{-# LANGUAGE DeriveGeneric #-}
{-# LANGUAGE DuplicateRecordFields #-}
{-# LANGUAGE NamedFieldPuns #-}
{-# LANGUAGE OverloadedStrings #-}
{-# LANGUAGE RecordWildCards #-}
{-# LANGUAGE StrictData #-}
{-# LANGUAGE TypeFamilies #-}
{-# LANGUAGE NoImplicitPrelude #-}
{-# OPTIONS_GHC -fno-warn-unused-binds #-}
{-# OPTIONS_GHC -fno-warn-unused-imports #-}
{-# OPTIONS_GHC -fno-warn-unused-matches #-}

-- Derived from AWS service descriptions, licensed under Apache 2.0.

-- |
-- Module      : Amazonka.EC2.AuthorizeSecurityGroupEgress
-- Copyright   : (c) 2013-2023 Brendan Hay
-- License     : Mozilla Public License, v. 2.0.
-- Maintainer  : Brendan Hay
-- Stability   : auto-generated
-- Portability : non-portable (GHC extensions)
--
-- [VPC only] Adds the specified outbound (egress) rules to a security
-- group for use with a VPC.
--
-- An outbound rule permits instances to send traffic to the specified IPv4
-- or IPv6 CIDR address ranges, or to the instances that are associated
-- with the specified source security groups. When specifying an outbound
-- rule for your security group in a VPC, the @IpPermissions@ must include
-- a destination for the traffic.
--
-- You specify a protocol for each rule (for example, TCP). For the TCP and
-- UDP protocols, you must also specify the destination port or port range.
-- For the ICMP protocol, you must also specify the ICMP type and code. You
-- can use -1 for the type or code to mean all types or all codes.
--
-- Rule changes are propagated to affected instances as quickly as
-- possible. However, a small delay might occur.
--
-- For information about VPC security group quotas, see
-- <https://docs.aws.amazon.com/vpc/latest/userguide/amazon-vpc-limits.html Amazon VPC quotas>.
module Amazonka.EC2.AuthorizeSecurityGroupEgress
  ( -- * Creating a Request
    AuthorizeSecurityGroupEgress (..),
    newAuthorizeSecurityGroupEgress,

    -- * Request Lenses
    authorizeSecurityGroupEgress_cidrIp,
    authorizeSecurityGroupEgress_dryRun,
    authorizeSecurityGroupEgress_fromPort,
    authorizeSecurityGroupEgress_ipPermissions,
    authorizeSecurityGroupEgress_ipProtocol,
    authorizeSecurityGroupEgress_sourceSecurityGroupName,
    authorizeSecurityGroupEgress_sourceSecurityGroupOwnerId,
    authorizeSecurityGroupEgress_tagSpecifications,
    authorizeSecurityGroupEgress_toPort,
    authorizeSecurityGroupEgress_groupId,

    -- * Destructuring the Response
    AuthorizeSecurityGroupEgressResponse (..),
    newAuthorizeSecurityGroupEgressResponse,

    -- * Response Lenses
    authorizeSecurityGroupEgressResponse_return,
    authorizeSecurityGroupEgressResponse_securityGroupRules,
    authorizeSecurityGroupEgressResponse_httpStatus,
  )
where

import qualified Amazonka.Core as Core
import qualified Amazonka.Core.Lens.Internal as Lens
import qualified Amazonka.Data as Data
import Amazonka.EC2.Types
import qualified Amazonka.Prelude as Prelude
import qualified Amazonka.Request as Request
import qualified Amazonka.Response as Response

-- | /See:/ 'newAuthorizeSecurityGroupEgress' smart constructor.
data AuthorizeSecurityGroupEgress = AuthorizeSecurityGroupEgress'
  { -- | Not supported. Use a set of IP permissions to specify the CIDR.
    AuthorizeSecurityGroupEgress -> Maybe Text
cidrIp :: Prelude.Maybe Prelude.Text,
    -- | Checks whether you have the required permissions for the action, without
    -- actually making the request, and provides an error response. If you have
    -- the required permissions, the error response is @DryRunOperation@.
    -- Otherwise, it is @UnauthorizedOperation@.
    AuthorizeSecurityGroupEgress -> Maybe Bool
dryRun :: Prelude.Maybe Prelude.Bool,
    -- | Not supported. Use a set of IP permissions to specify the port.
    AuthorizeSecurityGroupEgress -> Maybe Int
fromPort :: Prelude.Maybe Prelude.Int,
    -- | The sets of IP permissions. You can\'t specify a destination security
    -- group and a CIDR IP address range in the same set of permissions.
    AuthorizeSecurityGroupEgress -> Maybe [IpPermission]
ipPermissions :: Prelude.Maybe [IpPermission],
    -- | Not supported. Use a set of IP permissions to specify the protocol name
    -- or number.
    AuthorizeSecurityGroupEgress -> Maybe Text
ipProtocol :: Prelude.Maybe Prelude.Text,
    -- | Not supported. Use a set of IP permissions to specify a destination
    -- security group.
    AuthorizeSecurityGroupEgress -> Maybe Text
sourceSecurityGroupName :: Prelude.Maybe Prelude.Text,
    -- | Not supported. Use a set of IP permissions to specify a destination
    -- security group.
    AuthorizeSecurityGroupEgress -> Maybe Text
sourceSecurityGroupOwnerId :: Prelude.Maybe Prelude.Text,
    -- | The tags applied to the security group rule.
    AuthorizeSecurityGroupEgress -> Maybe [TagSpecification]
tagSpecifications :: Prelude.Maybe [TagSpecification],
    -- | Not supported. Use a set of IP permissions to specify the port.
    AuthorizeSecurityGroupEgress -> Maybe Int
toPort :: Prelude.Maybe Prelude.Int,
    -- | The ID of the security group.
    AuthorizeSecurityGroupEgress -> Text
groupId :: Prelude.Text
  }
  deriving (AuthorizeSecurityGroupEgress
-> AuthorizeSecurityGroupEgress -> Bool
forall a. (a -> a -> Bool) -> (a -> a -> Bool) -> Eq a
/= :: AuthorizeSecurityGroupEgress
-> AuthorizeSecurityGroupEgress -> Bool
$c/= :: AuthorizeSecurityGroupEgress
-> AuthorizeSecurityGroupEgress -> Bool
== :: AuthorizeSecurityGroupEgress
-> AuthorizeSecurityGroupEgress -> Bool
$c== :: AuthorizeSecurityGroupEgress
-> AuthorizeSecurityGroupEgress -> Bool
Prelude.Eq, ReadPrec [AuthorizeSecurityGroupEgress]
ReadPrec AuthorizeSecurityGroupEgress
Int -> ReadS AuthorizeSecurityGroupEgress
ReadS [AuthorizeSecurityGroupEgress]
forall a.
(Int -> ReadS a)
-> ReadS [a] -> ReadPrec a -> ReadPrec [a] -> Read a
readListPrec :: ReadPrec [AuthorizeSecurityGroupEgress]
$creadListPrec :: ReadPrec [AuthorizeSecurityGroupEgress]
readPrec :: ReadPrec AuthorizeSecurityGroupEgress
$creadPrec :: ReadPrec AuthorizeSecurityGroupEgress
readList :: ReadS [AuthorizeSecurityGroupEgress]
$creadList :: ReadS [AuthorizeSecurityGroupEgress]
readsPrec :: Int -> ReadS AuthorizeSecurityGroupEgress
$creadsPrec :: Int -> ReadS AuthorizeSecurityGroupEgress
Prelude.Read, Int -> AuthorizeSecurityGroupEgress -> ShowS
[AuthorizeSecurityGroupEgress] -> ShowS
AuthorizeSecurityGroupEgress -> String
forall a.
(Int -> a -> ShowS) -> (a -> String) -> ([a] -> ShowS) -> Show a
showList :: [AuthorizeSecurityGroupEgress] -> ShowS
$cshowList :: [AuthorizeSecurityGroupEgress] -> ShowS
show :: AuthorizeSecurityGroupEgress -> String
$cshow :: AuthorizeSecurityGroupEgress -> String
showsPrec :: Int -> AuthorizeSecurityGroupEgress -> ShowS
$cshowsPrec :: Int -> AuthorizeSecurityGroupEgress -> ShowS
Prelude.Show, forall x.
Rep AuthorizeSecurityGroupEgress x -> AuthorizeSecurityGroupEgress
forall x.
AuthorizeSecurityGroupEgress -> Rep AuthorizeSecurityGroupEgress x
forall a.
(forall x. a -> Rep a x) -> (forall x. Rep a x -> a) -> Generic a
$cto :: forall x.
Rep AuthorizeSecurityGroupEgress x -> AuthorizeSecurityGroupEgress
$cfrom :: forall x.
AuthorizeSecurityGroupEgress -> Rep AuthorizeSecurityGroupEgress x
Prelude.Generic)

-- |
-- Create a value of 'AuthorizeSecurityGroupEgress' with all optional fields omitted.
--
-- Use <https://hackage.haskell.org/package/generic-lens generic-lens> or <https://hackage.haskell.org/package/optics optics> to modify other optional fields.
--
-- The following record fields are available, with the corresponding lenses provided
-- for backwards compatibility:
--
-- 'cidrIp', 'authorizeSecurityGroupEgress_cidrIp' - Not supported. Use a set of IP permissions to specify the CIDR.
--
-- 'dryRun', 'authorizeSecurityGroupEgress_dryRun' - Checks whether you have the required permissions for the action, without
-- actually making the request, and provides an error response. If you have
-- the required permissions, the error response is @DryRunOperation@.
-- Otherwise, it is @UnauthorizedOperation@.
--
-- 'fromPort', 'authorizeSecurityGroupEgress_fromPort' - Not supported. Use a set of IP permissions to specify the port.
--
-- 'ipPermissions', 'authorizeSecurityGroupEgress_ipPermissions' - The sets of IP permissions. You can\'t specify a destination security
-- group and a CIDR IP address range in the same set of permissions.
--
-- 'ipProtocol', 'authorizeSecurityGroupEgress_ipProtocol' - Not supported. Use a set of IP permissions to specify the protocol name
-- or number.
--
-- 'sourceSecurityGroupName', 'authorizeSecurityGroupEgress_sourceSecurityGroupName' - Not supported. Use a set of IP permissions to specify a destination
-- security group.
--
-- 'sourceSecurityGroupOwnerId', 'authorizeSecurityGroupEgress_sourceSecurityGroupOwnerId' - Not supported. Use a set of IP permissions to specify a destination
-- security group.
--
-- 'tagSpecifications', 'authorizeSecurityGroupEgress_tagSpecifications' - The tags applied to the security group rule.
--
-- 'toPort', 'authorizeSecurityGroupEgress_toPort' - Not supported. Use a set of IP permissions to specify the port.
--
-- 'groupId', 'authorizeSecurityGroupEgress_groupId' - The ID of the security group.
newAuthorizeSecurityGroupEgress ::
  -- | 'groupId'
  Prelude.Text ->
  AuthorizeSecurityGroupEgress
newAuthorizeSecurityGroupEgress :: Text -> AuthorizeSecurityGroupEgress
newAuthorizeSecurityGroupEgress Text
pGroupId_ =
  AuthorizeSecurityGroupEgress'
    { $sel:cidrIp:AuthorizeSecurityGroupEgress' :: Maybe Text
cidrIp =
        forall a. Maybe a
Prelude.Nothing,
      $sel:dryRun:AuthorizeSecurityGroupEgress' :: Maybe Bool
dryRun = forall a. Maybe a
Prelude.Nothing,
      $sel:fromPort:AuthorizeSecurityGroupEgress' :: Maybe Int
fromPort = forall a. Maybe a
Prelude.Nothing,
      $sel:ipPermissions:AuthorizeSecurityGroupEgress' :: Maybe [IpPermission]
ipPermissions = forall a. Maybe a
Prelude.Nothing,
      $sel:ipProtocol:AuthorizeSecurityGroupEgress' :: Maybe Text
ipProtocol = forall a. Maybe a
Prelude.Nothing,
      $sel:sourceSecurityGroupName:AuthorizeSecurityGroupEgress' :: Maybe Text
sourceSecurityGroupName = forall a. Maybe a
Prelude.Nothing,
      $sel:sourceSecurityGroupOwnerId:AuthorizeSecurityGroupEgress' :: Maybe Text
sourceSecurityGroupOwnerId = forall a. Maybe a
Prelude.Nothing,
      $sel:tagSpecifications:AuthorizeSecurityGroupEgress' :: Maybe [TagSpecification]
tagSpecifications = forall a. Maybe a
Prelude.Nothing,
      $sel:toPort:AuthorizeSecurityGroupEgress' :: Maybe Int
toPort = forall a. Maybe a
Prelude.Nothing,
      $sel:groupId:AuthorizeSecurityGroupEgress' :: Text
groupId = Text
pGroupId_
    }

-- | Not supported. Use a set of IP permissions to specify the CIDR.
authorizeSecurityGroupEgress_cidrIp :: Lens.Lens' AuthorizeSecurityGroupEgress (Prelude.Maybe Prelude.Text)
authorizeSecurityGroupEgress_cidrIp :: Lens' AuthorizeSecurityGroupEgress (Maybe Text)
authorizeSecurityGroupEgress_cidrIp = forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\AuthorizeSecurityGroupEgress' {Maybe Text
cidrIp :: Maybe Text
$sel:cidrIp:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
cidrIp} -> Maybe Text
cidrIp) (\s :: AuthorizeSecurityGroupEgress
s@AuthorizeSecurityGroupEgress' {} Maybe Text
a -> AuthorizeSecurityGroupEgress
s {$sel:cidrIp:AuthorizeSecurityGroupEgress' :: Maybe Text
cidrIp = Maybe Text
a} :: AuthorizeSecurityGroupEgress)

-- | Checks whether you have the required permissions for the action, without
-- actually making the request, and provides an error response. If you have
-- the required permissions, the error response is @DryRunOperation@.
-- Otherwise, it is @UnauthorizedOperation@.
authorizeSecurityGroupEgress_dryRun :: Lens.Lens' AuthorizeSecurityGroupEgress (Prelude.Maybe Prelude.Bool)
authorizeSecurityGroupEgress_dryRun :: Lens' AuthorizeSecurityGroupEgress (Maybe Bool)
authorizeSecurityGroupEgress_dryRun = forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\AuthorizeSecurityGroupEgress' {Maybe Bool
dryRun :: Maybe Bool
$sel:dryRun:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Bool
dryRun} -> Maybe Bool
dryRun) (\s :: AuthorizeSecurityGroupEgress
s@AuthorizeSecurityGroupEgress' {} Maybe Bool
a -> AuthorizeSecurityGroupEgress
s {$sel:dryRun:AuthorizeSecurityGroupEgress' :: Maybe Bool
dryRun = Maybe Bool
a} :: AuthorizeSecurityGroupEgress)

-- | Not supported. Use a set of IP permissions to specify the port.
authorizeSecurityGroupEgress_fromPort :: Lens.Lens' AuthorizeSecurityGroupEgress (Prelude.Maybe Prelude.Int)
authorizeSecurityGroupEgress_fromPort :: Lens' AuthorizeSecurityGroupEgress (Maybe Int)
authorizeSecurityGroupEgress_fromPort = forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\AuthorizeSecurityGroupEgress' {Maybe Int
fromPort :: Maybe Int
$sel:fromPort:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Int
fromPort} -> Maybe Int
fromPort) (\s :: AuthorizeSecurityGroupEgress
s@AuthorizeSecurityGroupEgress' {} Maybe Int
a -> AuthorizeSecurityGroupEgress
s {$sel:fromPort:AuthorizeSecurityGroupEgress' :: Maybe Int
fromPort = Maybe Int
a} :: AuthorizeSecurityGroupEgress)

-- | The sets of IP permissions. You can\'t specify a destination security
-- group and a CIDR IP address range in the same set of permissions.
authorizeSecurityGroupEgress_ipPermissions :: Lens.Lens' AuthorizeSecurityGroupEgress (Prelude.Maybe [IpPermission])
authorizeSecurityGroupEgress_ipPermissions :: Lens' AuthorizeSecurityGroupEgress (Maybe [IpPermission])
authorizeSecurityGroupEgress_ipPermissions = forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\AuthorizeSecurityGroupEgress' {Maybe [IpPermission]
ipPermissions :: Maybe [IpPermission]
$sel:ipPermissions:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe [IpPermission]
ipPermissions} -> Maybe [IpPermission]
ipPermissions) (\s :: AuthorizeSecurityGroupEgress
s@AuthorizeSecurityGroupEgress' {} Maybe [IpPermission]
a -> AuthorizeSecurityGroupEgress
s {$sel:ipPermissions:AuthorizeSecurityGroupEgress' :: Maybe [IpPermission]
ipPermissions = Maybe [IpPermission]
a} :: AuthorizeSecurityGroupEgress) forall b c a. (b -> c) -> (a -> b) -> a -> c
Prelude.. forall (f :: * -> *) (g :: * -> *) s t a b.
(Functor f, Functor g) =>
AnIso s t a b -> Iso (f s) (g t) (f a) (g b)
Lens.mapping forall s t a b. (Coercible s a, Coercible t b) => Iso s t a b
Lens.coerced

-- | Not supported. Use a set of IP permissions to specify the protocol name
-- or number.
authorizeSecurityGroupEgress_ipProtocol :: Lens.Lens' AuthorizeSecurityGroupEgress (Prelude.Maybe Prelude.Text)
authorizeSecurityGroupEgress_ipProtocol :: Lens' AuthorizeSecurityGroupEgress (Maybe Text)
authorizeSecurityGroupEgress_ipProtocol = forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\AuthorizeSecurityGroupEgress' {Maybe Text
ipProtocol :: Maybe Text
$sel:ipProtocol:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
ipProtocol} -> Maybe Text
ipProtocol) (\s :: AuthorizeSecurityGroupEgress
s@AuthorizeSecurityGroupEgress' {} Maybe Text
a -> AuthorizeSecurityGroupEgress
s {$sel:ipProtocol:AuthorizeSecurityGroupEgress' :: Maybe Text
ipProtocol = Maybe Text
a} :: AuthorizeSecurityGroupEgress)

-- | Not supported. Use a set of IP permissions to specify a destination
-- security group.
authorizeSecurityGroupEgress_sourceSecurityGroupName :: Lens.Lens' AuthorizeSecurityGroupEgress (Prelude.Maybe Prelude.Text)
authorizeSecurityGroupEgress_sourceSecurityGroupName :: Lens' AuthorizeSecurityGroupEgress (Maybe Text)
authorizeSecurityGroupEgress_sourceSecurityGroupName = forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\AuthorizeSecurityGroupEgress' {Maybe Text
sourceSecurityGroupName :: Maybe Text
$sel:sourceSecurityGroupName:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
sourceSecurityGroupName} -> Maybe Text
sourceSecurityGroupName) (\s :: AuthorizeSecurityGroupEgress
s@AuthorizeSecurityGroupEgress' {} Maybe Text
a -> AuthorizeSecurityGroupEgress
s {$sel:sourceSecurityGroupName:AuthorizeSecurityGroupEgress' :: Maybe Text
sourceSecurityGroupName = Maybe Text
a} :: AuthorizeSecurityGroupEgress)

-- | Not supported. Use a set of IP permissions to specify a destination
-- security group.
authorizeSecurityGroupEgress_sourceSecurityGroupOwnerId :: Lens.Lens' AuthorizeSecurityGroupEgress (Prelude.Maybe Prelude.Text)
authorizeSecurityGroupEgress_sourceSecurityGroupOwnerId :: Lens' AuthorizeSecurityGroupEgress (Maybe Text)
authorizeSecurityGroupEgress_sourceSecurityGroupOwnerId = forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\AuthorizeSecurityGroupEgress' {Maybe Text
sourceSecurityGroupOwnerId :: Maybe Text
$sel:sourceSecurityGroupOwnerId:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
sourceSecurityGroupOwnerId} -> Maybe Text
sourceSecurityGroupOwnerId) (\s :: AuthorizeSecurityGroupEgress
s@AuthorizeSecurityGroupEgress' {} Maybe Text
a -> AuthorizeSecurityGroupEgress
s {$sel:sourceSecurityGroupOwnerId:AuthorizeSecurityGroupEgress' :: Maybe Text
sourceSecurityGroupOwnerId = Maybe Text
a} :: AuthorizeSecurityGroupEgress)

-- | The tags applied to the security group rule.
authorizeSecurityGroupEgress_tagSpecifications :: Lens.Lens' AuthorizeSecurityGroupEgress (Prelude.Maybe [TagSpecification])
authorizeSecurityGroupEgress_tagSpecifications :: Lens' AuthorizeSecurityGroupEgress (Maybe [TagSpecification])
authorizeSecurityGroupEgress_tagSpecifications = forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\AuthorizeSecurityGroupEgress' {Maybe [TagSpecification]
tagSpecifications :: Maybe [TagSpecification]
$sel:tagSpecifications:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe [TagSpecification]
tagSpecifications} -> Maybe [TagSpecification]
tagSpecifications) (\s :: AuthorizeSecurityGroupEgress
s@AuthorizeSecurityGroupEgress' {} Maybe [TagSpecification]
a -> AuthorizeSecurityGroupEgress
s {$sel:tagSpecifications:AuthorizeSecurityGroupEgress' :: Maybe [TagSpecification]
tagSpecifications = Maybe [TagSpecification]
a} :: AuthorizeSecurityGroupEgress) forall b c a. (b -> c) -> (a -> b) -> a -> c
Prelude.. forall (f :: * -> *) (g :: * -> *) s t a b.
(Functor f, Functor g) =>
AnIso s t a b -> Iso (f s) (g t) (f a) (g b)
Lens.mapping forall s t a b. (Coercible s a, Coercible t b) => Iso s t a b
Lens.coerced

-- | Not supported. Use a set of IP permissions to specify the port.
authorizeSecurityGroupEgress_toPort :: Lens.Lens' AuthorizeSecurityGroupEgress (Prelude.Maybe Prelude.Int)
authorizeSecurityGroupEgress_toPort :: Lens' AuthorizeSecurityGroupEgress (Maybe Int)
authorizeSecurityGroupEgress_toPort = forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\AuthorizeSecurityGroupEgress' {Maybe Int
toPort :: Maybe Int
$sel:toPort:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Int
toPort} -> Maybe Int
toPort) (\s :: AuthorizeSecurityGroupEgress
s@AuthorizeSecurityGroupEgress' {} Maybe Int
a -> AuthorizeSecurityGroupEgress
s {$sel:toPort:AuthorizeSecurityGroupEgress' :: Maybe Int
toPort = Maybe Int
a} :: AuthorizeSecurityGroupEgress)

-- | The ID of the security group.
authorizeSecurityGroupEgress_groupId :: Lens.Lens' AuthorizeSecurityGroupEgress Prelude.Text
authorizeSecurityGroupEgress_groupId :: Lens' AuthorizeSecurityGroupEgress Text
authorizeSecurityGroupEgress_groupId = forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\AuthorizeSecurityGroupEgress' {Text
groupId :: Text
$sel:groupId:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Text
groupId} -> Text
groupId) (\s :: AuthorizeSecurityGroupEgress
s@AuthorizeSecurityGroupEgress' {} Text
a -> AuthorizeSecurityGroupEgress
s {$sel:groupId:AuthorizeSecurityGroupEgress' :: Text
groupId = Text
a} :: AuthorizeSecurityGroupEgress)

instance Core.AWSRequest AuthorizeSecurityGroupEgress where
  type
    AWSResponse AuthorizeSecurityGroupEgress =
      AuthorizeSecurityGroupEgressResponse
  request :: (Service -> Service)
-> AuthorizeSecurityGroupEgress
-> Request AuthorizeSecurityGroupEgress
request Service -> Service
overrides =
    forall a. ToRequest a => Service -> a -> Request a
Request.postQuery (Service -> Service
overrides Service
defaultService)
  response :: forall (m :: * -> *).
MonadResource m =>
(ByteStringLazy -> IO ByteStringLazy)
-> Service
-> Proxy AuthorizeSecurityGroupEgress
-> ClientResponse ClientBody
-> m (Either
        Error (ClientResponse (AWSResponse AuthorizeSecurityGroupEgress)))
response =
    forall (m :: * -> *) a.
MonadResource m =>
(Int -> ResponseHeaders -> [Node] -> Either String (AWSResponse a))
-> (ByteStringLazy -> IO ByteStringLazy)
-> Service
-> Proxy a
-> ClientResponse ClientBody
-> m (Either Error (ClientResponse (AWSResponse a)))
Response.receiveXML
      ( \Int
s ResponseHeaders
h [Node]
x ->
          Maybe Bool
-> Maybe [SecurityGroupRule]
-> Int
-> AuthorizeSecurityGroupEgressResponse
AuthorizeSecurityGroupEgressResponse'
            forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b
Prelude.<$> ([Node]
x forall a. FromXML a => [Node] -> Text -> Either String (Maybe a)
Data..@? Text
"return")
            forall (f :: * -> *) a b. Applicative f => f (a -> b) -> f a -> f b
Prelude.<*> ( [Node]
x
                            forall a. FromXML a => [Node] -> Text -> Either String (Maybe a)
Data..@? Text
"securityGroupRuleSet"
                            forall (f :: * -> *) a. Functor f => f (Maybe a) -> a -> f a
Core..!@ forall a. Monoid a => a
Prelude.mempty
                            forall (m :: * -> *) a b. Monad m => m a -> (a -> m b) -> m b
Prelude.>>= forall (f :: * -> *) a b.
Applicative f =>
([a] -> f b) -> [a] -> f (Maybe b)
Core.may (forall a. FromXML a => Text -> [Node] -> Either String [a]
Data.parseXMLList Text
"item")
                        )
            forall (f :: * -> *) a b. Applicative f => f (a -> b) -> f a -> f b
Prelude.<*> (forall (f :: * -> *) a. Applicative f => a -> f a
Prelude.pure (forall a. Enum a => a -> Int
Prelude.fromEnum Int
s))
      )

instance
  Prelude.Hashable
    AuthorizeSecurityGroupEgress
  where
  hashWithSalt :: Int -> AuthorizeSecurityGroupEgress -> Int
hashWithSalt Int
_salt AuthorizeSecurityGroupEgress' {Maybe Bool
Maybe Int
Maybe [TagSpecification]
Maybe [IpPermission]
Maybe Text
Text
groupId :: Text
toPort :: Maybe Int
tagSpecifications :: Maybe [TagSpecification]
sourceSecurityGroupOwnerId :: Maybe Text
sourceSecurityGroupName :: Maybe Text
ipProtocol :: Maybe Text
ipPermissions :: Maybe [IpPermission]
fromPort :: Maybe Int
dryRun :: Maybe Bool
cidrIp :: Maybe Text
$sel:groupId:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Text
$sel:toPort:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Int
$sel:tagSpecifications:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe [TagSpecification]
$sel:sourceSecurityGroupOwnerId:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
$sel:sourceSecurityGroupName:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
$sel:ipProtocol:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
$sel:ipPermissions:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe [IpPermission]
$sel:fromPort:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Int
$sel:dryRun:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Bool
$sel:cidrIp:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
..} =
    Int
_salt
      forall a. Hashable a => Int -> a -> Int
`Prelude.hashWithSalt` Maybe Text
cidrIp
      forall a. Hashable a => Int -> a -> Int
`Prelude.hashWithSalt` Maybe Bool
dryRun
      forall a. Hashable a => Int -> a -> Int
`Prelude.hashWithSalt` Maybe Int
fromPort
      forall a. Hashable a => Int -> a -> Int
`Prelude.hashWithSalt` Maybe [IpPermission]
ipPermissions
      forall a. Hashable a => Int -> a -> Int
`Prelude.hashWithSalt` Maybe Text
ipProtocol
      forall a. Hashable a => Int -> a -> Int
`Prelude.hashWithSalt` Maybe Text
sourceSecurityGroupName
      forall a. Hashable a => Int -> a -> Int
`Prelude.hashWithSalt` Maybe Text
sourceSecurityGroupOwnerId
      forall a. Hashable a => Int -> a -> Int
`Prelude.hashWithSalt` Maybe [TagSpecification]
tagSpecifications
      forall a. Hashable a => Int -> a -> Int
`Prelude.hashWithSalt` Maybe Int
toPort
      forall a. Hashable a => Int -> a -> Int
`Prelude.hashWithSalt` Text
groupId

instance Prelude.NFData AuthorizeSecurityGroupEgress where
  rnf :: AuthorizeSecurityGroupEgress -> ()
rnf AuthorizeSecurityGroupEgress' {Maybe Bool
Maybe Int
Maybe [TagSpecification]
Maybe [IpPermission]
Maybe Text
Text
groupId :: Text
toPort :: Maybe Int
tagSpecifications :: Maybe [TagSpecification]
sourceSecurityGroupOwnerId :: Maybe Text
sourceSecurityGroupName :: Maybe Text
ipProtocol :: Maybe Text
ipPermissions :: Maybe [IpPermission]
fromPort :: Maybe Int
dryRun :: Maybe Bool
cidrIp :: Maybe Text
$sel:groupId:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Text
$sel:toPort:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Int
$sel:tagSpecifications:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe [TagSpecification]
$sel:sourceSecurityGroupOwnerId:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
$sel:sourceSecurityGroupName:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
$sel:ipProtocol:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
$sel:ipPermissions:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe [IpPermission]
$sel:fromPort:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Int
$sel:dryRun:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Bool
$sel:cidrIp:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
..} =
    forall a. NFData a => a -> ()
Prelude.rnf Maybe Text
cidrIp
      seq :: forall a b. a -> b -> b
`Prelude.seq` forall a. NFData a => a -> ()
Prelude.rnf Maybe Bool
dryRun
      seq :: forall a b. a -> b -> b
`Prelude.seq` forall a. NFData a => a -> ()
Prelude.rnf Maybe Int
fromPort
      seq :: forall a b. a -> b -> b
`Prelude.seq` forall a. NFData a => a -> ()
Prelude.rnf Maybe [IpPermission]
ipPermissions
      seq :: forall a b. a -> b -> b
`Prelude.seq` forall a. NFData a => a -> ()
Prelude.rnf Maybe Text
ipProtocol
      seq :: forall a b. a -> b -> b
`Prelude.seq` forall a. NFData a => a -> ()
Prelude.rnf Maybe Text
sourceSecurityGroupName
      seq :: forall a b. a -> b -> b
`Prelude.seq` forall a. NFData a => a -> ()
Prelude.rnf Maybe Text
sourceSecurityGroupOwnerId
      seq :: forall a b. a -> b -> b
`Prelude.seq` forall a. NFData a => a -> ()
Prelude.rnf Maybe [TagSpecification]
tagSpecifications
      seq :: forall a b. a -> b -> b
`Prelude.seq` forall a. NFData a => a -> ()
Prelude.rnf Maybe Int
toPort
      seq :: forall a b. a -> b -> b
`Prelude.seq` forall a. NFData a => a -> ()
Prelude.rnf Text
groupId

instance Data.ToHeaders AuthorizeSecurityGroupEgress where
  toHeaders :: AuthorizeSecurityGroupEgress -> ResponseHeaders
toHeaders = forall a b. a -> b -> a
Prelude.const forall a. Monoid a => a
Prelude.mempty

instance Data.ToPath AuthorizeSecurityGroupEgress where
  toPath :: AuthorizeSecurityGroupEgress -> ByteString
toPath = forall a b. a -> b -> a
Prelude.const ByteString
"/"

instance Data.ToQuery AuthorizeSecurityGroupEgress where
  toQuery :: AuthorizeSecurityGroupEgress -> QueryString
toQuery AuthorizeSecurityGroupEgress' {Maybe Bool
Maybe Int
Maybe [TagSpecification]
Maybe [IpPermission]
Maybe Text
Text
groupId :: Text
toPort :: Maybe Int
tagSpecifications :: Maybe [TagSpecification]
sourceSecurityGroupOwnerId :: Maybe Text
sourceSecurityGroupName :: Maybe Text
ipProtocol :: Maybe Text
ipPermissions :: Maybe [IpPermission]
fromPort :: Maybe Int
dryRun :: Maybe Bool
cidrIp :: Maybe Text
$sel:groupId:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Text
$sel:toPort:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Int
$sel:tagSpecifications:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe [TagSpecification]
$sel:sourceSecurityGroupOwnerId:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
$sel:sourceSecurityGroupName:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
$sel:ipProtocol:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
$sel:ipPermissions:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe [IpPermission]
$sel:fromPort:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Int
$sel:dryRun:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Bool
$sel:cidrIp:AuthorizeSecurityGroupEgress' :: AuthorizeSecurityGroupEgress -> Maybe Text
..} =
    forall a. Monoid a => [a] -> a
Prelude.mconcat
      [ ByteString
"Action"
          forall a. ToQuery a => ByteString -> a -> QueryString
Data.=: ( ByteString
"AuthorizeSecurityGroupEgress" ::
                      Prelude.ByteString
                  ),
        ByteString
"Version"
          forall a. ToQuery a => ByteString -> a -> QueryString
Data.=: (ByteString
"2016-11-15" :: Prelude.ByteString),
        ByteString
"CidrIp" forall a. ToQuery a => ByteString -> a -> QueryString
Data.=: Maybe Text
cidrIp,
        ByteString
"DryRun" forall a. ToQuery a => ByteString -> a -> QueryString
Data.=: Maybe Bool
dryRun,
        ByteString
"FromPort" forall a. ToQuery a => ByteString -> a -> QueryString
Data.=: Maybe Int
fromPort,
        forall a. ToQuery a => a -> QueryString
Data.toQuery
          ( forall a.
(IsList a, ToQuery (Item a)) =>
ByteString -> a -> QueryString
Data.toQueryList ByteString
"IpPermissions"
              forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b
Prelude.<$> Maybe [IpPermission]
ipPermissions
          ),
        ByteString
"IpProtocol" forall a. ToQuery a => ByteString -> a -> QueryString
Data.=: Maybe Text
ipProtocol,
        ByteString
"SourceSecurityGroupName"
          forall a. ToQuery a => ByteString -> a -> QueryString
Data.=: Maybe Text
sourceSecurityGroupName,
        ByteString
"SourceSecurityGroupOwnerId"
          forall a. ToQuery a => ByteString -> a -> QueryString
Data.=: Maybe Text
sourceSecurityGroupOwnerId,
        forall a. ToQuery a => a -> QueryString
Data.toQuery
          ( forall a.
(IsList a, ToQuery (Item a)) =>
ByteString -> a -> QueryString
Data.toQueryList ByteString
"TagSpecification"
              forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b
Prelude.<$> Maybe [TagSpecification]
tagSpecifications
          ),
        ByteString
"ToPort" forall a. ToQuery a => ByteString -> a -> QueryString
Data.=: Maybe Int
toPort,
        ByteString
"GroupId" forall a. ToQuery a => ByteString -> a -> QueryString
Data.=: Text
groupId
      ]

-- | /See:/ 'newAuthorizeSecurityGroupEgressResponse' smart constructor.
data AuthorizeSecurityGroupEgressResponse = AuthorizeSecurityGroupEgressResponse'
  { -- | Returns @true@ if the request succeeds; otherwise, returns an error.
    AuthorizeSecurityGroupEgressResponse -> Maybe Bool
return' :: Prelude.Maybe Prelude.Bool,
    -- | Information about the outbound (egress) security group rules that were
    -- added.
    AuthorizeSecurityGroupEgressResponse -> Maybe [SecurityGroupRule]
securityGroupRules :: Prelude.Maybe [SecurityGroupRule],
    -- | The response's http status code.
    AuthorizeSecurityGroupEgressResponse -> Int
httpStatus :: Prelude.Int
  }
  deriving (AuthorizeSecurityGroupEgressResponse
-> AuthorizeSecurityGroupEgressResponse -> Bool
forall a. (a -> a -> Bool) -> (a -> a -> Bool) -> Eq a
/= :: AuthorizeSecurityGroupEgressResponse
-> AuthorizeSecurityGroupEgressResponse -> Bool
$c/= :: AuthorizeSecurityGroupEgressResponse
-> AuthorizeSecurityGroupEgressResponse -> Bool
== :: AuthorizeSecurityGroupEgressResponse
-> AuthorizeSecurityGroupEgressResponse -> Bool
$c== :: AuthorizeSecurityGroupEgressResponse
-> AuthorizeSecurityGroupEgressResponse -> Bool
Prelude.Eq, ReadPrec [AuthorizeSecurityGroupEgressResponse]
ReadPrec AuthorizeSecurityGroupEgressResponse
Int -> ReadS AuthorizeSecurityGroupEgressResponse
ReadS [AuthorizeSecurityGroupEgressResponse]
forall a.
(Int -> ReadS a)
-> ReadS [a] -> ReadPrec a -> ReadPrec [a] -> Read a
readListPrec :: ReadPrec [AuthorizeSecurityGroupEgressResponse]
$creadListPrec :: ReadPrec [AuthorizeSecurityGroupEgressResponse]
readPrec :: ReadPrec AuthorizeSecurityGroupEgressResponse
$creadPrec :: ReadPrec AuthorizeSecurityGroupEgressResponse
readList :: ReadS [AuthorizeSecurityGroupEgressResponse]
$creadList :: ReadS [AuthorizeSecurityGroupEgressResponse]
readsPrec :: Int -> ReadS AuthorizeSecurityGroupEgressResponse
$creadsPrec :: Int -> ReadS AuthorizeSecurityGroupEgressResponse
Prelude.Read, Int -> AuthorizeSecurityGroupEgressResponse -> ShowS
[AuthorizeSecurityGroupEgressResponse] -> ShowS
AuthorizeSecurityGroupEgressResponse -> String
forall a.
(Int -> a -> ShowS) -> (a -> String) -> ([a] -> ShowS) -> Show a
showList :: [AuthorizeSecurityGroupEgressResponse] -> ShowS
$cshowList :: [AuthorizeSecurityGroupEgressResponse] -> ShowS
show :: AuthorizeSecurityGroupEgressResponse -> String
$cshow :: AuthorizeSecurityGroupEgressResponse -> String
showsPrec :: Int -> AuthorizeSecurityGroupEgressResponse -> ShowS
$cshowsPrec :: Int -> AuthorizeSecurityGroupEgressResponse -> ShowS
Prelude.Show, forall x.
Rep AuthorizeSecurityGroupEgressResponse x
-> AuthorizeSecurityGroupEgressResponse
forall x.
AuthorizeSecurityGroupEgressResponse
-> Rep AuthorizeSecurityGroupEgressResponse x
forall a.
(forall x. a -> Rep a x) -> (forall x. Rep a x -> a) -> Generic a
$cto :: forall x.
Rep AuthorizeSecurityGroupEgressResponse x
-> AuthorizeSecurityGroupEgressResponse
$cfrom :: forall x.
AuthorizeSecurityGroupEgressResponse
-> Rep AuthorizeSecurityGroupEgressResponse x
Prelude.Generic)

-- |
-- Create a value of 'AuthorizeSecurityGroupEgressResponse' with all optional fields omitted.
--
-- Use <https://hackage.haskell.org/package/generic-lens generic-lens> or <https://hackage.haskell.org/package/optics optics> to modify other optional fields.
--
-- The following record fields are available, with the corresponding lenses provided
-- for backwards compatibility:
--
-- 'return'', 'authorizeSecurityGroupEgressResponse_return' - Returns @true@ if the request succeeds; otherwise, returns an error.
--
-- 'securityGroupRules', 'authorizeSecurityGroupEgressResponse_securityGroupRules' - Information about the outbound (egress) security group rules that were
-- added.
--
-- 'httpStatus', 'authorizeSecurityGroupEgressResponse_httpStatus' - The response's http status code.
newAuthorizeSecurityGroupEgressResponse ::
  -- | 'httpStatus'
  Prelude.Int ->
  AuthorizeSecurityGroupEgressResponse
newAuthorizeSecurityGroupEgressResponse :: Int -> AuthorizeSecurityGroupEgressResponse
newAuthorizeSecurityGroupEgressResponse Int
pHttpStatus_ =
  AuthorizeSecurityGroupEgressResponse'
    { $sel:return':AuthorizeSecurityGroupEgressResponse' :: Maybe Bool
return' =
        forall a. Maybe a
Prelude.Nothing,
      $sel:securityGroupRules:AuthorizeSecurityGroupEgressResponse' :: Maybe [SecurityGroupRule]
securityGroupRules = forall a. Maybe a
Prelude.Nothing,
      $sel:httpStatus:AuthorizeSecurityGroupEgressResponse' :: Int
httpStatus = Int
pHttpStatus_
    }

-- | Returns @true@ if the request succeeds; otherwise, returns an error.
authorizeSecurityGroupEgressResponse_return :: Lens.Lens' AuthorizeSecurityGroupEgressResponse (Prelude.Maybe Prelude.Bool)
authorizeSecurityGroupEgressResponse_return :: Lens' AuthorizeSecurityGroupEgressResponse (Maybe Bool)
authorizeSecurityGroupEgressResponse_return = forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\AuthorizeSecurityGroupEgressResponse' {Maybe Bool
return' :: Maybe Bool
$sel:return':AuthorizeSecurityGroupEgressResponse' :: AuthorizeSecurityGroupEgressResponse -> Maybe Bool
return'} -> Maybe Bool
return') (\s :: AuthorizeSecurityGroupEgressResponse
s@AuthorizeSecurityGroupEgressResponse' {} Maybe Bool
a -> AuthorizeSecurityGroupEgressResponse
s {$sel:return':AuthorizeSecurityGroupEgressResponse' :: Maybe Bool
return' = Maybe Bool
a} :: AuthorizeSecurityGroupEgressResponse)

-- | Information about the outbound (egress) security group rules that were
-- added.
authorizeSecurityGroupEgressResponse_securityGroupRules :: Lens.Lens' AuthorizeSecurityGroupEgressResponse (Prelude.Maybe [SecurityGroupRule])
authorizeSecurityGroupEgressResponse_securityGroupRules :: Lens'
  AuthorizeSecurityGroupEgressResponse (Maybe [SecurityGroupRule])
authorizeSecurityGroupEgressResponse_securityGroupRules = forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\AuthorizeSecurityGroupEgressResponse' {Maybe [SecurityGroupRule]
securityGroupRules :: Maybe [SecurityGroupRule]
$sel:securityGroupRules:AuthorizeSecurityGroupEgressResponse' :: AuthorizeSecurityGroupEgressResponse -> Maybe [SecurityGroupRule]
securityGroupRules} -> Maybe [SecurityGroupRule]
securityGroupRules) (\s :: AuthorizeSecurityGroupEgressResponse
s@AuthorizeSecurityGroupEgressResponse' {} Maybe [SecurityGroupRule]
a -> AuthorizeSecurityGroupEgressResponse
s {$sel:securityGroupRules:AuthorizeSecurityGroupEgressResponse' :: Maybe [SecurityGroupRule]
securityGroupRules = Maybe [SecurityGroupRule]
a} :: AuthorizeSecurityGroupEgressResponse) forall b c a. (b -> c) -> (a -> b) -> a -> c
Prelude.. forall (f :: * -> *) (g :: * -> *) s t a b.
(Functor f, Functor g) =>
AnIso s t a b -> Iso (f s) (g t) (f a) (g b)
Lens.mapping forall s t a b. (Coercible s a, Coercible t b) => Iso s t a b
Lens.coerced

-- | The response's http status code.
authorizeSecurityGroupEgressResponse_httpStatus :: Lens.Lens' AuthorizeSecurityGroupEgressResponse Prelude.Int
authorizeSecurityGroupEgressResponse_httpStatus :: Lens' AuthorizeSecurityGroupEgressResponse Int
authorizeSecurityGroupEgressResponse_httpStatus = forall s a b t. (s -> a) -> (s -> b -> t) -> Lens s t a b
Lens.lens (\AuthorizeSecurityGroupEgressResponse' {Int
httpStatus :: Int
$sel:httpStatus:AuthorizeSecurityGroupEgressResponse' :: AuthorizeSecurityGroupEgressResponse -> Int
httpStatus} -> Int
httpStatus) (\s :: AuthorizeSecurityGroupEgressResponse
s@AuthorizeSecurityGroupEgressResponse' {} Int
a -> AuthorizeSecurityGroupEgressResponse
s {$sel:httpStatus:AuthorizeSecurityGroupEgressResponse' :: Int
httpStatus = Int
a} :: AuthorizeSecurityGroupEgressResponse)

instance
  Prelude.NFData
    AuthorizeSecurityGroupEgressResponse
  where
  rnf :: AuthorizeSecurityGroupEgressResponse -> ()
rnf AuthorizeSecurityGroupEgressResponse' {Int
Maybe Bool
Maybe [SecurityGroupRule]
httpStatus :: Int
securityGroupRules :: Maybe [SecurityGroupRule]
return' :: Maybe Bool
$sel:httpStatus:AuthorizeSecurityGroupEgressResponse' :: AuthorizeSecurityGroupEgressResponse -> Int
$sel:securityGroupRules:AuthorizeSecurityGroupEgressResponse' :: AuthorizeSecurityGroupEgressResponse -> Maybe [SecurityGroupRule]
$sel:return':AuthorizeSecurityGroupEgressResponse' :: AuthorizeSecurityGroupEgressResponse -> Maybe Bool
..} =
    forall a. NFData a => a -> ()
Prelude.rnf Maybe Bool
return'
      seq :: forall a b. a -> b -> b
`Prelude.seq` forall a. NFData a => a -> ()
Prelude.rnf Maybe [SecurityGroupRule]
securityGroupRules
      seq :: forall a b. a -> b -> b
`Prelude.seq` forall a. NFData a => a -> ()
Prelude.rnf Int
httpStatus