• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1<html><body>
2<style>
3
4body, h1, h2, h3, div, span, p, pre, a {
5  margin: 0;
6  padding: 0;
7  border: 0;
8  font-weight: inherit;
9  font-style: inherit;
10  font-size: 100%;
11  font-family: inherit;
12  vertical-align: baseline;
13}
14
15body {
16  font-size: 13px;
17  padding: 1em;
18}
19
20h1 {
21  font-size: 26px;
22  margin-bottom: 1em;
23}
24
25h2 {
26  font-size: 24px;
27  margin-bottom: 1em;
28}
29
30h3 {
31  font-size: 20px;
32  margin-bottom: 1em;
33  margin-top: 1em;
34}
35
36pre, code {
37  line-height: 1.5;
38  font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39}
40
41pre {
42  margin-top: 0.5em;
43}
44
45h1, h2, h3, p {
46  font-family: Arial, sans serif;
47}
48
49h1, h2, h3 {
50  border-bottom: solid #CCC 1px;
51}
52
53.toc_element {
54  margin-top: 0.5em;
55}
56
57.firstline {
58  margin-left: 2 em;
59}
60
61.method  {
62  margin-top: 1em;
63  border: solid 1px #CCC;
64  padding: 1em;
65  background: #EEE;
66}
67
68.details {
69  font-weight: bold;
70  font-size: 14px;
71}
72
73</style>
74
75<h1><a href="appengine_v1.html">App Engine Admin API</a> . <a href="appengine_v1.apps.html">apps</a> . <a href="appengine_v1.apps.firewall.html">firewall</a> . <a href="appengine_v1.apps.firewall.ingressRules.html">ingressRules</a></h1>
76<h2>Instance Methods</h2>
77<p class="toc_element">
78  <code><a href="#batchUpdate">batchUpdate(appsId, body, x__xgafv=None)</a></code></p>
79<p class="firstline">Replaces the entire firewall ruleset in one bulk operation. This overrides and replaces the rules of an existing firewall with the new rules.If the final rule does not match traffic with the '*' wildcard IP range, then an "allow all" rule is explicitly added to the end of the list.</p>
80<p class="toc_element">
81  <code><a href="#create">create(appsId, body, x__xgafv=None)</a></code></p>
82<p class="firstline">Creates a firewall rule for the application.</p>
83<p class="toc_element">
84  <code><a href="#delete">delete(appsId, ingressRulesId, x__xgafv=None)</a></code></p>
85<p class="firstline">Deletes the specified firewall rule.</p>
86<p class="toc_element">
87  <code><a href="#get">get(appsId, ingressRulesId, x__xgafv=None)</a></code></p>
88<p class="firstline">Gets the specified firewall rule.</p>
89<p class="toc_element">
90  <code><a href="#list">list(appsId, pageSize=None, matchingAddress=None, pageToken=None, x__xgafv=None)</a></code></p>
91<p class="firstline">Lists the firewall rules of an application.</p>
92<p class="toc_element">
93  <code><a href="#list_next">list_next(previous_request, previous_response)</a></code></p>
94<p class="firstline">Retrieves the next page of results.</p>
95<p class="toc_element">
96  <code><a href="#patch">patch(appsId, ingressRulesId, body, updateMask=None, x__xgafv=None)</a></code></p>
97<p class="firstline">Updates the specified firewall rule.</p>
98<h3>Method Details</h3>
99<div class="method">
100    <code class="details" id="batchUpdate">batchUpdate(appsId, body, x__xgafv=None)</code>
101  <pre>Replaces the entire firewall ruleset in one bulk operation. This overrides and replaces the rules of an existing firewall with the new rules.If the final rule does not match traffic with the '*' wildcard IP range, then an "allow all" rule is explicitly added to the end of the list.
102
103Args:
104  appsId: string, Part of `name`. Name of the Firewall collection to set. Example: apps/myapp/firewall/ingressRules. (required)
105  body: object, The request body. (required)
106    The object takes the form of:
107
108{ # Request message for Firewall.BatchUpdateIngressRules.
109    "ingressRules": [ # A list of FirewallRules to replace the existing set.
110      { # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests.
111        "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user.
112        "action": "A String", # The action to take on matched requests.
113        "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32  or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32.
114        "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters.
115      },
116    ],
117  }
118
119  x__xgafv: string, V1 error format.
120    Allowed values
121      1 - v1 error format
122      2 - v2 error format
123
124Returns:
125  An object of the form:
126
127    { # Response message for Firewall.UpdateAllIngressRules.
128    "ingressRules": [ # The full list of ingress FirewallRules for this application.
129      { # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests.
130        "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user.
131        "action": "A String", # The action to take on matched requests.
132        "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32  or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32.
133        "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters.
134      },
135    ],
136  }</pre>
137</div>
138
139<div class="method">
140    <code class="details" id="create">create(appsId, body, x__xgafv=None)</code>
141  <pre>Creates a firewall rule for the application.
142
143Args:
144  appsId: string, Part of `parent`. Name of the parent Firewall collection in which to create a new rule. Example: apps/myapp/firewall/ingressRules. (required)
145  body: object, The request body. (required)
146    The object takes the form of:
147
148{ # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests.
149  "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user.
150  "action": "A String", # The action to take on matched requests.
151  "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32  or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32.
152  "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters.
153}
154
155  x__xgafv: string, V1 error format.
156    Allowed values
157      1 - v1 error format
158      2 - v2 error format
159
160Returns:
161  An object of the form:
162
163    { # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests.
164    "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user.
165    "action": "A String", # The action to take on matched requests.
166    "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32  or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32.
167    "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters.
168  }</pre>
169</div>
170
171<div class="method">
172    <code class="details" id="delete">delete(appsId, ingressRulesId, x__xgafv=None)</code>
173  <pre>Deletes the specified firewall rule.
174
175Args:
176  appsId: string, Part of `name`. Name of the Firewall resource to delete. Example: apps/myapp/firewall/ingressRules/100. (required)
177  ingressRulesId: string, Part of `name`. See documentation of `appsId`. (required)
178  x__xgafv: string, V1 error format.
179    Allowed values
180      1 - v1 error format
181      2 - v2 error format
182
183Returns:
184  An object of the form:
185
186    { # A generic empty message that you can re-use to avoid defining duplicated empty messages in your APIs. A typical example is to use it as the request or the response type of an API method. For instance:
187      # service Foo {
188      #   rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty);
189      # }
190      # The JSON representation for Empty is empty JSON object {}.
191  }</pre>
192</div>
193
194<div class="method">
195    <code class="details" id="get">get(appsId, ingressRulesId, x__xgafv=None)</code>
196  <pre>Gets the specified firewall rule.
197
198Args:
199  appsId: string, Part of `name`. Name of the Firewall resource to retrieve. Example: apps/myapp/firewall/ingressRules/100. (required)
200  ingressRulesId: string, Part of `name`. See documentation of `appsId`. (required)
201  x__xgafv: string, V1 error format.
202    Allowed values
203      1 - v1 error format
204      2 - v2 error format
205
206Returns:
207  An object of the form:
208
209    { # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests.
210    "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user.
211    "action": "A String", # The action to take on matched requests.
212    "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32  or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32.
213    "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters.
214  }</pre>
215</div>
216
217<div class="method">
218    <code class="details" id="list">list(appsId, pageSize=None, matchingAddress=None, pageToken=None, x__xgafv=None)</code>
219  <pre>Lists the firewall rules of an application.
220
221Args:
222  appsId: string, Part of `parent`. Name of the Firewall collection to retrieve. Example: apps/myapp/firewall/ingressRules. (required)
223  pageSize: integer, Maximum results to return per page.
224  matchingAddress: string, A valid IP Address. If set, only rules matching this address will be returned. The first returned rule will be the rule that fires on requests from this IP.
225  pageToken: string, Continuation token for fetching the next page of results.
226  x__xgafv: string, V1 error format.
227    Allowed values
228      1 - v1 error format
229      2 - v2 error format
230
231Returns:
232  An object of the form:
233
234    { # Response message for Firewall.ListIngressRules.
235    "nextPageToken": "A String", # Continuation token for fetching the next page of results.
236    "ingressRules": [ # The ingress FirewallRules for this application.
237      { # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests.
238        "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user.
239        "action": "A String", # The action to take on matched requests.
240        "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32  or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32.
241        "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters.
242      },
243    ],
244  }</pre>
245</div>
246
247<div class="method">
248    <code class="details" id="list_next">list_next(previous_request, previous_response)</code>
249  <pre>Retrieves the next page of results.
250
251Args:
252  previous_request: The request for the previous page. (required)
253  previous_response: The response from the request for the previous page. (required)
254
255Returns:
256  A request object that you can call 'execute()' on to request the next
257  page. Returns None if there are no more items in the collection.
258    </pre>
259</div>
260
261<div class="method">
262    <code class="details" id="patch">patch(appsId, ingressRulesId, body, updateMask=None, x__xgafv=None)</code>
263  <pre>Updates the specified firewall rule.
264
265Args:
266  appsId: string, Part of `name`. Name of the Firewall resource to update. Example: apps/myapp/firewall/ingressRules/100. (required)
267  ingressRulesId: string, Part of `name`. See documentation of `appsId`. (required)
268  body: object, The request body. (required)
269    The object takes the form of:
270
271{ # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests.
272  "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user.
273  "action": "A String", # The action to take on matched requests.
274  "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32  or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32.
275  "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters.
276}
277
278  updateMask: string, Standard field mask for the set of fields to be updated.
279  x__xgafv: string, V1 error format.
280    Allowed values
281      1 - v1 error format
282      2 - v2 error format
283
284Returns:
285  An object of the form:
286
287    { # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests.
288    "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user.
289    "action": "A String", # The action to take on matched requests.
290    "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32  or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32.
291    "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters.
292  }</pre>
293</div>
294
295</body></html>