#[non_exhaustive]pub struct AwsEc2SecurityGroupIpPermission {
pub ip_protocol: Option<String>,
pub from_port: i32,
pub to_port: i32,
pub user_id_group_pairs: Option<Vec<AwsEc2SecurityGroupUserIdGroupPair>>,
pub ip_ranges: Option<Vec<AwsEc2SecurityGroupIpRange>>,
pub ipv6_ranges: Option<Vec<AwsEc2SecurityGroupIpv6Range>>,
pub prefix_list_ids: Option<Vec<AwsEc2SecurityGroupPrefixListId>>,
}Expand description
An IP permission for an EC2 security group.
Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.ip_protocol: Option<String>The IP protocol name (tcp, udp, icmp, icmpv6) or number.
[VPC only] Use -1 to specify all protocols.
When authorizing security group rules, specifying -1 or a protocol number other than tcp, udp, icmp, or icmpv6 allows traffic on all ports, regardless of any port range you specify.
For tcp, udp, and icmp, you must specify a port range.
For icmpv6, the port range is optional. If you omit the port range, traffic for all types and codes is allowed.
from_port: i32The start of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type number.
A value of -1 indicates all ICMP/ICMPv6 types. If you specify all ICMP/ICMPv6 types, you must specify all codes.
to_port: i32The end of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.
A value of -1 indicates all ICMP/ICMPv6 codes. If you specify all ICMP/ICMPv6 types, you must specify all codes.
user_id_group_pairs: Option<Vec<AwsEc2SecurityGroupUserIdGroupPair>>The security group and Amazon Web Services account ID pairs.
ip_ranges: Option<Vec<AwsEc2SecurityGroupIpRange>>The IPv4 ranges.
ipv6_ranges: Option<Vec<AwsEc2SecurityGroupIpv6Range>>The IPv6 ranges.
prefix_list_ids: Option<Vec<AwsEc2SecurityGroupPrefixListId>>[VPC only] The prefix list IDs for an Amazon Web Services service. With outbound rules, this is the Amazon Web Services service to access through a VPC endpoint from instances associated with the security group.
Implementations
The IP protocol name (tcp, udp, icmp, icmpv6) or number.
[VPC only] Use -1 to specify all protocols.
When authorizing security group rules, specifying -1 or a protocol number other than tcp, udp, icmp, or icmpv6 allows traffic on all ports, regardless of any port range you specify.
For tcp, udp, and icmp, you must specify a port range.
For icmpv6, the port range is optional. If you omit the port range, traffic for all types and codes is allowed.
The start of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type number.
A value of -1 indicates all ICMP/ICMPv6 types. If you specify all ICMP/ICMPv6 types, you must specify all codes.
The end of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.
A value of -1 indicates all ICMP/ICMPv6 codes. If you specify all ICMP/ICMPv6 types, you must specify all codes.
The security group and Amazon Web Services account ID pairs.
The IPv6 ranges.
[VPC only] The prefix list IDs for an Amazon Web Services service. With outbound rules, this is the Amazon Web Services service to access through a VPC endpoint from instances associated with the security group.
Creates a new builder-style object to manufacture AwsEc2SecurityGroupIpPermission
Trait Implementations
This method tests for self and other values to be equal, and is used
by ==. Read more
This method tests for !=.
Auto Trait Implementations
impl Send for AwsEc2SecurityGroupIpPermission
impl Sync for AwsEc2SecurityGroupIpPermission
impl Unpin for AwsEc2SecurityGroupIpPermission
Blanket Implementations
Mutably borrows from an owned value. Read more
Attaches the provided Subscriber to this type, returning a
WithDispatch wrapper. Read more
Attaches the current default Subscriber to this type, returning a
WithDispatch wrapper. Read more