Struct aws_sdk_route53resolver::operation::associate_firewall_rule_group::AssociateFirewallRuleGroupInput
source · #[non_exhaustive]pub struct AssociateFirewallRuleGroupInput {
pub creator_request_id: Option<String>,
pub firewall_rule_group_id: Option<String>,
pub vpc_id: Option<String>,
pub priority: Option<i32>,
pub name: Option<String>,
pub mutation_protection: Option<MutationProtectionStatus>,
pub tags: Option<Vec<Tag>>,
}
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.creator_request_id: Option<String>
A unique string that identifies the request and that allows failed requests to be retried without the risk of running the operation twice. CreatorRequestId
can be any unique string, for example, a date/time stamp.
firewall_rule_group_id: Option<String>
The unique identifier of the firewall rule group.
vpc_id: Option<String>
The unique identifier of the VPC that you want to associate with the rule group.
priority: Option<i32>
The setting that determines the processing order of the rule group among the rule groups that you associate with the specified VPC. DNS Firewall filters VPC traffic starting from the rule group with the lowest numeric priority setting.
You must specify a unique priority for each rule group that you associate with a single VPC. To make it easier to insert rule groups later, leave space between the numbers, for example, use 101, 200, and so on. You can change the priority setting for a rule group association after you create it.
The allowed values for Priority
are between 100 and 9900.
name: Option<String>
A name that lets you identify the association, to manage and use it.
mutation_protection: Option<MutationProtectionStatus>
If enabled, this setting disallows modification or removal of the association, to help prevent against accidentally altering DNS firewall protections. When you create the association, the default setting is DISABLED
.
A list of the tag keys and values that you want to associate with the rule group association.
Implementations§
source§impl AssociateFirewallRuleGroupInput
impl AssociateFirewallRuleGroupInput
sourcepub fn creator_request_id(&self) -> Option<&str>
pub fn creator_request_id(&self) -> Option<&str>
A unique string that identifies the request and that allows failed requests to be retried without the risk of running the operation twice. CreatorRequestId
can be any unique string, for example, a date/time stamp.
sourcepub fn firewall_rule_group_id(&self) -> Option<&str>
pub fn firewall_rule_group_id(&self) -> Option<&str>
The unique identifier of the firewall rule group.
sourcepub fn vpc_id(&self) -> Option<&str>
pub fn vpc_id(&self) -> Option<&str>
The unique identifier of the VPC that you want to associate with the rule group.
sourcepub fn priority(&self) -> Option<i32>
pub fn priority(&self) -> Option<i32>
The setting that determines the processing order of the rule group among the rule groups that you associate with the specified VPC. DNS Firewall filters VPC traffic starting from the rule group with the lowest numeric priority setting.
You must specify a unique priority for each rule group that you associate with a single VPC. To make it easier to insert rule groups later, leave space between the numbers, for example, use 101, 200, and so on. You can change the priority setting for a rule group association after you create it.
The allowed values for Priority
are between 100 and 9900.
sourcepub fn name(&self) -> Option<&str>
pub fn name(&self) -> Option<&str>
A name that lets you identify the association, to manage and use it.
sourcepub fn mutation_protection(&self) -> Option<&MutationProtectionStatus>
pub fn mutation_protection(&self) -> Option<&MutationProtectionStatus>
If enabled, this setting disallows modification or removal of the association, to help prevent against accidentally altering DNS firewall protections. When you create the association, the default setting is DISABLED
.
A list of the tag keys and values that you want to associate with the rule group association.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .tags.is_none()
.
source§impl AssociateFirewallRuleGroupInput
impl AssociateFirewallRuleGroupInput
sourcepub fn builder() -> AssociateFirewallRuleGroupInputBuilder
pub fn builder() -> AssociateFirewallRuleGroupInputBuilder
Creates a new builder-style object to manufacture AssociateFirewallRuleGroupInput
.
Trait Implementations§
source§impl Clone for AssociateFirewallRuleGroupInput
impl Clone for AssociateFirewallRuleGroupInput
source§fn clone(&self) -> AssociateFirewallRuleGroupInput
fn clone(&self) -> AssociateFirewallRuleGroupInput
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl PartialEq for AssociateFirewallRuleGroupInput
impl PartialEq for AssociateFirewallRuleGroupInput
source§fn eq(&self, other: &AssociateFirewallRuleGroupInput) -> bool
fn eq(&self, other: &AssociateFirewallRuleGroupInput) -> bool
self
and other
values to be equal, and is used
by ==
.impl StructuralPartialEq for AssociateFirewallRuleGroupInput
Auto Trait Implementations§
impl Freeze for AssociateFirewallRuleGroupInput
impl RefUnwindSafe for AssociateFirewallRuleGroupInput
impl Send for AssociateFirewallRuleGroupInput
impl Sync for AssociateFirewallRuleGroupInput
impl Unpin for AssociateFirewallRuleGroupInput
impl UnwindSafe for AssociateFirewallRuleGroupInput
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> Instrument for T
impl<T> Instrument for T
source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoEither for T
impl<T> IntoEither for T
source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moresource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more