#[non_exhaustive]pub struct AddIpRoutesInput {
pub directory_id: Option<String>,
pub ip_routes: Option<Vec<IpRoute>>,
pub update_security_group_for_directory_controllers: Option<bool>,
}Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.directory_id: Option<String>Identifier (ID) of the directory to which to add the address block.
ip_routes: Option<Vec<IpRoute>>IP address blocks, using CIDR format, of the traffic to route. This is often the IP address block of the DNS server used for your self-managed domain.
update_security_group_for_directory_controllers: Option<bool>If set to true, updates the inbound and outbound rules of the security group that has the description: "Amazon Web Services created security group for directory ID directory controllers." Following are the new rules:
Inbound:
-
Type: Custom UDP Rule, Protocol: UDP, Range: 88, Source: 0.0.0.0/0
-
Type: Custom UDP Rule, Protocol: UDP, Range: 123, Source: 0.0.0.0/0
-
Type: Custom UDP Rule, Protocol: UDP, Range: 138, Source: 0.0.0.0/0
-
Type: Custom UDP Rule, Protocol: UDP, Range: 389, Source: 0.0.0.0/0
-
Type: Custom UDP Rule, Protocol: UDP, Range: 464, Source: 0.0.0.0/0
-
Type: Custom UDP Rule, Protocol: UDP, Range: 445, Source: 0.0.0.0/0
-
Type: Custom TCP Rule, Protocol: TCP, Range: 88, Source: 0.0.0.0/0
-
Type: Custom TCP Rule, Protocol: TCP, Range: 135, Source: 0.0.0.0/0
-
Type: Custom TCP Rule, Protocol: TCP, Range: 445, Source: 0.0.0.0/0
-
Type: Custom TCP Rule, Protocol: TCP, Range: 464, Source: 0.0.0.0/0
-
Type: Custom TCP Rule, Protocol: TCP, Range: 636, Source: 0.0.0.0/0
-
Type: Custom TCP Rule, Protocol: TCP, Range: 1024-65535, Source: 0.0.0.0/0
-
Type: Custom TCP Rule, Protocol: TCP, Range: 3268-33269, Source: 0.0.0.0/0
-
Type: DNS (UDP), Protocol: UDP, Range: 53, Source: 0.0.0.0/0
-
Type: DNS (TCP), Protocol: TCP, Range: 53, Source: 0.0.0.0/0
-
Type: LDAP, Protocol: TCP, Range: 389, Source: 0.0.0.0/0
-
Type: All ICMP, Protocol: All, Range: N/A, Source: 0.0.0.0/0
Outbound:
-
Type: All traffic, Protocol: All, Range: All, Destination: 0.0.0.0/0
These security rules impact an internal network interface that is not exposed publicly.
Implementations§
source§impl AddIpRoutesInput
impl AddIpRoutesInput
sourcepub fn directory_id(&self) -> Option<&str>
pub fn directory_id(&self) -> Option<&str>
Identifier (ID) of the directory to which to add the address block.
sourcepub fn ip_routes(&self) -> &[IpRoute]
pub fn ip_routes(&self) -> &[IpRoute]
IP address blocks, using CIDR format, of the traffic to route. This is often the IP address block of the DNS server used for your self-managed domain.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .ip_routes.is_none().
sourcepub fn update_security_group_for_directory_controllers(&self) -> Option<bool>
pub fn update_security_group_for_directory_controllers(&self) -> Option<bool>
If set to true, updates the inbound and outbound rules of the security group that has the description: "Amazon Web Services created security group for directory ID directory controllers." Following are the new rules:
Inbound:
-
Type: Custom UDP Rule, Protocol: UDP, Range: 88, Source: 0.0.0.0/0
-
Type: Custom UDP Rule, Protocol: UDP, Range: 123, Source: 0.0.0.0/0
-
Type: Custom UDP Rule, Protocol: UDP, Range: 138, Source: 0.0.0.0/0
-
Type: Custom UDP Rule, Protocol: UDP, Range: 389, Source: 0.0.0.0/0
-
Type: Custom UDP Rule, Protocol: UDP, Range: 464, Source: 0.0.0.0/0
-
Type: Custom UDP Rule, Protocol: UDP, Range: 445, Source: 0.0.0.0/0
-
Type: Custom TCP Rule, Protocol: TCP, Range: 88, Source: 0.0.0.0/0
-
Type: Custom TCP Rule, Protocol: TCP, Range: 135, Source: 0.0.0.0/0
-
Type: Custom TCP Rule, Protocol: TCP, Range: 445, Source: 0.0.0.0/0
-
Type: Custom TCP Rule, Protocol: TCP, Range: 464, Source: 0.0.0.0/0
-
Type: Custom TCP Rule, Protocol: TCP, Range: 636, Source: 0.0.0.0/0
-
Type: Custom TCP Rule, Protocol: TCP, Range: 1024-65535, Source: 0.0.0.0/0
-
Type: Custom TCP Rule, Protocol: TCP, Range: 3268-33269, Source: 0.0.0.0/0
-
Type: DNS (UDP), Protocol: UDP, Range: 53, Source: 0.0.0.0/0
-
Type: DNS (TCP), Protocol: TCP, Range: 53, Source: 0.0.0.0/0
-
Type: LDAP, Protocol: TCP, Range: 389, Source: 0.0.0.0/0
-
Type: All ICMP, Protocol: All, Range: N/A, Source: 0.0.0.0/0
Outbound:
-
Type: All traffic, Protocol: All, Range: All, Destination: 0.0.0.0/0
These security rules impact an internal network interface that is not exposed publicly.
source§impl AddIpRoutesInput
impl AddIpRoutesInput
sourcepub fn builder() -> AddIpRoutesInputBuilder
pub fn builder() -> AddIpRoutesInputBuilder
Creates a new builder-style object to manufacture AddIpRoutesInput.
Trait Implementations§
source§impl Clone for AddIpRoutesInput
impl Clone for AddIpRoutesInput
source§fn clone(&self) -> AddIpRoutesInput
fn clone(&self) -> AddIpRoutesInput
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read moresource§impl Debug for AddIpRoutesInput
impl Debug for AddIpRoutesInput
source§impl PartialEq for AddIpRoutesInput
impl PartialEq for AddIpRoutesInput
source§fn eq(&self, other: &AddIpRoutesInput) -> bool
fn eq(&self, other: &AddIpRoutesInput) -> bool
self and other values to be equal, and is used
by ==.