#[non_exhaustive]pub struct AssociateFirewallRuleGroupInput {
pub creator_request_id: Option<String>,
pub firewall_rule_group_id: Option<String>,
pub vpc_id: Option<String>,
pub priority: Option<i32>,
pub name: Option<String>,
pub mutation_protection: Option<MutationProtectionStatus>,
pub tags: Option<Vec<Tag>>,
}
Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.creator_request_id: Option<String>
A unique string that identifies the request and that allows failed requests to be retried without the risk of running the operation twice. CreatorRequestId
can be any unique string, for example, a date/time stamp.
firewall_rule_group_id: Option<String>
The unique identifier of the firewall rule group.
vpc_id: Option<String>
The unique identifier of the VPC that you want to associate with the rule group.
priority: Option<i32>
The setting that determines the processing order of the rule group among the rule groups that you associate with the specified VPC. DNS Firewall filters VPC traffic starting from the rule group with the lowest numeric priority setting.
You must specify a unique priority for each rule group that you associate with a single VPC. To make it easier to insert rule groups later, leave space between the numbers, for example, use 101, 200, and so on. You can change the priority setting for a rule group association after you create it.
The allowed values for Priority
are between 100 and 9900.
name: Option<String>
A name that lets you identify the association, to manage and use it.
mutation_protection: Option<MutationProtectionStatus>
If enabled, this setting disallows modification or removal of the association, to help prevent against accidentally altering DNS firewall protections. When you create the association, the default setting is DISABLED
.
A list of the tag keys and values that you want to associate with the rule group association.
Implementations
sourceimpl AssociateFirewallRuleGroupInput
impl AssociateFirewallRuleGroupInput
sourcepub async fn make_operation(
self,
_config: &Config
) -> Result<Operation<AssociateFirewallRuleGroup, AwsErrorRetryPolicy>, BuildError>
pub async fn make_operation(
self,
_config: &Config
) -> Result<Operation<AssociateFirewallRuleGroup, AwsErrorRetryPolicy>, BuildError>
Consumes the builder and constructs an Operation<AssociateFirewallRuleGroup
>
sourcepub fn builder() -> Builder
pub fn builder() -> Builder
Creates a new builder-style object to manufacture AssociateFirewallRuleGroupInput
sourceimpl AssociateFirewallRuleGroupInput
impl AssociateFirewallRuleGroupInput
sourcepub fn creator_request_id(&self) -> Option<&str>
pub fn creator_request_id(&self) -> Option<&str>
A unique string that identifies the request and that allows failed requests to be retried without the risk of running the operation twice. CreatorRequestId
can be any unique string, for example, a date/time stamp.
sourcepub fn firewall_rule_group_id(&self) -> Option<&str>
pub fn firewall_rule_group_id(&self) -> Option<&str>
The unique identifier of the firewall rule group.
sourcepub fn vpc_id(&self) -> Option<&str>
pub fn vpc_id(&self) -> Option<&str>
The unique identifier of the VPC that you want to associate with the rule group.
sourcepub fn priority(&self) -> Option<i32>
pub fn priority(&self) -> Option<i32>
The setting that determines the processing order of the rule group among the rule groups that you associate with the specified VPC. DNS Firewall filters VPC traffic starting from the rule group with the lowest numeric priority setting.
You must specify a unique priority for each rule group that you associate with a single VPC. To make it easier to insert rule groups later, leave space between the numbers, for example, use 101, 200, and so on. You can change the priority setting for a rule group association after you create it.
The allowed values for Priority
are between 100 and 9900.
sourcepub fn name(&self) -> Option<&str>
pub fn name(&self) -> Option<&str>
A name that lets you identify the association, to manage and use it.
sourcepub fn mutation_protection(&self) -> Option<&MutationProtectionStatus>
pub fn mutation_protection(&self) -> Option<&MutationProtectionStatus>
If enabled, this setting disallows modification or removal of the association, to help prevent against accidentally altering DNS firewall protections. When you create the association, the default setting is DISABLED
.
A list of the tag keys and values that you want to associate with the rule group association.
Trait Implementations
sourceimpl Clone for AssociateFirewallRuleGroupInput
impl Clone for AssociateFirewallRuleGroupInput
sourcefn clone(&self) -> AssociateFirewallRuleGroupInput
fn clone(&self) -> AssociateFirewallRuleGroupInput
Returns a copy of the value. Read more
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source
. Read more
sourceimpl PartialEq<AssociateFirewallRuleGroupInput> for AssociateFirewallRuleGroupInput
impl PartialEq<AssociateFirewallRuleGroupInput> for AssociateFirewallRuleGroupInput
sourcefn eq(&self, other: &AssociateFirewallRuleGroupInput) -> bool
fn eq(&self, other: &AssociateFirewallRuleGroupInput) -> bool
This method tests for self
and other
values to be equal, and is used
by ==
. Read more
sourcefn ne(&self, other: &AssociateFirewallRuleGroupInput) -> bool
fn ne(&self, other: &AssociateFirewallRuleGroupInput) -> bool
This method tests for !=
.
impl StructuralPartialEq for AssociateFirewallRuleGroupInput
Auto Trait Implementations
impl RefUnwindSafe for AssociateFirewallRuleGroupInput
impl Send for AssociateFirewallRuleGroupInput
impl Sync for AssociateFirewallRuleGroupInput
impl Unpin for AssociateFirewallRuleGroupInput
impl UnwindSafe for AssociateFirewallRuleGroupInput
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcefn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<T> Instrument for T
impl<T> Instrument for T
sourcefn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
sourcefn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
sourceimpl<T> WithSubscriber for T
impl<T> WithSubscriber for T
sourcefn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
Attaches the provided Subscriber
to this type, returning a
WithDispatch
wrapper. Read more
sourcefn with_current_subscriber(self) -> WithDispatch<Self>
fn with_current_subscriber(self) -> WithDispatch<Self>
Attaches the current default Subscriber
to this type, returning a
WithDispatch
wrapper. Read more