Python SDK
Reference for fastvm. Auto-generated from the OpenAPI spec.
Install
pip install fastvmImport
from fastvm import FastvmClient client = FastvmClient() # reads FASTVM_API_KEY / FASTVM_BASE_URL
Top-level helpers
client.*
client.uploadhelper
Description
Copy a local file or directory into the VM. Uses vms.files.presign
and vms.files.fetch under the hood. Directories are tarred on the
fly before upload and extracted VM-side after fetch.
Streams end-to-end with no intermediate copy to /tmp on the client,
so multi-GB transfers are bounded by VM disk, not RAM. Directory
mode needs the tar binary on the client's PATH (standard on
macOS and Linux; available on modern Windows via bsdtar).
Parameters
vm_idstrrequiredlocal_pathstrrequiredremote_pathstrrequiredfetch_timeout_secint600exec_timeout_secint600Returns
NoneExample
client.upload(vm.id, "./config.toml", "/etc/app.toml") # file client.upload(vm.id, "./src", "/root/src") # directory (tar-streamed)
client.downloadhelper
Description
Copy a file or directory from the VM to the client. Uses
vms.files.presign plus a VM-side exec to classify the path and
stream its contents out. Directories are tarred VM-side and
un-tarred on the client, rooted at ./ so upload and download are
symmetric.
Streams end-to-end with no intermediate copy. Missing paths raise
FileNotFoundError (Python) or FileTransferError with
code: 'ENOENT' (TypeScript).
Parameters
vm_idstrrequiredremote_pathstrrequiredlocal_pathstrrequiredexec_timeout_secint600Returns
NoneExample
client.download(vm.id, "/root/out.log", "./out.log") # file client.download(vm.id, "/var/log", "./log-backup") # directory
client.wait_for_vm_readyhelper
Description
Poll GET /v1/vms/{id} until the VM reaches status == "running" or
a terminal failure status. Same polling logic as vms.launch; use
this when you already have a VM id from vms.list() or another flow.
Parameters
vm_idstrrequiredpoll_intervalfloat2.0timeoutfloat300.0Returns
Example
vm = client.vms.retrieve(some_id) vm = client.wait_for_vm_ready(vm.id, timeout=120)
VMs
client.vms.*
client.vms.list
GET/v1/vmsDescription
List VMs
Parameters
statusVMStatusVMStatus; unknown values return an empty list.Returns
[]client.vms.launchoverride
POST/v1/vmsDescription
Launch a VM and (by default) block until it reaches status == "running".
POST /v1/vms returns 201 for immediately-running VMs and 202 for queued
VMs; the override handles both paths transparently by polling
GET /v1/vms/{id}.
Pass wait=false (TS) / wait=False (Python) to skip polling and
return the raw 201/202 body. Pass snapshot_id / snapshotId to
restore from a snapshot instead of cold-booting.
Terminal failure statuses (error, stopped, deleting) raise
VMLaunchError. Polling-deadline exceeded raises VMNotReadyError.
Parameters
machine_typeMachineType | NoneNonesnapshot_idstr | NoneNonenamestr | NoneNonemetadatadict[str, str] | NoneNonefirewallFirewallPolicy | NoneNonewaitboolTruepoll_intervalfloat2.0wait_timeoutfloat300.0timeoutfloat | httpx.Timeout | NoneNonemax_retriesint0Returns
Example
from fastvm import FastvmClient client = FastvmClient() vm = client.vms.launch(machine_type="c1m2", name="dev") print(vm.id, vm.status) # "running" # Restore from snapshot vm = client.vms.launch(snapshot_id="snp_...") # Skip polling — get the raw 201/202 body vm = client.vms.launch(machine_type="c1m2", wait=False)
client.vms.retrieve
GET/v1/vms/{id}Description
Get a VM
Parameters
idstrrequiredReturns
client.vms.update
PATCH/v1/vms/{id}Description
Update a VM
Parameters
Returns
client.vms.delete
DELETE/v1/vms/{id}Description
Delete a VM
Parameters
idstrrequiredReturns
client.vms.pause
POST/v1/vms/{id}/pauseDescription
Pause a VM
Parameters
idstrrequiredReturns
client.vms.resume
POST/v1/vms/{id}/resumeDescription
Resume a paused VM
Parameters
idstrrequiredReturns
client.vms.refresh_ttl
POST/v1/vms/{id}/ttl/refreshDescription
Reset the VM's TTL cycle
Parameters
idstrrequiredReturns
client.vms.set_firewall
PUT/v1/vms/{id}/firewallDescription
Replace firewall policy
Parameters
Returns
client.vms.patch_firewall
PATCH/v1/vms/{id}/firewallDescription
Patch firewall policy
Parameters
Returns
client.vms.console_token
POST/v1/vms/{id}/console-tokenDescription
Mint a console token
Parameters
idstrrequiredReturns
client.vms.runoverride
POST/v1/vms/{id}/execDescription
Execute a command inside a VM. The override accepts str in addition
to Sequence[str]: plain shell strings are auto-wrapped into
["sh", "-c", "<cmd>"] before hitting the API. Argv-style calls pass
through unchanged.
The wrap guards against Python's silent string-to-chars iteration when
a Sequence[str] parameter is passed a bare string, which would
otherwise produce a nonsensical argv like ["l","s"," ","-","l","a"].
Parameters
idstrrequiredcommandstr | Sequence[str]requiredtimeout_secint | NoneNonemax_retriesint0Returns
Example
# Shell strings work — auto-wrapped into ["sh", "-c", ...] result = client.vms.run(vm.id, command="ls -la /root") # Argv lists pass through unchanged result = client.vms.run(vm.id, command=["python3", "main.py", "--flag"]) print(result.exit_code, result.stdout)
client.vms.streamhelper
Description
Stream exec output as typed events via Accept: application/x-ndjson.
Same endpoint as vms.run (POST /v1/vms/{id}/exec), but the server
emits a newline-delimited stream of ExecEvent objects instead of a
single buffered JSON response. Events are:
"o"— stdout chunk (decoded bytes indata)"e"— stderr chunk (decoded bytes indata)"x"— terminal exit event (exit_code,timed_out,duration_ms)
There is no 4 MiB per-stream cap on output. The HTTP connection stays
open until the command exits or timeout_sec fires server-side. Use
this for long-running processes (builds, test runners, live logs) where
you need incremental output without buffering the entire result.
Shell strings (Python only) are auto-wrapped into ["sh", "-c", ...]
exactly like vms.run.
Parameters
idstrrequiredcommandstr | Sequence[str]requiredtimeout_secint | NoneNoneReturns
Iterator[]Example
from fastvm import FastvmClient, ExecEvent client = FastvmClient() for event in client.vms.stream(vm.id, command="make -j8"): if event.type == "o": sys.stdout.buffer.write(event.data) elif event.type == "e": sys.stderr.buffer.write(event.data) elif event.type == "x": print(f"exit {event.exit_code} in {event.duration_ms} ms")
VMs.Services
client.vms.services.*
client.vms.services.list
GET/v1/vms/{id}/servicesDescription
List service registrations
Parameters
idstrrequiredReturns
[]client.vms.services.register
POST/v1/vms/{id}/servicesDescription
Register a service on a VM
Parameters
idstrrequirednamestrrequiredportintrequiredh2cboolfalseReturns
client.vms.services.update
PUT/v1/vms/{id}/services/{serviceName}Description
Register or update a service on a VM
Parameters
idstrrequiredservice_namestrrequiredportintrequiredh2cboolfalseReturns
client.vms.services.delete
DELETE/v1/vms/{id}/services/{serviceName}Description
Deregister a service from a VM
Parameters
idstrrequiredservice_namestrrequiredVMs.Files
client.vms.files.*
client.vms.files.presign
POST/v1/vms/{id}/files/presignDescription
Mint signed URLs for uploading a file to a VM
Parameters
idstrrequiredpathstrfetchFileToVm). Used only to scope the staging object key; any value server-side is accepted here.requiredReturns
Example
# High-level helpers — handle presign + PUT/GET + fetch + (for dirs) tar # for both file and directory transfers automatically. client.upload(vm.id, "./local/file.txt", "/root/file.txt") client.upload(vm.id, "./local-dir", "/root/remote-dir") client.download(vm.id, "/root/out.log", "./out.log") client.download(vm.id, "/var/log", "./log-backup") # Raw call if you need manual control over the signed-URL flow: presign = client.vms.files.presign(vm.id, path="/root/file.txt")
client.vms.files.fetch
POST/v1/vms/{id}/files/fetchDescription
Fetch a file into a VM from a presigned URL
Parameters
idstrrequiredurlstrdownloadUrl previously returned by POST /v1/vms/{id}/files/presign (URLs from other sources are rejected).requiredpathstrrequiredtimeout_secintReturns
Example
# You usually don't call this directly — client.upload() composes # presign + PUT + fetch in a single call. Use it when you need to # pipe an already-hosted URL (still from /files/presign) into the VM. client.vms.files.fetch(vm.id, url=presign.download_url, path="/root/file.txt")
VMs.Volumes
client.vms.volumes.*
client.vms.volumes.attach
POST/v1/vms/{id}/volumesDescription
Attach a volume to a VM
Parameters
idstrrequiredvolume_idstrrequiredmount_pathstrrequiredread_onlyboolfalseReturns
client.vms.volumes.detach
DELETE/v1/vms/{id}/volumes/{volumeId}Description
Detach a volume from a VM
Parameters
idstrrequiredvolume_idstrrequiredReturns
VMs.Bucket_mounts
client.vms.bucket_mounts.*
client.vms.bucket_mounts.list
GET/v1/vms/{id}/bucket-mountsDescription
List bucket-mounts on a VM
Parameters
idstrrequiredReturns
[]client.vms.bucket_mounts.attach
POST/v1/vms/{id}/bucket-mountsDescription
Attach a customer GCS / S3 bucket to a VM
Parameters
idstrrequiredbucket_uristrgs://<bucket>[/prefix] or s3://<bucket>[/prefix].requiredmount_pathstrrequiredread_onlyboolfalsecredentialsBucketMountCredentialsrequiredReturns
client.vms.bucket_mounts.retrieve
GET/v1/vms/{id}/bucket-mounts/{bucketMountId}Description
Get a bucket-mount
Parameters
idstrrequiredbucket_mount_idstrbm_<22-char-lowercase-hex>), unique per VM.requiredReturns
client.vms.bucket_mounts.rotate
PATCH/v1/vms/{id}/bucket-mounts/{bucketMountId}Description
Rotate bucket-mount credentials in-place
Parameters
idstrrequiredbucket_mount_idstrbm_<22-char-lowercase-hex>), unique per VM.requiredcredentialsBucketMountCredentialsrequiredReturns
client.vms.bucket_mounts.delete
DELETE/v1/vms/{id}/bucket-mounts/{bucketMountId}Description
Detach and delete a bucket-mount
Parameters
idstrrequiredbucket_mount_idstrbm_<22-char-lowercase-hex>), unique per VM.requiredMe.Ssh_keys
client.me.ssh_keys.*
client.me.ssh_keys.list
GET/v1/me/ssh-keysDescription
List the calling user's authorized SSH keys
Returns
client.me.ssh_keys.add
POST/v1/me/ssh-keysDescription
Register an SSH public key for the calling user
Parameters
namestrpublic_keystrssh-ed25519 AAA...). Comments are stripped. Newlines are rejected.requiredReturns
Example
with open(os.path.expanduser("~/.ssh/id_ed25519.pub")) as f: client.me.ssh_keys.add(public_key=f.read(), name="laptop") # then: ssh <vm.id>@ssh.<domain>
client.me.ssh_keys.delete
DELETE/v1/me/ssh-keys/{fingerprint}Description
Remove an authorized SSH key
Parameters
fingerprintstrSHA256:abc...). The base64 hash includes + and / and the prefix has :, so callers MUST URL-encode the value into the path segment. SDKs do this automatically.requiredReturns
Snapshots
client.snapshots.*
client.snapshots.list
GET/v1/snapshotsDescription
List snapshots
Returns
[]client.snapshots.create
POST/v1/snapshotsDescription
Create a snapshot from a VM
Parameters
vm_idstrrequirednamestrsnapshot-<8-char-vmId-prefix> if empty.Returns
client.snapshots.retrieve
GET/v1/snapshots/{id}Description
Get a snapshot
Parameters
idstrrequiredReturns
client.snapshots.update
PATCH/v1/snapshots/{id}Description
Rename a snapshot
Parameters
idstrrequirednamestrReturns
client.snapshots.delete
DELETE/v1/snapshots/{id}Description
Delete a snapshot
Parameters
idstrrequiredReturns
Snapshot_imports
client.snapshot_imports.*
client.snapshot_imports.list
GET/v1/snapshot-importsDescription
List the calling org's snapshot imports
Returns
[]client.snapshot_imports.create
POST/v1/snapshot-importsDescription
Build a snapshot from a Docker / OCI image or a Dockerfile
Parameters
machine_typeMachineTypedisk_gi_bintnamestrsourceSnapshotImportSourceSpecrequiredReturns
Example
# High-level: builds, polls, returns the completed Snapshot. snapshot = await client.build(image_ref="python:3.13-slim") # Dockerfile + context (zipped in-SDK, presigned + PUT, # then snapshot import created): snapshot = await client.build( dockerfile=Path("./Dockerfile").read_text(), context_dir="./my-app", )
client.snapshot_imports.presign_context
POST/v1/snapshot-imports/context-presignDescription
Mint a signed URL for uploading a Dockerfile build-context archive
Parameters
size_bytesint400 when it exceeds the platform-wide cap (the same cap is also enforced by the signed URL itself).Returns
client.snapshot_imports.retrieve
GET/v1/snapshot-imports/{id}Description
Get a snapshot import's state
Parameters
idstrrequiredReturns
client.snapshot_imports.delete
DELETE/v1/snapshot-imports/{id}Description
Delete a terminal snapshot import (cascades to its snapshot)
Parameters
idstrrequiredReturns
client.snapshot_imports.cancel
POST/v1/snapshot-imports/{id}/cancelDescription
Cancel an in-flight snapshot import
Parameters
idstrrequiredReturns
Quotas
client.quotas.*
client.quotas.retrieve
GET/v1/org/quotasDescription
Get org quotas and usage
Returns
Volumes
client.volumes.*
client.volumes.create
POST/v1/volumesDescription
Create a managed volume
Parameters
namestrrequiredsize_gi_bintrequiredaccess_mode"rw" | "ro"requiredReturns
client.volumes.retrieve
GET/v1/volumes/{id}Description
Get a volume
Parameters
idstrvol_<22-char-lowercase-hex>).requiredReturns
client.volumes.update
PATCH/v1/volumes/{id}Description
Update a volume's name, sizeGiB (grow / shrink-if-not-overfull), or accessMode
Parameters
idstrvol_<22-char-lowercase-hex>).requirednamestrsize_gi_bintaccess_mode"rw" | "ro"Returns
client.volumes.delete
DELETE/v1/volumes/{id}Description
Delete a volume
Parameters
idstrvol_<22-char-lowercase-hex>).requiredReturns
client.volumes.list_attachments
GET/v1/volumes/{id}/attachmentsDescription
List VMs currently attached to this volume
Parameters
idstrvol_<22-char-lowercase-hex>).requiredReturns
VolumeAttachmentItemWithVm[]Types
Shared schemas referenced in parameters and return values.
DeleteResponse
objectidstrdeletedboolVMStatus
primitiveprovisioning, running, stopped, pausing, paused, resuming, deleting, error. Terminal failure statuses are error and stopped; transitional values (provisioning, pausing, resuming, deleting) indicate the VM is in flight. Additional values may be introduced in future server versions; clients should treat unknown values as "in transition" rather than as hard errors.SnapshotStatus
primitivecreating, ready, error. Additional values may be introduced in future server versions.MachineType
primitivec1m2, c2m4). Controls CPU and memory allocation. Must be supplied on launch unless restoring from a snapshot.VM
objectidstrnamestrorg_idstrmachine_namestrsource_namestrfirewallFirewallPolicyeffective_firewallunknownfirewall (the user policy) unioned with per-service auto-rules from this VM's registered services. Each auto-rule has source CIDR ::/0 and a description of the form auto: proxy service <name>. The same policy is what the worker firewall actually enforces. Set firewall to mutate; this field is computed per-response from firewall and the current service registry, never persisted.metadataMetadataenv_varsEnvVarspublic_ipv6strcpuintmemory_mi_bintdisk_gi_bintstatusVMStatuscreated_atstrdeleted_atunknownttlunknownTTL for semantics.expires_at_msintrunning (the countdown freezes on pause).ttl_remaining_msintexpiresAtMs on resume.paused_atunknownvolumesVolumeAttachmentItem[]bucket_mountsBucketMount[]Snapshot
objectidstrnamestrorg_idstrvm_idstrfirewallFirewallPolicymetadataMetadataenv_varsEnvVarsservicesSnapshotService[]volumesSnapshotVolumeAttachment[]bucket_mountsSnapshotBucketMountAttachment[]statusSnapshotStatuscreated_atstrPolicyAction
enumallowdenyIngressRuleKind
enumcidr is supported — inbound packets don't carry a domain the worker could match on without TLS interception.cidrEgressRuleKind
enumcidr: match by destination IP/CIDR + port/proto. - fqdn: match by destination domain (resolved through the in-process DNS resolver) + port/proto. Resolved IPs land in a per-rule dynamic nft set; the chain emits one rule per fqdn rule keyed on (set, proto, port). Port/proto enforcement on fqdn rules is honest — the prior kind: domain shape with a shared allow-set silently ignored them. Fqdn values accept an optional leading *. wildcard (e.g. *.example.com). Bare wildcards and non-leading wildcards are rejected. Wildcards match one-or-more labels left of the suffix and do not match the apex (matches DNS wildcard semantics).cidrfqdnDNSMode
enumdns.domains. - allow: allowlist — only listed domains can resolve; any other query returns NXDOMAIN. - deny: blocklist — listed domains return NXDOMAIN; all other queries resolve through the upstream resolver. Default is deny with an empty list, which means "resolve everything" — the safe default that preserves existing behavior when callers omit the dns block.allowdenyIngressRule
objectactionPolicyActionkindIngressRuleKindvaluestr::/0, 10.0.0.0/8). IPv4 and IPv6 CIDRs are both accepted in the schema; L3 enforcement coverage per family is a worker-side concern.protocol"tcp" | "udp" | "any"portsstr443), inclusive range (8080-8090), or any. When protocol is any, ports MUST be any.descriptionstrIngressPolicy
objectdefaultPolicyActionrulesIngressRule[]EgressRule
objectactionPolicyActionkindEgressRuleKindvaluestrkind: cidr, an IPv4 or IPv6 CIDR. For kind: fqdn, a domain name with optional leading *. wildcard. Must be reachable through the dns gate — a fqdn value blocked by dns.mode/dns.domains is rejected at PUT time as a dead rule.protocol"tcp" | "udp" | "any"portsstr443), inclusive range (8080-8090), or any. When protocol is any, ports MUST be any.descriptionstrEgressPolicy
objectdefaultPolicyActionrulesEgressRule[]DNSPolicy
objectmode to deny when missing, domains to [], and blockBypass to false (see normalizeDNSPolicy in scheduler/internal/httpapi/firewall.go).modeDNSModedomainslist[str]block_bypassboolfalse — turning this on breaks workloads that legitimately reach 1.1.1.1 / 8.8.8.8 / etc. on TCP/443 for non-DoH reasons (e.g. services whose data plane lives on a Cloudflare anycast IP). Operators who enable DNS allowlist mode typically also flip this on explicitly.FirewallPolicy
objectfirewall: null on VM create is also valid.SnapshotService
objectPOST /v1/vms (snapshot-restore branch) so the new VM gets the same service registrations the source VM had at snapshot time.namestrportinth2cboolSnapshotImportSourceSpec
objecttype selects which other fields are consumed. The opposite-variant fields must be omitted; mixing them is a 400 at the API boundary.type"image" | "dockerfile"image: pull an existing Docker / OCI image reference. -dockerfile: build a user-supplied Dockerfile against an uploaded build context.
imagestrghcr.io/foo/bar:v1, nginx:1.27, alpine@sha256:…). Required when type=image.platformstr<os>/<arch> (e.g. linux/amd64). Defaults to linux/amd64. Image-variant only.registry_usernamestrtype=image authenticates the OCI pull, type=dockerfile authenticates the FROM pulls performed by buildah inside the sandbox VM.registry_passwordstrregistry_hoststrregistryUsername / registryPassword authenticate against (e.g. docker.io, ghcr.io, 1234.dkr.ecr.us-east-1.amazonaws.com). Required when credentials are set on type=dockerfile: the baker keys the auth.json entry against this host. Tolerated but ignored for type=image (the host is derived from the image reference). Optional port: e.g. registry.example.com:5000.context_refstrPOST /v1/snapshot-imports/context-presign. Required when type=dockerfile. The platform validates that the referenced upload belongs to the calling org and consumes the token on use.dockerfile_pathstrDockerfile. Must not be absolute and must not contain ...build_argsdict--build-arg KEY=VALUE pairs forwarded to the build. Capped at 64 entries, 8 KiB total.targetstr--target selector. Empty means the final stage.SnapshotImportEvent
objectrunning (preparing → network → pull → export → saving → warming).phasestrpreparing, network, pull (image source), fetch_context, build (dockerfile source), export, saving, warming, done.statusstrstarted, completed, failed, skipped, cancelled.timestamp_msintmessagestrSnapshotImportSourceView
objectGET /v1/snapshot-imports/{id}. Strips secrets (registryPassword, raw context object keys) — only fields safe to echo back to the caller appear here.type"image" | "dockerfile"imagestrplatformstrregistry_usernamestrregistry_hoststrdockerfile_pathstrbuild_argsdicttargetstrcontext_size_bytesintSnapshotImportResponse
objectPOST /v1/snapshot-imports (initial pending state), GET /v1/snapshot-imports/{id}, GET /v1/snapshot-imports (in the array elements), and POST /v1/snapshot-imports/{id}/cancel.idstrnamestrsourceSnapshotImportSourceViewstatusstrpending (queued, no worker yet), claimed (worker assigned, dispatch in flight), running (worker executing the pipeline), succeeded / failed / cancelled (terminal).snapshot_idstrstatus is succeeded. Fetch the corresponding Snapshot record via GET /v1/snapshots/{id}.errorstrstatus is failed. User-safe diagnostic.eventsSnapshotImportEvent[]machine_namestrcpuintmemory_mi_bintdisk_gi_bintcreated_atstrstarted_atstrupdated_atstrfinished_atstrContextPresignResponse
objectcontext_refstrsource.contextRef on the subsequent POST /v1/snapshot-imports. Single-use; the create call consumes the entry.upload_urlstrContent-Type: application/zip.expires_in_secintuploadUrl, in seconds.max_upload_bytesintMetadata
objectEnvVars
object[A-Za-z_][A-Za-z0-9_]*); values may not contain newline, carriage return, or null bytes. Total JSON encoding ≤65536 bytes.ExecEvent
objectPOST /v1/vms/{id}/exec under Accept: application/x-ndjson. Short field names (t, d, c, to, ms) keep per-chunk overhead small since high-output commands can produce thousands of events per exec.t"o" | "e" | "x"o = stdout chunk, e = stderr chunk, x = terminal exit event.dstro/e: base64-encoded raw bytes of the chunk. For x: optional diagnostic string (e.g. spawn failure) when non-empty.cintx events only.toboolx events only.msintx events only.ExecVMResponse
objectPOST /v1/vms/{id}/exec under Accept: application/json. The server collects the streamed events and returns this aggregate once the command exits. Per-stream output is capped at 4 MiB; overflow bytes are dropped and signalled via stdoutTruncated / stderrTruncated. Streaming clients (Accept: application/x-ndjson) receive every byte without a cap.exit_codeintstdoutstrstderrstrtimed_outboolstdout_truncatedboolstderr_truncatedboolduration_msintFilePresignResponse
objectuploadUrl, and either side GETs them back via downloadUrl. URLs expire after expiresInSec seconds and the staging object is auto-deleted after about a day.upload_urlstrContent-Type: application/octet-stream. Used by the client on upload, or by the VM (via an exec'd curl -T -) on download.download_urlstrPOST /v1/vms/{id}/files/fetch) on upload, or by the client (via httpx.stream / curl) on download.expires_in_secintmax_upload_bytesintConsoleTokenResponse
objecttokenstrexpires_in_secintwebsocket_pathstrwss://<host><websocketPath>?session=<token>.SshKey
objectnamestrpublic_keystr<type> <base64-blob> — the optional comment is stripped server-side. Supported types: ssh-ed25519, ssh-rsa, ecdsa-sha2-nistp{256,384,521}, plus FIDO2 hardware-backed variants (sk-...@openssh.com).fingerprintstrSHA256:abc.... This is the identifier — matches what ssh-keygen -lf prints and what your ssh client shows on first connect; pass it back as the {fingerprint} path segment to deleteSshKey.created_atstrSshKeyListResponse
objectkeysSshKey[]OrgQuotaValues
objectvcpuintmemory_mi_bintdisk_gi_bintsnapshot_countintvolume_countintvolume_gi_bintOrgQuotaUsage
objectService
objectnamestr<name>--<vmIdHexNoHyphens>.proxy.<stack-domain>.portinth2cboolVolume
objectidstrnamestrorg_idstraccess_modestrrw, ro. Future server versions may introduce additional values.size_gi_bintstatusstrcreating — the substrate-create saga is in flight. Set by the server briefly between the customer's POST /v1/volumes and the worker substrate provisioning; attach attempts are rejected with VOL_NOT_READY until the saga commits. Clients polling immediately after create may observe this state. - ready — substrate is up; attachable. - deleting — cleanup is in progress; not attachable. Future server versions may introduce additional values.pending_size_gi_bintsizeGiB is still the pre-resize value and pendingSizeGiB is the target. Set briefly between PATCH /v1/volumes/{id} and the substrate resize commit. Clients polling immediately after a resize may observe a non-zero value.mounted_countintused_gi_bintcreated_atstrVolumeAttachmentItem
objectvolume_idstrmount_pathstrread_onlyboolmount_statusstrmounted, failed, pending. pending appears on attachments to paused VMs (mount happens on resume) and briefly during in-flight hot-attach.status_messagestrDetachVolumeResponse
objectdetachedboolwarningsDetachWarning[]DetachWarning
objecttypestrack_timeout, guest_unresponsive.messagestrBucketMount
objectidstrvm_idstrbucket_uristrgs://... or s3://...; future schemes may be added.mount_pathstrread_onlyboolmount_statusstrmounted, failed, pending.status_messagestrcreated_atstrSnapshotVolumeAttachment
objectvolume_idstrmount_pathstrread_onlyboolSnapshotBucketMountAttachment
objectbucket_uristrmount_pathstrread_onlyboolHealthResponse
objectstatusstr