amazonka-ec2-2.0: Amazon Elastic Compute Cloud SDK.
Copyright(c) 2013-2023 Brendan Hay
LicenseMozilla Public License, v. 2.0.
MaintainerBrendan Hay
Stabilityauto-generated
Portabilitynon-portable (GHC extensions)
Safe HaskellSafe-Inferred
LanguageHaskell2010

Amazonka.EC2.Types.IpPermission

Description

 
Synopsis

Documentation

data IpPermission Source #

Describes a set of permissions for a security group rule.

See: newIpPermission smart constructor.

Constructors

IpPermission' 

Fields

  • fromPort :: Maybe Int

    The start of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type number. A value of -1 indicates all ICMP/ICMPv6 types. If you specify all ICMP/ICMPv6 types, you must specify all codes.

  • ipRanges :: Maybe [IpRange]

    The IPv4 ranges.

  • ipv6Ranges :: Maybe [Ipv6Range]
    VPC only
    The IPv6 ranges.
  • prefixListIds :: Maybe [PrefixListId]
    VPC only
    The prefix list IDs.
  • toPort :: Maybe Int

    The end of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code. A value of -1 indicates all ICMP/ICMPv6 codes. If you specify all ICMP/ICMPv6 types, you must specify all codes.

  • userIdGroupPairs :: Maybe [UserIdGroupPair]

    The security group and Amazon Web Services account ID pairs.

  • ipProtocol :: Text

    The IP protocol name (tcp, udp, icmp, icmpv6) or number (see Protocol Numbers).

    VPC only
    Use -1 to specify all protocols. When authorizing security group rules, specifying -1 or a protocol number other than tcp, udp, icmp, or icmpv6 allows traffic on all ports, regardless of any port range you specify. For tcp, udp, and icmp, you must specify a port range. For icmpv6, the port range is optional; if you omit the port range, traffic for all types and codes is allowed.

Instances

Instances details
ToQuery IpPermission Source # 
Instance details

Defined in Amazonka.EC2.Types.IpPermission

FromXML IpPermission Source # 
Instance details

Defined in Amazonka.EC2.Types.IpPermission

Generic IpPermission Source # 
Instance details

Defined in Amazonka.EC2.Types.IpPermission

Associated Types

type Rep IpPermission :: Type -> Type #

Read IpPermission Source # 
Instance details

Defined in Amazonka.EC2.Types.IpPermission

Show IpPermission Source # 
Instance details

Defined in Amazonka.EC2.Types.IpPermission

NFData IpPermission Source # 
Instance details

Defined in Amazonka.EC2.Types.IpPermission

Methods

rnf :: IpPermission -> () #

Eq IpPermission Source # 
Instance details

Defined in Amazonka.EC2.Types.IpPermission

Hashable IpPermission Source # 
Instance details

Defined in Amazonka.EC2.Types.IpPermission

type Rep IpPermission Source # 
Instance details

Defined in Amazonka.EC2.Types.IpPermission

newIpPermission Source #

Create a value of IpPermission with all optional fields omitted.

Use generic-lens or optics to modify other optional fields.

The following record fields are available, with the corresponding lenses provided for backwards compatibility:

$sel:fromPort:IpPermission', ipPermission_fromPort - The start of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type number. A value of -1 indicates all ICMP/ICMPv6 types. If you specify all ICMP/ICMPv6 types, you must specify all codes.

$sel:ipRanges:IpPermission', ipPermission_ipRanges - The IPv4 ranges.

$sel:ipv6Ranges:IpPermission', ipPermission_ipv6Ranges - [VPC only] The IPv6 ranges.

$sel:prefixListIds:IpPermission', ipPermission_prefixListIds - [VPC only] The prefix list IDs.

$sel:toPort:IpPermission', ipPermission_toPort - The end of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code. A value of -1 indicates all ICMP/ICMPv6 codes. If you specify all ICMP/ICMPv6 types, you must specify all codes.

$sel:userIdGroupPairs:IpPermission', ipPermission_userIdGroupPairs - The security group and Amazon Web Services account ID pairs.

$sel:ipProtocol:IpPermission', ipPermission_ipProtocol - The IP protocol name (tcp, udp, icmp, icmpv6) or number (see Protocol Numbers).

VPC only
Use -1 to specify all protocols. When authorizing security group rules, specifying -1 or a protocol number other than tcp, udp, icmp, or icmpv6 allows traffic on all ports, regardless of any port range you specify. For tcp, udp, and icmp, you must specify a port range. For icmpv6, the port range is optional; if you omit the port range, traffic for all types and codes is allowed.

ipPermission_fromPort :: Lens' IpPermission (Maybe Int) Source #

The start of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type number. A value of -1 indicates all ICMP/ICMPv6 types. If you specify all ICMP/ICMPv6 types, you must specify all codes.

ipPermission_toPort :: Lens' IpPermission (Maybe Int) Source #

The end of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code. A value of -1 indicates all ICMP/ICMPv6 codes. If you specify all ICMP/ICMPv6 types, you must specify all codes.

ipPermission_userIdGroupPairs :: Lens' IpPermission (Maybe [UserIdGroupPair]) Source #

The security group and Amazon Web Services account ID pairs.

ipPermission_ipProtocol :: Lens' IpPermission Text Source #

The IP protocol name (tcp, udp, icmp, icmpv6) or number (see Protocol Numbers).

VPC only
Use -1 to specify all protocols. When authorizing security group rules, specifying -1 or a protocol number other than tcp, udp, icmp, or icmpv6 allows traffic on all ports, regardless of any port range you specify. For tcp, udp, and icmp, you must specify a port range. For icmpv6, the port range is optional; if you omit the port range, traffic for all types and codes is allowed.