#[non_exhaustive]pub struct ModifyVpnTunnelOptionsSpecification {Show 20 fields
pub tunnel_inside_cidr: Option<String>,
pub tunnel_inside_ipv6_cidr: Option<String>,
pub pre_shared_key: Option<String>,
pub phase1_lifetime_seconds: Option<i32>,
pub phase2_lifetime_seconds: Option<i32>,
pub rekey_margin_time_seconds: Option<i32>,
pub rekey_fuzz_percentage: Option<i32>,
pub replay_window_size: Option<i32>,
pub dpd_timeout_seconds: Option<i32>,
pub dpd_timeout_action: Option<String>,
pub phase1_encryption_algorithms: Option<Vec<Phase1EncryptionAlgorithmsRequestListValue>>,
pub phase2_encryption_algorithms: Option<Vec<Phase2EncryptionAlgorithmsRequestListValue>>,
pub phase1_integrity_algorithms: Option<Vec<Phase1IntegrityAlgorithmsRequestListValue>>,
pub phase2_integrity_algorithms: Option<Vec<Phase2IntegrityAlgorithmsRequestListValue>>,
pub phase1_dh_group_numbers: Option<Vec<Phase1DhGroupNumbersRequestListValue>>,
pub phase2_dh_group_numbers: Option<Vec<Phase2DhGroupNumbersRequestListValue>>,
pub ike_versions: Option<Vec<IkeVersionsRequestListValue>>,
pub startup_action: Option<String>,
pub log_options: Option<VpnTunnelLogOptionsSpecification>,
pub enable_tunnel_lifecycle_control: Option<bool>,
}
Expand description
The Amazon Web Services Site-to-Site VPN tunnel options to modify.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.tunnel_inside_cidr: Option<String>
The range of inside IPv4 addresses for the tunnel. Any specified CIDR blocks must be unique across all VPN connections that use the same virtual private gateway.
Constraints: A size /30 CIDR block from the 169.254.0.0/16
range. The following CIDR blocks are reserved and cannot be used:
-
169.254.0.0/30
-
169.254.1.0/30
-
169.254.2.0/30
-
169.254.3.0/30
-
169.254.4.0/30
-
169.254.5.0/30
-
169.254.169.252/30
tunnel_inside_ipv6_cidr: Option<String>
The range of inside IPv6 addresses for the tunnel. Any specified CIDR blocks must be unique across all VPN connections that use the same transit gateway.
Constraints: A size /126 CIDR block from the local fd00::/8
range.
The pre-shared key (PSK) to establish initial authentication between the virtual private gateway and the customer gateway.
Constraints: Allowed characters are alphanumeric characters, periods (.), and underscores (_). Must be between 8 and 64 characters in length and cannot start with zero (0).
phase1_lifetime_seconds: Option<i32>
The lifetime for phase 1 of the IKE negotiation, in seconds.
Constraints: A value between 900 and 28,800.
Default: 28800
phase2_lifetime_seconds: Option<i32>
The lifetime for phase 2 of the IKE negotiation, in seconds.
Constraints: A value between 900 and 3,600. The value must be less than the value for Phase1LifetimeSeconds
.
Default: 3600
rekey_margin_time_seconds: Option<i32>
The margin time, in seconds, before the phase 2 lifetime expires, during which the Amazon Web Services side of the VPN connection performs an IKE rekey. The exact time of the rekey is randomly selected based on the value for RekeyFuzzPercentage
.
Constraints: A value between 60 and half of Phase2LifetimeSeconds
.
Default: 270
rekey_fuzz_percentage: Option<i32>
The percentage of the rekey window (determined by RekeyMarginTimeSeconds
) during which the rekey time is randomly selected.
Constraints: A value between 0 and 100.
Default: 100
replay_window_size: Option<i32>
The number of packets in an IKE replay window.
Constraints: A value between 64 and 2048.
Default: 1024
dpd_timeout_seconds: Option<i32>
The number of seconds after which a DPD timeout occurs. A DPD timeout of 40 seconds means that the VPN endpoint will consider the peer dead 30 seconds after the first failed keep-alive.
Constraints: A value greater than or equal to 30.
Default: 40
dpd_timeout_action: Option<String>
The action to take after DPD timeout occurs. Specify restart
to restart the IKE initiation. Specify clear
to end the IKE session.
Valid Values: clear
| none
| restart
Default: clear
phase1_encryption_algorithms: Option<Vec<Phase1EncryptionAlgorithmsRequestListValue>>
One or more encryption algorithms that are permitted for the VPN tunnel for phase 1 IKE negotiations.
Valid values: AES128
| AES256
| AES128-GCM-16
| AES256-GCM-16
phase2_encryption_algorithms: Option<Vec<Phase2EncryptionAlgorithmsRequestListValue>>
One or more encryption algorithms that are permitted for the VPN tunnel for phase 2 IKE negotiations.
Valid values: AES128
| AES256
| AES128-GCM-16
| AES256-GCM-16
phase1_integrity_algorithms: Option<Vec<Phase1IntegrityAlgorithmsRequestListValue>>
One or more integrity algorithms that are permitted for the VPN tunnel for phase 1 IKE negotiations.
Valid values: SHA1
| SHA2-256
| SHA2-384
| SHA2-512
phase2_integrity_algorithms: Option<Vec<Phase2IntegrityAlgorithmsRequestListValue>>
One or more integrity algorithms that are permitted for the VPN tunnel for phase 2 IKE negotiations.
Valid values: SHA1
| SHA2-256
| SHA2-384
| SHA2-512
phase1_dh_group_numbers: Option<Vec<Phase1DhGroupNumbersRequestListValue>>
One or more Diffie-Hellman group numbers that are permitted for the VPN tunnel for phase 1 IKE negotiations.
Valid values: 2
| 14
| 15
| 16
| 17
| 18
| 19
| 20
| 21
| 22
| 23
| 24
phase2_dh_group_numbers: Option<Vec<Phase2DhGroupNumbersRequestListValue>>
One or more Diffie-Hellman group numbers that are permitted for the VPN tunnel for phase 2 IKE negotiations.
Valid values: 2
| 5
| 14
| 15
| 16
| 17
| 18
| 19
| 20
| 21
| 22
| 23
| 24
ike_versions: Option<Vec<IkeVersionsRequestListValue>>
The IKE versions that are permitted for the VPN tunnel.
Valid values: ikev1
| ikev2
startup_action: Option<String>
The action to take when the establishing the tunnel for the VPN connection. By default, your customer gateway device must initiate the IKE negotiation and bring up the tunnel. Specify start
for Amazon Web Services to initiate the IKE negotiation.
Valid Values: add
| start
Default: add
log_options: Option<VpnTunnelLogOptionsSpecification>
Options for logging VPN tunnel activity.
enable_tunnel_lifecycle_control: Option<bool>
Turn on or off tunnel endpoint lifecycle control feature.
Implementations§
Source§impl ModifyVpnTunnelOptionsSpecification
impl ModifyVpnTunnelOptionsSpecification
Sourcepub fn tunnel_inside_cidr(&self) -> Option<&str>
pub fn tunnel_inside_cidr(&self) -> Option<&str>
The range of inside IPv4 addresses for the tunnel. Any specified CIDR blocks must be unique across all VPN connections that use the same virtual private gateway.
Constraints: A size /30 CIDR block from the 169.254.0.0/16
range. The following CIDR blocks are reserved and cannot be used:
-
169.254.0.0/30
-
169.254.1.0/30
-
169.254.2.0/30
-
169.254.3.0/30
-
169.254.4.0/30
-
169.254.5.0/30
-
169.254.169.252/30
Sourcepub fn tunnel_inside_ipv6_cidr(&self) -> Option<&str>
pub fn tunnel_inside_ipv6_cidr(&self) -> Option<&str>
The range of inside IPv6 addresses for the tunnel. Any specified CIDR blocks must be unique across all VPN connections that use the same transit gateway.
Constraints: A size /126 CIDR block from the local fd00::/8
range.
The pre-shared key (PSK) to establish initial authentication between the virtual private gateway and the customer gateway.
Constraints: Allowed characters are alphanumeric characters, periods (.), and underscores (_). Must be between 8 and 64 characters in length and cannot start with zero (0).
Sourcepub fn phase1_lifetime_seconds(&self) -> Option<i32>
pub fn phase1_lifetime_seconds(&self) -> Option<i32>
The lifetime for phase 1 of the IKE negotiation, in seconds.
Constraints: A value between 900 and 28,800.
Default: 28800
Sourcepub fn phase2_lifetime_seconds(&self) -> Option<i32>
pub fn phase2_lifetime_seconds(&self) -> Option<i32>
The lifetime for phase 2 of the IKE negotiation, in seconds.
Constraints: A value between 900 and 3,600. The value must be less than the value for Phase1LifetimeSeconds
.
Default: 3600
Sourcepub fn rekey_margin_time_seconds(&self) -> Option<i32>
pub fn rekey_margin_time_seconds(&self) -> Option<i32>
The margin time, in seconds, before the phase 2 lifetime expires, during which the Amazon Web Services side of the VPN connection performs an IKE rekey. The exact time of the rekey is randomly selected based on the value for RekeyFuzzPercentage
.
Constraints: A value between 60 and half of Phase2LifetimeSeconds
.
Default: 270
Sourcepub fn rekey_fuzz_percentage(&self) -> Option<i32>
pub fn rekey_fuzz_percentage(&self) -> Option<i32>
The percentage of the rekey window (determined by RekeyMarginTimeSeconds
) during which the rekey time is randomly selected.
Constraints: A value between 0 and 100.
Default: 100
Sourcepub fn replay_window_size(&self) -> Option<i32>
pub fn replay_window_size(&self) -> Option<i32>
The number of packets in an IKE replay window.
Constraints: A value between 64 and 2048.
Default: 1024
Sourcepub fn dpd_timeout_seconds(&self) -> Option<i32>
pub fn dpd_timeout_seconds(&self) -> Option<i32>
The number of seconds after which a DPD timeout occurs. A DPD timeout of 40 seconds means that the VPN endpoint will consider the peer dead 30 seconds after the first failed keep-alive.
Constraints: A value greater than or equal to 30.
Default: 40
Sourcepub fn dpd_timeout_action(&self) -> Option<&str>
pub fn dpd_timeout_action(&self) -> Option<&str>
The action to take after DPD timeout occurs. Specify restart
to restart the IKE initiation. Specify clear
to end the IKE session.
Valid Values: clear
| none
| restart
Default: clear
Sourcepub fn phase1_encryption_algorithms(
&self,
) -> &[Phase1EncryptionAlgorithmsRequestListValue]
pub fn phase1_encryption_algorithms( &self, ) -> &[Phase1EncryptionAlgorithmsRequestListValue]
One or more encryption algorithms that are permitted for the VPN tunnel for phase 1 IKE negotiations.
Valid values: AES128
| AES256
| AES128-GCM-16
| AES256-GCM-16
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .phase1_encryption_algorithms.is_none()
.
Sourcepub fn phase2_encryption_algorithms(
&self,
) -> &[Phase2EncryptionAlgorithmsRequestListValue]
pub fn phase2_encryption_algorithms( &self, ) -> &[Phase2EncryptionAlgorithmsRequestListValue]
One or more encryption algorithms that are permitted for the VPN tunnel for phase 2 IKE negotiations.
Valid values: AES128
| AES256
| AES128-GCM-16
| AES256-GCM-16
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .phase2_encryption_algorithms.is_none()
.
Sourcepub fn phase1_integrity_algorithms(
&self,
) -> &[Phase1IntegrityAlgorithmsRequestListValue]
pub fn phase1_integrity_algorithms( &self, ) -> &[Phase1IntegrityAlgorithmsRequestListValue]
One or more integrity algorithms that are permitted for the VPN tunnel for phase 1 IKE negotiations.
Valid values: SHA1
| SHA2-256
| SHA2-384
| SHA2-512
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .phase1_integrity_algorithms.is_none()
.
Sourcepub fn phase2_integrity_algorithms(
&self,
) -> &[Phase2IntegrityAlgorithmsRequestListValue]
pub fn phase2_integrity_algorithms( &self, ) -> &[Phase2IntegrityAlgorithmsRequestListValue]
One or more integrity algorithms that are permitted for the VPN tunnel for phase 2 IKE negotiations.
Valid values: SHA1
| SHA2-256
| SHA2-384
| SHA2-512
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .phase2_integrity_algorithms.is_none()
.
Sourcepub fn phase1_dh_group_numbers(&self) -> &[Phase1DhGroupNumbersRequestListValue]
pub fn phase1_dh_group_numbers(&self) -> &[Phase1DhGroupNumbersRequestListValue]
One or more Diffie-Hellman group numbers that are permitted for the VPN tunnel for phase 1 IKE negotiations.
Valid values: 2
| 14
| 15
| 16
| 17
| 18
| 19
| 20
| 21
| 22
| 23
| 24
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .phase1_dh_group_numbers.is_none()
.
Sourcepub fn phase2_dh_group_numbers(&self) -> &[Phase2DhGroupNumbersRequestListValue]
pub fn phase2_dh_group_numbers(&self) -> &[Phase2DhGroupNumbersRequestListValue]
One or more Diffie-Hellman group numbers that are permitted for the VPN tunnel for phase 2 IKE negotiations.
Valid values: 2
| 5
| 14
| 15
| 16
| 17
| 18
| 19
| 20
| 21
| 22
| 23
| 24
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .phase2_dh_group_numbers.is_none()
.
Sourcepub fn ike_versions(&self) -> &[IkeVersionsRequestListValue]
pub fn ike_versions(&self) -> &[IkeVersionsRequestListValue]
The IKE versions that are permitted for the VPN tunnel.
Valid values: ikev1
| ikev2
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .ike_versions.is_none()
.
Sourcepub fn startup_action(&self) -> Option<&str>
pub fn startup_action(&self) -> Option<&str>
The action to take when the establishing the tunnel for the VPN connection. By default, your customer gateway device must initiate the IKE negotiation and bring up the tunnel. Specify start
for Amazon Web Services to initiate the IKE negotiation.
Valid Values: add
| start
Default: add
Sourcepub fn log_options(&self) -> Option<&VpnTunnelLogOptionsSpecification>
pub fn log_options(&self) -> Option<&VpnTunnelLogOptionsSpecification>
Options for logging VPN tunnel activity.
Sourcepub fn enable_tunnel_lifecycle_control(&self) -> Option<bool>
pub fn enable_tunnel_lifecycle_control(&self) -> Option<bool>
Turn on or off tunnel endpoint lifecycle control feature.
Source§impl ModifyVpnTunnelOptionsSpecification
impl ModifyVpnTunnelOptionsSpecification
Sourcepub fn builder() -> ModifyVpnTunnelOptionsSpecificationBuilder
pub fn builder() -> ModifyVpnTunnelOptionsSpecificationBuilder
Creates a new builder-style object to manufacture ModifyVpnTunnelOptionsSpecification
.
Trait Implementations§
Source§impl Clone for ModifyVpnTunnelOptionsSpecification
impl Clone for ModifyVpnTunnelOptionsSpecification
Source§fn clone(&self) -> ModifyVpnTunnelOptionsSpecification
fn clone(&self) -> ModifyVpnTunnelOptionsSpecification
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreSource§impl PartialEq for ModifyVpnTunnelOptionsSpecification
impl PartialEq for ModifyVpnTunnelOptionsSpecification
Source§fn eq(&self, other: &ModifyVpnTunnelOptionsSpecification) -> bool
fn eq(&self, other: &ModifyVpnTunnelOptionsSpecification) -> bool
self
and other
values to be equal, and is used by ==
.impl StructuralPartialEq for ModifyVpnTunnelOptionsSpecification
Auto Trait Implementations§
impl Freeze for ModifyVpnTunnelOptionsSpecification
impl RefUnwindSafe for ModifyVpnTunnelOptionsSpecification
impl Send for ModifyVpnTunnelOptionsSpecification
impl Sync for ModifyVpnTunnelOptionsSpecification
impl Unpin for ModifyVpnTunnelOptionsSpecification
impl UnwindSafe for ModifyVpnTunnelOptionsSpecification
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<T> Instrument for T
impl<T> Instrument for T
Source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
Source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moreSource§impl<T> Paint for Twhere
T: ?Sized,
impl<T> Paint for Twhere
T: ?Sized,
Source§fn fg(&self, value: Color) -> Painted<&T>
fn fg(&self, value: Color) -> Painted<&T>
Returns a styled value derived from self
with the foreground set to
value
.
This method should be used rarely. Instead, prefer to use color-specific
builder methods like red()
and
green()
, which have the same functionality but are
pithier.
§Example
Set foreground color to white using fg()
:
use yansi::{Paint, Color};
painted.fg(Color::White);
Set foreground color to white using white()
.
use yansi::Paint;
painted.white();
Source§fn bright_black(&self) -> Painted<&T>
fn bright_black(&self) -> Painted<&T>
Source§fn bright_red(&self) -> Painted<&T>
fn bright_red(&self) -> Painted<&T>
Source§fn bright_green(&self) -> Painted<&T>
fn bright_green(&self) -> Painted<&T>
Source§fn bright_yellow(&self) -> Painted<&T>
fn bright_yellow(&self) -> Painted<&T>
Source§fn bright_blue(&self) -> Painted<&T>
fn bright_blue(&self) -> Painted<&T>
Source§fn bright_magenta(&self) -> Painted<&T>
fn bright_magenta(&self) -> Painted<&T>
Source§fn bright_cyan(&self) -> Painted<&T>
fn bright_cyan(&self) -> Painted<&T>
Source§fn bright_white(&self) -> Painted<&T>
fn bright_white(&self) -> Painted<&T>
Source§fn bg(&self, value: Color) -> Painted<&T>
fn bg(&self, value: Color) -> Painted<&T>
Returns a styled value derived from self
with the background set to
value
.
This method should be used rarely. Instead, prefer to use color-specific
builder methods like on_red()
and
on_green()
, which have the same functionality but
are pithier.
§Example
Set background color to red using fg()
:
use yansi::{Paint, Color};
painted.bg(Color::Red);
Set background color to red using on_red()
.
use yansi::Paint;
painted.on_red();
Source§fn on_primary(&self) -> Painted<&T>
fn on_primary(&self) -> Painted<&T>
Source§fn on_magenta(&self) -> Painted<&T>
fn on_magenta(&self) -> Painted<&T>
Source§fn on_bright_black(&self) -> Painted<&T>
fn on_bright_black(&self) -> Painted<&T>
Source§fn on_bright_red(&self) -> Painted<&T>
fn on_bright_red(&self) -> Painted<&T>
Source§fn on_bright_green(&self) -> Painted<&T>
fn on_bright_green(&self) -> Painted<&T>
Source§fn on_bright_yellow(&self) -> Painted<&T>
fn on_bright_yellow(&self) -> Painted<&T>
Source§fn on_bright_blue(&self) -> Painted<&T>
fn on_bright_blue(&self) -> Painted<&T>
Source§fn on_bright_magenta(&self) -> Painted<&T>
fn on_bright_magenta(&self) -> Painted<&T>
Source§fn on_bright_cyan(&self) -> Painted<&T>
fn on_bright_cyan(&self) -> Painted<&T>
Source§fn on_bright_white(&self) -> Painted<&T>
fn on_bright_white(&self) -> Painted<&T>
Source§fn attr(&self, value: Attribute) -> Painted<&T>
fn attr(&self, value: Attribute) -> Painted<&T>
Enables the styling Attribute
value
.
This method should be used rarely. Instead, prefer to use
attribute-specific builder methods like bold()
and
underline()
, which have the same functionality
but are pithier.
§Example
Make text bold using attr()
:
use yansi::{Paint, Attribute};
painted.attr(Attribute::Bold);
Make text bold using using bold()
.
use yansi::Paint;
painted.bold();
Source§fn rapid_blink(&self) -> Painted<&T>
fn rapid_blink(&self) -> Painted<&T>
Source§fn quirk(&self, value: Quirk) -> Painted<&T>
fn quirk(&self, value: Quirk) -> Painted<&T>
Enables the yansi
Quirk
value
.
This method should be used rarely. Instead, prefer to use quirk-specific
builder methods like mask()
and
wrap()
, which have the same functionality but are
pithier.
§Example
Enable wrapping using .quirk()
:
use yansi::{Paint, Quirk};
painted.quirk(Quirk::Wrap);
Enable wrapping using wrap()
.
use yansi::Paint;
painted.wrap();
Source§fn clear(&self) -> Painted<&T>
👎Deprecated since 1.0.1: renamed to resetting()
due to conflicts with Vec::clear()
.
The clear()
method will be removed in a future release.
fn clear(&self) -> Painted<&T>
resetting()
due to conflicts with Vec::clear()
.
The clear()
method will be removed in a future release.Source§fn whenever(&self, value: Condition) -> Painted<&T>
fn whenever(&self, value: Condition) -> Painted<&T>
Conditionally enable styling based on whether the Condition
value
applies. Replaces any previous condition.
See the crate level docs for more details.
§Example
Enable styling painted
only when both stdout
and stderr
are TTYs:
use yansi::{Paint, Condition};
painted.red().on_yellow().whenever(Condition::STDOUTERR_ARE_TTY);