// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
impl super::Client {
/// Constructs a fluent builder for the [`AddIpRoutes`](crate::operation::add_ip_routes::builders::AddIpRoutesFluentBuilder) operation.
///
/// - The fluent builder is configurable:
/// - [`directory_id(impl ::std::convert::Into<String>)`](crate::operation::add_ip_routes::builders::AddIpRoutesFluentBuilder::directory_id) / [`set_directory_id(Option<String>)`](crate::operation::add_ip_routes::builders::AddIpRoutesFluentBuilder::set_directory_id): <p>Identifier (ID) of the directory to which to add the address block.</p>
/// - [`ip_routes(Vec<IpRoute>)`](crate::operation::add_ip_routes::builders::AddIpRoutesFluentBuilder::ip_routes) / [`set_ip_routes(Option<Vec<IpRoute>>)`](crate::operation::add_ip_routes::builders::AddIpRoutesFluentBuilder::set_ip_routes): <p>IP address blocks, using CIDR format, of the traffic to route. This is often the IP address block of the DNS server used for your self-managed domain.</p>
/// - [`update_security_group_for_directory_controllers(bool)`](crate::operation::add_ip_routes::builders::AddIpRoutesFluentBuilder::update_security_group_for_directory_controllers) / [`set_update_security_group_for_directory_controllers(Option<bool>)`](crate::operation::add_ip_routes::builders::AddIpRoutesFluentBuilder::set_update_security_group_for_directory_controllers): <p>If set to true, updates the inbound and outbound rules of the security group that has the description: "Amazon Web Services created security group for <i>directory ID</i> directory controllers." Following are the new rules: </p> <p>Inbound:</p> <ul> <li> <p>Type: Custom UDP Rule, Protocol: UDP, Range: 88, Source: 0.0.0.0/0</p> </li> <li> <p>Type: Custom UDP Rule, Protocol: UDP, Range: 123, Source: 0.0.0.0/0</p> </li> <li> <p>Type: Custom UDP Rule, Protocol: UDP, Range: 138, Source: 0.0.0.0/0</p> </li> <li> <p>Type: Custom UDP Rule, Protocol: UDP, Range: 389, Source: 0.0.0.0/0</p> </li> <li> <p>Type: Custom UDP Rule, Protocol: UDP, Range: 464, Source: 0.0.0.0/0</p> </li> <li> <p>Type: Custom UDP Rule, Protocol: UDP, Range: 445, Source: 0.0.0.0/0</p> </li> <li> <p>Type: Custom TCP Rule, Protocol: TCP, Range: 88, Source: 0.0.0.0/0</p> </li> <li> <p>Type: Custom TCP Rule, Protocol: TCP, Range: 135, Source: 0.0.0.0/0</p> </li> <li> <p>Type: Custom TCP Rule, Protocol: TCP, Range: 445, Source: 0.0.0.0/0</p> </li> <li> <p>Type: Custom TCP Rule, Protocol: TCP, Range: 464, Source: 0.0.0.0/0</p> </li> <li> <p>Type: Custom TCP Rule, Protocol: TCP, Range: 636, Source: 0.0.0.0/0</p> </li> <li> <p>Type: Custom TCP Rule, Protocol: TCP, Range: 1024-65535, Source: 0.0.0.0/0</p> </li> <li> <p>Type: Custom TCP Rule, Protocol: TCP, Range: 3268-33269, Source: 0.0.0.0/0</p> </li> <li> <p>Type: DNS (UDP), Protocol: UDP, Range: 53, Source: 0.0.0.0/0</p> </li> <li> <p>Type: DNS (TCP), Protocol: TCP, Range: 53, Source: 0.0.0.0/0</p> </li> <li> <p>Type: LDAP, Protocol: TCP, Range: 389, Source: 0.0.0.0/0</p> </li> <li> <p>Type: All ICMP, Protocol: All, Range: N/A, Source: 0.0.0.0/0</p> </li> </ul> <p></p> <p>Outbound:</p> <ul> <li> <p>Type: All traffic, Protocol: All, Range: All, Destination: 0.0.0.0/0</p> </li> </ul> <p>These security rules impact an internal network interface that is not exposed publicly.</p>
/// - On success, responds with [`AddIpRoutesOutput`](crate::operation::add_ip_routes::AddIpRoutesOutput)
/// - On failure, responds with [`SdkError<AddIpRoutesError>`](crate::operation::add_ip_routes::AddIpRoutesError)
pub fn add_ip_routes(&self) -> crate::operation::add_ip_routes::builders::AddIpRoutesFluentBuilder {
crate::operation::add_ip_routes::builders::AddIpRoutesFluentBuilder::new(self.handle.clone())
}
}