[−][src]Struct rusoto_ec2::IpPermission
Describes a set of permissions for a security group rule.
Fields
from_port: Option<i64>
The start of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type number. A value of -1
indicates all ICMP/ICMPv6 types. If you specify all ICMP/ICMPv6 types, you must specify all codes.
ip_protocol: Option<String>
The IP protocol name (tcp
, udp
, icmp
) or number (see Protocol Numbers).
[EC2-VPC only] Use -1
to specify all protocols. When authorizing security group rules, specifying -1
or a protocol number other than tcp
, udp
, icmp
, or 58
(ICMPv6) allows traffic on all ports, regardless of any port range you specify. For tcp
, udp
, and icmp
, you must specify a port range. For 58
(ICMPv6), you can optionally specify a port range; if you don't, traffic for all types and codes is allowed when authorizing rules.
ip_ranges: Option<Vec<IpRange>>
One or more IPv4 ranges.
ipv_6_ranges: Option<Vec<Ipv6Range>>
[EC2-VPC only] One or more IPv6 ranges.
prefix_list_ids: Option<Vec<PrefixListId>>
(EC2-VPC only; valid for AuthorizeSecurityGroupEgress, RevokeSecurityGroupEgress and DescribeSecurityGroups only) One or more prefix list IDs for an AWS service. In an AuthorizeSecurityGroupEgress request, this is the AWS service that you want to access through a VPC endpoint from instances associated with the security group.
to_port: Option<i64>
The end of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code. A value of -1
indicates all ICMP/ICMPv6 codes for the specified ICMP type. If you specify all ICMP/ICMPv6 types, you must specify all codes.
user_id_group_pairs: Option<Vec<UserIdGroupPair>>
One or more security group and AWS account ID pairs.
Trait Implementations
impl Clone for IpPermission
[src]
impl Clone for IpPermission
fn clone(&self) -> IpPermission
[src]
fn clone(&self) -> IpPermission
fn clone_from(&mut self, source: &Self)
1.0.0[src]
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source
. Read more
impl Default for IpPermission
[src]
impl Default for IpPermission
fn default() -> IpPermission
[src]
fn default() -> IpPermission
impl PartialEq<IpPermission> for IpPermission
[src]
impl PartialEq<IpPermission> for IpPermission
fn eq(&self, other: &IpPermission) -> bool
[src]
fn eq(&self, other: &IpPermission) -> bool
fn ne(&self, other: &IpPermission) -> bool
[src]
fn ne(&self, other: &IpPermission) -> bool
impl Debug for IpPermission
[src]
impl Debug for IpPermission
Auto Trait Implementations
impl Send for IpPermission
impl Send for IpPermission
impl Sync for IpPermission
impl Sync for IpPermission
Blanket Implementations
impl<T> From for T
[src]
impl<T> From for T
impl<T, U> Into for T where
U: From<T>,
[src]
impl<T, U> Into for T where
U: From<T>,
impl<T> ToOwned for T where
T: Clone,
[src]
impl<T> ToOwned for T where
T: Clone,
impl<T, U> TryFrom for T where
T: From<U>,
[src]
impl<T, U> TryFrom for T where
T: From<U>,
type Error = !
try_from
)The type returned in the event of a conversion error.
fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>
[src]
fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>
impl<T> Borrow for T where
T: ?Sized,
[src]
impl<T> Borrow for T where
T: ?Sized,
impl<T, U> TryInto for T where
U: TryFrom<T>,
[src]
impl<T, U> TryInto for T where
U: TryFrom<T>,
type Error = <U as TryFrom<T>>::Error
try_from
)The type returned in the event of a conversion error.
fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>
[src]
fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>
impl<T> BorrowMut for T where
T: ?Sized,
[src]
impl<T> BorrowMut for T where
T: ?Sized,
fn borrow_mut(&mut self) -> &mut T
[src]
fn borrow_mut(&mut self) -> &mut T
impl<T> Any for T where
T: 'static + ?Sized,
[src]
impl<T> Any for T where
T: 'static + ?Sized,
fn get_type_id(&self) -> TypeId
[src]
fn get_type_id(&self) -> TypeId
impl<T> Same for T
impl<T> Same for T
type Output = T
Should always be Self
impl<T> Erased for T
impl<T> Erased for T