pub struct FirewallPolicyRuleMatcher {
    pub dest_address_groups: Option<Vec<String>>,
    pub dest_fqdns: Option<Vec<String>>,
    pub dest_ip_ranges: Option<Vec<String>>,
    pub dest_region_codes: Option<Vec<String>>,
    pub dest_threat_intelligences: Option<Vec<String>>,
    pub layer4_configs: Option<Vec<FirewallPolicyRuleMatcherLayer4Config>>,
    pub src_address_groups: Option<Vec<String>>,
    pub src_fqdns: Option<Vec<String>>,
    pub src_ip_ranges: Option<Vec<String>>,
    pub src_region_codes: Option<Vec<String>>,
    pub src_secure_tags: Option<Vec<FirewallPolicyRuleSecureTag>>,
    pub src_threat_intelligences: Option<Vec<String>>,
}
Expand description

Represents a match condition that incoming traffic is evaluated against. Exactly one field must be specified.

This type is not used in any activity, and only used as part of another schema.

Fields§

§dest_address_groups: Option<Vec<String>>

Address groups which should be matched against the traffic destination. Maximum number of destination address groups is 10.

§dest_fqdns: Option<Vec<String>>

Fully Qualified Domain Name (FQDN) which should be matched against traffic destination. Maximum number of destination fqdn allowed is 100.

§dest_ip_ranges: Option<Vec<String>>

CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.

§dest_region_codes: Option<Vec<String>>

Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.“US” Maximum number of dest region codes allowed is 5000.

§dest_threat_intelligences: Option<Vec<String>>

Names of Network Threat Intelligence lists. The IPs in these lists will be matched against traffic destination.

§layer4_configs: Option<Vec<FirewallPolicyRuleMatcherLayer4Config>>

Pairs of IP protocols and ports that the rule should match.

§src_address_groups: Option<Vec<String>>

Address groups which should be matched against the traffic source. Maximum number of source address groups is 10.

§src_fqdns: Option<Vec<String>>

Fully Qualified Domain Name (FQDN) which should be matched against traffic source. Maximum number of source fqdn allowed is 100.

§src_ip_ranges: Option<Vec<String>>

CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.

§src_region_codes: Option<Vec<String>>

Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.“US” Maximum number of source region codes allowed is 5000.

§src_secure_tags: Option<Vec<FirewallPolicyRuleSecureTag>>

List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.

§src_threat_intelligences: Option<Vec<String>>

Names of Network Threat Intelligence lists. The IPs in these lists will be matched against traffic source.

Trait Implementations§

source§

impl Clone for FirewallPolicyRuleMatcher

source§

fn clone(&self) -> FirewallPolicyRuleMatcher

Returns a copy of the value. Read more
1.0.0 · source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
source§

impl Debug for FirewallPolicyRuleMatcher

source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
source§

impl Default for FirewallPolicyRuleMatcher

source§

fn default() -> FirewallPolicyRuleMatcher

Returns the “default value” for a type. Read more
source§

impl<'de> Deserialize<'de> for FirewallPolicyRuleMatcher

source§

fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>
where __D: Deserializer<'de>,

Deserialize this value from the given Serde deserializer. Read more
source§

impl Serialize for FirewallPolicyRuleMatcher

source§

fn serialize<__S>(&self, __serializer: __S) -> Result<__S::Ok, __S::Error>
where __S: Serializer,

Serialize this value into the given Serde serializer. Read more
source§

impl Part for FirewallPolicyRuleMatcher

Auto Trait Implementations§

Blanket Implementations§

source§

impl<T> Any for T
where T: 'static + ?Sized,

source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
source§

impl<T> Borrow<T> for T
where T: ?Sized,

source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
source§

impl<T> From<T> for T

source§

fn from(t: T) -> T

Returns the argument unchanged.

source§

impl<T> Instrument for T

source§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided Span, returning an Instrumented wrapper. Read more
source§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
source§

impl<T, U> Into<U> for T
where U: From<T>,

source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

source§

impl<T> ToOwned for T
where T: Clone,

§

type Owned = T

The resulting type after obtaining ownership.
source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

§

type Error = Infallible

The type returned in the event of a conversion error.
source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
source§

impl<T> WithSubscriber for T

source§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>
where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a WithDispatch wrapper. Read more
source§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a WithDispatch wrapper. Read more
source§

impl<T> DeserializeOwned for T
where T: for<'de> Deserialize<'de>,