Struct aws_sdk_networkfirewall::types::RulesSourceList
source · #[non_exhaustive]pub struct RulesSourceList {
pub targets: Vec<String>,
pub target_types: Vec<TargetType>,
pub generated_rules_type: GeneratedRulesType,
}
Expand description
Stateful inspection criteria for a domain list rule group.
For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.
By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the HOME_NET
rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see RuleVariables
in this guide and Stateful domain list rule groups in Network Firewall in the Network Firewall Developer Guide.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.targets: Vec<String>
The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:
-
Explicit names. For example,
abc.example.com
matches only the domainabc.example.com
. -
Names that use a domain wildcard, which you indicate with an initial '
.
'. For example,.example.com
matchesexample.com
and matches all subdomains ofexample.com
, such asabc.example.com
andwww.example.com
.
target_types: Vec<TargetType>
The protocols you want to inspect. Specify TLS_SNI
for HTTPS
. Specify HTTP_HOST
for HTTP
. You can specify either or both.
generated_rules_type: GeneratedRulesType
Whether you want to allow or deny access to the domains in your target list.
Implementations§
source§impl RulesSourceList
impl RulesSourceList
sourcepub fn targets(&self) -> &[String]
pub fn targets(&self) -> &[String]
The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:
-
Explicit names. For example,
abc.example.com
matches only the domainabc.example.com
. -
Names that use a domain wildcard, which you indicate with an initial '
.
'. For example,.example.com
matchesexample.com
and matches all subdomains ofexample.com
, such asabc.example.com
andwww.example.com
.
sourcepub fn target_types(&self) -> &[TargetType]
pub fn target_types(&self) -> &[TargetType]
The protocols you want to inspect. Specify TLS_SNI
for HTTPS
. Specify HTTP_HOST
for HTTP
. You can specify either or both.
sourcepub fn generated_rules_type(&self) -> &GeneratedRulesType
pub fn generated_rules_type(&self) -> &GeneratedRulesType
Whether you want to allow or deny access to the domains in your target list.
source§impl RulesSourceList
impl RulesSourceList
sourcepub fn builder() -> RulesSourceListBuilder
pub fn builder() -> RulesSourceListBuilder
Creates a new builder-style object to manufacture RulesSourceList
.
Trait Implementations§
source§impl Clone for RulesSourceList
impl Clone for RulesSourceList
source§fn clone(&self) -> RulesSourceList
fn clone(&self) -> RulesSourceList
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for RulesSourceList
impl Debug for RulesSourceList
source§impl PartialEq for RulesSourceList
impl PartialEq for RulesSourceList
source§fn eq(&self, other: &RulesSourceList) -> bool
fn eq(&self, other: &RulesSourceList) -> bool
self
and other
values to be equal, and is used
by ==
.impl StructuralPartialEq for RulesSourceList
Auto Trait Implementations§
impl Freeze for RulesSourceList
impl RefUnwindSafe for RulesSourceList
impl Send for RulesSourceList
impl Sync for RulesSourceList
impl Unpin for RulesSourceList
impl UnwindSafe for RulesSourceList
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> Instrument for T
impl<T> Instrument for T
source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoEither for T
impl<T> IntoEither for T
source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moresource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more