You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: openapi.yaml
+80-48Lines changed: 80 additions & 48 deletions
Original file line number
Diff line number
Diff line change
@@ -9787,14 +9787,12 @@ paths:
9787
9787
Firewall to a Linode service. Currently, Firewalls can only be assigned to Linode
9788
9788
instances.
9789
9789
9790
-
A Firewall can be assigned to multiple Linode services, and up to five active Firewalls
9791
-
can be assigned to a single Linode service.
9790
+
A Firewall can be assigned to a single Linode service at a time.
9792
9791
9793
9792
A `firewall_create` Event is generated when this endpoint returns successfully.
9794
9793
9795
9794
This endpoint is in **beta**.
9796
9795
9797
-
9798
9796
* Gain access to [Linode Cloud Firewall](https://www.linode.com/products/firewall/) by signing up for our [Greenlight Beta program](https://www.linode.com/green-light/#sign-up-form).
9799
9797
* During the beta, Cloud Firewall is not available in every [data center region](/docs/api/regions). For the current list of availability, see the [Cloud Firewall Product Documentation](https://www.linode.com/docs/products/networking/cloud-firewall/).
A Firewall Device assigns a Firewall to a Linode service. Currently, Firewalls
9830
9825
can only be assigned to Linode instances.
9831
9826
9832
-
* A Firewall can be assigned to multiple Linode services, and up to five active Firewalls can
9833
-
be assigned to a single Linode service.
9827
+
* A Firewall can be assigned to a single Linode service at a time.
9834
9828
9835
9829
* Additional disabled Firewalls can be assigned to a service, but they cannot be enabled if five other active Firewalls
9836
9830
are already assigned to the same service.
@@ -9866,41 +9860,46 @@ paths:
9866
9860
-X POST -d '{
9867
9861
"label": "firewall123",
9868
9862
"rules": {
9863
+
"inbound_policy": "DROP",
9869
9864
"inbound": [
9870
9865
{
9871
9866
"protocol": "TCP",
9872
9867
"ports": "22, 80, 443",
9873
9868
"addresses": {
9874
9869
"ipv4": [
9875
-
"192.0.2.1",
9876
9870
"192.0.2.0/24"
9877
9871
],
9878
9872
"ipv6": [
9879
9873
"2001:DB8::/32"
9880
9874
]
9881
-
}
9875
+
},
9876
+
"action": "ACCEPT",
9877
+
"label": "inbound-rule123",
9878
+
"description": "An example inbound rule description."
9882
9879
}
9883
9880
],
9881
+
"outbound_policy": "DROP"
9884
9882
"outbound": [
9885
9883
{
9886
9884
"protocol": "TCP",
9887
9885
"ports": "49152-65535",
9888
9886
"addresses": {
9889
9887
"ipv4": [
9890
-
"192.0.2.1",
9891
9888
"192.0.2.0/24"
9892
9889
],
9893
9890
"ipv6": [
9894
9891
"2001:DB8::/32"
9895
9892
]
9896
-
}
9893
+
},
9894
+
"action": "ACCEPT",
9895
+
"label": "outbound-rule123",
9896
+
"description": "An example outbound rule description."
9897
9897
}
9898
9898
]
9899
9899
},
9900
9900
"devices": {
9901
9901
"linodes": [
9902
-
123,
9903
-
456
9902
+
123
9904
9903
]
9905
9904
},
9906
9905
"tags": [
@@ -10172,10 +10171,9 @@ paths:
10172
10171
description: |
10173
10172
Creates a Firewall Device, which assigns a Firewall to a Linode service (referred to
10174
10173
as the Device's `entity`). Currently, only Devices with an entity of type `linode` are accepted.
10175
-
A Firewall can be assigned to multiple Linode services, and up to five active Firewalls can
10176
-
be assigned to a single Linode service. Additional disabled Firewalls can be
10177
-
assigned to a service, but they cannot be enabled if five other active Firewalls
10178
-
are already assigned to the same service.
10174
+
A Firewall can be assigned a single Linode service at a time. Additional disabled Firewalls can be
10175
+
assigned to a service, but they cannot be enabled if another active Firewall
10176
+
is already assigned to the same service.
10179
10177
10180
10178
Creating a Firewall Device will apply the Rules from a Firewall to a Linode service.
10181
10179
A `firewall_device_add` Event is generated when the Firewall Device is added successfully.
@@ -10443,34 +10441,40 @@ paths:
10443
10441
curl -H "Content-Type: application/json" \
10444
10442
-H "Authorization: Bearer $TOKEN" \
10445
10443
-X PUT -d '{
10444
+
"inbound_policy": "DROP",
10446
10445
"inbound": [
10447
10446
{
10448
10447
"protocol": "TCP",
10449
10448
"ports": "22, 80, 443",
10450
-
"addresses": {
10449
+
"addresses": {
10451
10450
"ipv4": [
10452
-
"192.0.2.1",
10453
10451
"192.0.2.0/24"
10454
10452
],
10455
10453
"ipv6": [
10456
10454
"2001:DB8::/32"
10457
10455
]
10458
-
}
10456
+
},
10457
+
"action": "ACCEPT",
10458
+
"label": "inbound-rule123",
10459
+
"description": "An example inbound rule description."
10459
10460
}
10460
10461
],
10462
+
"outbound_policy": "DROP"
10461
10463
"outbound": [
10462
10464
{
10463
10465
"protocol": "TCP",
10464
10466
"ports": "49152-65535",
10465
10467
"addresses": {
10466
10468
"ipv4": [
10467
-
"192.0.2.1",
10468
10469
"192.0.2.0/24"
10469
10470
],
10470
10471
"ipv6": [
10471
10472
"2001:DB8::/32"
10472
10473
]
10473
-
}
10474
+
},
10475
+
"action": "ACCEPT",
10476
+
"label": "outbound-rule123",
10477
+
"description": "An example outbound rule description."
10474
10478
}
10475
10479
]
10476
10480
}' \
@@ -16521,8 +16525,7 @@ components:
16521
16525
Firewall:
16522
16526
type: object
16523
16527
description: >
16524
-
A resource that controls incoming and outgoing network traffic to a Linode service. A Firewall can
16525
-
be assigned to multiple Linode services, and up to five active Firewalls can be assigned to a single Linode service.
16528
+
A resource that controls incoming and outgoing network traffic to a Linode service. Only one Firewall can be attached to a Linode at any given time.
16526
16529
[Create a Firewall Device](/docs/api/networking/#firewall-create)
16527
16530
to assign a Firewall to a Linode service. Currently, Firewalls can only be assigned to Linode instances.
16528
16531
properties:
@@ -16537,7 +16540,7 @@ components:
16537
16540
label:
16538
16541
x-linode-filterable: true
16539
16542
type: string
16540
-
description: >
16543
+
description: |
16541
16544
The Firewall's label, for display purposes only.
16542
16545
16543
16546
Firewall labels have the following constraints:
@@ -16576,7 +16579,7 @@ components:
16576
16579
The status of this Firewall.
16577
16580
16578
16581
* When a Firewall is first created its status is `enabled`.
16579
-
* Use the [Update Firewall](/docs/api/networking/#firewall-update) endpoint to set a Firewall's status to `enbaled` or `disabled`.
16582
+
* Use the [Update Firewall](/docs/api/networking/#firewall-update) endpoint to set a Firewall's status to `enabled` or `disabled`.
16580
16583
* Use the [Delete Firewall](/docs/api/networking/#firewall-delete) endpoint to delete a Firewall.
16581
16584
enum:
16582
16585
- enabled
@@ -16589,12 +16592,7 @@ components:
16589
16592
description: |
16590
16593
The inbound and outbound access rules to apply to the Firewall.
16591
16594
16592
-
* A minimum of one open inbound rule is required. Any inbound
16593
-
traffic that is not permitted by your rules will be blocked.
16594
-
* Outbound rules are optional. When no outbound rules are specified,
16595
-
all outbound traffic is allowed. If one or more outbound rules are
16596
-
specified, all outbound traffic that is not permitted by your rules
16597
-
will be blocked.
16595
+
`inbound_policy` and `outbound_policy` are required when creating a new Firewall.
16598
16596
16599
16597
A Firewall may have up to 25 rules across its inbound and outbound rulesets.
16600
16598
properties:
@@ -16606,8 +16604,22 @@ components:
16606
16604
type: array
16607
16605
items:
16608
16606
$ref: '#/components/schemas/FirewallRuleConfig'
16609
-
required:
16610
-
- inbound
16607
+
inbound_policy:
16608
+
type: string
16609
+
enum:
16610
+
- ACCEPT
16611
+
- DROP
16612
+
description: |
16613
+
The default behavior for inbound traffic. This setting can be overridden by [updating](/docs/api/networking/#firewall-rules-update) the `inbound.action` property of the Firewall Rule.
16614
+
example: DROP
16615
+
outbound_policy:
16616
+
type: string
16617
+
enum:
16618
+
- ACCEPT
16619
+
- DROP
16620
+
description: |
16621
+
The default behavior for outbound traffic. This setting can be overridden by [updating](/docs/api/networking/#firewall-rules-update) the `action` property for an individual Firewall Rule.
16622
+
example: DROP
16611
16623
tags:
16612
16624
x-linode-filterable: true
16613
16625
description: >
@@ -16660,28 +16672,48 @@ components:
16660
16672
are treated as equivalent when accounting for this limit.
16661
16673
properties:
16662
16674
ipv4:
16663
-
description: A list of IPv4 addresses or networks.
16675
+
description: A list of IPv4 addresses or networks. Must be in IP/mask format.
16664
16676
type: array
16665
16677
items:
16666
16678
type: string
16667
16679
example:
16668
-
- 192.0.2.1
16669
16680
- 192.0.2.0/24
16670
16681
ipv6:
16671
-
description: A list of IPv6 addresses or networks.
16682
+
description: A list of IPv6 addresses or networks. Must be in IP/mask format.
16672
16683
type: array
16673
16684
items:
16674
16685
type: string
16675
16686
example:
16676
16687
- 2001:DB8::/32
16688
+
action:
16689
+
type: string
16690
+
enum:
16691
+
- ACCEPT
16692
+
- DROP
16693
+
description: |
16694
+
The behavior for this rule. Overrides the `inbound_policy` or `outbound_policy` for the Firewall.
16695
+
example: ACCEPT
16696
+
label:
16697
+
type: string
16698
+
description: |
16699
+
Used to identify this rule. For display purposes only.
16700
+
example: firewallrule123
16701
+
minLength: 3
16702
+
maxLength: 32
16703
+
description:
16704
+
type: string
16705
+
description: |
16706
+
Used to describe this rule. For display purposes only.
16707
+
example: 'An example firewall rule description.'
16708
+
minLength: 1
16709
+
maxLength: 100
16677
16710
FirewallDevices:
16678
16711
type: object
16679
16712
description: >
16680
16713
Associates a Firewall with a Linode service. A Firewall can be assigned
16681
-
to multiple Linode services, and up to five active Firewalls can
16682
-
be assigned to a single Linode service. Additional disabled Firewalls can be
16683
-
assigned to a service, but they cannot be enabled if five other active Firewalls
16684
-
are already assigned to the same service.
16714
+
to a single Linode service at a time. Additional disabled Firewalls can be
16715
+
assigned to a service, but they cannot be enabled if another active Firewall
0 commit comments