1<html><body> 2<style> 3 4body, h1, h2, h3, div, span, p, pre, a { 5 margin: 0; 6 padding: 0; 7 border: 0; 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 13} 14 15body { 16 font-size: 13px; 17 padding: 1em; 18} 19 20h1 { 21 font-size: 26px; 22 margin-bottom: 1em; 23} 24 25h2 { 26 font-size: 24px; 27 margin-bottom: 1em; 28} 29 30h3 { 31 font-size: 20px; 32 margin-bottom: 1em; 33 margin-top: 1em; 34} 35 36pre, code { 37 line-height: 1.5; 38 font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace; 39} 40 41pre { 42 margin-top: 0.5em; 43} 44 45h1, h2, h3, p { 46 font-family: Arial, sans serif; 47} 48 49h1, h2, h3 { 50 border-bottom: solid #CCC 1px; 51} 52 53.toc_element { 54 margin-top: 0.5em; 55} 56 57.firstline { 58 margin-left: 2 em; 59} 60 61.method { 62 margin-top: 1em; 63 border: solid 1px #CCC; 64 padding: 1em; 65 background: #EEE; 66} 67 68.details { 69 font-weight: bold; 70 font-size: 14px; 71} 72 73</style> 74 75<h1><a href="appengine_v1beta.html">App Engine Admin API</a> . <a href="appengine_v1beta.apps.html">apps</a> . <a href="appengine_v1beta.apps.firewall.html">firewall</a> . <a href="appengine_v1beta.apps.firewall.ingressRules.html">ingressRules</a></h1> 76<h2>Instance Methods</h2> 77<p class="toc_element"> 78 <code><a href="#batchUpdate">batchUpdate(appsId, body, x__xgafv=None)</a></code></p> 79<p class="firstline">Replaces the entire firewall ruleset in one bulk operation. This overrides and replaces the rules of an existing firewall with the new rules.If the final rule does not match traffic with the '*' wildcard IP range, then an "allow all" rule is explicitly added to the end of the list.</p> 80<p class="toc_element"> 81 <code><a href="#create">create(appsId, body, x__xgafv=None)</a></code></p> 82<p class="firstline">Creates a firewall rule for the application.</p> 83<p class="toc_element"> 84 <code><a href="#delete">delete(appsId, ingressRulesId, x__xgafv=None)</a></code></p> 85<p class="firstline">Deletes the specified firewall rule.</p> 86<p class="toc_element"> 87 <code><a href="#get">get(appsId, ingressRulesId, x__xgafv=None)</a></code></p> 88<p class="firstline">Gets the specified firewall rule.</p> 89<p class="toc_element"> 90 <code><a href="#list">list(appsId, pageSize=None, matchingAddress=None, pageToken=None, x__xgafv=None)</a></code></p> 91<p class="firstline">Lists the firewall rules of an application.</p> 92<p class="toc_element"> 93 <code><a href="#list_next">list_next(previous_request, previous_response)</a></code></p> 94<p class="firstline">Retrieves the next page of results.</p> 95<p class="toc_element"> 96 <code><a href="#patch">patch(appsId, ingressRulesId, body, updateMask=None, x__xgafv=None)</a></code></p> 97<p class="firstline">Updates the specified firewall rule.</p> 98<h3>Method Details</h3> 99<div class="method"> 100 <code class="details" id="batchUpdate">batchUpdate(appsId, body, x__xgafv=None)</code> 101 <pre>Replaces the entire firewall ruleset in one bulk operation. This overrides and replaces the rules of an existing firewall with the new rules.If the final rule does not match traffic with the '*' wildcard IP range, then an "allow all" rule is explicitly added to the end of the list. 102 103Args: 104 appsId: string, Part of `name`. Name of the Firewall collection to set. Example: apps/myapp/firewall/ingressRules. (required) 105 body: object, The request body. (required) 106 The object takes the form of: 107 108{ # Request message for Firewall.BatchUpdateIngressRules. 109 "ingressRules": [ # A list of FirewallRules to replace the existing set. 110 { # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests. 111 "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user. 112 "action": "A String", # The action to take on matched requests. 113 "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32 or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32. 114 "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters. 115 }, 116 ], 117 } 118 119 x__xgafv: string, V1 error format. 120 Allowed values 121 1 - v1 error format 122 2 - v2 error format 123 124Returns: 125 An object of the form: 126 127 { # Response message for Firewall.UpdateAllIngressRules. 128 "ingressRules": [ # The full list of ingress FirewallRules for this application. 129 { # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests. 130 "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user. 131 "action": "A String", # The action to take on matched requests. 132 "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32 or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32. 133 "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters. 134 }, 135 ], 136 }</pre> 137</div> 138 139<div class="method"> 140 <code class="details" id="create">create(appsId, body, x__xgafv=None)</code> 141 <pre>Creates a firewall rule for the application. 142 143Args: 144 appsId: string, Part of `parent`. Name of the parent Firewall collection in which to create a new rule. Example: apps/myapp/firewall/ingressRules. (required) 145 body: object, The request body. (required) 146 The object takes the form of: 147 148{ # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests. 149 "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user. 150 "action": "A String", # The action to take on matched requests. 151 "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32 or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32. 152 "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters. 153} 154 155 x__xgafv: string, V1 error format. 156 Allowed values 157 1 - v1 error format 158 2 - v2 error format 159 160Returns: 161 An object of the form: 162 163 { # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests. 164 "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user. 165 "action": "A String", # The action to take on matched requests. 166 "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32 or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32. 167 "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters. 168 }</pre> 169</div> 170 171<div class="method"> 172 <code class="details" id="delete">delete(appsId, ingressRulesId, x__xgafv=None)</code> 173 <pre>Deletes the specified firewall rule. 174 175Args: 176 appsId: string, Part of `name`. Name of the Firewall resource to delete. Example: apps/myapp/firewall/ingressRules/100. (required) 177 ingressRulesId: string, Part of `name`. See documentation of `appsId`. (required) 178 x__xgafv: string, V1 error format. 179 Allowed values 180 1 - v1 error format 181 2 - v2 error format 182 183Returns: 184 An object of the form: 185 186 { # A generic empty message that you can re-use to avoid defining duplicated empty messages in your APIs. A typical example is to use it as the request or the response type of an API method. For instance: 187 # service Foo { 188 # rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty); 189 # } 190 # The JSON representation for Empty is empty JSON object {}. 191 }</pre> 192</div> 193 194<div class="method"> 195 <code class="details" id="get">get(appsId, ingressRulesId, x__xgafv=None)</code> 196 <pre>Gets the specified firewall rule. 197 198Args: 199 appsId: string, Part of `name`. Name of the Firewall resource to retrieve. Example: apps/myapp/firewall/ingressRules/100. (required) 200 ingressRulesId: string, Part of `name`. See documentation of `appsId`. (required) 201 x__xgafv: string, V1 error format. 202 Allowed values 203 1 - v1 error format 204 2 - v2 error format 205 206Returns: 207 An object of the form: 208 209 { # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests. 210 "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user. 211 "action": "A String", # The action to take on matched requests. 212 "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32 or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32. 213 "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters. 214 }</pre> 215</div> 216 217<div class="method"> 218 <code class="details" id="list">list(appsId, pageSize=None, matchingAddress=None, pageToken=None, x__xgafv=None)</code> 219 <pre>Lists the firewall rules of an application. 220 221Args: 222 appsId: string, Part of `parent`. Name of the Firewall collection to retrieve. Example: apps/myapp/firewall/ingressRules. (required) 223 pageSize: integer, Maximum results to return per page. 224 matchingAddress: string, A valid IP Address. If set, only rules matching this address will be returned. The first returned rule will be the rule that fires on requests from this IP. 225 pageToken: string, Continuation token for fetching the next page of results. 226 x__xgafv: string, V1 error format. 227 Allowed values 228 1 - v1 error format 229 2 - v2 error format 230 231Returns: 232 An object of the form: 233 234 { # Response message for Firewall.ListIngressRules. 235 "nextPageToken": "A String", # Continuation token for fetching the next page of results. 236 "ingressRules": [ # The ingress FirewallRules for this application. 237 { # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests. 238 "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user. 239 "action": "A String", # The action to take on matched requests. 240 "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32 or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32. 241 "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters. 242 }, 243 ], 244 }</pre> 245</div> 246 247<div class="method"> 248 <code class="details" id="list_next">list_next(previous_request, previous_response)</code> 249 <pre>Retrieves the next page of results. 250 251Args: 252 previous_request: The request for the previous page. (required) 253 previous_response: The response from the request for the previous page. (required) 254 255Returns: 256 A request object that you can call 'execute()' on to request the next 257 page. Returns None if there are no more items in the collection. 258 </pre> 259</div> 260 261<div class="method"> 262 <code class="details" id="patch">patch(appsId, ingressRulesId, body, updateMask=None, x__xgafv=None)</code> 263 <pre>Updates the specified firewall rule. 264 265Args: 266 appsId: string, Part of `name`. Name of the Firewall resource to update. Example: apps/myapp/firewall/ingressRules/100. (required) 267 ingressRulesId: string, Part of `name`. See documentation of `appsId`. (required) 268 body: object, The request body. (required) 269 The object takes the form of: 270 271{ # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests. 272 "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user. 273 "action": "A String", # The action to take on matched requests. 274 "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32 or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32. 275 "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters. 276} 277 278 updateMask: string, Standard field mask for the set of fields to be updated. 279 x__xgafv: string, V1 error format. 280 Allowed values 281 1 - v1 error format 282 2 - v2 error format 283 284Returns: 285 An object of the form: 286 287 { # A single firewall rule that is evaluated against incoming traffic and provides an action to take on matched requests. 288 "priority": 42, # A positive integer between 1, Int32.MaxValue-1 that defines the order of rule evaluation. Rules with the lowest priority are evaluated first.A default rule at priority Int32.MaxValue matches all IPv4 and IPv6 traffic when no previous rule matches. Only the action of this rule can be modified by the user. 289 "action": "A String", # The action to take on matched requests. 290 "sourceRange": "A String", # IP address or range, defined using CIDR notation, of requests that this rule applies to. You can use the wildcard character "*" to match all IPs equivalent to "0/0" and "::/0" together. Examples: 192.168.1.1 or 192.168.0.0/16 or 2001:db8::/32 or 2001:0db8:0000:0042:0000:8a2e:0370:7334.<p>Truncation will be silently performed on addresses which are not properly truncated. For example, 1.2.3.4/24 is accepted as the same address as 1.2.3.0/24. Similarly, for IPv6, 2001:db8::1/32 is accepted as the same address as 2001:db8::/32. 291 "description": "A String", # An optional string description of this rule. This field has a maximum length of 100 characters. 292 }</pre> 293</div> 294 295</body></html>