// Copyright 2021 Google LLC. All Rights Reserved.
// 
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
// 
//     http://www.apache.org/licenses/LICENSE-2.0
// 
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// GENERATED BY gen_go_data.go
// gen_go_data -package beta -var YAML_firewall blaze-out/k8-fastbuild/genfiles/cloud/graphite/mmv2/services/google/compute/beta/firewall.yaml

package beta

// blaze-out/k8-fastbuild/genfiles/cloud/graphite/mmv2/services/google/compute/beta/firewall.yaml
var YAML_firewall = []byte("info:\n  title: Compute/Firewall\n  description: DCL Specification for the Compute Firewall resource\n  x-dcl-has-iam: false\npaths:\n  get:\n    description: The function used to get information about a Firewall\n    parameters:\n    - name: Firewall\n      required: true\n      description: A full instance of a Firewall\n  apply:\n    description: The function used to apply information about a Firewall\n    parameters:\n    - name: Firewall\n      required: true\n      description: A full instance of a Firewall\n  delete:\n    description: The function used to delete a Firewall\n    parameters:\n    - name: Firewall\n      required: true\n      description: A full instance of a Firewall\n  deleteAll:\n    description: The function used to delete all Firewall\n    parameters:\n    - name: project\n      required: true\n      schema:\n        type: string\n  list:\n    description: The function used to list information about many Firewall\n    parameters:\n    - name: project\n      required: true\n      schema:\n        type: string\ncomponents:\n  schemas:\n    Firewall:\n      title: Firewall\n      x-dcl-id: projects/{{project}}/global/firewalls/{{name}}\n      x-dcl-locations:\n      - global\n      x-dcl-parent-container: project\n      type: object\n      required:\n      - name\n      - network\n      properties:\n        allowed:\n          type: array\n          x-dcl-go-name: Allowed\n          description: The list of ALLOW rules specified by this firewall. Each rule\n            specifies a protocol and port-range tuple that describes a permitted connection.\n          x-dcl-send-empty: true\n          x-dcl-list-type: set\n          items:\n            type: object\n            x-dcl-go-type: FirewallAllowed\n            required:\n            - ipProtocol\n            properties:\n              ipProtocol:\n                type: string\n                x-dcl-go-name: IPProtocol\n                description: The IP protocol to which this rule applies. The protocol\n                  type is required when creating a firewall rule. This value can either\n                  be one of the following well known protocol strings (`tcp`, `udp`,\n                  `icmp`, `esp`, `ah`, `ipip`, `sctp`) or the IP protocol number.\n              ipProtocolAlt:\n                type: array\n                x-dcl-go-name: IPProtocolAlt\n                description: NO DESCRIPTION FOUND\n                x-dcl-send-empty: true\n                x-dcl-list-type: list\n                items:\n                  type: string\n                  x-dcl-go-type: string\n              ports:\n                type: array\n                x-dcl-go-name: Ports\n                description: 'An optional list of ports to which this rule applies.\n                  This field is only applicable for the UDP or TCP protocol. Each\n                  entry must be either an integer or a range. If not specified, this\n                  rule applies to connections through any port.  Example inputs include:\n                  `[\"22\"]`, `[\"80\",\"443\"]`, and `[\"12345-12349\"]`.'\n                x-dcl-send-empty: true\n                x-dcl-list-type: list\n                items:\n                  type: string\n                  x-dcl-go-type: string\n        creationTimestamp:\n          type: string\n          format: date-time\n          x-dcl-go-name: CreationTimestamp\n          readOnly: true\n          description: Creation timestamp\n          x-kubernetes-immutable: true\n        denied:\n          type: array\n          x-dcl-go-name: Denied\n          description: The list of DENY rules specified by this firewall. Each rule\n            specifies a protocol and port-range tuple that describes a denied connection.\n          x-dcl-send-empty: true\n          x-dcl-list-type: set\n          items:\n            type: object\n            x-dcl-go-type: FirewallDenied\n            required:\n            - ipProtocol\n            properties:\n              ipProtocol:\n                type: string\n                x-dcl-go-name: IPProtocol\n                description: The IP protocol to which this rule applies. The protocol\n                  type is required when creating a firewall rule. This value can either\n                  be one of the following well known protocol strings (`tcp`, `udp`,\n                  `icmp`, `esp`, `ah`, `ipip`, `sctp`) or the IP protocol number.\n              ipProtocolAlt:\n                type: array\n                x-dcl-go-name: IPProtocolAlt\n                description: NO DESCRIPTION FOUND\n                x-dcl-send-empty: true\n                x-dcl-list-type: list\n                items:\n                  type: string\n                  x-dcl-go-type: string\n              ports:\n                type: array\n                x-dcl-go-name: Ports\n                description: 'An optional list of ports to which this rule applies.\n                  This field is only applicable for the UDP or TCP protocol. Each\n                  entry must be either an integer or a range. If not specified, this\n                  rule applies to connections through any port.  Example inputs include:\n                  `[\"22\"]`, `[\"80\",\"443\"]`, and `[\"12345-12349\"]`.'\n                x-dcl-send-empty: true\n                x-dcl-list-type: list\n                items:\n                  type: string\n                  x-dcl-go-type: string\n        description:\n          type: string\n          x-dcl-go-name: Description\n          description: An optional description of this resource. Provide this field\n            when you create the resource.\n          x-kubernetes-immutable: true\n        destinationRanges:\n          type: array\n          x-dcl-go-name: DestinationRanges\n          description: If destination ranges are specified, the firewall rule applies\n            only to traffic that has destination IP address in these ranges. These\n            ranges must be expressed in [CIDR](https://wikipedia.org/wiki/Classless_Inter-Domain_Routing)\n            format. Only IPv4 is supported.\n          x-dcl-server-default: true\n          x-dcl-send-empty: true\n          x-dcl-list-type: set\n          items:\n            type: string\n            x-dcl-go-type: string\n        direction:\n          type: string\n          x-dcl-go-name: Direction\n          x-dcl-go-type: FirewallDirectionEnum\n          description: Direction of traffic to which this firewall applies, either\n            `INGRESS` or `EGRESS`. The default is `INGRESS`. For `INGRESS` traffic,\n            you cannot specify the `destinationRanges` field, and for `EGRESS` traffic,\n            you cannot specify the `sourceRanges` or `sourceTags` fields.\n          x-kubernetes-immutable: true\n          x-dcl-server-default: true\n          enum:\n          - INGRESS\n          - EGRESS\n        disabled:\n          type: boolean\n          x-dcl-go-name: Disabled\n          description: Denotes whether the firewall rule is disabled. When set to\n            true, the firewall rule is not enforced and the network behaves as if\n            it did not exist. If this is unspecified, the firewall rule will be enabled.\n        id:\n          type: string\n          x-dcl-go-name: Id\n          description: '[Output Only] The unique identifier for the resource. This\n            identifier is defined by the server.'\n        logConfig:\n          type: object\n          x-dcl-go-name: LogConfig\n          x-dcl-go-type: FirewallLogConfig\n          description: This field denotes the logging options for a particular firewall\n            rule. If logging is enabled, logs will be exported to Cloud Logging.\n          properties:\n            enable:\n              type: boolean\n              x-dcl-go-name: Enable\n              description: This field denotes whether to enable logging for a particular\n                firewall rule.\n        name:\n          type: string\n          x-dcl-go-name: Name\n          description: Name of the resource; provided by the client when the resource\n            is created. The name must be 1-63 characters long, and comply with [RFC1035](https://www.ietf.org/rfc/rfc1035.txt).\n            Specifically, the name must be 1-63 characters long and match the regular\n            expression `[a-z]([-a-z0-9]*[a-z0-9])?. The first character must be a\n            lowercase letter, and all following characters (except for the last character)\n            must be a dash, lowercase letter, or digit. The last character must be\n            a lowercase letter or digit.\n          x-kubernetes-immutable: true\n        network:\n          type: string\n          x-dcl-go-name: Network\n          description: 'URL of the network resource for this firewall rule. If not\n            specified when creating a firewall rule, the `default` network is used:\n            `global/networks/default` If you choose to specify this field, you can\n            specify the network as a full or partial URL. For example, the following\n            are all valid URLs: `https://www.googleapis.com/compute/v1/projects/myproject/global/networks/my-network`,`projects/myproject/global/networks/my-network`,`global/networks/default`'\n          x-dcl-references:\n          - resource: Compute/Network\n            field: selfLink\n        priority:\n          type: integer\n          format: int64\n          x-dcl-go-name: Priority\n          description: Priority for this rule. This is an integer between `0` and\n            `65535`, both inclusive. The default value is `1000`. Relative priorities\n            determine which rule takes effect if multiple rules apply. Lower values\n            indicate higher priority. For example, a rule with priority `0` has higher\n            precedence than a rule with priority `1`. DENY rules take precedence over\n            ALLOW rules if they have equal priority. Note that VPC networks have [implied](https://cloud.google.com/vpc/docs/firewalls#default_firewall_rules)\n            rules with a priority of `65535`. To avoid conflicts with the implied\n            rules, use a priority number less than `65535`.\n          default: 1000\n        project:\n          type: string\n          x-dcl-go-name: Project\n          description: GCP project associated with this project.\n          x-kubernetes-immutable: true\n          x-dcl-references:\n          - resource: Cloudresourcemanager/Project\n            field: name\n            parent: true\n        selfLink:\n          type: string\n          x-dcl-go-name: SelfLink\n          readOnly: true\n          description: '[Output Only] Server-defined URL for the resource.'\n          x-kubernetes-immutable: true\n        sourceRanges:\n          type: array\n          x-dcl-go-name: SourceRanges\n          description: 'If source ranges are specified, the firewall rule applies\n            only to traffic that has a source IP address in these ranges. These ranges\n            must be expressed in [CIDR](https://wikipedia.org/wiki/Classless_Inter-Domain_Routing)\n            format. One or both of `sourceRanges` and `sourceTags` may be set. If\n            both fields are set, the rule applies to traffic that has a source IP\n            address within `sourceRanges` OR a source IP from a resource with a matching\n            tag listed in the `sourceTags` field. The connection does not need to\n            match both fields for the rule to apply. Only IPv4 is supported. '\n          x-dcl-server-default: true\n          x-dcl-send-empty: true\n          x-dcl-list-type: set\n          items:\n            type: string\n            x-dcl-go-type: string\n        sourceServiceAccounts:\n          type: array\n          x-dcl-go-name: SourceServiceAccounts\n          description: If source service accounts are specified, the firewall rules\n            apply only to traffic originating from an instance with a service account\n            in this list. Source service accounts cannot be used to control traffic\n            to an instance's external IP address because service accounts are associated\n            with an instance, not an IP address. `sourceRanges` can be set at the\n            same time as `sourceServiceAccounts`. If both are set, the firewall applies\n            to traffic that has a source IP address within the `sourceRanges` OR a\n            source IP that belongs to an instance with service account listed in `sourceServiceAccount`.\n            The connection does not need to match both fields for the firewall to\n            apply. `sourceServiceAccounts` cannot be used at the same time as `sourceTags`\n            or `targetTags`.\n          x-dcl-send-empty: true\n          x-dcl-list-type: set\n          items:\n            type: string\n            x-dcl-go-type: string\n        sourceTags:\n          type: array\n          x-dcl-go-name: SourceTags\n          description: 'If source tags are specified, the firewall rule applies only\n            to traffic with source IPs that match the primary network interfaces of\n            VM instances that have the tag and are in the same VPC network. Source\n            tags cannot be used to control traffic to an instance''s external IP address,\n            it only applies to traffic between instances in the same virtual network.\n            Because tags are associated with instances, not IP addresses. One or both\n            of `sourceRanges` and `sourceTags` may be set. If both fields are set,\n            the firewall applies to traffic that has a source IP address within `sourceRanges`\n            OR a source IP from a resource with a matching tag listed in the `sourceTags`\n            field. The connection does not need to match both fields for the firewall\n            to apply. '\n          x-dcl-send-empty: true\n          x-dcl-list-type: set\n          items:\n            type: string\n            x-dcl-go-type: string\n        targetServiceAccounts:\n          type: array\n          x-dcl-go-name: TargetServiceAccounts\n          description: A list of service accounts indicating sets of instances located\n            in the network that may make network connections as specified in `allowed[]`.\n            `targetServiceAccounts` cannot be used at the same time as `targetTags`\n            or `sourceTags`. If neither `targetServiceAccounts` nor `targetTags` are\n            specified, the firewall rule applies to all instances on the specified\n            network.\n          x-dcl-send-empty: true\n          x-dcl-list-type: set\n          items:\n            type: string\n            x-dcl-go-type: string\n        targetTags:\n          type: array\n          x-dcl-go-name: TargetTags\n          description: 'A list of tags that controls which instances the firewall\n            rule applies to. If `targetTags` are specified, then the firewall rule\n            applies only to instances in the VPC network that have one of those tags.\n            If no `targetTags` are specified, the firewall rule applies to all instances\n            on the specified network. '\n          x-dcl-send-empty: true\n          x-dcl-list-type: set\n          items:\n            type: string\n            x-dcl-go-type: string\n")

// 15014 bytes
// MD5: ac6efb394420fa2953496eb68c46557f
