diff --git a/api-ref/src/wadls/netconn-api/src/common.ent b/api-ref/src/wadls/netconn-api/src/common.ent index c644a2d28..af300a2ef 100644 --- a/api-ref/src/wadls/netconn-api/src/common.ent +++ b/api-ref/src/wadls/netconn-api/src/common.ent @@ -575,78 +575,6 @@ Integer value for the limit of values to return. '> - - - Security group rule object. - - - - Either ingress or egress. - - - - Either IPv4 or IPv6. - - - - The ID for the security group rule. - - - - The maximum port ranges. Set to - null. - - - - The minimum port ranges. Set to - null. - - - - The protocol. Set to null. - - - - The remote group ID. Set to - null. - - - - The remote IP prefix. Set to - null. - - - - The security group ID for the security group with - which the rule is - associated. - - - - The tenant ID. - '> The security group name. - &securityGroupRule; + @@ -163,7 +164,8 @@ The security group name. - &securityGroupRule; + @@ -229,7 +231,8 @@ The security group name. - &securityGroupRule; + @@ -306,39 +309,6 @@ The list provides the unique ID for each security group rule. - - - - - - - - &securityGroupRule; - - - - - - - - - - - - - Creates an OpenStack Networking - security group rule. - @@ -351,6 +321,13 @@ rule is applied to traffic leaving the instance. + + Must be IPv4 or IPv6, + and addresses represented in CIDR must match the ingress or + egress rules. + + + + + + + + + + + + + + + + + + + + Creates an OpenStack Networking + security group rule. + + + + Ingress or + egress: The direction in which the security group + rule is applied. For a compute instance, an + ingress security group rule is applied to incoming + (ingress) traffic for that instance. An egress + rule is applied to traffic leaving the + instance. + + + Must be IPv4 or IPv6, + and addresses represented in CIDR must match the ingress or + egress rules. + + + The security + group ID to associate with this security group + rule. + + + The minimum + port number in the range that is matched by the + security group rule. If the protocol is TCP or + UDP, this value must be less than or equal to the + value of the port_range_max attribute. If the + protocol is ICMP, this value must be an ICMP + type. + + + The maximum + port number in the range that is matched by the + security group rule. The port_range_min attribute + constrains the port_range_max attribute. If the + protocol is ICMP, this value must be an ICMP + type. + + + The protocol + that is matched by the security group rule. Valid + values are null, tcp, udp, and icmp. + + + The remote + group ID to be associated with this security group + rule. You can specify either remote_group_id or + remote_ip_prefix in the request body. + + + The remote + IP prefix to be associated with this security + group rule. You can specify either remote_group_id + or remote_ip_prefix in the request body. This + attribute matches the specified IP prefix as the + source IP address of the IP packet. + + The security group name. - &securityGroupRule; @@ -489,7 +570,78 @@ - &securityGroupRule; + + Ingress or + egress: The direction in which the security group + rule is applied. For a compute instance, an + ingress security group rule is applied to incoming + (ingress) traffic for that instance. An egress + rule is applied to traffic leaving the + instance. + + + Must be IPv4 or IPv6, + and addresses represented in CIDR must match the ingress or + egress rules. + + + The security + group ID to associate with this security group + rule. + + + The minimum + port number in the range that is matched by the + security group rule. If the protocol is TCP or + UDP, this value must be less than or equal to the + value of the port_range_max attribute. If the + protocol is ICMP, this value must be an ICMP + type. + + + The maximum + port number in the range that is matched by the + security group rule. The port_range_min attribute + constrains the port_range_max attribute. If the + protocol is ICMP, this value must be an ICMP + type. + + + The protocol + that is matched by the security group rule. Valid + values are null, tcp, udp, and icmp. + + + The remote + group ID to be associated with this security group + rule. You can specify either remote_group_id or + remote_ip_prefix in the request body. + + + The remote + IP prefix to be associated with this security + group rule. You can specify either remote_group_id + or remote_ip_prefix in the request body. This + attribute matches the specified IP prefix as the + source IP address of the IP packet. + @@ -498,7 +650,7 @@ /> - +