pub struct PutParams {Show 17 fields
pub action: Option<String>,
pub comment: Option<String>,
pub delete: Option<String>,
pub dest: Option<String>,
pub digest: Option<String>,
pub dport: Option<String>,
pub enable: Option<u64>,
pub icmp_type: Option<String>,
pub iface: Option<String>,
pub log: Option<Log>,
pub macro_def: Option<String>,
pub moveto: Option<u64>,
pub proto: Option<String>,
pub source: Option<String>,
pub sport: Option<String>,
pub ty: Option<Type>,
pub additional_properties: HashMap<String, Value>,
}
Fields§
§action: Option<String>
Rule action (‘ACCEPT’, ‘DROP’, ‘REJECT’) or security group name.
comment: Option<String>
Descriptive comment.
delete: Option<String>
A list of settings you want to delete.
dest: Option<String>
Restrict packet destination address. This can refer to a single IP address, an IP set (‘+ipsetname’) or an IP alias definition. You can also specify an address range like ‘20.34.101.207-201.3.9.99’, or a list of IP addresses and networks (entries are separated by comma). Please do not mix IPv4 and IPv6 addresses inside such lists.
digest: Option<String>
Prevent changes if current configuration file has a different digest. This can be used to prevent concurrent modifications.
dport: Option<String>
Restrict TCP/UDP destination port. You can use service names or simple numbers (0-65535), as defined in ‘/etc/services’. Port ranges can be specified with ‘\d+:\d+’, for example ‘80:85’, and you can use comma separated list to match several ports or ranges.
enable: Option<u64>
Flag to enable/disable a rule.
icmp_type: Option<String>
Specify icmp-type. Only valid if proto equals ‘icmp’ or ‘icmpv6’/‘ipv6-icmp’.
iface: Option<String>
Network interface name. You have to use network configuration key names for VMs and containers (‘net\d+’). Host related rules can use arbitrary strings.
log: Option<Log>
Log level for firewall rule.
macro_def: Option<String>
Use predefined standard macro.
moveto: Option<u64>
Move rule to new position <moveto>. Other arguments are ignored.
proto: Option<String>
IP protocol. You can use protocol names (‘tcp’/‘udp’) or simple numbers, as defined in ‘/etc/protocols’.
source: Option<String>
Restrict packet source address. This can refer to a single IP address, an IP set (‘+ipsetname’) or an IP alias definition. You can also specify an address range like ‘20.34.101.207-201.3.9.99’, or a list of IP addresses and networks (entries are separated by comma). Please do not mix IPv4 and IPv6 addresses inside such lists.
sport: Option<String>
Restrict TCP/UDP source port. You can use service names or simple numbers (0-65535), as defined in ‘/etc/services’. Port ranges can be specified with ‘\d+:\d+’, for example ‘80:85’, and you can use comma separated list to match several ports or ranges.
ty: Option<Type>
Rule type.
additional_properties: HashMap<String, Value>