pub struct AuthorizeSecurityGroupIngress { /* private fields */ }
Expand description
Fluent builder constructing a request to AuthorizeSecurityGroupIngress
.
Adds the specified inbound (ingress) rules to a security group.
An inbound rule permits instances to receive traffic from the specified IPv4 or IPv6 CIDR address range, or from the instances that are associated with the specified destination security groups. When specifying an inbound rule for your security group in a VPC, the IpPermissions
must include a source for the traffic.
You specify a protocol for each rule (for example, TCP). For TCP and UDP, you must also specify the destination port or port range. For ICMP/ICMPv6, you must also specify the ICMP/ICMPv6 type and code. You can use -1 to mean all types or all codes.
Rule changes are propagated to instances within the security group as quickly as possible. However, a small delay might occur.
For more information about VPC security group quotas, see Amazon VPC quotas.
We are retiring EC2-Classic. We recommend that you migrate from EC2-Classic to a VPC. For more information, see Migrate from EC2-Classic to a VPC in the Amazon Elastic Compute Cloud User Guide.
Implementations
sourceimpl AuthorizeSecurityGroupIngress
impl AuthorizeSecurityGroupIngress
sourcepub async fn customize(
self
) -> Result<CustomizableOperation<AuthorizeSecurityGroupIngress, AwsResponseRetryClassifier>, SdkError<AuthorizeSecurityGroupIngressError>>
pub async fn customize(
self
) -> Result<CustomizableOperation<AuthorizeSecurityGroupIngress, AwsResponseRetryClassifier>, SdkError<AuthorizeSecurityGroupIngressError>>
Consume this builder, creating a customizable operation that can be modified before being sent. The operation’s inner http::Request can be modified as well.
sourcepub async fn send(
self
) -> Result<AuthorizeSecurityGroupIngressOutput, SdkError<AuthorizeSecurityGroupIngressError>>
pub async fn send(
self
) -> Result<AuthorizeSecurityGroupIngressOutput, SdkError<AuthorizeSecurityGroupIngressError>>
Sends the request and returns the response.
If an error occurs, an SdkError
will be returned with additional details that
can be matched against.
By default, any retryable failures will be retried twice. Retry behavior is configurable with the RetryConfig, which can be set when configuring the client.
sourcepub fn cidr_ip(self, input: impl Into<String>) -> Self
pub fn cidr_ip(self, input: impl Into<String>) -> Self
The IPv4 address range, in CIDR format. You can't specify this parameter when specifying a source security group. To specify an IPv6 address range, use a set of IP permissions.
Alternatively, use a set of IP permissions to specify multiple rules and a description for the rule.
sourcepub fn set_cidr_ip(self, input: Option<String>) -> Self
pub fn set_cidr_ip(self, input: Option<String>) -> Self
The IPv4 address range, in CIDR format. You can't specify this parameter when specifying a source security group. To specify an IPv6 address range, use a set of IP permissions.
Alternatively, use a set of IP permissions to specify multiple rules and a description for the rule.
sourcepub fn from_port(self, input: i32) -> Self
pub fn from_port(self, input: i32) -> Self
The start of port range for the TCP and UDP protocols, or an ICMP type number. For the ICMP type number, use -1
to specify all types. If you specify all ICMP types, you must specify all codes.
Alternatively, use a set of IP permissions to specify multiple rules and a description for the rule.
sourcepub fn set_from_port(self, input: Option<i32>) -> Self
pub fn set_from_port(self, input: Option<i32>) -> Self
The start of port range for the TCP and UDP protocols, or an ICMP type number. For the ICMP type number, use -1
to specify all types. If you specify all ICMP types, you must specify all codes.
Alternatively, use a set of IP permissions to specify multiple rules and a description for the rule.
sourcepub fn group_id(self, input: impl Into<String>) -> Self
pub fn group_id(self, input: impl Into<String>) -> Self
The ID of the security group. You must specify either the security group ID or the security group name in the request. For security groups in a nondefault VPC, you must specify the security group ID.
sourcepub fn set_group_id(self, input: Option<String>) -> Self
pub fn set_group_id(self, input: Option<String>) -> Self
The ID of the security group. You must specify either the security group ID or the security group name in the request. For security groups in a nondefault VPC, you must specify the security group ID.
sourcepub fn group_name(self, input: impl Into<String>) -> Self
pub fn group_name(self, input: impl Into<String>) -> Self
[EC2-Classic, default VPC] The name of the security group. You must specify either the security group ID or the security group name in the request. For security groups in a nondefault VPC, you must specify the security group ID.
sourcepub fn set_group_name(self, input: Option<String>) -> Self
pub fn set_group_name(self, input: Option<String>) -> Self
[EC2-Classic, default VPC] The name of the security group. You must specify either the security group ID or the security group name in the request. For security groups in a nondefault VPC, you must specify the security group ID.
sourcepub fn ip_permissions(self, input: IpPermission) -> Self
pub fn ip_permissions(self, input: IpPermission) -> Self
Appends an item to IpPermissions
.
To override the contents of this collection use set_ip_permissions
.
The sets of IP permissions.
sourcepub fn set_ip_permissions(self, input: Option<Vec<IpPermission>>) -> Self
pub fn set_ip_permissions(self, input: Option<Vec<IpPermission>>) -> Self
The sets of IP permissions.
sourcepub fn ip_protocol(self, input: impl Into<String>) -> Self
pub fn ip_protocol(self, input: impl Into<String>) -> Self
The IP protocol name (tcp
, udp
, icmp
) or number (see Protocol Numbers). To specify icmpv6
, use a set of IP permissions.
[VPC only] Use -1
to specify all protocols. If you specify -1
or a protocol other than tcp
, udp
, or icmp
, traffic on all ports is allowed, regardless of any ports you specify.
Alternatively, use a set of IP permissions to specify multiple rules and a description for the rule.
sourcepub fn set_ip_protocol(self, input: Option<String>) -> Self
pub fn set_ip_protocol(self, input: Option<String>) -> Self
The IP protocol name (tcp
, udp
, icmp
) or number (see Protocol Numbers). To specify icmpv6
, use a set of IP permissions.
[VPC only] Use -1
to specify all protocols. If you specify -1
or a protocol other than tcp
, udp
, or icmp
, traffic on all ports is allowed, regardless of any ports you specify.
Alternatively, use a set of IP permissions to specify multiple rules and a description for the rule.
sourcepub fn source_security_group_name(self, input: impl Into<String>) -> Self
pub fn source_security_group_name(self, input: impl Into<String>) -> Self
[EC2-Classic, default VPC] The name of the source security group. You can't specify this parameter in combination with the following parameters: the CIDR IP address range, the start of the port range, the IP protocol, and the end of the port range. Creates rules that grant full ICMP, UDP, and TCP access. To create a rule with a specific IP protocol and port range, use a set of IP permissions instead. For EC2-VPC, the source security group must be in the same VPC.
sourcepub fn set_source_security_group_name(self, input: Option<String>) -> Self
pub fn set_source_security_group_name(self, input: Option<String>) -> Self
[EC2-Classic, default VPC] The name of the source security group. You can't specify this parameter in combination with the following parameters: the CIDR IP address range, the start of the port range, the IP protocol, and the end of the port range. Creates rules that grant full ICMP, UDP, and TCP access. To create a rule with a specific IP protocol and port range, use a set of IP permissions instead. For EC2-VPC, the source security group must be in the same VPC.
sourcepub fn source_security_group_owner_id(self, input: impl Into<String>) -> Self
pub fn source_security_group_owner_id(self, input: impl Into<String>) -> Self
[nondefault VPC] The Amazon Web Services account ID for the source security group, if the source security group is in a different account. You can't specify this parameter in combination with the following parameters: the CIDR IP address range, the IP protocol, the start of the port range, and the end of the port range. Creates rules that grant full ICMP, UDP, and TCP access. To create a rule with a specific IP protocol and port range, use a set of IP permissions instead.
sourcepub fn set_source_security_group_owner_id(self, input: Option<String>) -> Self
pub fn set_source_security_group_owner_id(self, input: Option<String>) -> Self
[nondefault VPC] The Amazon Web Services account ID for the source security group, if the source security group is in a different account. You can't specify this parameter in combination with the following parameters: the CIDR IP address range, the IP protocol, the start of the port range, and the end of the port range. Creates rules that grant full ICMP, UDP, and TCP access. To create a rule with a specific IP protocol and port range, use a set of IP permissions instead.
sourcepub fn to_port(self, input: i32) -> Self
pub fn to_port(self, input: i32) -> Self
The end of port range for the TCP and UDP protocols, or an ICMP code number. For the ICMP code number, use -1
to specify all codes. If you specify all ICMP types, you must specify all codes.
Alternatively, use a set of IP permissions to specify multiple rules and a description for the rule.
sourcepub fn set_to_port(self, input: Option<i32>) -> Self
pub fn set_to_port(self, input: Option<i32>) -> Self
The end of port range for the TCP and UDP protocols, or an ICMP code number. For the ICMP code number, use -1
to specify all codes. If you specify all ICMP types, you must specify all codes.
Alternatively, use a set of IP permissions to specify multiple rules and a description for the rule.
sourcepub fn dry_run(self, input: bool) -> Self
pub fn dry_run(self, input: bool) -> Self
Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation
. Otherwise, it is UnauthorizedOperation
.
sourcepub fn set_dry_run(self, input: Option<bool>) -> Self
pub fn set_dry_run(self, input: Option<bool>) -> Self
Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation
. Otherwise, it is UnauthorizedOperation
.
sourcepub fn tag_specifications(self, input: TagSpecification) -> Self
pub fn tag_specifications(self, input: TagSpecification) -> Self
Appends an item to TagSpecifications
.
To override the contents of this collection use set_tag_specifications
.
[VPC Only] The tags applied to the security group rule.
sourcepub fn set_tag_specifications(self, input: Option<Vec<TagSpecification>>) -> Self
pub fn set_tag_specifications(self, input: Option<Vec<TagSpecification>>) -> Self
[VPC Only] The tags applied to the security group rule.
Trait Implementations
sourceimpl Clone for AuthorizeSecurityGroupIngress
impl Clone for AuthorizeSecurityGroupIngress
sourcefn clone(&self) -> AuthorizeSecurityGroupIngress
fn clone(&self) -> AuthorizeSecurityGroupIngress
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read more