,33 +14814,33 @@ components:
14815
14814
FirewallRuleConfig:
14816
14815
type: object
14817
14816
description: >
14818
- This Firewall's access rules. To open traffic on a range of ports
14819
- specify a `start_port` and an `end_port` .
14817
+ One of a Firewall's inbound or outbound access rules. The ` ports` property
14818
+ can be used to allow traffic on a comma-separated list of different ports .
14820
14819
required:
14821
14820
- protocol
14822
- - start_port
14823
14821
properties:
14824
14822
protocol:
14825
14823
type: string
14826
14824
enum:
14827
- - ALL
14828
14825
- TCP
14829
14826
- UDP
14830
14827
- ICMP
14831
14828
description: >
14832
14829
The type of network traffic to allow.
14833
14830
example: TCP
14834
- start_port:
14835
- type: integer
14836
- description: >
14837
- The port on which traffic will be allowed. Must be a value of `1-65535`.
14838
- example: 20
14839
- end_port:
14840
- type: integer
14841
- description: >
14842
- The end port for a range of ports on which traffic will be allowed. This port must be greater than or equal to the `start_port`
14843
- and must be a value of `1-65535`.
14844
- example: 22
14831
+ ports:
14832
+ type: string
14833
+ description: |
14834
+ A string representing the port or ports on which traffic will be allowed:
14835
+
14836
+ - The string may be a single port, a range of ports, or a comma-separated list
14837
+ of single ports and port ranges. A space is permitted following each comma.
14838
+ - A range of ports is inclusive of the start and end values for the range. The
14839
+ end value of the range must be greater than the start value.
14840
+ - Ports must be within 1 and 65535.
14841
+ - Ports may not be specified if a rule's protocol is `ICMP`. At least one port
14842
+ must be specified if a rule's protocol is `TCP` or `UDP`.
14843
+ example: '22-24, 80, 443'
14845
14844
addresses:
14846
14845
type: object
14847
14846
description: >
0 commit comments