oci-networkfirewall 2.76.1 → 2.77.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (152) hide show
  1. package/lib/client.d.ts +87 -81
  2. package/lib/client.js +89 -80
  3. package/lib/client.js.map +1 -1
  4. package/lib/model/clone-network-firewall-policy-details.d.ts +2 -2
  5. package/lib/model/create-decryption-rule-details.d.ts +2 -2
  6. package/lib/model/create-mapped-secret-details.d.ts +2 -2
  7. package/lib/model/create-network-firewall-details.d.ts +3 -3
  8. package/lib/model/create-network-firewall-policy-details.d.ts +2 -2
  9. package/lib/model/create-security-rule-details.d.ts +2 -2
  10. package/lib/model/decryption-action-type.d.ts +1 -1
  11. package/lib/model/decryption-action-type.js +1 -1
  12. package/lib/model/decryption-profile-summary.d.ts +2 -2
  13. package/lib/model/decryption-rule-summary.d.ts +2 -2
  14. package/lib/model/decryption-rule.d.ts +2 -2
  15. package/lib/model/inspection-type.d.ts +2 -2
  16. package/lib/model/inspection-type.js +2 -2
  17. package/lib/model/mapped-secret-summary.d.ts +2 -2
  18. package/lib/model/mapped-secret.d.ts +2 -2
  19. package/lib/model/network-firewall-policy-summary.d.ts +5 -5
  20. package/lib/model/network-firewall-policy.d.ts +5 -5
  21. package/lib/model/network-firewall-summary.d.ts +6 -6
  22. package/lib/model/network-firewall.d.ts +6 -6
  23. package/lib/model/security-rule-summary.d.ts +2 -2
  24. package/lib/model/security-rule.d.ts +2 -2
  25. package/lib/model/simple-url-pattern.d.ts +5 -5
  26. package/lib/model/traffic-action-type.d.ts +1 -1
  27. package/lib/model/traffic-action-type.js +1 -1
  28. package/lib/model/traffic-inspection-type.d.ts +1 -1
  29. package/lib/model/traffic-inspection-type.js +1 -1
  30. package/lib/model/update-decryption-rule-details.d.ts +2 -2
  31. package/lib/model/update-mapped-secret-details.d.ts +2 -2
  32. package/lib/model/update-network-firewall-details.d.ts +2 -2
  33. package/lib/model/update-network-firewall-policy-details.d.ts +2 -2
  34. package/lib/model/update-security-rule-details.d.ts +2 -2
  35. package/lib/request/apply-network-firewall-policy-request.d.ts +2 -2
  36. package/lib/request/bulk-upload-address-lists-request.d.ts +2 -2
  37. package/lib/request/bulk-upload-application-groups-request.d.ts +2 -2
  38. package/lib/request/bulk-upload-applications-request.d.ts +2 -2
  39. package/lib/request/bulk-upload-decryption-profiles-request.d.ts +2 -2
  40. package/lib/request/bulk-upload-decryption-rules-request.d.ts +2 -2
  41. package/lib/request/bulk-upload-mapped-secrets-request.d.ts +2 -2
  42. package/lib/request/bulk-upload-security-rules-request.d.ts +2 -2
  43. package/lib/request/bulk-upload-service-lists-request.d.ts +2 -2
  44. package/lib/request/bulk-upload-services-request.d.ts +2 -2
  45. package/lib/request/bulk-upload-url-lists-request.d.ts +2 -2
  46. package/lib/request/cancel-work-request-request.d.ts +2 -2
  47. package/lib/request/change-network-firewall-compartment-request.d.ts +2 -2
  48. package/lib/request/change-network-firewall-policy-compartment-request.d.ts +2 -2
  49. package/lib/request/clone-network-firewall-policy-request.d.ts +2 -2
  50. package/lib/request/create-address-list-request.d.ts +1 -1
  51. package/lib/request/create-application-group-request.d.ts +1 -1
  52. package/lib/request/create-application-request.d.ts +1 -1
  53. package/lib/request/create-decryption-profile-request.d.ts +1 -1
  54. package/lib/request/create-decryption-rule-request.d.ts +1 -1
  55. package/lib/request/create-mapped-secret-request.d.ts +1 -1
  56. package/lib/request/create-network-firewall-policy-request.d.ts +1 -1
  57. package/lib/request/create-network-firewall-request.d.ts +1 -1
  58. package/lib/request/create-security-rule-request.d.ts +1 -1
  59. package/lib/request/create-service-list-request.d.ts +1 -1
  60. package/lib/request/create-service-request.d.ts +1 -1
  61. package/lib/request/create-url-list-request.d.ts +1 -1
  62. package/lib/request/delete-address-list-request.d.ts +2 -2
  63. package/lib/request/delete-application-group-request.d.ts +2 -2
  64. package/lib/request/delete-application-request.d.ts +2 -2
  65. package/lib/request/delete-decryption-profile-request.d.ts +2 -2
  66. package/lib/request/delete-decryption-rule-request.d.ts +2 -2
  67. package/lib/request/delete-mapped-secret-request.d.ts +2 -2
  68. package/lib/request/delete-network-firewall-policy-request.d.ts +2 -2
  69. package/lib/request/delete-network-firewall-request.d.ts +2 -2
  70. package/lib/request/delete-security-rule-request.d.ts +2 -2
  71. package/lib/request/delete-service-list-request.d.ts +2 -2
  72. package/lib/request/delete-service-request.d.ts +2 -2
  73. package/lib/request/delete-url-list-request.d.ts +2 -2
  74. package/lib/request/get-address-list-request.d.ts +1 -1
  75. package/lib/request/get-application-group-request.d.ts +1 -1
  76. package/lib/request/get-application-request.d.ts +2 -2
  77. package/lib/request/get-decryption-profile-request.d.ts +1 -1
  78. package/lib/request/get-decryption-rule-request.d.ts +2 -2
  79. package/lib/request/get-mapped-secret-request.d.ts +2 -2
  80. package/lib/request/get-network-firewall-policy-request.d.ts +1 -1
  81. package/lib/request/get-network-firewall-request.d.ts +1 -1
  82. package/lib/request/get-security-rule-request.d.ts +1 -1
  83. package/lib/request/get-service-list-request.d.ts +1 -1
  84. package/lib/request/get-service-request.d.ts +2 -2
  85. package/lib/request/get-url-list-request.d.ts +1 -1
  86. package/lib/request/get-work-request-request.d.ts +1 -1
  87. package/lib/request/list-address-lists-request.d.ts +2 -2
  88. package/lib/request/list-application-groups-request.d.ts +2 -2
  89. package/lib/request/list-applications-request.d.ts +2 -2
  90. package/lib/request/list-decryption-profiles-request.d.ts +2 -2
  91. package/lib/request/list-decryption-rules-request.d.ts +2 -2
  92. package/lib/request/list-mapped-secrets-request.d.ts +2 -2
  93. package/lib/request/list-network-firewall-policies-request.d.ts +2 -2
  94. package/lib/request/list-network-firewalls-request.d.ts +3 -3
  95. package/lib/request/list-security-rules-request.d.ts +2 -2
  96. package/lib/request/list-service-lists-request.d.ts +2 -2
  97. package/lib/request/list-services-request.d.ts +2 -2
  98. package/lib/request/list-url-lists-request.d.ts +2 -2
  99. package/lib/request/list-work-request-errors-request.d.ts +2 -2
  100. package/lib/request/list-work-request-logs-request.d.ts +2 -2
  101. package/lib/request/list-work-requests-request.d.ts +2 -2
  102. package/lib/request/migrate-network-firewall-policy-request.d.ts +2 -2
  103. package/lib/request/update-address-list-request.d.ts +2 -2
  104. package/lib/request/update-application-group-request.d.ts +2 -2
  105. package/lib/request/update-application-request.d.ts +2 -2
  106. package/lib/request/update-decryption-profile-request.d.ts +2 -2
  107. package/lib/request/update-decryption-rule-request.d.ts +2 -2
  108. package/lib/request/update-mapped-secret-request.d.ts +2 -2
  109. package/lib/request/update-network-firewall-policy-request.d.ts +2 -2
  110. package/lib/request/update-network-firewall-request.d.ts +2 -2
  111. package/lib/request/update-security-rule-request.d.ts +2 -2
  112. package/lib/request/update-service-list-request.d.ts +2 -2
  113. package/lib/request/update-service-request.d.ts +2 -2
  114. package/lib/request/update-url-list-request.d.ts +2 -2
  115. package/lib/response/apply-network-firewall-policy-response.d.ts +1 -1
  116. package/lib/response/clone-network-firewall-policy-response.d.ts +1 -1
  117. package/lib/response/create-address-list-response.d.ts +1 -1
  118. package/lib/response/create-application-group-response.d.ts +1 -1
  119. package/lib/response/create-application-response.d.ts +1 -1
  120. package/lib/response/create-decryption-profile-response.d.ts +1 -1
  121. package/lib/response/create-decryption-rule-response.d.ts +1 -1
  122. package/lib/response/create-mapped-secret-response.d.ts +1 -1
  123. package/lib/response/create-network-firewall-policy-response.d.ts +1 -1
  124. package/lib/response/create-network-firewall-response.d.ts +1 -1
  125. package/lib/response/create-security-rule-response.d.ts +1 -1
  126. package/lib/response/create-service-list-response.d.ts +1 -1
  127. package/lib/response/create-service-response.d.ts +1 -1
  128. package/lib/response/create-url-list-response.d.ts +1 -1
  129. package/lib/response/get-address-list-response.d.ts +1 -1
  130. package/lib/response/get-application-group-response.d.ts +1 -1
  131. package/lib/response/get-application-response.d.ts +1 -1
  132. package/lib/response/get-decryption-profile-response.d.ts +1 -1
  133. package/lib/response/get-decryption-rule-response.d.ts +1 -1
  134. package/lib/response/get-mapped-secret-response.d.ts +1 -1
  135. package/lib/response/get-network-firewall-policy-response.d.ts +1 -1
  136. package/lib/response/get-network-firewall-response.d.ts +1 -1
  137. package/lib/response/get-security-rule-response.d.ts +1 -1
  138. package/lib/response/get-service-list-response.d.ts +1 -1
  139. package/lib/response/get-service-response.d.ts +1 -1
  140. package/lib/response/get-url-list-response.d.ts +1 -1
  141. package/lib/response/get-work-request-response.d.ts +1 -1
  142. package/lib/response/update-address-list-response.d.ts +1 -1
  143. package/lib/response/update-application-group-response.d.ts +1 -1
  144. package/lib/response/update-application-response.d.ts +1 -1
  145. package/lib/response/update-decryption-profile-response.d.ts +1 -1
  146. package/lib/response/update-decryption-rule-response.d.ts +1 -1
  147. package/lib/response/update-mapped-secret-response.d.ts +1 -1
  148. package/lib/response/update-security-rule-response.d.ts +1 -1
  149. package/lib/response/update-service-list-response.d.ts +1 -1
  150. package/lib/response/update-service-response.d.ts +1 -1
  151. package/lib/response/update-url-list-response.d.ts +1 -1
  152. package/package.json +3 -3
@@ -25,7 +25,7 @@ export interface CloneNetworkFirewallPolicyDetails {
25
25
  /**
26
26
  * Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace.
27
27
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
28
- * Example: `{\"Department\": \"Finance\"}`
28
+ * Example: {@code {\"Department\": \"Finance\"}}
29
29
  *
30
30
  */
31
31
  "freeformTags"?: {
@@ -34,7 +34,7 @@ export interface CloneNetworkFirewallPolicyDetails {
34
34
  /**
35
35
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
36
36
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
37
- * Example: `{\"Operations\": {\"CostCenter\": \"42\"}}`
37
+ * Example: {@code {\"Operations\": {\"CostCenter\": \"42\"}}}
38
38
  *
39
39
  */
40
40
  "definedTags"?: {
@@ -26,7 +26,7 @@ export interface CreateDecryptionRuleDetails {
26
26
  * Action:
27
27
  * <p>
28
28
  * NO_DECRYPT - Matching traffic is not decrypted.
29
- * * DECRYPT - Matching traffic is decrypted with the specified `secret` according to the specified `decryptionProfile`.
29
+ * * DECRYPT - Matching traffic is decrypted with the specified {@code secret} according to the specified {@code decryptionProfile}.
30
30
  *
31
31
  */
32
32
  "action": model.DecryptionActionType;
@@ -35,7 +35,7 @@ export interface CreateDecryptionRuleDetails {
35
35
  */
36
36
  "decryptionProfile"?: string;
37
37
  /**
38
- * The name of a mapped secret. Its `type` must match that of the specified decryption profile.
38
+ * The name of a mapped secret. Its {@code type} must match that of the specified decryption profile.
39
39
  */
40
40
  "secret"?: string;
41
41
  "position"?: model.RulePosition;
@@ -23,8 +23,8 @@ export interface CreateMappedSecretDetails {
23
23
  /**
24
24
  * Type of the secrets mapped based on the policy.
25
25
  * <p>
26
- * `SSL_INBOUND_INSPECTION`: For Inbound inspection of SSL traffic.
27
- * * `SSL_FORWARD_PROXY`: For forward proxy certificates for SSL inspection.
26
+ * {@code SSL_INBOUND_INSPECTION}: For Inbound inspection of SSL traffic.
27
+ * * {@code SSL_FORWARD_PROXY}: For forward proxy certificates for SSL inspection.
28
28
  *
29
29
  */
30
30
  "type": model.InspectionType;
@@ -29,7 +29,7 @@ export interface CreateNetworkFirewallDetails {
29
29
  /**
30
30
  * Availability Domain where Network Firewall instance is created.
31
31
  * To get a list of availability domains for a tenancy, use {@link #listAvailabilityDomains(ListAvailabilityDomainsRequest) listAvailabilityDomains} operation.
32
- * Example: `kIdk:PHX-AD-1`
32
+ * Example: {@code kIdk:PHX-AD-1}
33
33
  *
34
34
  */
35
35
  "availabilityDomain"?: string;
@@ -52,7 +52,7 @@ export interface CreateNetworkFirewallDetails {
52
52
  /**
53
53
  * Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace.
54
54
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
55
- * Example: `{\"Department\": \"Finance\"}`
55
+ * Example: {@code {\"Department\": \"Finance\"}}
56
56
  *
57
57
  */
58
58
  "freeformTags"?: {
@@ -61,7 +61,7 @@ export interface CreateNetworkFirewallDetails {
61
61
  /**
62
62
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
63
63
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
64
- * Example: `{\"Operations\": {\"CostCenter\": \"42\"}}`
64
+ * Example: {@code {\"Operations\": {\"CostCenter\": \"42\"}}}
65
65
  *
66
66
  */
67
67
  "definedTags"?: {
@@ -25,7 +25,7 @@ export interface CreateNetworkFirewallPolicyDetails {
25
25
  /**
26
26
  * Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace.
27
27
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
28
- * Example: `{\"Department\": \"Finance\"}`
28
+ * Example: {@code {\"Department\": \"Finance\"}}
29
29
  *
30
30
  */
31
31
  "freeformTags"?: {
@@ -34,7 +34,7 @@ export interface CreateNetworkFirewallPolicyDetails {
34
34
  /**
35
35
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
36
36
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
37
- * Example: `{\"Operations\": {\"CostCenter\": \"42\"}}`
37
+ * Example: {@code {\"Operations\": {\"CostCenter\": \"42\"}}}
38
38
  *
39
39
  */
40
40
  "definedTags"?: {
@@ -29,7 +29,7 @@ export interface CreateSecurityRuleDetails {
29
29
  * ALLOW - Allows the traffic.
30
30
  * * DROP - Silently drops the traffic, e.g. without sending a TCP reset.
31
31
  * * REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
32
- * * INSPECT - Inspects traffic for vulnerability as specified in `inspection`, which may result in rejection.
32
+ * * INSPECT - Inspects traffic for vulnerability as specified in {@code inspection}, which may result in rejection.
33
33
  *
34
34
  */
35
35
  "action": model.TrafficActionType;
@@ -37,7 +37,7 @@ export interface CreateSecurityRuleDetails {
37
37
  * Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
38
38
  * <p>
39
39
  * INTRUSION_DETECTION - Intrusion Detection.
40
- * * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in `type`.
40
+ * * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in {@code type}.
41
41
  *
42
42
  */
43
43
  "inspection"?: model.TrafficInspectionType;
@@ -13,7 +13,7 @@
13
13
  /**
14
14
  * Action:
15
15
  * * NO_DECRYPT - Matching traffic is not decrypted.
16
- * * DECRYPT - Matching traffic is decrypted with the specified `secret` according to the specified `decryptionProfile`.
16
+ * * DECRYPT - Matching traffic is decrypted with the specified {@code secret} according to the specified {@code decryptionProfile}.
17
17
  *
18
18
  **/
19
19
  export declare enum DecryptionActionType {
@@ -16,7 +16,7 @@ exports.DecryptionActionType = void 0;
16
16
  /**
17
17
  * Action:
18
18
  * * NO_DECRYPT - Matching traffic is not decrypted.
19
- * * DECRYPT - Matching traffic is decrypted with the specified `secret` according to the specified `decryptionProfile`.
19
+ * * DECRYPT - Matching traffic is decrypted with the specified {@code secret} according to the specified {@code decryptionProfile}.
20
20
  *
21
21
  **/
22
22
  var DecryptionActionType;
@@ -22,8 +22,8 @@ export interface DecryptionProfileSummary {
22
22
  /**
23
23
  * Type of the secrets mapped based on the policy.
24
24
  * <p>
25
- * `SSL_INBOUND_INSPECTION`: For Inbound inspection of SSL traffic.
26
- * * `SSL_FORWARD_PROXY`: For forward proxy certificates for SSL inspection.
25
+ * {@code SSL_INBOUND_INSPECTION}: For Inbound inspection of SSL traffic.
26
+ * * {@code SSL_FORWARD_PROXY}: For forward proxy certificates for SSL inspection.
27
27
  *
28
28
  */
29
29
  "type": model.InspectionType;
@@ -25,7 +25,7 @@ export interface DecryptionRuleSummary {
25
25
  * Action:
26
26
  * <p>
27
27
  * NO_DECRYPT - Matching traffic is not decrypted.
28
- * * DECRYPT - Matching traffic is decrypted with the specified `secret` according to the specified `decryptionProfile`.
28
+ * * DECRYPT - Matching traffic is decrypted with the specified {@code secret} according to the specified {@code decryptionProfile}.
29
29
  *
30
30
  */
31
31
  "action": model.DecryptionActionType;
@@ -34,7 +34,7 @@ export interface DecryptionRuleSummary {
34
34
  */
35
35
  "decryptionProfile": string;
36
36
  /**
37
- * The name of a mapped secret. Its `type` must match that of the specified decryption profile.
37
+ * The name of a mapped secret. Its {@code type} must match that of the specified decryption profile.
38
38
  */
39
39
  "secret": string;
40
40
  /**
@@ -26,7 +26,7 @@ export interface DecryptionRule {
26
26
  * Action:
27
27
  * <p>
28
28
  * NO_DECRYPT - Matching traffic is not decrypted.
29
- * * DECRYPT - Matching traffic is decrypted with the specified `secret` according to the specified `decryptionProfile`.
29
+ * * DECRYPT - Matching traffic is decrypted with the specified {@code secret} according to the specified {@code decryptionProfile}.
30
30
  *
31
31
  */
32
32
  "action": model.DecryptionActionType;
@@ -35,7 +35,7 @@ export interface DecryptionRule {
35
35
  */
36
36
  "decryptionProfile"?: string;
37
37
  /**
38
- * The name of a mapped secret. Its `type` must match that of the specified decryption profile.
38
+ * The name of a mapped secret. Its {@code type} must match that of the specified decryption profile.
39
39
  */
40
40
  "secret"?: string;
41
41
  "position"?: model.RulePosition;
@@ -13,8 +13,8 @@
13
13
  /**
14
14
  * Type of the secrets mapped based on the policy.
15
15
  * <p>
16
- * `SSL_INBOUND_INSPECTION`: For Inbound inspection of SSL traffic.
17
- * * `SSL_FORWARD_PROXY`: For forward proxy certificates for SSL inspection.
16
+ * {@code SSL_INBOUND_INSPECTION}: For Inbound inspection of SSL traffic.
17
+ * * {@code SSL_FORWARD_PROXY}: For forward proxy certificates for SSL inspection.
18
18
  *
19
19
  **/
20
20
  export declare enum InspectionType {
@@ -16,8 +16,8 @@ exports.InspectionType = void 0;
16
16
  /**
17
17
  * Type of the secrets mapped based on the policy.
18
18
  * <p>
19
- * `SSL_INBOUND_INSPECTION`: For Inbound inspection of SSL traffic.
20
- * * `SSL_FORWARD_PROXY`: For forward proxy certificates for SSL inspection.
19
+ * {@code SSL_INBOUND_INSPECTION}: For Inbound inspection of SSL traffic.
20
+ * * {@code SSL_FORWARD_PROXY}: For forward proxy certificates for SSL inspection.
21
21
  *
22
22
  **/
23
23
  var InspectionType;
@@ -26,8 +26,8 @@ export interface MappedSecretSummary {
26
26
  /**
27
27
  * Type of the secrets mapped based on the policy.
28
28
  * <p>
29
- * `SSL_INBOUND_INSPECTION`: For Inbound inspection of SSL traffic.
30
- * * `SSL_FORWARD_PROXY`: For forward proxy certificates for SSL inspection.
29
+ * {@code SSL_INBOUND_INSPECTION}: For Inbound inspection of SSL traffic.
30
+ * * {@code SSL_FORWARD_PROXY}: For forward proxy certificates for SSL inspection.
31
31
  *
32
32
  */
33
33
  "type": model.InspectionType;
@@ -22,8 +22,8 @@ export interface MappedSecret {
22
22
  /**
23
23
  * Type of the secrets mapped based on the policy.
24
24
  * <p>
25
- * `SSL_INBOUND_INSPECTION`: For Inbound inspection of SSL traffic.
26
- * * `SSL_FORWARD_PROXY`: For forward proxy certificates for SSL inspection.
25
+ * {@code SSL_INBOUND_INSPECTION}: For Inbound inspection of SSL traffic.
26
+ * * {@code SSL_FORWARD_PROXY}: For forward proxy certificates for SSL inspection.
27
27
  *
28
28
  */
29
29
  "type": model.InspectionType;
@@ -29,13 +29,13 @@ export interface NetworkFirewallPolicySummary {
29
29
  "displayName": string;
30
30
  /**
31
31
  * The time instant at which the Network Firewall Policy was created in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
32
- * Example: `2016-08-25T21:10:29.600Z`
32
+ * Example: {@code 2016-08-25T21:10:29.600Z}
33
33
  *
34
34
  */
35
35
  "timeCreated": Date;
36
36
  /**
37
37
  * The time instant at which the Network Firewall Policy was updated in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
38
- * Example: `2016-08-25T21:10:29.600Z`
38
+ * Example: {@code 2016-08-25T21:10:29.600Z}
39
39
  *
40
40
  */
41
41
  "timeUpdated"?: Date;
@@ -50,7 +50,7 @@ export interface NetworkFirewallPolicySummary {
50
50
  /**
51
51
  * Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace.
52
52
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
53
- * Example: `{\"Department\": \"Finance\"}`
53
+ * Example: {@code {\"Department\": \"Finance\"}}
54
54
  *
55
55
  */
56
56
  "freeformTags": {
@@ -59,7 +59,7 @@ export interface NetworkFirewallPolicySummary {
59
59
  /**
60
60
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
61
61
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
62
- * Example: `{\"Operations\": {\"CostCenter\": \"42\"}}`
62
+ * Example: {@code {\"Operations\": {\"CostCenter\": \"42\"}}}
63
63
  *
64
64
  */
65
65
  "definedTags": {
@@ -69,7 +69,7 @@ export interface NetworkFirewallPolicySummary {
69
69
  };
70
70
  /**
71
71
  * Usage of system tag keys. These predefined keys are scoped to namespaces.
72
- * Example: `{\"orcl-cloud\": {\"free-tier-retained\": \"true\"}}`
72
+ * Example: {@code {\"orcl-cloud\": {\"free-tier-retained\": \"true\"}}}
73
73
  *
74
74
  */
75
75
  "systemTags"?: {
@@ -29,13 +29,13 @@ export interface NetworkFirewallPolicy {
29
29
  "displayName": string;
30
30
  /**
31
31
  * The time instant at which the Network Firewall Policy was created in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
32
- * Example: `2016-08-25T21:10:29.600Z`
32
+ * Example: {@code 2016-08-25T21:10:29.600Z}
33
33
  *
34
34
  */
35
35
  "timeCreated": Date;
36
36
  /**
37
37
  * The time instant at which the Network Firewall Policy was updated in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
38
- * Example: `2016-08-25T21:10:29.600Z`
38
+ * Example: {@code 2016-08-25T21:10:29.600Z}
39
39
  *
40
40
  */
41
41
  "timeUpdated": Date;
@@ -55,7 +55,7 @@ export interface NetworkFirewallPolicy {
55
55
  /**
56
56
  * Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace.
57
57
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
58
- * Example: `{\"Department\": \"Finance\"}`
58
+ * Example: {@code {\"Department\": \"Finance\"}}
59
59
  *
60
60
  */
61
61
  "freeformTags": {
@@ -64,7 +64,7 @@ export interface NetworkFirewallPolicy {
64
64
  /**
65
65
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
66
66
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
67
- * Example: `{\"Operations\": {\"CostCenter\": \"42\"}}`
67
+ * Example: {@code {\"Operations\": {\"CostCenter\": \"42\"}}}
68
68
  *
69
69
  */
70
70
  "definedTags": {
@@ -74,7 +74,7 @@ export interface NetworkFirewallPolicy {
74
74
  };
75
75
  /**
76
76
  * Usage of system tag keys. These predefined keys are scoped to namespaces.
77
- * Example: `{\"orcl-cloud\": {\"free-tier-retained\": \"true\"}}`
77
+ * Example: {@code {\"orcl-cloud\": {\"free-tier-retained\": \"true\"}}}
78
78
  *
79
79
  */
80
80
  "systemTags"?: {
@@ -34,7 +34,7 @@ export interface NetworkFirewallSummary {
34
34
  /**
35
35
  * Availability Domain where Network Firewall instance is created.
36
36
  * To get a list of availability domains for a tenancy, use {@link #listAvailabilityDomains(ListAvailabilityDomainsRequest) listAvailabilityDomains} operation.
37
- * Example: `kIdk:PHX-AD-1`
37
+ * Example: {@code kIdk:PHX-AD-1}
38
38
  *
39
39
  */
40
40
  "availabilityDomain"?: string;
@@ -52,13 +52,13 @@ export interface NetworkFirewallSummary {
52
52
  "networkFirewallPolicyId": string;
53
53
  /**
54
54
  * The time instant at which the Network Firewall was created in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
55
- * Example: `2016-08-25T21:10:29.600Z`
55
+ * Example: {@code 2016-08-25T21:10:29.600Z}
56
56
  *
57
57
  */
58
58
  "timeCreated": Date;
59
59
  /**
60
60
  * The time instant at which the Network Firewall was updated in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
61
- * Example: `2016-08-25T21:10:29.600Z`
61
+ * Example: {@code 2016-08-25T21:10:29.600Z}
62
62
  *
63
63
  */
64
64
  "timeUpdated"?: Date;
@@ -73,7 +73,7 @@ export interface NetworkFirewallSummary {
73
73
  /**
74
74
  * Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace.
75
75
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
76
- * Example: `{\"Department\": \"Finance\"}`
76
+ * Example: {@code {\"Department\": \"Finance\"}}
77
77
  *
78
78
  */
79
79
  "freeformTags": {
@@ -82,7 +82,7 @@ export interface NetworkFirewallSummary {
82
82
  /**
83
83
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
84
84
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
85
- * Example: `{\"Operations\": {\"CostCenter\": \"42\"}}`
85
+ * Example: {@code {\"Operations\": {\"CostCenter\": \"42\"}}}
86
86
  *
87
87
  */
88
88
  "definedTags": {
@@ -92,7 +92,7 @@ export interface NetworkFirewallSummary {
92
92
  };
93
93
  /**
94
94
  * Usage of system tag keys. These predefined keys are scoped to namespaces.
95
- * Example: `{\"orcl-cloud\": {\"free-tier-retained\": \"true\"}}`
95
+ * Example: {@code {\"orcl-cloud\": {\"free-tier-retained\": \"true\"}}}
96
96
  *
97
97
  */
98
98
  "systemTags"?: {
@@ -47,7 +47,7 @@ export interface NetworkFirewall {
47
47
  /**
48
48
  * Availability Domain where Network Firewall instance is created.
49
49
  * To get a list of availability domains for a tenancy, use the {@link #listAvailabilityDomains(ListAvailabilityDomainsRequest) listAvailabilityDomains} operation.
50
- * Example: `kIdk:PHX-AD-1`
50
+ * Example: {@code kIdk:PHX-AD-1}
51
51
  *
52
52
  */
53
53
  "availabilityDomain"?: string;
@@ -57,13 +57,13 @@ export interface NetworkFirewall {
57
57
  "networkSecurityGroupIds"?: Array<string>;
58
58
  /**
59
59
  * The time at which the Network Firewall was created in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
60
- * Example: `2016-08-25T21:10:29.600Z`
60
+ * Example: {@code 2016-08-25T21:10:29.600Z}
61
61
  *
62
62
  */
63
63
  "timeCreated": Date;
64
64
  /**
65
65
  * The time at which the Network Firewall was updated in the format defined by [RFC3339](https://tools.ietf.org/html/rfc3339).
66
- * Example: `2016-08-25T21:10:29.600Z`
66
+ * Example: {@code 2016-08-25T21:10:29.600Z}
67
67
  *
68
68
  */
69
69
  "timeUpdated": Date;
@@ -78,7 +78,7 @@ export interface NetworkFirewall {
78
78
  /**
79
79
  * Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace.
80
80
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
81
- * Example: `{\"Department\": \"Finance\"}`
81
+ * Example: {@code {\"Department\": \"Finance\"}}
82
82
  *
83
83
  */
84
84
  "freeformTags": {
@@ -87,7 +87,7 @@ export interface NetworkFirewall {
87
87
  /**
88
88
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
89
89
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
90
- * Example: `{\"Operations\": {\"CostCenter\": \"42\"}}`
90
+ * Example: {@code {\"Operations\": {\"CostCenter\": \"42\"}}}
91
91
  *
92
92
  */
93
93
  "definedTags": {
@@ -97,7 +97,7 @@ export interface NetworkFirewall {
97
97
  };
98
98
  /**
99
99
  * Usage of system tag keys. These predefined keys are scoped to namespaces.
100
- * Example: `{\"orcl-cloud\": {\"free-tier-retained\": \"true\"}}`
100
+ * Example: {@code {\"orcl-cloud\": {\"free-tier-retained\": \"true\"}}}
101
101
  *
102
102
  */
103
103
  "systemTags"?: {
@@ -28,7 +28,7 @@ export interface SecurityRuleSummary {
28
28
  * ALLOW - Allows the traffic.
29
29
  * * DROP - Silently drops the traffic, e.g. without sending a TCP reset.
30
30
  * * REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
31
- * * INSPECT - Inspects traffic for vulnerability as specified in `inspection`, which may result in rejection.
31
+ * * INSPECT - Inspects traffic for vulnerability as specified in {@code inspection}, which may result in rejection.
32
32
  *
33
33
  */
34
34
  "action": model.TrafficActionType;
@@ -36,7 +36,7 @@ export interface SecurityRuleSummary {
36
36
  * Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
37
37
  * <p>
38
38
  * INTRUSION_DETECTION - Intrusion Detection.
39
- * * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in `type`.
39
+ * * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in {@code type}.
40
40
  *
41
41
  */
42
42
  "inspection"?: model.TrafficInspectionType;
@@ -29,7 +29,7 @@ export interface SecurityRule {
29
29
  * ALLOW - Allows the traffic.
30
30
  * * DROP - Silently drops the traffic, e.g. without sending a TCP reset.
31
31
  * * REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
32
- * * INSPECT - Inspects traffic for vulnerability as specified in `inspection`, which may result in rejection.
32
+ * * INSPECT - Inspects traffic for vulnerability as specified in {@code inspection}, which may result in rejection.
33
33
  *
34
34
  */
35
35
  "action": model.TrafficActionType;
@@ -37,7 +37,7 @@ export interface SecurityRule {
37
37
  * Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
38
38
  * <p>
39
39
  * INTRUSION_DETECTION - Intrusion Detection.
40
- * * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in `type`.
40
+ * * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in {@code type}.
41
41
  *
42
42
  */
43
43
  "inspection"?: model.TrafficInspectionType;
@@ -15,19 +15,19 @@ import * as model from "../model";
15
15
  * Pattern describing an http/https URL or set thereof
16
16
  * as a concatenation of optional host component and optional path component.
17
17
  * <p>
18
- `*.example.com` will match http://example.com/ and https://foo.example.com/foo?bar.
18
+ {@code *.example.com} will match http://example.com/ and https://foo.example.com/foo?bar.
19
19
  * <p>
20
- `www.example.com/foo*` will match https://www.example.com/foo and http://www.exampe.com/foobar and https://www.example.com/foo/bar?baz, but not
20
+ {@code www.example.com/foo*} will match https://www.example.com/foo and http://www.exampe.com/foobar and https://www.example.com/foo/bar?baz, but not
21
21
  * http://sub.www.example.com/foo or https://www.example.com/FOO.
22
22
  * <p>
23
- `*.example.com/foo*` will match http://example.com/foo and https://sub2.sub.example.com/foo/bar?baz, but not http://example.com/FOO.
23
+ {@code *.example.com/foo*} will match http://example.com/foo and https://sub2.sub.example.com/foo/bar?baz, but not http://example.com/FOO.
24
24
  *
25
25
  */
26
26
  export interface SimpleUrlPattern extends model.UrlPattern {
27
27
  /**
28
28
  * A string consisting of a concatenation of optional host component and optional path component.
29
- * The host component may start with `*.` to match the case-insensitive domain and all its subdomains.
30
- * The path component must start with a `/`, and may end with `*` to match all paths of which it is a case-sensitive prefix.
29
+ * The host component may start with {@code *.} to match the case-insensitive domain and all its subdomains.
30
+ * The path component must start with a {@code /}, and may end with {@code *} to match all paths of which it is a case-sensitive prefix.
31
31
  * A missing host component matches all request domains, and a missing path component matches all request paths.
32
32
  * An empty value matches all requests.
33
33
  *
@@ -16,7 +16,7 @@
16
16
  * ALLOW - Allows the traffic.
17
17
  * * DROP - Silently drops the traffic, e.g. without sending a TCP reset.
18
18
  * * REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
19
- * * INSPECT - Inspects traffic for vulnerability as specified in `inspection`, which may result in rejection.
19
+ * * INSPECT - Inspects traffic for vulnerability as specified in {@code inspection}, which may result in rejection.
20
20
  *
21
21
  **/
22
22
  export declare enum TrafficActionType {
@@ -19,7 +19,7 @@ exports.TrafficActionType = void 0;
19
19
  * ALLOW - Allows the traffic.
20
20
  * * DROP - Silently drops the traffic, e.g. without sending a TCP reset.
21
21
  * * REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
22
- * * INSPECT - Inspects traffic for vulnerability as specified in `inspection`, which may result in rejection.
22
+ * * INSPECT - Inspects traffic for vulnerability as specified in {@code inspection}, which may result in rejection.
23
23
  *
24
24
  **/
25
25
  var TrafficActionType;
@@ -14,7 +14,7 @@
14
14
  * Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
15
15
  * <p>
16
16
  * INTRUSION_DETECTION - Intrusion Detection.
17
- * * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in `type`.
17
+ * * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in {@code type}.
18
18
  *
19
19
  **/
20
20
  export declare enum TrafficInspectionType {
@@ -17,7 +17,7 @@ exports.TrafficInspectionType = void 0;
17
17
  * Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
18
18
  * <p>
19
19
  * INTRUSION_DETECTION - Intrusion Detection.
20
- * * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in `type`.
20
+ * * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in {@code type}.
21
21
  *
22
22
  **/
23
23
  var TrafficInspectionType;
@@ -22,7 +22,7 @@ export interface UpdateDecryptionRuleDetails {
22
22
  * Action:
23
23
  * <p>
24
24
  * NO_DECRYPT - Matching traffic is not decrypted.
25
- * * DECRYPT - Matching traffic is decrypted with the specified `secret` according to the specified `decryptionProfile`.
25
+ * * DECRYPT - Matching traffic is decrypted with the specified {@code secret} according to the specified {@code decryptionProfile}.
26
26
  *
27
27
  */
28
28
  "action": model.DecryptionActionType;
@@ -31,7 +31,7 @@ export interface UpdateDecryptionRuleDetails {
31
31
  */
32
32
  "decryptionProfile"?: string;
33
33
  /**
34
- * The name of a mapped secret. Its `type` must match that of the specified decryption profile.
34
+ * The name of a mapped secret. Its {@code type} must match that of the specified decryption profile.
35
35
  */
36
36
  "secret"?: string;
37
37
  "position"?: model.RulePosition;
@@ -18,8 +18,8 @@ export interface UpdateMappedSecretDetails {
18
18
  /**
19
19
  * Type of the secrets mapped based on the policy.
20
20
  * <p>
21
- * `SSL_INBOUND_INSPECTION`: For Inbound inspection of SSL traffic.
22
- * * `SSL_FORWARD_PROXY`: For forward proxy certificates for SSL inspection.
21
+ * {@code SSL_INBOUND_INSPECTION}: For Inbound inspection of SSL traffic.
22
+ * * {@code SSL_FORWARD_PROXY}: For forward proxy certificates for SSL inspection.
23
23
  *
24
24
  */
25
25
  "type": model.InspectionType;
@@ -29,7 +29,7 @@ export interface UpdateNetworkFirewallDetails {
29
29
  /**
30
30
  * Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace.
31
31
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
32
- * Example: `{\"Department\": \"Finance\"}`
32
+ * Example: {@code {\"Department\": \"Finance\"}}
33
33
  *
34
34
  */
35
35
  "freeformTags"?: {
@@ -38,7 +38,7 @@ export interface UpdateNetworkFirewallDetails {
38
38
  /**
39
39
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
40
40
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
41
- * Example: `{\"Operations\": {\"CostCenter\": \"42\"}}`
41
+ * Example: {@code {\"Operations\": {\"CostCenter\": \"42\"}}}
42
42
  *
43
43
  */
44
44
  "definedTags"?: {
@@ -21,7 +21,7 @@ export interface UpdateNetworkFirewallPolicyDetails {
21
21
  /**
22
22
  * Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace.
23
23
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
24
- * Example: `{\"Department\": \"Finance\"}`
24
+ * Example: {@code {\"Department\": \"Finance\"}}
25
25
  *
26
26
  */
27
27
  "freeformTags"?: {
@@ -30,7 +30,7 @@ export interface UpdateNetworkFirewallPolicyDetails {
30
30
  /**
31
31
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
32
32
  * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
33
- * Example: `{\"Operations\": {\"CostCenter\": \"42\"}}`
33
+ * Example: {@code {\"Operations\": {\"CostCenter\": \"42\"}}}
34
34
  *
35
35
  */
36
36
  "definedTags"?: {
@@ -25,7 +25,7 @@ export interface UpdateSecurityRuleDetails {
25
25
  * ALLOW - Allows the traffic.
26
26
  * * DROP - Silently drops the traffic, e.g. without sending a TCP reset.
27
27
  * * REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
28
- * * INSPECT - Inspects traffic for vulnerability as specified in `inspection`, which may result in rejection.
28
+ * * INSPECT - Inspects traffic for vulnerability as specified in {@code inspection}, which may result in rejection.
29
29
  *
30
30
  */
31
31
  "action": model.TrafficActionType;
@@ -33,7 +33,7 @@ export interface UpdateSecurityRuleDetails {
33
33
  * Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
34
34
  * <p>
35
35
  * INTRUSION_DETECTION - Intrusion Detection.
36
- * * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in `type`.
36
+ * * INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in {@code type}.
37
37
  *
38
38
  */
39
39
  "inspection"?: model.TrafficInspectionType;