409 lines
18 KiB
C
409 lines
18 KiB
C
|
|
/**
|
|||
|
|
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|||
|
|
* SPDX-License-Identifier: Apache-2.0.
|
|||
|
|
*/
|
|||
|
|
|
|||
|
|
#pragma once
|
|||
|
|
#include <aws/ec2/EC2_EXPORTS.h>
|
|||
|
|
#include <aws/core/utils/memory/stl/AWSStreamFwd.h>
|
|||
|
|
#include <aws/core/utils/memory/stl/AWSString.h>
|
|||
|
|
#include <aws/core/utils/memory/stl/AWSVector.h>
|
|||
|
|
#include <aws/ec2/model/IpRange.h>
|
|||
|
|
#include <aws/ec2/model/Ipv6Range.h>
|
|||
|
|
#include <aws/ec2/model/PrefixListId.h>
|
|||
|
|
#include <aws/ec2/model/UserIdGroupPair.h>
|
|||
|
|
#include <utility>
|
|||
|
|
|
|||
|
|
namespace Aws
|
|||
|
|
{
|
|||
|
|
namespace Utils
|
|||
|
|
{
|
|||
|
|
namespace Xml
|
|||
|
|
{
|
|||
|
|
class XmlNode;
|
|||
|
|
} // namespace Xml
|
|||
|
|
} // namespace Utils
|
|||
|
|
namespace EC2
|
|||
|
|
{
|
|||
|
|
namespace Model
|
|||
|
|
{
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>Describes a set of permissions for a security group rule.</p><p><h3>See
|
|||
|
|
* Also:</h3> <a
|
|||
|
|
* href="http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/IpPermission">AWS
|
|||
|
|
* API Reference</a></p>
|
|||
|
|
*/
|
|||
|
|
class AWS_EC2_API IpPermission
|
|||
|
|
{
|
|||
|
|
public:
|
|||
|
|
IpPermission();
|
|||
|
|
IpPermission(const Aws::Utils::Xml::XmlNode& xmlNode);
|
|||
|
|
IpPermission& operator=(const Aws::Utils::Xml::XmlNode& xmlNode);
|
|||
|
|
|
|||
|
|
void OutputToStream(Aws::OStream& ostream, const char* location, unsigned index, const char* locationValue) const;
|
|||
|
|
void OutputToStream(Aws::OStream& oStream, const char* location) const;
|
|||
|
|
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The start of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type
|
|||
|
|
* number. A value of <code>-1</code> indicates all ICMP/ICMPv6 types. If you
|
|||
|
|
* specify all ICMP/ICMPv6 types, you must specify all codes.</p>
|
|||
|
|
*/
|
|||
|
|
inline int GetFromPort() const{ return m_fromPort; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The start of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type
|
|||
|
|
* number. A value of <code>-1</code> indicates all ICMP/ICMPv6 types. If you
|
|||
|
|
* specify all ICMP/ICMPv6 types, you must specify all codes.</p>
|
|||
|
|
*/
|
|||
|
|
inline bool FromPortHasBeenSet() const { return m_fromPortHasBeenSet; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The start of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type
|
|||
|
|
* number. A value of <code>-1</code> indicates all ICMP/ICMPv6 types. If you
|
|||
|
|
* specify all ICMP/ICMPv6 types, you must specify all codes.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetFromPort(int value) { m_fromPortHasBeenSet = true; m_fromPort = value; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The start of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type
|
|||
|
|
* number. A value of <code>-1</code> indicates all ICMP/ICMPv6 types. If you
|
|||
|
|
* specify all ICMP/ICMPv6 types, you must specify all codes.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& WithFromPort(int value) { SetFromPort(value); return *this;}
|
|||
|
|
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IP protocol name (<code>tcp</code>, <code>udp</code>, <code>icmp</code>,
|
|||
|
|
* <code>icmpv6</code>) or number (see <a
|
|||
|
|
* href="http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml">Protocol
|
|||
|
|
* Numbers</a>).</p> <p>[VPC only] Use <code>-1</code> to specify all protocols.
|
|||
|
|
* When authorizing security group rules, specifying <code>-1</code> or a protocol
|
|||
|
|
* number other than <code>tcp</code>, <code>udp</code>, <code>icmp</code>, or
|
|||
|
|
* <code>icmpv6</code> allows traffic on all ports, regardless of any port range
|
|||
|
|
* you specify. For <code>tcp</code>, <code>udp</code>, and <code>icmp</code>, you
|
|||
|
|
* must specify a port range. For <code>icmpv6</code>, the port range is optional;
|
|||
|
|
* if you omit the port range, traffic for all types and codes is allowed.</p>
|
|||
|
|
*/
|
|||
|
|
inline const Aws::String& GetIpProtocol() const{ return m_ipProtocol; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IP protocol name (<code>tcp</code>, <code>udp</code>, <code>icmp</code>,
|
|||
|
|
* <code>icmpv6</code>) or number (see <a
|
|||
|
|
* href="http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml">Protocol
|
|||
|
|
* Numbers</a>).</p> <p>[VPC only] Use <code>-1</code> to specify all protocols.
|
|||
|
|
* When authorizing security group rules, specifying <code>-1</code> or a protocol
|
|||
|
|
* number other than <code>tcp</code>, <code>udp</code>, <code>icmp</code>, or
|
|||
|
|
* <code>icmpv6</code> allows traffic on all ports, regardless of any port range
|
|||
|
|
* you specify. For <code>tcp</code>, <code>udp</code>, and <code>icmp</code>, you
|
|||
|
|
* must specify a port range. For <code>icmpv6</code>, the port range is optional;
|
|||
|
|
* if you omit the port range, traffic for all types and codes is allowed.</p>
|
|||
|
|
*/
|
|||
|
|
inline bool IpProtocolHasBeenSet() const { return m_ipProtocolHasBeenSet; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IP protocol name (<code>tcp</code>, <code>udp</code>, <code>icmp</code>,
|
|||
|
|
* <code>icmpv6</code>) or number (see <a
|
|||
|
|
* href="http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml">Protocol
|
|||
|
|
* Numbers</a>).</p> <p>[VPC only] Use <code>-1</code> to specify all protocols.
|
|||
|
|
* When authorizing security group rules, specifying <code>-1</code> or a protocol
|
|||
|
|
* number other than <code>tcp</code>, <code>udp</code>, <code>icmp</code>, or
|
|||
|
|
* <code>icmpv6</code> allows traffic on all ports, regardless of any port range
|
|||
|
|
* you specify. For <code>tcp</code>, <code>udp</code>, and <code>icmp</code>, you
|
|||
|
|
* must specify a port range. For <code>icmpv6</code>, the port range is optional;
|
|||
|
|
* if you omit the port range, traffic for all types and codes is allowed.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetIpProtocol(const Aws::String& value) { m_ipProtocolHasBeenSet = true; m_ipProtocol = value; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IP protocol name (<code>tcp</code>, <code>udp</code>, <code>icmp</code>,
|
|||
|
|
* <code>icmpv6</code>) or number (see <a
|
|||
|
|
* href="http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml">Protocol
|
|||
|
|
* Numbers</a>).</p> <p>[VPC only] Use <code>-1</code> to specify all protocols.
|
|||
|
|
* When authorizing security group rules, specifying <code>-1</code> or a protocol
|
|||
|
|
* number other than <code>tcp</code>, <code>udp</code>, <code>icmp</code>, or
|
|||
|
|
* <code>icmpv6</code> allows traffic on all ports, regardless of any port range
|
|||
|
|
* you specify. For <code>tcp</code>, <code>udp</code>, and <code>icmp</code>, you
|
|||
|
|
* must specify a port range. For <code>icmpv6</code>, the port range is optional;
|
|||
|
|
* if you omit the port range, traffic for all types and codes is allowed.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetIpProtocol(Aws::String&& value) { m_ipProtocolHasBeenSet = true; m_ipProtocol = std::move(value); }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IP protocol name (<code>tcp</code>, <code>udp</code>, <code>icmp</code>,
|
|||
|
|
* <code>icmpv6</code>) or number (see <a
|
|||
|
|
* href="http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml">Protocol
|
|||
|
|
* Numbers</a>).</p> <p>[VPC only] Use <code>-1</code> to specify all protocols.
|
|||
|
|
* When authorizing security group rules, specifying <code>-1</code> or a protocol
|
|||
|
|
* number other than <code>tcp</code>, <code>udp</code>, <code>icmp</code>, or
|
|||
|
|
* <code>icmpv6</code> allows traffic on all ports, regardless of any port range
|
|||
|
|
* you specify. For <code>tcp</code>, <code>udp</code>, and <code>icmp</code>, you
|
|||
|
|
* must specify a port range. For <code>icmpv6</code>, the port range is optional;
|
|||
|
|
* if you omit the port range, traffic for all types and codes is allowed.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetIpProtocol(const char* value) { m_ipProtocolHasBeenSet = true; m_ipProtocol.assign(value); }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IP protocol name (<code>tcp</code>, <code>udp</code>, <code>icmp</code>,
|
|||
|
|
* <code>icmpv6</code>) or number (see <a
|
|||
|
|
* href="http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml">Protocol
|
|||
|
|
* Numbers</a>).</p> <p>[VPC only] Use <code>-1</code> to specify all protocols.
|
|||
|
|
* When authorizing security group rules, specifying <code>-1</code> or a protocol
|
|||
|
|
* number other than <code>tcp</code>, <code>udp</code>, <code>icmp</code>, or
|
|||
|
|
* <code>icmpv6</code> allows traffic on all ports, regardless of any port range
|
|||
|
|
* you specify. For <code>tcp</code>, <code>udp</code>, and <code>icmp</code>, you
|
|||
|
|
* must specify a port range. For <code>icmpv6</code>, the port range is optional;
|
|||
|
|
* if you omit the port range, traffic for all types and codes is allowed.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& WithIpProtocol(const Aws::String& value) { SetIpProtocol(value); return *this;}
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IP protocol name (<code>tcp</code>, <code>udp</code>, <code>icmp</code>,
|
|||
|
|
* <code>icmpv6</code>) or number (see <a
|
|||
|
|
* href="http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml">Protocol
|
|||
|
|
* Numbers</a>).</p> <p>[VPC only] Use <code>-1</code> to specify all protocols.
|
|||
|
|
* When authorizing security group rules, specifying <code>-1</code> or a protocol
|
|||
|
|
* number other than <code>tcp</code>, <code>udp</code>, <code>icmp</code>, or
|
|||
|
|
* <code>icmpv6</code> allows traffic on all ports, regardless of any port range
|
|||
|
|
* you specify. For <code>tcp</code>, <code>udp</code>, and <code>icmp</code>, you
|
|||
|
|
* must specify a port range. For <code>icmpv6</code>, the port range is optional;
|
|||
|
|
* if you omit the port range, traffic for all types and codes is allowed.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& WithIpProtocol(Aws::String&& value) { SetIpProtocol(std::move(value)); return *this;}
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IP protocol name (<code>tcp</code>, <code>udp</code>, <code>icmp</code>,
|
|||
|
|
* <code>icmpv6</code>) or number (see <a
|
|||
|
|
* href="http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml">Protocol
|
|||
|
|
* Numbers</a>).</p> <p>[VPC only] Use <code>-1</code> to specify all protocols.
|
|||
|
|
* When authorizing security group rules, specifying <code>-1</code> or a protocol
|
|||
|
|
* number other than <code>tcp</code>, <code>udp</code>, <code>icmp</code>, or
|
|||
|
|
* <code>icmpv6</code> allows traffic on all ports, regardless of any port range
|
|||
|
|
* you specify. For <code>tcp</code>, <code>udp</code>, and <code>icmp</code>, you
|
|||
|
|
* must specify a port range. For <code>icmpv6</code>, the port range is optional;
|
|||
|
|
* if you omit the port range, traffic for all types and codes is allowed.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& WithIpProtocol(const char* value) { SetIpProtocol(value); return *this;}
|
|||
|
|
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IPv4 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline const Aws::Vector<IpRange>& GetIpRanges() const{ return m_ipRanges; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IPv4 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline bool IpRangesHasBeenSet() const { return m_ipRangesHasBeenSet; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IPv4 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetIpRanges(const Aws::Vector<IpRange>& value) { m_ipRangesHasBeenSet = true; m_ipRanges = value; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IPv4 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetIpRanges(Aws::Vector<IpRange>&& value) { m_ipRangesHasBeenSet = true; m_ipRanges = std::move(value); }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IPv4 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& WithIpRanges(const Aws::Vector<IpRange>& value) { SetIpRanges(value); return *this;}
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IPv4 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& WithIpRanges(Aws::Vector<IpRange>&& value) { SetIpRanges(std::move(value)); return *this;}
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IPv4 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& AddIpRanges(const IpRange& value) { m_ipRangesHasBeenSet = true; m_ipRanges.push_back(value); return *this; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The IPv4 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& AddIpRanges(IpRange&& value) { m_ipRangesHasBeenSet = true; m_ipRanges.push_back(std::move(value)); return *this; }
|
|||
|
|
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The IPv6 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline const Aws::Vector<Ipv6Range>& GetIpv6Ranges() const{ return m_ipv6Ranges; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The IPv6 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline bool Ipv6RangesHasBeenSet() const { return m_ipv6RangesHasBeenSet; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The IPv6 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetIpv6Ranges(const Aws::Vector<Ipv6Range>& value) { m_ipv6RangesHasBeenSet = true; m_ipv6Ranges = value; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The IPv6 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetIpv6Ranges(Aws::Vector<Ipv6Range>&& value) { m_ipv6RangesHasBeenSet = true; m_ipv6Ranges = std::move(value); }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The IPv6 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& WithIpv6Ranges(const Aws::Vector<Ipv6Range>& value) { SetIpv6Ranges(value); return *this;}
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The IPv6 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& WithIpv6Ranges(Aws::Vector<Ipv6Range>&& value) { SetIpv6Ranges(std::move(value)); return *this;}
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The IPv6 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& AddIpv6Ranges(const Ipv6Range& value) { m_ipv6RangesHasBeenSet = true; m_ipv6Ranges.push_back(value); return *this; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The IPv6 ranges.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& AddIpv6Ranges(Ipv6Range&& value) { m_ipv6RangesHasBeenSet = true; m_ipv6Ranges.push_back(std::move(value)); return *this; }
|
|||
|
|
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The prefix list IDs.</p>
|
|||
|
|
*/
|
|||
|
|
inline const Aws::Vector<PrefixListId>& GetPrefixListIds() const{ return m_prefixListIds; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The prefix list IDs.</p>
|
|||
|
|
*/
|
|||
|
|
inline bool PrefixListIdsHasBeenSet() const { return m_prefixListIdsHasBeenSet; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The prefix list IDs.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetPrefixListIds(const Aws::Vector<PrefixListId>& value) { m_prefixListIdsHasBeenSet = true; m_prefixListIds = value; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The prefix list IDs.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetPrefixListIds(Aws::Vector<PrefixListId>&& value) { m_prefixListIdsHasBeenSet = true; m_prefixListIds = std::move(value); }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The prefix list IDs.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& WithPrefixListIds(const Aws::Vector<PrefixListId>& value) { SetPrefixListIds(value); return *this;}
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The prefix list IDs.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& WithPrefixListIds(Aws::Vector<PrefixListId>&& value) { SetPrefixListIds(std::move(value)); return *this;}
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The prefix list IDs.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& AddPrefixListIds(const PrefixListId& value) { m_prefixListIdsHasBeenSet = true; m_prefixListIds.push_back(value); return *this; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>[VPC only] The prefix list IDs.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& AddPrefixListIds(PrefixListId&& value) { m_prefixListIdsHasBeenSet = true; m_prefixListIds.push_back(std::move(value)); return *this; }
|
|||
|
|
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The end of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.
|
|||
|
|
* A value of <code>-1</code> indicates all ICMP/ICMPv6 codes. If you specify all
|
|||
|
|
* ICMP/ICMPv6 types, you must specify all codes.</p>
|
|||
|
|
*/
|
|||
|
|
inline int GetToPort() const{ return m_toPort; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The end of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.
|
|||
|
|
* A value of <code>-1</code> indicates all ICMP/ICMPv6 codes. If you specify all
|
|||
|
|
* ICMP/ICMPv6 types, you must specify all codes.</p>
|
|||
|
|
*/
|
|||
|
|
inline bool ToPortHasBeenSet() const { return m_toPortHasBeenSet; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The end of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.
|
|||
|
|
* A value of <code>-1</code> indicates all ICMP/ICMPv6 codes. If you specify all
|
|||
|
|
* ICMP/ICMPv6 types, you must specify all codes.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetToPort(int value) { m_toPortHasBeenSet = true; m_toPort = value; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The end of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.
|
|||
|
|
* A value of <code>-1</code> indicates all ICMP/ICMPv6 codes. If you specify all
|
|||
|
|
* ICMP/ICMPv6 types, you must specify all codes.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& WithToPort(int value) { SetToPort(value); return *this;}
|
|||
|
|
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The security group and AWS account ID pairs.</p>
|
|||
|
|
*/
|
|||
|
|
inline const Aws::Vector<UserIdGroupPair>& GetUserIdGroupPairs() const{ return m_userIdGroupPairs; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The security group and AWS account ID pairs.</p>
|
|||
|
|
*/
|
|||
|
|
inline bool UserIdGroupPairsHasBeenSet() const { return m_userIdGroupPairsHasBeenSet; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The security group and AWS account ID pairs.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetUserIdGroupPairs(const Aws::Vector<UserIdGroupPair>& value) { m_userIdGroupPairsHasBeenSet = true; m_userIdGroupPairs = value; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The security group and AWS account ID pairs.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetUserIdGroupPairs(Aws::Vector<UserIdGroupPair>&& value) { m_userIdGroupPairsHasBeenSet = true; m_userIdGroupPairs = std::move(value); }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The security group and AWS account ID pairs.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& WithUserIdGroupPairs(const Aws::Vector<UserIdGroupPair>& value) { SetUserIdGroupPairs(value); return *this;}
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The security group and AWS account ID pairs.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& WithUserIdGroupPairs(Aws::Vector<UserIdGroupPair>&& value) { SetUserIdGroupPairs(std::move(value)); return *this;}
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The security group and AWS account ID pairs.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& AddUserIdGroupPairs(const UserIdGroupPair& value) { m_userIdGroupPairsHasBeenSet = true; m_userIdGroupPairs.push_back(value); return *this; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The security group and AWS account ID pairs.</p>
|
|||
|
|
*/
|
|||
|
|
inline IpPermission& AddUserIdGroupPairs(UserIdGroupPair&& value) { m_userIdGroupPairsHasBeenSet = true; m_userIdGroupPairs.push_back(std::move(value)); return *this; }
|
|||
|
|
|
|||
|
|
private:
|
|||
|
|
|
|||
|
|
int m_fromPort;
|
|||
|
|
bool m_fromPortHasBeenSet;
|
|||
|
|
|
|||
|
|
Aws::String m_ipProtocol;
|
|||
|
|
bool m_ipProtocolHasBeenSet;
|
|||
|
|
|
|||
|
|
Aws::Vector<IpRange> m_ipRanges;
|
|||
|
|
bool m_ipRangesHasBeenSet;
|
|||
|
|
|
|||
|
|
Aws::Vector<Ipv6Range> m_ipv6Ranges;
|
|||
|
|
bool m_ipv6RangesHasBeenSet;
|
|||
|
|
|
|||
|
|
Aws::Vector<PrefixListId> m_prefixListIds;
|
|||
|
|
bool m_prefixListIdsHasBeenSet;
|
|||
|
|
|
|||
|
|
int m_toPort;
|
|||
|
|
bool m_toPortHasBeenSet;
|
|||
|
|
|
|||
|
|
Aws::Vector<UserIdGroupPair> m_userIdGroupPairs;
|
|||
|
|
bool m_userIdGroupPairsHasBeenSet;
|
|||
|
|
};
|
|||
|
|
|
|||
|
|
} // namespace Model
|
|||
|
|
} // namespace EC2
|
|||
|
|
} // namespace Aws
|