oci-vnmonitoring 2.76.1 → 2.77.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (212) hide show
  1. package/lib/client.d.ts +12 -12
  2. package/lib/client.js +12 -12
  3. package/lib/model/add-drg-route-rule-details.d.ts +3 -3
  4. package/lib/model/add-public-ip-pool-capacity-details.d.ts +3 -3
  5. package/lib/model/add-security-rule-details.d.ts +21 -21
  6. package/lib/model/add-subnet-ipv6-cidr-details.d.ts +1 -1
  7. package/lib/model/add-vcn-ipv6-cidr-details.d.ts +1 -1
  8. package/lib/model/bgp-session-info.d.ts +15 -15
  9. package/lib/model/byoip-allocated-range-collection.d.ts +1 -1
  10. package/lib/model/byoip-range-collection.d.ts +2 -2
  11. package/lib/model/byoip-range-summary.d.ts +9 -9
  12. package/lib/model/byoip-range-vcn-ipv6-allocation-summary.d.ts +3 -3
  13. package/lib/model/byoip-range.d.ts +15 -15
  14. package/lib/model/byoipv6-cidr-details.d.ts +3 -3
  15. package/lib/model/capture-filter.d.ts +3 -3
  16. package/lib/model/change-path-analyzer-test-compartment-details.d.ts +2 -2
  17. package/lib/model/compute-instance-endpoint.d.ts +2 -2
  18. package/lib/model/connect-remote-peering-connections-details.d.ts +1 -1
  19. package/lib/model/cpe-device-config-answer.d.ts +2 -2
  20. package/lib/model/cpe.d.ts +5 -5
  21. package/lib/model/create-byoip-range-details.d.ts +4 -4
  22. package/lib/model/create-capture-filter-details.d.ts +2 -2
  23. package/lib/model/create-cpe-details.d.ts +4 -4
  24. package/lib/model/create-cross-connect-details.d.ts +4 -4
  25. package/lib/model/create-cross-connect-group-details.d.ts +2 -2
  26. package/lib/model/create-dhcp-details.d.ts +2 -2
  27. package/lib/model/create-drg-attachment-details.d.ts +3 -3
  28. package/lib/model/create-drg-details.d.ts +2 -2
  29. package/lib/model/create-drg-route-distribution-details.d.ts +2 -2
  30. package/lib/model/create-drg-route-table-details.d.ts +2 -2
  31. package/lib/model/create-internet-gateway-details.d.ts +2 -2
  32. package/lib/model/create-ip-sec-connection-details.d.ts +12 -12
  33. package/lib/model/create-ip-sec-connection-tunnel-details.d.ts +3 -3
  34. package/lib/model/create-ip-sec-tunnel-bgp-session-details.d.ts +15 -15
  35. package/lib/model/create-ipv6-details.d.ts +4 -4
  36. package/lib/model/create-local-peering-gateway-details.d.ts +2 -2
  37. package/lib/model/create-nat-gateway-details.d.ts +4 -4
  38. package/lib/model/create-network-security-group-details.d.ts +2 -2
  39. package/lib/model/create-path-analyzer-test-details.d.ts +5 -5
  40. package/lib/model/create-private-ip-details.d.ts +5 -5
  41. package/lib/model/create-public-ip-details.d.ts +2 -2
  42. package/lib/model/create-public-ip-pool-details.d.ts +2 -2
  43. package/lib/model/create-remote-peering-connection-details.d.ts +2 -2
  44. package/lib/model/create-route-table-details.d.ts +2 -2
  45. package/lib/model/create-security-list-details.d.ts +2 -2
  46. package/lib/model/create-service-gateway-details.d.ts +4 -4
  47. package/lib/model/create-subnet-details.d.ts +14 -14
  48. package/lib/model/create-vcn-details.d.ts +11 -11
  49. package/lib/model/create-virtual-circuit-details.d.ts +13 -13
  50. package/lib/model/create-vlan-details.d.ts +4 -4
  51. package/lib/model/create-vnic-details.d.ts +24 -24
  52. package/lib/model/create-vtap-details.d.ts +7 -7
  53. package/lib/model/cross-connect-group.d.ts +4 -4
  54. package/lib/model/cross-connect-location.d.ts +1 -1
  55. package/lib/model/cross-connect-mapping-details.d.ts +6 -6
  56. package/lib/model/cross-connect-mapping.d.ts +7 -7
  57. package/lib/model/cross-connect-port-speed-shape.d.ts +2 -2
  58. package/lib/model/cross-connect-status.d.ts +2 -2
  59. package/lib/model/cross-connect.d.ts +5 -5
  60. package/lib/model/dhcp-dns-option.d.ts +1 -1
  61. package/lib/model/dhcp-options.d.ts +3 -3
  62. package/lib/model/dhcp-search-domain-option.d.ts +2 -2
  63. package/lib/model/drg-attachment-info.d.ts +1 -1
  64. package/lib/model/drg-attachment.d.ts +6 -6
  65. package/lib/model/drg-route-distribution-statement.d.ts +1 -1
  66. package/lib/model/drg-route-distribution.d.ts +4 -4
  67. package/lib/model/drg-route-rule.d.ts +10 -10
  68. package/lib/model/drg-route-table.d.ts +4 -4
  69. package/lib/model/drg.d.ts +3 -3
  70. package/lib/model/egress-security-rule.d.ts +9 -9
  71. package/lib/model/endpoint.d.ts +1 -1
  72. package/lib/model/fast-connect-provider-service-key.d.ts +2 -2
  73. package/lib/model/fast-connect-provider-service.d.ts +1 -1
  74. package/lib/model/flow-log-capture-filter-rule-details.d.ts +1 -1
  75. package/lib/model/i-psec-connection-device-status.d.ts +1 -1
  76. package/lib/model/i-psec-connection-tunnel.d.ts +7 -7
  77. package/lib/model/i-psec-connection.d.ts +14 -14
  78. package/lib/model/icmp-traffic-protocol-parameters.d.ts +1 -1
  79. package/lib/model/ingress-security-rule.d.ts +9 -9
  80. package/lib/model/internet-gateway.d.ts +3 -3
  81. package/lib/model/ip-address-endpoint.d.ts +2 -2
  82. package/lib/model/ipv6.d.ts +7 -7
  83. package/lib/model/letter-of-authority.d.ts +1 -1
  84. package/lib/model/load-balancer-endpoint.d.ts +1 -1
  85. package/lib/model/load-balancer-listener-endpoint.d.ts +1 -1
  86. package/lib/model/local-peering-gateway.d.ts +11 -11
  87. package/lib/model/macsec-key.d.ts +1 -1
  88. package/lib/model/nat-gateway.d.ts +5 -5
  89. package/lib/model/network-load-balancer-endpoint.d.ts +1 -1
  90. package/lib/model/network-load-balancer-listener-endpoint.d.ts +1 -1
  91. package/lib/model/network-security-group-vnic.d.ts +1 -1
  92. package/lib/model/network-security-group.d.ts +3 -3
  93. package/lib/model/path-analysis-work-request-result.d.ts +2 -2
  94. package/lib/model/path-analyzer-test-collection.d.ts +2 -2
  95. package/lib/model/path-analyzer-test-summary.d.ts +9 -9
  96. package/lib/model/path-analyzer-test.d.ts +9 -9
  97. package/lib/model/path.d.ts +1 -1
  98. package/lib/model/persisted-get-path-analysis-details.d.ts +2 -2
  99. package/lib/model/private-ip.d.ts +21 -21
  100. package/lib/model/protocol-parameters.d.ts +1 -1
  101. package/lib/model/public-ip-pool-collection.d.ts +1 -1
  102. package/lib/model/public-ip-pool-summary.d.ts +3 -3
  103. package/lib/model/public-ip-pool.d.ts +3 -3
  104. package/lib/model/public-ip.d.ts +17 -17
  105. package/lib/model/query-options.d.ts +1 -1
  106. package/lib/model/remote-peering-connection.d.ts +7 -7
  107. package/lib/model/remove-public-ip-pool-capacity-details.d.ts +1 -1
  108. package/lib/model/remove-subnet-ipv6-cidr-details.d.ts +1 -1
  109. package/lib/model/remove-vcn-ipv6-cidr-details.d.ts +1 -1
  110. package/lib/model/route-rule.d.ts +13 -13
  111. package/lib/model/route-table.d.ts +4 -4
  112. package/lib/model/security-action.d.ts +1 -1
  113. package/lib/model/security-list.d.ts +3 -3
  114. package/lib/model/security-rule.d.ts +26 -26
  115. package/lib/model/service-gateway.d.ts +7 -7
  116. package/lib/model/service.d.ts +10 -10
  117. package/lib/model/subnet-endpoint.d.ts +2 -2
  118. package/lib/model/subnet.d.ts +21 -21
  119. package/lib/model/tcp-protocol-parameters.d.ts +2 -2
  120. package/lib/model/tcp-traffic-protocol-parameters.d.ts +3 -3
  121. package/lib/model/topology-associated-with-entity-relationship.d.ts +2 -2
  122. package/lib/model/topology-associated-with-relationship-details.d.ts +1 -1
  123. package/lib/model/topology-contains-entity-relationship.d.ts +2 -2
  124. package/lib/model/topology-routes-to-entity-relationship.d.ts +1 -1
  125. package/lib/model/topology-routes-to-relationship-details.d.ts +5 -5
  126. package/lib/model/topology.d.ts +1 -1
  127. package/lib/model/traffic-node.d.ts +1 -1
  128. package/lib/model/traffic-protocol-parameters.d.ts +1 -1
  129. package/lib/model/traffic-route.d.ts +1 -1
  130. package/lib/model/tunnel-config.d.ts +2 -2
  131. package/lib/model/tunnel-cpe-device-config.d.ts +1 -1
  132. package/lib/model/tunnel-phase-one-details.d.ts +1 -1
  133. package/lib/model/tunnel-phase-two-details.d.ts +1 -1
  134. package/lib/model/tunnel-security-association-summary.d.ts +1 -1
  135. package/lib/model/tunnel-status.d.ts +3 -3
  136. package/lib/model/udp-protocol-parameters.d.ts +2 -2
  137. package/lib/model/udp-traffic-protocol-parameters.d.ts +3 -3
  138. package/lib/model/update-byoip-range-details.d.ts +3 -3
  139. package/lib/model/update-capture-filter-details.d.ts +2 -2
  140. package/lib/model/update-cpe-details.d.ts +2 -2
  141. package/lib/model/update-cross-connect-details.d.ts +3 -3
  142. package/lib/model/update-cross-connect-group-details.d.ts +2 -2
  143. package/lib/model/update-dhcp-details.d.ts +2 -2
  144. package/lib/model/update-drg-attachment-details.d.ts +2 -2
  145. package/lib/model/update-drg-details.d.ts +2 -2
  146. package/lib/model/update-drg-route-distribution-details.d.ts +2 -2
  147. package/lib/model/update-drg-route-rule-details.d.ts +3 -3
  148. package/lib/model/update-drg-route-table-details.d.ts +2 -2
  149. package/lib/model/update-internet-gateway-details.d.ts +2 -2
  150. package/lib/model/update-ip-sec-connection-details.d.ts +8 -8
  151. package/lib/model/update-ip-sec-connection-tunnel-details.d.ts +3 -3
  152. package/lib/model/update-ip-sec-tunnel-bgp-session-details.d.ts +16 -16
  153. package/lib/model/update-ipv6-details.d.ts +2 -2
  154. package/lib/model/update-local-peering-gateway-details.d.ts +2 -2
  155. package/lib/model/update-nat-gateway-details.d.ts +4 -4
  156. package/lib/model/update-network-security-group-details.d.ts +2 -2
  157. package/lib/model/update-path-analyzer-test-details.d.ts +4 -4
  158. package/lib/model/update-private-ip-details.d.ts +4 -4
  159. package/lib/model/update-public-ip-details.d.ts +2 -2
  160. package/lib/model/update-public-ip-pool-details.d.ts +2 -2
  161. package/lib/model/update-remote-peering-connection-details.d.ts +2 -2
  162. package/lib/model/update-route-table-details.d.ts +2 -2
  163. package/lib/model/update-security-list-details.d.ts +2 -2
  164. package/lib/model/update-security-rule-details.d.ts +23 -23
  165. package/lib/model/update-service-gateway-details.d.ts +8 -8
  166. package/lib/model/update-subnet-details.d.ts +5 -5
  167. package/lib/model/update-vcn-details.d.ts +2 -2
  168. package/lib/model/update-virtual-circuit-details.d.ts +7 -7
  169. package/lib/model/update-vlan-details.d.ts +3 -3
  170. package/lib/model/update-vnic-details.d.ts +7 -7
  171. package/lib/model/update-vtap-details.d.ts +5 -5
  172. package/lib/model/upgrade-status.d.ts +1 -1
  173. package/lib/model/vcn.d.ts +8 -8
  174. package/lib/model/virtual-circuit-bandwidth-shape.d.ts +2 -2
  175. package/lib/model/virtual-circuit-drg-attachment-network-details.d.ts +1 -1
  176. package/lib/model/virtual-circuit-public-prefix.d.ts +2 -2
  177. package/lib/model/virtual-circuit.d.ts +11 -11
  178. package/lib/model/vlan-endpoint.d.ts +2 -2
  179. package/lib/model/vlan.d.ts +6 -6
  180. package/lib/model/vnic-endpoint.d.ts +2 -2
  181. package/lib/model/vnic.d.ts +16 -16
  182. package/lib/model/vtap.d.ts +8 -8
  183. package/lib/model/work-request-error-collection.d.ts +2 -2
  184. package/lib/model/work-request-log-entry-collection.d.ts +1 -1
  185. package/lib/model/work-request-resource.d.ts +3 -3
  186. package/lib/model/work-request-result-collection.d.ts +2 -2
  187. package/lib/model/work-request-summary-collection.d.ts +2 -2
  188. package/lib/model/work-request-summary.d.ts +2 -2
  189. package/lib/model/work-request.d.ts +2 -2
  190. package/lib/request/change-path-analyzer-test-compartment-request.d.ts +3 -3
  191. package/lib/request/create-path-analyzer-test-request.d.ts +1 -1
  192. package/lib/request/delete-path-analyzer-test-request.d.ts +3 -3
  193. package/lib/request/get-path-analysis-request.d.ts +1 -1
  194. package/lib/request/get-path-analyzer-test-request.d.ts +2 -2
  195. package/lib/request/get-work-request-request.d.ts +1 -1
  196. package/lib/request/list-path-analyzer-tests-request.d.ts +7 -7
  197. package/lib/request/list-work-request-errors-request.d.ts +5 -5
  198. package/lib/request/list-work-request-logs-request.d.ts +5 -5
  199. package/lib/request/list-work-request-results-request.d.ts +3 -3
  200. package/lib/request/list-work-requests-request.d.ts +6 -6
  201. package/lib/request/update-path-analyzer-test-request.d.ts +3 -3
  202. package/lib/response/change-path-analyzer-test-compartment-response.d.ts +1 -1
  203. package/lib/response/create-path-analyzer-test-response.d.ts +1 -1
  204. package/lib/response/get-path-analyzer-test-response.d.ts +1 -1
  205. package/lib/response/get-work-request-response.d.ts +1 -1
  206. package/lib/response/list-path-analyzer-tests-response.d.ts +1 -1
  207. package/lib/response/list-work-request-errors-response.d.ts +1 -1
  208. package/lib/response/list-work-request-logs-response.d.ts +1 -1
  209. package/lib/response/list-work-request-results-response.d.ts +1 -1
  210. package/lib/response/list-work-requests-response.d.ts +1 -1
  211. package/lib/response/update-path-analyzer-test-response.d.ts +1 -1
  212. package/package.json +3 -3
@@ -21,7 +21,7 @@ You can't assign a table to a virtual circuit or IPSec tunnel attachment if ther
21
21
  export interface UpdateDrgRouteTableDetails {
22
22
  /**
23
23
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
24
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
24
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
25
25
  *
26
26
  */
27
27
  "definedTags"?: {
@@ -37,7 +37,7 @@ export interface UpdateDrgRouteTableDetails {
37
37
  "displayName"?: string;
38
38
  /**
39
39
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
40
- * Example: `{\"bar-key\": \"value\"}`
40
+ * Example: {@code {\"bar-key\": \"value\"}}
41
41
  *
42
42
  */
43
43
  "freeformTags"?: {
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  export interface UpdateInternetGatewayDetails {
16
16
  /**
17
17
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
18
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
18
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
19
19
  *
20
20
  */
21
21
  "definedTags"?: {
@@ -31,7 +31,7 @@ export interface UpdateInternetGatewayDetails {
31
31
  "displayName"?: string;
32
32
  /**
33
33
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
34
- * Example: `{\"bar-key\": \"value\"}`
34
+ * Example: {@code {\"bar-key\": \"value\"}}
35
35
  *
36
36
  */
37
37
  "freeformTags"?: {
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  export interface UpdateIPSecConnectionDetails {
16
16
  /**
17
17
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
18
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
18
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
19
19
  *
20
20
  */
21
21
  "definedTags"?: {
@@ -31,7 +31,7 @@ export interface UpdateIPSecConnectionDetails {
31
31
  "displayName"?: string;
32
32
  /**
33
33
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
34
- * Example: `{\"bar-key\": \"value\"}`
34
+ * Example: {@code {\"bar-key\": \"value\"}}
35
35
  *
36
36
  */
37
37
  "freeformTags"?: {
@@ -40,20 +40,20 @@ export interface UpdateIPSecConnectionDetails {
40
40
  /**
41
41
  * Your identifier for your CPE device. Can be either an IP address or a hostname (specifically, the
42
42
  * fully qualified domain name (FQDN)). The type of identifier you provide here must correspond
43
- * to the value for `cpeLocalIdentifierType`.
43
+ * to the value for {@code cpeLocalIdentifierType}.
44
44
  * <p>
45
45
  For information about why you'd provide this value, see
46
46
  * [If Your CPE Is Behind a NAT Device](https://docs.cloud.oracle.com/iaas/Content/Network/Tasks/overviewIPsec.htm#nat).
47
47
  * <p>
48
- Example IP address: `10.0.3.3`
48
+ Example IP address: {@code 10.0.3.3}
49
49
  * <p>
50
- Example hostname: `cpe.example.com`
50
+ Example hostname: {@code cpe.example.com}
51
51
  *
52
52
  */
53
53
  "cpeLocalIdentifier"?: string;
54
54
  /**
55
55
  * The type of identifier for your CPE device. The value you provide here must correspond to the value
56
- * for `cpeLocalIdentifier`.
56
+ * for {@code cpeLocalIdentifier}.
57
57
  *
58
58
  */
59
59
  "cpeLocalIdentifierType"?: UpdateIPSecConnectionDetails.CpeLocalIdentifierType;
@@ -64,9 +64,9 @@ export interface UpdateIPSecConnectionDetails {
64
64
  * IPv6 addressing is supported for all commercial and government regions.
65
65
  * See [IPv6 Addresses](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/ipv6.htm).
66
66
  * <p>
67
- Example: `10.0.1.0/24`
67
+ Example: {@code 10.0.1.0/24}
68
68
  * <p>
69
- Example: `2001:db8::/32`
69
+ Example: {@code 2001:db8::/32}
70
70
  *
71
71
  */
72
72
  "staticRoutes"?: Array<string>;
@@ -37,13 +37,13 @@ export interface UpdateIPSecConnectionTunnelDetails {
37
37
  */
38
38
  "oracleInitiation"?: UpdateIPSecConnectionTunnelDetails.OracleInitiation;
39
39
  /**
40
- * By default (the `AUTO` setting), IKE sends packets with a source and destination port set to 500,
40
+ * By default (the {@code AUTO} setting), IKE sends packets with a source and destination port set to 500,
41
41
  * and when it detects that the port used to forward packets has changed (most likely because a NAT device
42
42
  * is between the CPE device and the Oracle VPN headend) it will try to negotiate the use of NAT-T.
43
43
  * <p>
44
- The `ENABLED` option sets the IKE protocol to use port 4500 instead of 500 and forces encapsulating traffic with the ESP protocol inside UDP packets.
44
+ The {@code ENABLED} option sets the IKE protocol to use port 4500 instead of 500 and forces encapsulating traffic with the ESP protocol inside UDP packets.
45
45
  * <p>
46
- The `DISABLED` option directs IKE to completely refuse to negotiate NAT-T
46
+ The {@code DISABLED} option directs IKE to completely refuse to negotiate NAT-T
47
47
  * even if it senses there may be a NAT device in use.
48
48
  *
49
49
  */
@@ -16,70 +16,70 @@ export interface UpdateIPSecTunnelBgpSessionDetails {
16
16
  /**
17
17
  * The IP address for the Oracle end of the inside tunnel interface.
18
18
  * <p>
19
- If the tunnel's `routing` attribute is set to `BGP`
19
+ If the tunnel's {@code routing} attribute is set to {@code BGP}
20
20
  * (see {@link #updateIPSecConnectionTunnelDetails(UpdateIPSecConnectionTunnelDetailsRequest) updateIPSecConnectionTunnelDetails}), this IP address
21
21
  * is used for the tunnel's BGP session.
22
22
  * <p>
23
- If `routing` is instead set to `STATIC`, you can set this IP address to troubleshoot or
23
+ If {@code routing} is instead set to {@code STATIC}, you can set this IP address to troubleshoot or
24
24
  * monitor the tunnel.
25
25
  * <p>
26
26
  The value must be a /30 or /31.
27
27
  * <p>
28
28
  If you are switching the tunnel from using BGP dynamic routing to static routing and want
29
- * to remove the value for `oracleInterfaceIp`, you can set the value to an empty string.
29
+ * to remove the value for {@code oracleInterfaceIp}, you can set the value to an empty string.
30
30
  * <p>
31
- Example: `10.0.0.4/31`
31
+ Example: {@code 10.0.0.4/31}
32
32
  *
33
33
  */
34
34
  "oracleInterfaceIp"?: string;
35
35
  /**
36
36
  * The IP address for the CPE end of the inside tunnel interface.
37
37
  * <p>
38
- If the tunnel's `routing` attribute is set to `BGP`
38
+ If the tunnel's {@code routing} attribute is set to {@code BGP}
39
39
  * (see {@link #updateIPSecConnectionTunnelDetails(UpdateIPSecConnectionTunnelDetailsRequest) updateIPSecConnectionTunnelDetails}), this IP address
40
40
  * is used for the tunnel's BGP session.
41
41
  * <p>
42
- If `routing` is instead set to `STATIC`, you can set this IP address to troubleshoot or
42
+ If {@code routing} is instead set to {@code STATIC}, you can set this IP address to troubleshoot or
43
43
  * monitor the tunnel.
44
44
  * <p>
45
45
  The value must be a /30 or /31.
46
46
  * <p>
47
47
  If you are switching the tunnel from using BGP dynamic routing to static routing and want
48
- * to remove the value for `customerInterfaceIp`, you can set the value to an empty string.
48
+ * to remove the value for {@code customerInterfaceIp}, you can set the value to an empty string.
49
49
  * <p>
50
- Example: `10.0.0.5/31`
50
+ Example: {@code 10.0.0.5/31}
51
51
  *
52
52
  */
53
53
  "customerInterfaceIp"?: string;
54
54
  /**
55
55
  * The IPv6 address for the Oracle end of the inside tunnel interface. This IP address is optional.
56
56
  * <p>
57
- If the tunnel's `routing` attribute is set to `BGP`
57
+ If the tunnel's {@code routing} attribute is set to {@code BGP}
58
58
  * (see {@link IPSecConnectionTunnel}), this IP address
59
59
  * is used for the tunnel's BGP session.
60
60
  * <p>
61
- If `routing` is instead set to `STATIC`, you can set this IP
61
+ If {@code routing} is instead set to {@code STATIC}, you can set this IP
62
62
  * address to troubleshoot or monitor the tunnel.
63
63
  * <p>
64
64
  Only subnet masks from /64 up to /127 are allowed.
65
65
  * <p>
66
- Example: `2001:db8::1/64`
66
+ Example: {@code 2001:db8::1/64}
67
67
  *
68
68
  */
69
69
  "oracleInterfaceIpv6"?: string;
70
70
  /**
71
71
  * The IPv6 address for the CPE end of the inside tunnel interface. This IP address is optional.
72
72
  * <p>
73
- If the tunnel's `routing` attribute is set to `BGP`
73
+ If the tunnel's {@code routing} attribute is set to {@code BGP}
74
74
  * (see {@link IPSecConnectionTunnel}), this IP address
75
75
  * is used for the tunnel's BGP session.
76
76
  * <p>
77
- If `routing` is instead set to `STATIC`, you can set this IP
77
+ If {@code routing} is instead set to {@code STATIC}, you can set this IP
78
78
  * address to troubleshoot or monitor the tunnel.
79
79
  * <p>
80
80
  Only subnet masks from /64 up to /127 are allowed.
81
81
  * <p>
82
- Example: `2001:db8::1/64`
82
+ Example: {@code 2001:db8::1/64}
83
83
  *
84
84
  */
85
85
  "customerInterfaceIpv6"?: string;
@@ -88,9 +88,9 @@ export interface UpdateIPSecTunnelBgpSessionDetails {
88
88
  * Uses \"asplain\" format.
89
89
  * <p>
90
90
  If you are switching the tunnel from using BGP dynamic routing to static routing, the
91
- * `customerBgpAsn` must be null.
91
+ * {@code customerBgpAsn} must be null.
92
92
  * <p>
93
- Example: `12345` (2-byte) or `1587232876` (4-byte)
93
+ Example: {@code 12345} (2-byte) or {@code 1587232876} (4-byte)
94
94
  *
95
95
  */
96
96
  "customerBgpAsn"?: string;
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  export interface UpdateIpv6Details {
16
16
  /**
17
17
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
18
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
18
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
19
19
  *
20
20
  */
21
21
  "definedTags"?: {
@@ -31,7 +31,7 @@ export interface UpdateIpv6Details {
31
31
  "displayName"?: string;
32
32
  /**
33
33
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
34
- * Example: `{\"bar-key\": \"value\"}`
34
+ * Example: {@code {\"bar-key\": \"value\"}}
35
35
  *
36
36
  */
37
37
  "freeformTags"?: {
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  export interface UpdateLocalPeeringGatewayDetails {
16
16
  /**
17
17
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
18
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
18
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
19
19
  *
20
20
  */
21
21
  "definedTags"?: {
@@ -31,7 +31,7 @@ export interface UpdateLocalPeeringGatewayDetails {
31
31
  "displayName"?: string;
32
32
  /**
33
33
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
34
- * Example: `{\"bar-key\": \"value\"}`
34
+ * Example: {@code {\"bar-key\": \"value\"}}
35
35
  *
36
36
  */
37
37
  "freeformTags"?: {
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  export interface UpdateNatGatewayDetails {
16
16
  /**
17
17
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
18
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
18
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
19
19
  *
20
20
  */
21
21
  "definedTags"?: {
@@ -31,16 +31,16 @@ export interface UpdateNatGatewayDetails {
31
31
  "displayName"?: string;
32
32
  /**
33
33
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
34
- * Example: `{\"bar-key\": \"value\"}`
34
+ * Example: {@code {\"bar-key\": \"value\"}}
35
35
  *
36
36
  */
37
37
  "freeformTags"?: {
38
38
  [key: string]: string;
39
39
  };
40
40
  /**
41
- * Whether the NAT gateway blocks traffic through it. The default is `false`.
41
+ * Whether the NAT gateway blocks traffic through it. The default is {@code false}.
42
42
  * <p>
43
- Example: `true`
43
+ Example: {@code true}
44
44
  *
45
45
  */
46
46
  "blockTraffic"?: boolean;
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  export interface UpdateNetworkSecurityGroupDetails {
16
16
  /**
17
17
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
18
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
18
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
19
19
  *
20
20
  */
21
21
  "definedTags"?: {
@@ -31,7 +31,7 @@ export interface UpdateNetworkSecurityGroupDetails {
31
31
  "displayName"?: string;
32
32
  /**
33
33
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
34
- * Example: `{\"bar-key\": \"value\"}`
34
+ * Example: {@code {\"bar-key\": \"value\"}}
35
35
  *
36
36
  */
37
37
  "freeformTags"?: {
@@ -14,7 +14,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
14
14
  */
15
15
  import * as model from "../model";
16
16
  /**
17
- * Details to update a `PathAnalyzerTest` resource.
17
+ * Details to update a {@code PathAnalyzerTest} resource.
18
18
  */
19
19
  export interface UpdatePathAnalyzerTestDetails {
20
20
  /**
@@ -24,7 +24,7 @@ export interface UpdatePathAnalyzerTestDetails {
24
24
  */
25
25
  "displayName"?: string;
26
26
  /**
27
- * The IP protocol to use in the `PathAnalyzerTest` resource. Note: Numbers greater than Number.MAX_SAFE_INTEGER will result in rounding issues.
27
+ * The IP protocol to use in the {@code PathAnalyzerTest} resource. Note: Numbers greater than Number.MAX_SAFE_INTEGER will result in rounding issues.
28
28
  */
29
29
  "protocol"?: number;
30
30
  "sourceEndpoint"?: model.NetworkLoadBalancerListenerEndpoint | model.ComputeInstanceEndpoint | model.NetworkLoadBalancerEndpoint | model.LoadBalancerEndpoint | model.VnicEndpoint | model.IpAddressEndpoint | model.VlanEndpoint | model.SubnetEndpoint | model.LoadBalancerListenerEndpoint;
@@ -33,7 +33,7 @@ export interface UpdatePathAnalyzerTestDetails {
33
33
  "queryOptions"?: model.QueryOptions;
34
34
  /**
35
35
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
36
- * Example: `{\"bar-key\": \"value\"}`
36
+ * Example: {@code {\"bar-key\": \"value\"}}
37
37
  *
38
38
  */
39
39
  "freeformTags"?: {
@@ -41,7 +41,7 @@ export interface UpdatePathAnalyzerTestDetails {
41
41
  };
42
42
  /**
43
43
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
44
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
44
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
45
45
  *
46
46
  */
47
47
  "definedTags"?: {
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  export interface UpdatePrivateIpDetails {
16
16
  /**
17
17
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
18
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
18
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
19
19
  *
20
20
  */
21
21
  "definedTags"?: {
@@ -31,7 +31,7 @@ export interface UpdatePrivateIpDetails {
31
31
  "displayName"?: string;
32
32
  /**
33
33
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
34
- * Example: `{\"bar-key\": \"value\"}`
34
+ * Example: {@code {\"bar-key\": \"value\"}}
35
35
  *
36
36
  */
37
37
  "freeformTags"?: {
@@ -40,7 +40,7 @@ export interface UpdatePrivateIpDetails {
40
40
  /**
41
41
  * The hostname for the private IP. Used for DNS. The value
42
42
  * is the hostname portion of the private IP's fully qualified domain name (FQDN)
43
- * (for example, `bminstance1` in FQDN `bminstance1.subnet123.vcn1.oraclevcn.com`).
43
+ * (for example, {@code bminstance1} in FQDN {@code bminstance1.subnet123.vcn1.oraclevcn.com}).
44
44
  * Must be unique across all VNICs in the subnet and comply with
45
45
  * [RFC 952](https://tools.ietf.org/html/rfc952) and
46
46
  * [RFC 1123](https://tools.ietf.org/html/rfc1123).
@@ -48,7 +48,7 @@ export interface UpdatePrivateIpDetails {
48
48
  For more information, see
49
49
  * [DNS in Your Virtual Cloud Network](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/dns.htm).
50
50
  * <p>
51
- Example: `bminstance1`
51
+ Example: {@code bminstance1}
52
52
  *
53
53
  */
54
54
  "hostnameLabel"?: string;
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  export interface UpdatePublicIpDetails {
16
16
  /**
17
17
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
18
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
18
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
19
19
  *
20
20
  */
21
21
  "definedTags"?: {
@@ -31,7 +31,7 @@ export interface UpdatePublicIpDetails {
31
31
  "displayName"?: string;
32
32
  /**
33
33
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
34
- * Example: `{\"bar-key\": \"value\"}`
34
+ * Example: {@code {\"bar-key\": \"value\"}}
35
35
  *
36
36
  */
37
37
  "freeformTags"?: {
@@ -18,7 +18,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
18
18
  export interface UpdatePublicIpPoolDetails {
19
19
  /**
20
20
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
21
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
21
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
22
22
  *
23
23
  */
24
24
  "definedTags"?: {
@@ -34,7 +34,7 @@ export interface UpdatePublicIpPoolDetails {
34
34
  "displayName"?: string;
35
35
  /**
36
36
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
37
- * Example: `{\"bar-key\": \"value\"}`
37
+ * Example: {@code {\"bar-key\": \"value\"}}
38
38
  *
39
39
  */
40
40
  "freeformTags"?: {
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  export interface UpdateRemotePeeringConnectionDetails {
16
16
  /**
17
17
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
18
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
18
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
19
19
  *
20
20
  */
21
21
  "definedTags"?: {
@@ -31,7 +31,7 @@ export interface UpdateRemotePeeringConnectionDetails {
31
31
  "displayName"?: string;
32
32
  /**
33
33
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
34
- * Example: `{\"bar-key\": \"value\"}`
34
+ * Example: {@code {\"bar-key\": \"value\"}}
35
35
  *
36
36
  */
37
37
  "freeformTags"?: {
@@ -16,7 +16,7 @@ import * as model from "../model";
16
16
  export interface UpdateRouteTableDetails {
17
17
  /**
18
18
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
19
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
19
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
20
20
  *
21
21
  */
22
22
  "definedTags"?: {
@@ -32,7 +32,7 @@ export interface UpdateRouteTableDetails {
32
32
  "displayName"?: string;
33
33
  /**
34
34
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
35
- * Example: `{\"bar-key\": \"value\"}`
35
+ * Example: {@code {\"bar-key\": \"value\"}}
36
36
  *
37
37
  */
38
38
  "freeformTags"?: {
@@ -16,7 +16,7 @@ import * as model from "../model";
16
16
  export interface UpdateSecurityListDetails {
17
17
  /**
18
18
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
19
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
19
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
20
20
  *
21
21
  */
22
22
  "definedTags"?: {
@@ -36,7 +36,7 @@ export interface UpdateSecurityListDetails {
36
36
  "egressSecurityRules"?: Array<model.EgressSecurityRule>;
37
37
  /**
38
38
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
39
- * Example: `{\"bar-key\": \"value\"}`
39
+ * Example: {@code {\"bar-key\": \"value\"}}
40
40
  *
41
41
  */
42
42
  "freeformTags"?: {
@@ -14,7 +14,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
14
14
  */
15
15
  import * as model from "../model";
16
16
  /**
17
- * A rule for allowing inbound (`direction`= INGRESS) or outbound (`direction`= EGRESS) IP packets.
17
+ * A rule for allowing inbound ({@code direction}= INGRESS) or outbound ({@code direction}= EGRESS) IP packets.
18
18
  *
19
19
  */
20
20
  export interface UpdateSecurityRuleDetails {
@@ -29,13 +29,13 @@ export interface UpdateSecurityRuleDetails {
29
29
  * <p>
30
30
  Allowed values:
31
31
  * <p>
32
- * An IP address range in CIDR notation. For example: `192.168.1.0/24` or `2001:0db8:0123:45::/56`
32
+ * An IP address range in CIDR notation. For example: {@code 192.168.1.0/24} or {@code 2001:0db8:0123:45::/56}
33
33
  * IPv6 addressing is supported for all commercial and government regions. See
34
34
  * [IPv6 Addresses](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/ipv6.htm).
35
35
  * <p>
36
- * The `cidrBlock` value for a {@link Service}, if you're
37
- * setting up a security rule for traffic destined for a particular `Service` through
38
- * a service gateway. For example: `oci-phx-objectstorage`.
36
+ * The {@code cidrBlock} value for a {@link Service}, if you're
37
+ * setting up a security rule for traffic destined for a particular {@code Service} through
38
+ * a service gateway. For example: {@code oci-phx-objectstorage}.
39
39
  * <p>
40
40
  * The [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a {@link NetworkSecurityGroup} in the same
41
41
  * VCN. The value can be the NSG that the rule belongs to if the rule's intent is to control
@@ -44,24 +44,24 @@ export interface UpdateSecurityRuleDetails {
44
44
  */
45
45
  "destination"?: string;
46
46
  /**
47
- * Type of destination for the rule. Required if `direction` = `EGRESS`.
47
+ * Type of destination for the rule. Required if {@code direction} = {@code EGRESS}.
48
48
  * <p>
49
49
  Allowed values:
50
50
  * <p>
51
- * `CIDR_BLOCK`: If the rule's `destination` is an IP address range in CIDR notation.
51
+ * {@code CIDR_BLOCK}: If the rule's {@code destination} is an IP address range in CIDR notation.
52
52
  * <p>
53
- * `SERVICE_CIDR_BLOCK`: If the rule's `destination` is the `cidrBlock` value for a
53
+ * {@code SERVICE_CIDR_BLOCK}: If the rule's {@code destination} is the {@code cidrBlock} value for a
54
54
  * {@link Service} (the rule is for traffic destined for a
55
- * particular `Service` through a service gateway).
55
+ * particular {@code Service} through a service gateway).
56
56
  * <p>
57
- * `NETWORK_SECURITY_GROUP`: If the rule's `destination` is the [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a
57
+ * {@code NETWORK_SECURITY_GROUP}: If the rule's {@code destination} is the [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a
58
58
  * {@link NetworkSecurityGroup}.
59
59
  *
60
60
  */
61
61
  "destinationType"?: UpdateSecurityRuleDetails.DestinationType;
62
62
  /**
63
- * Direction of the security rule. Set to `EGRESS` for rules to allow outbound IP packets,
64
- * or `INGRESS` for rules to allow inbound IP packets.
63
+ * Direction of the security rule. Set to {@code EGRESS} for rules to allow outbound IP packets,
64
+ * or {@code INGRESS} for rules to allow inbound IP packets.
65
65
  *
66
66
  */
67
67
  "direction": UpdateSecurityRuleDetails.Direction;
@@ -69,7 +69,7 @@ export interface UpdateSecurityRuleDetails {
69
69
  /**
70
70
  * The Oracle-assigned ID of the security rule that you want to update. You can't change this value.
71
71
  * <p>
72
- Example: `04ABEC`
72
+ Example: {@code 04ABEC}
73
73
  *
74
74
  */
75
75
  "id": string;
@@ -83,7 +83,7 @@ export interface UpdateSecurityRuleDetails {
83
83
  */
84
84
  "isStateless"?: boolean;
85
85
  /**
86
- * The transport protocol. Specify either `all` or an IPv4 protocol number as
86
+ * The transport protocol. Specify either {@code all} or an IPv4 protocol number as
87
87
  * defined in
88
88
  * [Protocol Numbers](http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml).
89
89
  * Options are supported only for ICMP (\"1\"), TCP (\"6\"), UDP (\"17\"), and ICMPv6 (\"58\").
@@ -96,13 +96,13 @@ export interface UpdateSecurityRuleDetails {
96
96
  * <p>
97
97
  Allowed values:
98
98
  * <p>
99
- * An IP address range in CIDR notation. For example: `192.168.1.0/24` or `2001:0db8:0123:45::/56`
99
+ * An IP address range in CIDR notation. For example: {@code 192.168.1.0/24} or {@code 2001:0db8:0123:45::/56}
100
100
  * IPv6 addressing is supported for all commercial and government regions. See
101
101
  * [IPv6 Addresses](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/ipv6.htm).
102
102
  * <p>
103
- * The `cidrBlock` value for a {@link Service}, if you're
104
- * setting up a security rule for traffic coming from a particular `Service` through
105
- * a service gateway. For example: `oci-phx-objectstorage`.
103
+ * The {@code cidrBlock} value for a {@link Service}, if you're
104
+ * setting up a security rule for traffic coming from a particular {@code Service} through
105
+ * a service gateway. For example: {@code oci-phx-objectstorage}.
106
106
  * <p>
107
107
  * The [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a {@link NetworkSecurityGroup} in the same
108
108
  * VCN. The value can be the NSG that the rule belongs to if the rule's intent is to control
@@ -111,15 +111,15 @@ export interface UpdateSecurityRuleDetails {
111
111
  */
112
112
  "source"?: string;
113
113
  /**
114
- * Type of source for the rule. Required if `direction` = `INGRESS`.
114
+ * Type of source for the rule. Required if {@code direction} = {@code INGRESS}.
115
115
  * <p>
116
- * `CIDR_BLOCK`: If the rule's `source` is an IP address range in CIDR notation.
116
+ * {@code CIDR_BLOCK}: If the rule's {@code source} is an IP address range in CIDR notation.
117
117
  * <p>
118
- * `SERVICE_CIDR_BLOCK`: If the rule's `source` is the `cidrBlock` value for a
118
+ * {@code SERVICE_CIDR_BLOCK}: If the rule's {@code source} is the {@code cidrBlock} value for a
119
119
  * {@link Service} (the rule is for traffic coming from a
120
- * particular `Service` through a service gateway).
120
+ * particular {@code Service} through a service gateway).
121
121
  * <p>
122
- * `NETWORK_SECURITY_GROUP`: If the rule's `source` is the [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a
122
+ * {@code NETWORK_SECURITY_GROUP}: If the rule's {@code source} is the [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a
123
123
  * {@link NetworkSecurityGroup}.
124
124
  *
125
125
  */
@@ -15,16 +15,16 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
15
15
  import * as model from "../model";
16
16
  export interface UpdateServiceGatewayDetails {
17
17
  /**
18
- * Whether the service gateway blocks all traffic through it. The default is `false`. When
19
- * this is `true`, traffic is not routed to any services, regardless of route rules.
18
+ * Whether the service gateway blocks all traffic through it. The default is {@code false}. When
19
+ * this is {@code true}, traffic is not routed to any services, regardless of route rules.
20
20
  * <p>
21
- Example: `true`
21
+ Example: {@code true}
22
22
  *
23
23
  */
24
24
  "blockTraffic"?: boolean;
25
25
  /**
26
26
  * Defined tags for this resource. Each key is predefined and scoped to a namespace.
27
- * Example: `{\"foo-namespace\": {\"bar-key\": \"value\"}}`
27
+ * Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
28
28
  *
29
29
  */
30
30
  "definedTags"?: {
@@ -40,7 +40,7 @@ export interface UpdateServiceGatewayDetails {
40
40
  "displayName"?: string;
41
41
  /**
42
42
  * Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
43
- * Example: `{\"bar-key\": \"value\"}`
43
+ * Example: {@code {\"bar-key\": \"value\"}}
44
44
  *
45
45
  */
46
46
  "freeformTags"?: {
@@ -54,15 +54,15 @@ export interface UpdateServiceGatewayDetails {
54
54
  */
55
55
  "routeTableId"?: string;
56
56
  /**
57
- * List of all the `Service` objects you want enabled on this service gateway. Sending an empty list
57
+ * List of all the {@code Service} objects you want enabled on this service gateway. Sending an empty list
58
58
  * means you want to disable all services. Omitting this parameter entirely keeps the
59
59
  * existing list of services intact.
60
60
  * <p>
61
- You can also enable or disable a particular `Service` by using
61
+ You can also enable or disable a particular {@code Service} by using
62
62
  * {@link #attachServiceId(AttachServiceIdRequest) attachServiceId} or
63
63
  * {@link #detachServiceId(DetachServiceIdRequest) detachServiceId}.
64
64
  * <p>
65
- For each enabled `Service`, make sure there's a route rule with the `Service` object's `cidrBlock`
65
+ For each enabled {@code Service}, make sure there's a route rule with the {@code Service} object's {@code cidrBlock}
66
66
  * as the rule's destination and the service gateway as the rule's target. See
67
67
  * {@link RouteTable}.
68
68
  *