oci-vnmonitoring 2.76.1 → 2.77.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/client.d.ts +12 -12
- package/lib/client.js +12 -12
- package/lib/model/add-drg-route-rule-details.d.ts +3 -3
- package/lib/model/add-public-ip-pool-capacity-details.d.ts +3 -3
- package/lib/model/add-security-rule-details.d.ts +21 -21
- package/lib/model/add-subnet-ipv6-cidr-details.d.ts +1 -1
- package/lib/model/add-vcn-ipv6-cidr-details.d.ts +1 -1
- package/lib/model/bgp-session-info.d.ts +15 -15
- package/lib/model/byoip-allocated-range-collection.d.ts +1 -1
- package/lib/model/byoip-range-collection.d.ts +2 -2
- package/lib/model/byoip-range-summary.d.ts +9 -9
- package/lib/model/byoip-range-vcn-ipv6-allocation-summary.d.ts +3 -3
- package/lib/model/byoip-range.d.ts +15 -15
- package/lib/model/byoipv6-cidr-details.d.ts +3 -3
- package/lib/model/capture-filter.d.ts +3 -3
- package/lib/model/change-path-analyzer-test-compartment-details.d.ts +2 -2
- package/lib/model/compute-instance-endpoint.d.ts +2 -2
- package/lib/model/connect-remote-peering-connections-details.d.ts +1 -1
- package/lib/model/cpe-device-config-answer.d.ts +2 -2
- package/lib/model/cpe.d.ts +5 -5
- package/lib/model/create-byoip-range-details.d.ts +4 -4
- package/lib/model/create-capture-filter-details.d.ts +2 -2
- package/lib/model/create-cpe-details.d.ts +4 -4
- package/lib/model/create-cross-connect-details.d.ts +4 -4
- package/lib/model/create-cross-connect-group-details.d.ts +2 -2
- package/lib/model/create-dhcp-details.d.ts +2 -2
- package/lib/model/create-drg-attachment-details.d.ts +3 -3
- package/lib/model/create-drg-details.d.ts +2 -2
- package/lib/model/create-drg-route-distribution-details.d.ts +2 -2
- package/lib/model/create-drg-route-table-details.d.ts +2 -2
- package/lib/model/create-internet-gateway-details.d.ts +2 -2
- package/lib/model/create-ip-sec-connection-details.d.ts +12 -12
- package/lib/model/create-ip-sec-connection-tunnel-details.d.ts +3 -3
- package/lib/model/create-ip-sec-tunnel-bgp-session-details.d.ts +15 -15
- package/lib/model/create-ipv6-details.d.ts +4 -4
- package/lib/model/create-local-peering-gateway-details.d.ts +2 -2
- package/lib/model/create-nat-gateway-details.d.ts +4 -4
- package/lib/model/create-network-security-group-details.d.ts +2 -2
- package/lib/model/create-path-analyzer-test-details.d.ts +5 -5
- package/lib/model/create-private-ip-details.d.ts +5 -5
- package/lib/model/create-public-ip-details.d.ts +2 -2
- package/lib/model/create-public-ip-pool-details.d.ts +2 -2
- package/lib/model/create-remote-peering-connection-details.d.ts +2 -2
- package/lib/model/create-route-table-details.d.ts +2 -2
- package/lib/model/create-security-list-details.d.ts +2 -2
- package/lib/model/create-service-gateway-details.d.ts +4 -4
- package/lib/model/create-subnet-details.d.ts +14 -14
- package/lib/model/create-vcn-details.d.ts +11 -11
- package/lib/model/create-virtual-circuit-details.d.ts +13 -13
- package/lib/model/create-vlan-details.d.ts +4 -4
- package/lib/model/create-vnic-details.d.ts +24 -24
- package/lib/model/create-vtap-details.d.ts +7 -7
- package/lib/model/cross-connect-group.d.ts +4 -4
- package/lib/model/cross-connect-location.d.ts +1 -1
- package/lib/model/cross-connect-mapping-details.d.ts +6 -6
- package/lib/model/cross-connect-mapping.d.ts +7 -7
- package/lib/model/cross-connect-port-speed-shape.d.ts +2 -2
- package/lib/model/cross-connect-status.d.ts +2 -2
- package/lib/model/cross-connect.d.ts +5 -5
- package/lib/model/dhcp-dns-option.d.ts +1 -1
- package/lib/model/dhcp-options.d.ts +3 -3
- package/lib/model/dhcp-search-domain-option.d.ts +2 -2
- package/lib/model/drg-attachment-info.d.ts +1 -1
- package/lib/model/drg-attachment.d.ts +6 -6
- package/lib/model/drg-route-distribution-statement.d.ts +1 -1
- package/lib/model/drg-route-distribution.d.ts +4 -4
- package/lib/model/drg-route-rule.d.ts +10 -10
- package/lib/model/drg-route-table.d.ts +4 -4
- package/lib/model/drg.d.ts +3 -3
- package/lib/model/egress-security-rule.d.ts +9 -9
- package/lib/model/endpoint.d.ts +1 -1
- package/lib/model/fast-connect-provider-service-key.d.ts +2 -2
- package/lib/model/fast-connect-provider-service.d.ts +1 -1
- package/lib/model/flow-log-capture-filter-rule-details.d.ts +1 -1
- package/lib/model/i-psec-connection-device-status.d.ts +1 -1
- package/lib/model/i-psec-connection-tunnel.d.ts +7 -7
- package/lib/model/i-psec-connection.d.ts +14 -14
- package/lib/model/icmp-traffic-protocol-parameters.d.ts +1 -1
- package/lib/model/ingress-security-rule.d.ts +9 -9
- package/lib/model/internet-gateway.d.ts +3 -3
- package/lib/model/ip-address-endpoint.d.ts +2 -2
- package/lib/model/ipv6.d.ts +7 -7
- package/lib/model/letter-of-authority.d.ts +1 -1
- package/lib/model/load-balancer-endpoint.d.ts +1 -1
- package/lib/model/load-balancer-listener-endpoint.d.ts +1 -1
- package/lib/model/local-peering-gateway.d.ts +11 -11
- package/lib/model/macsec-key.d.ts +1 -1
- package/lib/model/nat-gateway.d.ts +5 -5
- package/lib/model/network-load-balancer-endpoint.d.ts +1 -1
- package/lib/model/network-load-balancer-listener-endpoint.d.ts +1 -1
- package/lib/model/network-security-group-vnic.d.ts +1 -1
- package/lib/model/network-security-group.d.ts +3 -3
- package/lib/model/path-analysis-work-request-result.d.ts +2 -2
- package/lib/model/path-analyzer-test-collection.d.ts +2 -2
- package/lib/model/path-analyzer-test-summary.d.ts +9 -9
- package/lib/model/path-analyzer-test.d.ts +9 -9
- package/lib/model/path.d.ts +1 -1
- package/lib/model/persisted-get-path-analysis-details.d.ts +2 -2
- package/lib/model/private-ip.d.ts +21 -21
- package/lib/model/protocol-parameters.d.ts +1 -1
- package/lib/model/public-ip-pool-collection.d.ts +1 -1
- package/lib/model/public-ip-pool-summary.d.ts +3 -3
- package/lib/model/public-ip-pool.d.ts +3 -3
- package/lib/model/public-ip.d.ts +17 -17
- package/lib/model/query-options.d.ts +1 -1
- package/lib/model/remote-peering-connection.d.ts +7 -7
- package/lib/model/remove-public-ip-pool-capacity-details.d.ts +1 -1
- package/lib/model/remove-subnet-ipv6-cidr-details.d.ts +1 -1
- package/lib/model/remove-vcn-ipv6-cidr-details.d.ts +1 -1
- package/lib/model/route-rule.d.ts +13 -13
- package/lib/model/route-table.d.ts +4 -4
- package/lib/model/security-action.d.ts +1 -1
- package/lib/model/security-list.d.ts +3 -3
- package/lib/model/security-rule.d.ts +26 -26
- package/lib/model/service-gateway.d.ts +7 -7
- package/lib/model/service.d.ts +10 -10
- package/lib/model/subnet-endpoint.d.ts +2 -2
- package/lib/model/subnet.d.ts +21 -21
- package/lib/model/tcp-protocol-parameters.d.ts +2 -2
- package/lib/model/tcp-traffic-protocol-parameters.d.ts +3 -3
- package/lib/model/topology-associated-with-entity-relationship.d.ts +2 -2
- package/lib/model/topology-associated-with-relationship-details.d.ts +1 -1
- package/lib/model/topology-contains-entity-relationship.d.ts +2 -2
- package/lib/model/topology-routes-to-entity-relationship.d.ts +1 -1
- package/lib/model/topology-routes-to-relationship-details.d.ts +5 -5
- package/lib/model/topology.d.ts +1 -1
- package/lib/model/traffic-node.d.ts +1 -1
- package/lib/model/traffic-protocol-parameters.d.ts +1 -1
- package/lib/model/traffic-route.d.ts +1 -1
- package/lib/model/tunnel-config.d.ts +2 -2
- package/lib/model/tunnel-cpe-device-config.d.ts +1 -1
- package/lib/model/tunnel-phase-one-details.d.ts +1 -1
- package/lib/model/tunnel-phase-two-details.d.ts +1 -1
- package/lib/model/tunnel-security-association-summary.d.ts +1 -1
- package/lib/model/tunnel-status.d.ts +3 -3
- package/lib/model/udp-protocol-parameters.d.ts +2 -2
- package/lib/model/udp-traffic-protocol-parameters.d.ts +3 -3
- package/lib/model/update-byoip-range-details.d.ts +3 -3
- package/lib/model/update-capture-filter-details.d.ts +2 -2
- package/lib/model/update-cpe-details.d.ts +2 -2
- package/lib/model/update-cross-connect-details.d.ts +3 -3
- package/lib/model/update-cross-connect-group-details.d.ts +2 -2
- package/lib/model/update-dhcp-details.d.ts +2 -2
- package/lib/model/update-drg-attachment-details.d.ts +2 -2
- package/lib/model/update-drg-details.d.ts +2 -2
- package/lib/model/update-drg-route-distribution-details.d.ts +2 -2
- package/lib/model/update-drg-route-rule-details.d.ts +3 -3
- package/lib/model/update-drg-route-table-details.d.ts +2 -2
- package/lib/model/update-internet-gateway-details.d.ts +2 -2
- package/lib/model/update-ip-sec-connection-details.d.ts +8 -8
- package/lib/model/update-ip-sec-connection-tunnel-details.d.ts +3 -3
- package/lib/model/update-ip-sec-tunnel-bgp-session-details.d.ts +16 -16
- package/lib/model/update-ipv6-details.d.ts +2 -2
- package/lib/model/update-local-peering-gateway-details.d.ts +2 -2
- package/lib/model/update-nat-gateway-details.d.ts +4 -4
- package/lib/model/update-network-security-group-details.d.ts +2 -2
- package/lib/model/update-path-analyzer-test-details.d.ts +4 -4
- package/lib/model/update-private-ip-details.d.ts +4 -4
- package/lib/model/update-public-ip-details.d.ts +2 -2
- package/lib/model/update-public-ip-pool-details.d.ts +2 -2
- package/lib/model/update-remote-peering-connection-details.d.ts +2 -2
- package/lib/model/update-route-table-details.d.ts +2 -2
- package/lib/model/update-security-list-details.d.ts +2 -2
- package/lib/model/update-security-rule-details.d.ts +23 -23
- package/lib/model/update-service-gateway-details.d.ts +8 -8
- package/lib/model/update-subnet-details.d.ts +5 -5
- package/lib/model/update-vcn-details.d.ts +2 -2
- package/lib/model/update-virtual-circuit-details.d.ts +7 -7
- package/lib/model/update-vlan-details.d.ts +3 -3
- package/lib/model/update-vnic-details.d.ts +7 -7
- package/lib/model/update-vtap-details.d.ts +5 -5
- package/lib/model/upgrade-status.d.ts +1 -1
- package/lib/model/vcn.d.ts +8 -8
- package/lib/model/virtual-circuit-bandwidth-shape.d.ts +2 -2
- package/lib/model/virtual-circuit-drg-attachment-network-details.d.ts +1 -1
- package/lib/model/virtual-circuit-public-prefix.d.ts +2 -2
- package/lib/model/virtual-circuit.d.ts +11 -11
- package/lib/model/vlan-endpoint.d.ts +2 -2
- package/lib/model/vlan.d.ts +6 -6
- package/lib/model/vnic-endpoint.d.ts +2 -2
- package/lib/model/vnic.d.ts +16 -16
- package/lib/model/vtap.d.ts +8 -8
- package/lib/model/work-request-error-collection.d.ts +2 -2
- package/lib/model/work-request-log-entry-collection.d.ts +1 -1
- package/lib/model/work-request-resource.d.ts +3 -3
- package/lib/model/work-request-result-collection.d.ts +2 -2
- package/lib/model/work-request-summary-collection.d.ts +2 -2
- package/lib/model/work-request-summary.d.ts +2 -2
- package/lib/model/work-request.d.ts +2 -2
- package/lib/request/change-path-analyzer-test-compartment-request.d.ts +3 -3
- package/lib/request/create-path-analyzer-test-request.d.ts +1 -1
- package/lib/request/delete-path-analyzer-test-request.d.ts +3 -3
- package/lib/request/get-path-analysis-request.d.ts +1 -1
- package/lib/request/get-path-analyzer-test-request.d.ts +2 -2
- package/lib/request/get-work-request-request.d.ts +1 -1
- package/lib/request/list-path-analyzer-tests-request.d.ts +7 -7
- package/lib/request/list-work-request-errors-request.d.ts +5 -5
- package/lib/request/list-work-request-logs-request.d.ts +5 -5
- package/lib/request/list-work-request-results-request.d.ts +3 -3
- package/lib/request/list-work-requests-request.d.ts +6 -6
- package/lib/request/update-path-analyzer-test-request.d.ts +3 -3
- package/lib/response/change-path-analyzer-test-compartment-response.d.ts +1 -1
- package/lib/response/create-path-analyzer-test-response.d.ts +1 -1
- package/lib/response/get-path-analyzer-test-response.d.ts +1 -1
- package/lib/response/get-work-request-response.d.ts +1 -1
- package/lib/response/list-path-analyzer-tests-response.d.ts +1 -1
- package/lib/response/list-work-request-errors-response.d.ts +1 -1
- package/lib/response/list-work-request-logs-response.d.ts +1 -1
- package/lib/response/list-work-request-results-response.d.ts +1 -1
- package/lib/response/list-work-requests-response.d.ts +1 -1
- package/lib/response/update-path-analyzer-test-response.d.ts +1 -1
- package/package.json +3 -3
|
@@ -21,7 +21,7 @@ You can't assign a table to a virtual circuit or IPSec tunnel attachment if ther
|
|
|
21
21
|
export interface UpdateDrgRouteTableDetails {
|
|
22
22
|
/**
|
|
23
23
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
24
|
-
* Example:
|
|
24
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
25
25
|
*
|
|
26
26
|
*/
|
|
27
27
|
"definedTags"?: {
|
|
@@ -37,7 +37,7 @@ export interface UpdateDrgRouteTableDetails {
|
|
|
37
37
|
"displayName"?: string;
|
|
38
38
|
/**
|
|
39
39
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
40
|
-
* Example:
|
|
40
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
41
41
|
*
|
|
42
42
|
*/
|
|
43
43
|
"freeformTags"?: {
|
|
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
export interface UpdateInternetGatewayDetails {
|
|
16
16
|
/**
|
|
17
17
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
18
|
-
* Example:
|
|
18
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
19
19
|
*
|
|
20
20
|
*/
|
|
21
21
|
"definedTags"?: {
|
|
@@ -31,7 +31,7 @@ export interface UpdateInternetGatewayDetails {
|
|
|
31
31
|
"displayName"?: string;
|
|
32
32
|
/**
|
|
33
33
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
34
|
-
* Example:
|
|
34
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
35
35
|
*
|
|
36
36
|
*/
|
|
37
37
|
"freeformTags"?: {
|
|
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
export interface UpdateIPSecConnectionDetails {
|
|
16
16
|
/**
|
|
17
17
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
18
|
-
* Example:
|
|
18
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
19
19
|
*
|
|
20
20
|
*/
|
|
21
21
|
"definedTags"?: {
|
|
@@ -31,7 +31,7 @@ export interface UpdateIPSecConnectionDetails {
|
|
|
31
31
|
"displayName"?: string;
|
|
32
32
|
/**
|
|
33
33
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
34
|
-
* Example:
|
|
34
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
35
35
|
*
|
|
36
36
|
*/
|
|
37
37
|
"freeformTags"?: {
|
|
@@ -40,20 +40,20 @@ export interface UpdateIPSecConnectionDetails {
|
|
|
40
40
|
/**
|
|
41
41
|
* Your identifier for your CPE device. Can be either an IP address or a hostname (specifically, the
|
|
42
42
|
* fully qualified domain name (FQDN)). The type of identifier you provide here must correspond
|
|
43
|
-
* to the value for
|
|
43
|
+
* to the value for {@code cpeLocalIdentifierType}.
|
|
44
44
|
* <p>
|
|
45
45
|
For information about why you'd provide this value, see
|
|
46
46
|
* [If Your CPE Is Behind a NAT Device](https://docs.cloud.oracle.com/iaas/Content/Network/Tasks/overviewIPsec.htm#nat).
|
|
47
47
|
* <p>
|
|
48
|
-
Example IP address:
|
|
48
|
+
Example IP address: {@code 10.0.3.3}
|
|
49
49
|
* <p>
|
|
50
|
-
Example hostname:
|
|
50
|
+
Example hostname: {@code cpe.example.com}
|
|
51
51
|
*
|
|
52
52
|
*/
|
|
53
53
|
"cpeLocalIdentifier"?: string;
|
|
54
54
|
/**
|
|
55
55
|
* The type of identifier for your CPE device. The value you provide here must correspond to the value
|
|
56
|
-
* for
|
|
56
|
+
* for {@code cpeLocalIdentifier}.
|
|
57
57
|
*
|
|
58
58
|
*/
|
|
59
59
|
"cpeLocalIdentifierType"?: UpdateIPSecConnectionDetails.CpeLocalIdentifierType;
|
|
@@ -64,9 +64,9 @@ export interface UpdateIPSecConnectionDetails {
|
|
|
64
64
|
* IPv6 addressing is supported for all commercial and government regions.
|
|
65
65
|
* See [IPv6 Addresses](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/ipv6.htm).
|
|
66
66
|
* <p>
|
|
67
|
-
Example:
|
|
67
|
+
Example: {@code 10.0.1.0/24}
|
|
68
68
|
* <p>
|
|
69
|
-
Example:
|
|
69
|
+
Example: {@code 2001:db8::/32}
|
|
70
70
|
*
|
|
71
71
|
*/
|
|
72
72
|
"staticRoutes"?: Array<string>;
|
|
@@ -37,13 +37,13 @@ export interface UpdateIPSecConnectionTunnelDetails {
|
|
|
37
37
|
*/
|
|
38
38
|
"oracleInitiation"?: UpdateIPSecConnectionTunnelDetails.OracleInitiation;
|
|
39
39
|
/**
|
|
40
|
-
* By default (the
|
|
40
|
+
* By default (the {@code AUTO} setting), IKE sends packets with a source and destination port set to 500,
|
|
41
41
|
* and when it detects that the port used to forward packets has changed (most likely because a NAT device
|
|
42
42
|
* is between the CPE device and the Oracle VPN headend) it will try to negotiate the use of NAT-T.
|
|
43
43
|
* <p>
|
|
44
|
-
The
|
|
44
|
+
The {@code ENABLED} option sets the IKE protocol to use port 4500 instead of 500 and forces encapsulating traffic with the ESP protocol inside UDP packets.
|
|
45
45
|
* <p>
|
|
46
|
-
The
|
|
46
|
+
The {@code DISABLED} option directs IKE to completely refuse to negotiate NAT-T
|
|
47
47
|
* even if it senses there may be a NAT device in use.
|
|
48
48
|
*
|
|
49
49
|
*/
|
|
@@ -16,70 +16,70 @@ export interface UpdateIPSecTunnelBgpSessionDetails {
|
|
|
16
16
|
/**
|
|
17
17
|
* The IP address for the Oracle end of the inside tunnel interface.
|
|
18
18
|
* <p>
|
|
19
|
-
If the tunnel's
|
|
19
|
+
If the tunnel's {@code routing} attribute is set to {@code BGP}
|
|
20
20
|
* (see {@link #updateIPSecConnectionTunnelDetails(UpdateIPSecConnectionTunnelDetailsRequest) updateIPSecConnectionTunnelDetails}), this IP address
|
|
21
21
|
* is used for the tunnel's BGP session.
|
|
22
22
|
* <p>
|
|
23
|
-
If
|
|
23
|
+
If {@code routing} is instead set to {@code STATIC}, you can set this IP address to troubleshoot or
|
|
24
24
|
* monitor the tunnel.
|
|
25
25
|
* <p>
|
|
26
26
|
The value must be a /30 or /31.
|
|
27
27
|
* <p>
|
|
28
28
|
If you are switching the tunnel from using BGP dynamic routing to static routing and want
|
|
29
|
-
* to remove the value for
|
|
29
|
+
* to remove the value for {@code oracleInterfaceIp}, you can set the value to an empty string.
|
|
30
30
|
* <p>
|
|
31
|
-
Example:
|
|
31
|
+
Example: {@code 10.0.0.4/31}
|
|
32
32
|
*
|
|
33
33
|
*/
|
|
34
34
|
"oracleInterfaceIp"?: string;
|
|
35
35
|
/**
|
|
36
36
|
* The IP address for the CPE end of the inside tunnel interface.
|
|
37
37
|
* <p>
|
|
38
|
-
If the tunnel's
|
|
38
|
+
If the tunnel's {@code routing} attribute is set to {@code BGP}
|
|
39
39
|
* (see {@link #updateIPSecConnectionTunnelDetails(UpdateIPSecConnectionTunnelDetailsRequest) updateIPSecConnectionTunnelDetails}), this IP address
|
|
40
40
|
* is used for the tunnel's BGP session.
|
|
41
41
|
* <p>
|
|
42
|
-
If
|
|
42
|
+
If {@code routing} is instead set to {@code STATIC}, you can set this IP address to troubleshoot or
|
|
43
43
|
* monitor the tunnel.
|
|
44
44
|
* <p>
|
|
45
45
|
The value must be a /30 or /31.
|
|
46
46
|
* <p>
|
|
47
47
|
If you are switching the tunnel from using BGP dynamic routing to static routing and want
|
|
48
|
-
* to remove the value for
|
|
48
|
+
* to remove the value for {@code customerInterfaceIp}, you can set the value to an empty string.
|
|
49
49
|
* <p>
|
|
50
|
-
Example:
|
|
50
|
+
Example: {@code 10.0.0.5/31}
|
|
51
51
|
*
|
|
52
52
|
*/
|
|
53
53
|
"customerInterfaceIp"?: string;
|
|
54
54
|
/**
|
|
55
55
|
* The IPv6 address for the Oracle end of the inside tunnel interface. This IP address is optional.
|
|
56
56
|
* <p>
|
|
57
|
-
If the tunnel's
|
|
57
|
+
If the tunnel's {@code routing} attribute is set to {@code BGP}
|
|
58
58
|
* (see {@link IPSecConnectionTunnel}), this IP address
|
|
59
59
|
* is used for the tunnel's BGP session.
|
|
60
60
|
* <p>
|
|
61
|
-
If
|
|
61
|
+
If {@code routing} is instead set to {@code STATIC}, you can set this IP
|
|
62
62
|
* address to troubleshoot or monitor the tunnel.
|
|
63
63
|
* <p>
|
|
64
64
|
Only subnet masks from /64 up to /127 are allowed.
|
|
65
65
|
* <p>
|
|
66
|
-
Example:
|
|
66
|
+
Example: {@code 2001:db8::1/64}
|
|
67
67
|
*
|
|
68
68
|
*/
|
|
69
69
|
"oracleInterfaceIpv6"?: string;
|
|
70
70
|
/**
|
|
71
71
|
* The IPv6 address for the CPE end of the inside tunnel interface. This IP address is optional.
|
|
72
72
|
* <p>
|
|
73
|
-
If the tunnel's
|
|
73
|
+
If the tunnel's {@code routing} attribute is set to {@code BGP}
|
|
74
74
|
* (see {@link IPSecConnectionTunnel}), this IP address
|
|
75
75
|
* is used for the tunnel's BGP session.
|
|
76
76
|
* <p>
|
|
77
|
-
If
|
|
77
|
+
If {@code routing} is instead set to {@code STATIC}, you can set this IP
|
|
78
78
|
* address to troubleshoot or monitor the tunnel.
|
|
79
79
|
* <p>
|
|
80
80
|
Only subnet masks from /64 up to /127 are allowed.
|
|
81
81
|
* <p>
|
|
82
|
-
Example:
|
|
82
|
+
Example: {@code 2001:db8::1/64}
|
|
83
83
|
*
|
|
84
84
|
*/
|
|
85
85
|
"customerInterfaceIpv6"?: string;
|
|
@@ -88,9 +88,9 @@ export interface UpdateIPSecTunnelBgpSessionDetails {
|
|
|
88
88
|
* Uses \"asplain\" format.
|
|
89
89
|
* <p>
|
|
90
90
|
If you are switching the tunnel from using BGP dynamic routing to static routing, the
|
|
91
|
-
*
|
|
91
|
+
* {@code customerBgpAsn} must be null.
|
|
92
92
|
* <p>
|
|
93
|
-
Example:
|
|
93
|
+
Example: {@code 12345} (2-byte) or {@code 1587232876} (4-byte)
|
|
94
94
|
*
|
|
95
95
|
*/
|
|
96
96
|
"customerBgpAsn"?: string;
|
|
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
export interface UpdateIpv6Details {
|
|
16
16
|
/**
|
|
17
17
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
18
|
-
* Example:
|
|
18
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
19
19
|
*
|
|
20
20
|
*/
|
|
21
21
|
"definedTags"?: {
|
|
@@ -31,7 +31,7 @@ export interface UpdateIpv6Details {
|
|
|
31
31
|
"displayName"?: string;
|
|
32
32
|
/**
|
|
33
33
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
34
|
-
* Example:
|
|
34
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
35
35
|
*
|
|
36
36
|
*/
|
|
37
37
|
"freeformTags"?: {
|
|
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
export interface UpdateLocalPeeringGatewayDetails {
|
|
16
16
|
/**
|
|
17
17
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
18
|
-
* Example:
|
|
18
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
19
19
|
*
|
|
20
20
|
*/
|
|
21
21
|
"definedTags"?: {
|
|
@@ -31,7 +31,7 @@ export interface UpdateLocalPeeringGatewayDetails {
|
|
|
31
31
|
"displayName"?: string;
|
|
32
32
|
/**
|
|
33
33
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
34
|
-
* Example:
|
|
34
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
35
35
|
*
|
|
36
36
|
*/
|
|
37
37
|
"freeformTags"?: {
|
|
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
export interface UpdateNatGatewayDetails {
|
|
16
16
|
/**
|
|
17
17
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
18
|
-
* Example:
|
|
18
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
19
19
|
*
|
|
20
20
|
*/
|
|
21
21
|
"definedTags"?: {
|
|
@@ -31,16 +31,16 @@ export interface UpdateNatGatewayDetails {
|
|
|
31
31
|
"displayName"?: string;
|
|
32
32
|
/**
|
|
33
33
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
34
|
-
* Example:
|
|
34
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
35
35
|
*
|
|
36
36
|
*/
|
|
37
37
|
"freeformTags"?: {
|
|
38
38
|
[key: string]: string;
|
|
39
39
|
};
|
|
40
40
|
/**
|
|
41
|
-
* Whether the NAT gateway blocks traffic through it. The default is
|
|
41
|
+
* Whether the NAT gateway blocks traffic through it. The default is {@code false}.
|
|
42
42
|
* <p>
|
|
43
|
-
Example:
|
|
43
|
+
Example: {@code true}
|
|
44
44
|
*
|
|
45
45
|
*/
|
|
46
46
|
"blockTraffic"?: boolean;
|
|
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
export interface UpdateNetworkSecurityGroupDetails {
|
|
16
16
|
/**
|
|
17
17
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
18
|
-
* Example:
|
|
18
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
19
19
|
*
|
|
20
20
|
*/
|
|
21
21
|
"definedTags"?: {
|
|
@@ -31,7 +31,7 @@ export interface UpdateNetworkSecurityGroupDetails {
|
|
|
31
31
|
"displayName"?: string;
|
|
32
32
|
/**
|
|
33
33
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
34
|
-
* Example:
|
|
34
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
35
35
|
*
|
|
36
36
|
*/
|
|
37
37
|
"freeformTags"?: {
|
|
@@ -14,7 +14,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
14
14
|
*/
|
|
15
15
|
import * as model from "../model";
|
|
16
16
|
/**
|
|
17
|
-
* Details to update a
|
|
17
|
+
* Details to update a {@code PathAnalyzerTest} resource.
|
|
18
18
|
*/
|
|
19
19
|
export interface UpdatePathAnalyzerTestDetails {
|
|
20
20
|
/**
|
|
@@ -24,7 +24,7 @@ export interface UpdatePathAnalyzerTestDetails {
|
|
|
24
24
|
*/
|
|
25
25
|
"displayName"?: string;
|
|
26
26
|
/**
|
|
27
|
-
* The IP protocol to use in the
|
|
27
|
+
* The IP protocol to use in the {@code PathAnalyzerTest} resource. Note: Numbers greater than Number.MAX_SAFE_INTEGER will result in rounding issues.
|
|
28
28
|
*/
|
|
29
29
|
"protocol"?: number;
|
|
30
30
|
"sourceEndpoint"?: model.NetworkLoadBalancerListenerEndpoint | model.ComputeInstanceEndpoint | model.NetworkLoadBalancerEndpoint | model.LoadBalancerEndpoint | model.VnicEndpoint | model.IpAddressEndpoint | model.VlanEndpoint | model.SubnetEndpoint | model.LoadBalancerListenerEndpoint;
|
|
@@ -33,7 +33,7 @@ export interface UpdatePathAnalyzerTestDetails {
|
|
|
33
33
|
"queryOptions"?: model.QueryOptions;
|
|
34
34
|
/**
|
|
35
35
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
36
|
-
* Example:
|
|
36
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
37
37
|
*
|
|
38
38
|
*/
|
|
39
39
|
"freeformTags"?: {
|
|
@@ -41,7 +41,7 @@ export interface UpdatePathAnalyzerTestDetails {
|
|
|
41
41
|
};
|
|
42
42
|
/**
|
|
43
43
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
44
|
-
* Example:
|
|
44
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
45
45
|
*
|
|
46
46
|
*/
|
|
47
47
|
"definedTags"?: {
|
|
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
export interface UpdatePrivateIpDetails {
|
|
16
16
|
/**
|
|
17
17
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
18
|
-
* Example:
|
|
18
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
19
19
|
*
|
|
20
20
|
*/
|
|
21
21
|
"definedTags"?: {
|
|
@@ -31,7 +31,7 @@ export interface UpdatePrivateIpDetails {
|
|
|
31
31
|
"displayName"?: string;
|
|
32
32
|
/**
|
|
33
33
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
34
|
-
* Example:
|
|
34
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
35
35
|
*
|
|
36
36
|
*/
|
|
37
37
|
"freeformTags"?: {
|
|
@@ -40,7 +40,7 @@ export interface UpdatePrivateIpDetails {
|
|
|
40
40
|
/**
|
|
41
41
|
* The hostname for the private IP. Used for DNS. The value
|
|
42
42
|
* is the hostname portion of the private IP's fully qualified domain name (FQDN)
|
|
43
|
-
* (for example,
|
|
43
|
+
* (for example, {@code bminstance1} in FQDN {@code bminstance1.subnet123.vcn1.oraclevcn.com}).
|
|
44
44
|
* Must be unique across all VNICs in the subnet and comply with
|
|
45
45
|
* [RFC 952](https://tools.ietf.org/html/rfc952) and
|
|
46
46
|
* [RFC 1123](https://tools.ietf.org/html/rfc1123).
|
|
@@ -48,7 +48,7 @@ export interface UpdatePrivateIpDetails {
|
|
|
48
48
|
For more information, see
|
|
49
49
|
* [DNS in Your Virtual Cloud Network](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/dns.htm).
|
|
50
50
|
* <p>
|
|
51
|
-
Example:
|
|
51
|
+
Example: {@code bminstance1}
|
|
52
52
|
*
|
|
53
53
|
*/
|
|
54
54
|
"hostnameLabel"?: string;
|
|
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
export interface UpdatePublicIpDetails {
|
|
16
16
|
/**
|
|
17
17
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
18
|
-
* Example:
|
|
18
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
19
19
|
*
|
|
20
20
|
*/
|
|
21
21
|
"definedTags"?: {
|
|
@@ -31,7 +31,7 @@ export interface UpdatePublicIpDetails {
|
|
|
31
31
|
"displayName"?: string;
|
|
32
32
|
/**
|
|
33
33
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
34
|
-
* Example:
|
|
34
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
35
35
|
*
|
|
36
36
|
*/
|
|
37
37
|
"freeformTags"?: {
|
|
@@ -18,7 +18,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
18
18
|
export interface UpdatePublicIpPoolDetails {
|
|
19
19
|
/**
|
|
20
20
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
21
|
-
* Example:
|
|
21
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
22
22
|
*
|
|
23
23
|
*/
|
|
24
24
|
"definedTags"?: {
|
|
@@ -34,7 +34,7 @@ export interface UpdatePublicIpPoolDetails {
|
|
|
34
34
|
"displayName"?: string;
|
|
35
35
|
/**
|
|
36
36
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
37
|
-
* Example:
|
|
37
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
38
38
|
*
|
|
39
39
|
*/
|
|
40
40
|
"freeformTags"?: {
|
|
@@ -15,7 +15,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
export interface UpdateRemotePeeringConnectionDetails {
|
|
16
16
|
/**
|
|
17
17
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
18
|
-
* Example:
|
|
18
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
19
19
|
*
|
|
20
20
|
*/
|
|
21
21
|
"definedTags"?: {
|
|
@@ -31,7 +31,7 @@ export interface UpdateRemotePeeringConnectionDetails {
|
|
|
31
31
|
"displayName"?: string;
|
|
32
32
|
/**
|
|
33
33
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
34
|
-
* Example:
|
|
34
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
35
35
|
*
|
|
36
36
|
*/
|
|
37
37
|
"freeformTags"?: {
|
|
@@ -16,7 +16,7 @@ import * as model from "../model";
|
|
|
16
16
|
export interface UpdateRouteTableDetails {
|
|
17
17
|
/**
|
|
18
18
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
19
|
-
* Example:
|
|
19
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
20
20
|
*
|
|
21
21
|
*/
|
|
22
22
|
"definedTags"?: {
|
|
@@ -32,7 +32,7 @@ export interface UpdateRouteTableDetails {
|
|
|
32
32
|
"displayName"?: string;
|
|
33
33
|
/**
|
|
34
34
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
35
|
-
* Example:
|
|
35
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
36
36
|
*
|
|
37
37
|
*/
|
|
38
38
|
"freeformTags"?: {
|
|
@@ -16,7 +16,7 @@ import * as model from "../model";
|
|
|
16
16
|
export interface UpdateSecurityListDetails {
|
|
17
17
|
/**
|
|
18
18
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
19
|
-
* Example:
|
|
19
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
20
20
|
*
|
|
21
21
|
*/
|
|
22
22
|
"definedTags"?: {
|
|
@@ -36,7 +36,7 @@ export interface UpdateSecurityListDetails {
|
|
|
36
36
|
"egressSecurityRules"?: Array<model.EgressSecurityRule>;
|
|
37
37
|
/**
|
|
38
38
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
39
|
-
* Example:
|
|
39
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
40
40
|
*
|
|
41
41
|
*/
|
|
42
42
|
"freeformTags"?: {
|
|
@@ -14,7 +14,7 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
14
14
|
*/
|
|
15
15
|
import * as model from "../model";
|
|
16
16
|
/**
|
|
17
|
-
* A rule for allowing inbound (
|
|
17
|
+
* A rule for allowing inbound ({@code direction}= INGRESS) or outbound ({@code direction}= EGRESS) IP packets.
|
|
18
18
|
*
|
|
19
19
|
*/
|
|
20
20
|
export interface UpdateSecurityRuleDetails {
|
|
@@ -29,13 +29,13 @@ export interface UpdateSecurityRuleDetails {
|
|
|
29
29
|
* <p>
|
|
30
30
|
Allowed values:
|
|
31
31
|
* <p>
|
|
32
|
-
* An IP address range in CIDR notation. For example:
|
|
32
|
+
* An IP address range in CIDR notation. For example: {@code 192.168.1.0/24} or {@code 2001:0db8:0123:45::/56}
|
|
33
33
|
* IPv6 addressing is supported for all commercial and government regions. See
|
|
34
34
|
* [IPv6 Addresses](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/ipv6.htm).
|
|
35
35
|
* <p>
|
|
36
|
-
* The
|
|
37
|
-
* setting up a security rule for traffic destined for a particular
|
|
38
|
-
* a service gateway. For example:
|
|
36
|
+
* The {@code cidrBlock} value for a {@link Service}, if you're
|
|
37
|
+
* setting up a security rule for traffic destined for a particular {@code Service} through
|
|
38
|
+
* a service gateway. For example: {@code oci-phx-objectstorage}.
|
|
39
39
|
* <p>
|
|
40
40
|
* The [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a {@link NetworkSecurityGroup} in the same
|
|
41
41
|
* VCN. The value can be the NSG that the rule belongs to if the rule's intent is to control
|
|
@@ -44,24 +44,24 @@ export interface UpdateSecurityRuleDetails {
|
|
|
44
44
|
*/
|
|
45
45
|
"destination"?: string;
|
|
46
46
|
/**
|
|
47
|
-
* Type of destination for the rule. Required if
|
|
47
|
+
* Type of destination for the rule. Required if {@code direction} = {@code EGRESS}.
|
|
48
48
|
* <p>
|
|
49
49
|
Allowed values:
|
|
50
50
|
* <p>
|
|
51
|
-
*
|
|
51
|
+
* {@code CIDR_BLOCK}: If the rule's {@code destination} is an IP address range in CIDR notation.
|
|
52
52
|
* <p>
|
|
53
|
-
*
|
|
53
|
+
* {@code SERVICE_CIDR_BLOCK}: If the rule's {@code destination} is the {@code cidrBlock} value for a
|
|
54
54
|
* {@link Service} (the rule is for traffic destined for a
|
|
55
|
-
* particular
|
|
55
|
+
* particular {@code Service} through a service gateway).
|
|
56
56
|
* <p>
|
|
57
|
-
*
|
|
57
|
+
* {@code NETWORK_SECURITY_GROUP}: If the rule's {@code destination} is the [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a
|
|
58
58
|
* {@link NetworkSecurityGroup}.
|
|
59
59
|
*
|
|
60
60
|
*/
|
|
61
61
|
"destinationType"?: UpdateSecurityRuleDetails.DestinationType;
|
|
62
62
|
/**
|
|
63
|
-
* Direction of the security rule. Set to
|
|
64
|
-
* or
|
|
63
|
+
* Direction of the security rule. Set to {@code EGRESS} for rules to allow outbound IP packets,
|
|
64
|
+
* or {@code INGRESS} for rules to allow inbound IP packets.
|
|
65
65
|
*
|
|
66
66
|
*/
|
|
67
67
|
"direction": UpdateSecurityRuleDetails.Direction;
|
|
@@ -69,7 +69,7 @@ export interface UpdateSecurityRuleDetails {
|
|
|
69
69
|
/**
|
|
70
70
|
* The Oracle-assigned ID of the security rule that you want to update. You can't change this value.
|
|
71
71
|
* <p>
|
|
72
|
-
Example:
|
|
72
|
+
Example: {@code 04ABEC}
|
|
73
73
|
*
|
|
74
74
|
*/
|
|
75
75
|
"id": string;
|
|
@@ -83,7 +83,7 @@ export interface UpdateSecurityRuleDetails {
|
|
|
83
83
|
*/
|
|
84
84
|
"isStateless"?: boolean;
|
|
85
85
|
/**
|
|
86
|
-
* The transport protocol. Specify either
|
|
86
|
+
* The transport protocol. Specify either {@code all} or an IPv4 protocol number as
|
|
87
87
|
* defined in
|
|
88
88
|
* [Protocol Numbers](http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml).
|
|
89
89
|
* Options are supported only for ICMP (\"1\"), TCP (\"6\"), UDP (\"17\"), and ICMPv6 (\"58\").
|
|
@@ -96,13 +96,13 @@ export interface UpdateSecurityRuleDetails {
|
|
|
96
96
|
* <p>
|
|
97
97
|
Allowed values:
|
|
98
98
|
* <p>
|
|
99
|
-
* An IP address range in CIDR notation. For example:
|
|
99
|
+
* An IP address range in CIDR notation. For example: {@code 192.168.1.0/24} or {@code 2001:0db8:0123:45::/56}
|
|
100
100
|
* IPv6 addressing is supported for all commercial and government regions. See
|
|
101
101
|
* [IPv6 Addresses](https://docs.cloud.oracle.com/iaas/Content/Network/Concepts/ipv6.htm).
|
|
102
102
|
* <p>
|
|
103
|
-
* The
|
|
104
|
-
* setting up a security rule for traffic coming from a particular
|
|
105
|
-
* a service gateway. For example:
|
|
103
|
+
* The {@code cidrBlock} value for a {@link Service}, if you're
|
|
104
|
+
* setting up a security rule for traffic coming from a particular {@code Service} through
|
|
105
|
+
* a service gateway. For example: {@code oci-phx-objectstorage}.
|
|
106
106
|
* <p>
|
|
107
107
|
* The [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a {@link NetworkSecurityGroup} in the same
|
|
108
108
|
* VCN. The value can be the NSG that the rule belongs to if the rule's intent is to control
|
|
@@ -111,15 +111,15 @@ export interface UpdateSecurityRuleDetails {
|
|
|
111
111
|
*/
|
|
112
112
|
"source"?: string;
|
|
113
113
|
/**
|
|
114
|
-
* Type of source for the rule. Required if
|
|
114
|
+
* Type of source for the rule. Required if {@code direction} = {@code INGRESS}.
|
|
115
115
|
* <p>
|
|
116
|
-
*
|
|
116
|
+
* {@code CIDR_BLOCK}: If the rule's {@code source} is an IP address range in CIDR notation.
|
|
117
117
|
* <p>
|
|
118
|
-
*
|
|
118
|
+
* {@code SERVICE_CIDR_BLOCK}: If the rule's {@code source} is the {@code cidrBlock} value for a
|
|
119
119
|
* {@link Service} (the rule is for traffic coming from a
|
|
120
|
-
* particular
|
|
120
|
+
* particular {@code Service} through a service gateway).
|
|
121
121
|
* <p>
|
|
122
|
-
*
|
|
122
|
+
* {@code NETWORK_SECURITY_GROUP}: If the rule's {@code source} is the [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of a
|
|
123
123
|
* {@link NetworkSecurityGroup}.
|
|
124
124
|
*
|
|
125
125
|
*/
|
|
@@ -15,16 +15,16 @@ documentation for the [Network Path Analyzer](/iaas/Content/Network/Concepts/pat
|
|
|
15
15
|
import * as model from "../model";
|
|
16
16
|
export interface UpdateServiceGatewayDetails {
|
|
17
17
|
/**
|
|
18
|
-
* Whether the service gateway blocks all traffic through it. The default is
|
|
19
|
-
* this is
|
|
18
|
+
* Whether the service gateway blocks all traffic through it. The default is {@code false}. When
|
|
19
|
+
* this is {@code true}, traffic is not routed to any services, regardless of route rules.
|
|
20
20
|
* <p>
|
|
21
|
-
Example:
|
|
21
|
+
Example: {@code true}
|
|
22
22
|
*
|
|
23
23
|
*/
|
|
24
24
|
"blockTraffic"?: boolean;
|
|
25
25
|
/**
|
|
26
26
|
* Defined tags for this resource. Each key is predefined and scoped to a namespace.
|
|
27
|
-
* Example:
|
|
27
|
+
* Example: {@code {\"foo-namespace\": {\"bar-key\": \"value\"}}}
|
|
28
28
|
*
|
|
29
29
|
*/
|
|
30
30
|
"definedTags"?: {
|
|
@@ -40,7 +40,7 @@ export interface UpdateServiceGatewayDetails {
|
|
|
40
40
|
"displayName"?: string;
|
|
41
41
|
/**
|
|
42
42
|
* Simple key-value pair that is applied without any predefined name, type or scope. Exists for cross-compatibility only.
|
|
43
|
-
* Example:
|
|
43
|
+
* Example: {@code {\"bar-key\": \"value\"}}
|
|
44
44
|
*
|
|
45
45
|
*/
|
|
46
46
|
"freeformTags"?: {
|
|
@@ -54,15 +54,15 @@ export interface UpdateServiceGatewayDetails {
|
|
|
54
54
|
*/
|
|
55
55
|
"routeTableId"?: string;
|
|
56
56
|
/**
|
|
57
|
-
* List of all the
|
|
57
|
+
* List of all the {@code Service} objects you want enabled on this service gateway. Sending an empty list
|
|
58
58
|
* means you want to disable all services. Omitting this parameter entirely keeps the
|
|
59
59
|
* existing list of services intact.
|
|
60
60
|
* <p>
|
|
61
|
-
You can also enable or disable a particular
|
|
61
|
+
You can also enable or disable a particular {@code Service} by using
|
|
62
62
|
* {@link #attachServiceId(AttachServiceIdRequest) attachServiceId} or
|
|
63
63
|
* {@link #detachServiceId(DetachServiceIdRequest) detachServiceId}.
|
|
64
64
|
* <p>
|
|
65
|
-
For each enabled
|
|
65
|
+
For each enabled {@code Service}, make sure there's a route rule with the {@code Service} object's {@code cidrBlock}
|
|
66
66
|
* as the rule's destination and the service gateway as the rule's target. See
|
|
67
67
|
* {@link RouteTable}.
|
|
68
68
|
*
|