#[non_exhaustive]
pub struct AwsEc2SecurityGroupIpPermission { pub ip_protocol: Option<String>, pub from_port: Option<i32>, pub to_port: Option<i32>, pub user_id_group_pairs: Option<Vec<AwsEc2SecurityGroupUserIdGroupPair>>, pub ip_ranges: Option<Vec<AwsEc2SecurityGroupIpRange>>, pub ipv6_ranges: Option<Vec<AwsEc2SecurityGroupIpv6Range>>, pub prefix_list_ids: Option<Vec<AwsEc2SecurityGroupPrefixListId>>, }
Expand description

An IP permission for an EC2 security group.

Fields (Non-exhaustive)§

This struct is marked as non-exhaustive
Non-exhaustive structs could have additional fields added in future. Therefore, non-exhaustive structs cannot be constructed in external crates using the traditional Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.
§ip_protocol: Option<String>

The IP protocol name (tcp, udp, icmp, icmpv6) or number.

[VPC only] Use -1 to specify all protocols.

When authorizing security group rules, specifying -1 or a protocol number other than tcp, udp, icmp, or icmpv6 allows traffic on all ports, regardless of any port range you specify.

For tcp, udp, and icmp, you must specify a port range.

For icmpv6, the port range is optional. If you omit the port range, traffic for all types and codes is allowed.

§from_port: Option<i32>

The start of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type number.

A value of -1 indicates all ICMP/ICMPv6 types. If you specify all ICMP/ICMPv6 types, you must specify all codes.

§to_port: Option<i32>

The end of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.

A value of -1 indicates all ICMP/ICMPv6 codes. If you specify all ICMP/ICMPv6 types, you must specify all codes.

§user_id_group_pairs: Option<Vec<AwsEc2SecurityGroupUserIdGroupPair>>

The security group and Amazon Web Services account ID pairs.

§ip_ranges: Option<Vec<AwsEc2SecurityGroupIpRange>>

The IPv4 ranges.

§ipv6_ranges: Option<Vec<AwsEc2SecurityGroupIpv6Range>>

The IPv6 ranges.

§prefix_list_ids: Option<Vec<AwsEc2SecurityGroupPrefixListId>>

[VPC only] The prefix list IDs for an Amazon Web Services service. With outbound rules, this is the Amazon Web Services service to access through a VPC endpoint from instances associated with the security group.

Implementations§

source§

impl AwsEc2SecurityGroupIpPermission

source

pub fn ip_protocol(&self) -> Option<&str>

The IP protocol name (tcp, udp, icmp, icmpv6) or number.

[VPC only] Use -1 to specify all protocols.

When authorizing security group rules, specifying -1 or a protocol number other than tcp, udp, icmp, or icmpv6 allows traffic on all ports, regardless of any port range you specify.

For tcp, udp, and icmp, you must specify a port range.

For icmpv6, the port range is optional. If you omit the port range, traffic for all types and codes is allowed.

source

pub fn from_port(&self) -> Option<i32>

The start of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type number.

A value of -1 indicates all ICMP/ICMPv6 types. If you specify all ICMP/ICMPv6 types, you must specify all codes.

source

pub fn to_port(&self) -> Option<i32>

The end of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.

A value of -1 indicates all ICMP/ICMPv6 codes. If you specify all ICMP/ICMPv6 types, you must specify all codes.

source

pub fn user_id_group_pairs(&self) -> &[AwsEc2SecurityGroupUserIdGroupPair]

The security group and Amazon Web Services account ID pairs.

If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .user_id_group_pairs.is_none().

source

pub fn ip_ranges(&self) -> &[AwsEc2SecurityGroupIpRange]

The IPv4 ranges.

If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .ip_ranges.is_none().

source

pub fn ipv6_ranges(&self) -> &[AwsEc2SecurityGroupIpv6Range]

The IPv6 ranges.

If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .ipv6_ranges.is_none().

source

pub fn prefix_list_ids(&self) -> &[AwsEc2SecurityGroupPrefixListId]

[VPC only] The prefix list IDs for an Amazon Web Services service. With outbound rules, this is the Amazon Web Services service to access through a VPC endpoint from instances associated with the security group.

If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .prefix_list_ids.is_none().

source§

impl AwsEc2SecurityGroupIpPermission

source

pub fn builder() -> AwsEc2SecurityGroupIpPermissionBuilder

Creates a new builder-style object to manufacture AwsEc2SecurityGroupIpPermission.

Trait Implementations§

source§

impl Clone for AwsEc2SecurityGroupIpPermission

source§

fn clone(&self) -> AwsEc2SecurityGroupIpPermission

Returns a copy of the value. Read more
1.0.0 · source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
source§

impl Debug for AwsEc2SecurityGroupIpPermission

source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
source§

impl PartialEq for AwsEc2SecurityGroupIpPermission

source§

fn eq(&self, other: &AwsEc2SecurityGroupIpPermission) -> bool

This method tests for self and other values to be equal, and is used by ==.
1.0.0 · source§

fn ne(&self, other: &Rhs) -> bool

This method tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
source§

impl StructuralPartialEq for AwsEc2SecurityGroupIpPermission

Auto Trait Implementations§

Blanket Implementations§

source§

impl<T> Any for T
where T: 'static + ?Sized,

source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
source§

impl<T> Borrow<T> for T
where T: ?Sized,

source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
source§

impl<T> From<T> for T

source§

fn from(t: T) -> T

Returns the argument unchanged.

source§

impl<T> Instrument for T

source§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided Span, returning an Instrumented wrapper. Read more
source§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
source§

impl<T, U> Into<U> for T
where U: From<T>,

source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

source§

impl<Unshared, Shared> IntoShared<Shared> for Unshared
where Shared: FromUnshared<Unshared>,

source§

fn into_shared(self) -> Shared

Creates a shared type from an unshared type.
source§

impl<T> Same for T

§

type Output = T

Should always be Self
source§

impl<T> ToOwned for T
where T: Clone,

§

type Owned = T

The resulting type after obtaining ownership.
source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

§

type Error = Infallible

The type returned in the event of a conversion error.
source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
source§

impl<T> WithSubscriber for T

source§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>
where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a WithDispatch wrapper. Read more
source§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a WithDispatch wrapper. Read more