amazonka-ec2-1.6.0: Amazon Elastic Compute Cloud SDK.

Copyright(c) 2013-2018 Brendan Hay
LicenseMozilla Public License, v. 2.0.
MaintainerBrendan Hay <brendan.g.hay+amazonka@gmail.com>
Stabilityauto-generated
Portabilitynon-portable (GHC extensions)
Safe HaskellNone
LanguageHaskell2010

Network.AWS.EC2.AuthorizeSecurityGroupEgress

Contents

Description

EC2-VPC only
Adds one or more egress rules to a security group for use with a VPC. Specifically, this action permits instances to send traffic to one or more destination IPv4 or IPv6 CIDR address ranges, or to one or more destination security groups for the same VPC. This action doesn't apply to security groups for use in EC2-Classic. For more information, see Security Groups for Your VPC in the Amazon Virtual Private Cloud User Guide . For more information about security group limits, see Amazon VPC Limits .

Each rule consists of the protocol (for example, TCP), plus either a CIDR range or a source group. For the TCP and UDP protocols, you must also specify the destination port or port range. For the ICMP protocol, you must also specify the ICMP type and code. You can use -1 for the type or code to mean all types or all codes. You can optionally specify a description for the rule.

Rule changes are propagated to affected instances as quickly as possible. However, a small delay might occur.

Synopsis

Creating a Request

authorizeSecurityGroupEgress Source #

Creates a value of AuthorizeSecurityGroupEgress with the minimum fields required to make a request.

Use one of the following lenses to modify other fields as desired:

  • asgeFromPort - Not supported. Use a set of IP permissions to specify the port.
  • asgeIPPermissions - One or more sets of IP permissions. You can't specify a destination security group and a CIDR IP address range in the same set of permissions.
  • asgeIPProtocol - Not supported. Use a set of IP permissions to specify the protocol name or number.
  • asgeToPort - Not supported. Use a set of IP permissions to specify the port.
  • asgeCidrIP - Not supported. Use a set of IP permissions to specify the CIDR.
  • asgeSourceSecurityGroupOwnerId - Not supported. Use a set of IP permissions to specify a destination security group.
  • asgeSourceSecurityGroupName - Not supported. Use a set of IP permissions to specify a destination security group.
  • asgeDryRun - Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation . Otherwise, it is UnauthorizedOperation .
  • asgeGroupId - The ID of the security group.

data AuthorizeSecurityGroupEgress Source #

Contains the parameters for AuthorizeSecurityGroupEgress.

See: authorizeSecurityGroupEgress smart constructor.

Instances

Eq AuthorizeSecurityGroupEgress Source # 
Data AuthorizeSecurityGroupEgress Source # 

Methods

gfoldl :: (forall d b. Data d => c (d -> b) -> d -> c b) -> (forall g. g -> c g) -> AuthorizeSecurityGroupEgress -> c AuthorizeSecurityGroupEgress #

gunfold :: (forall b r. Data b => c (b -> r) -> c r) -> (forall r. r -> c r) -> Constr -> c AuthorizeSecurityGroupEgress #

toConstr :: AuthorizeSecurityGroupEgress -> Constr #

dataTypeOf :: AuthorizeSecurityGroupEgress -> DataType #

dataCast1 :: Typeable (* -> *) t => (forall d. Data d => c (t d)) -> Maybe (c AuthorizeSecurityGroupEgress) #

dataCast2 :: Typeable (* -> * -> *) t => (forall d e. (Data d, Data e) => c (t d e)) -> Maybe (c AuthorizeSecurityGroupEgress) #

gmapT :: (forall b. Data b => b -> b) -> AuthorizeSecurityGroupEgress -> AuthorizeSecurityGroupEgress #

gmapQl :: (r -> r' -> r) -> r -> (forall d. Data d => d -> r') -> AuthorizeSecurityGroupEgress -> r #

gmapQr :: (r' -> r -> r) -> r -> (forall d. Data d => d -> r') -> AuthorizeSecurityGroupEgress -> r #

gmapQ :: (forall d. Data d => d -> u) -> AuthorizeSecurityGroupEgress -> [u] #

gmapQi :: Int -> (forall d. Data d => d -> u) -> AuthorizeSecurityGroupEgress -> u #

gmapM :: Monad m => (forall d. Data d => d -> m d) -> AuthorizeSecurityGroupEgress -> m AuthorizeSecurityGroupEgress #

gmapMp :: MonadPlus m => (forall d. Data d => d -> m d) -> AuthorizeSecurityGroupEgress -> m AuthorizeSecurityGroupEgress #

gmapMo :: MonadPlus m => (forall d. Data d => d -> m d) -> AuthorizeSecurityGroupEgress -> m AuthorizeSecurityGroupEgress #

Read AuthorizeSecurityGroupEgress Source # 
Show AuthorizeSecurityGroupEgress Source # 
Generic AuthorizeSecurityGroupEgress Source # 
Hashable AuthorizeSecurityGroupEgress Source # 
NFData AuthorizeSecurityGroupEgress Source # 
AWSRequest AuthorizeSecurityGroupEgress Source # 
ToHeaders AuthorizeSecurityGroupEgress Source # 
ToPath AuthorizeSecurityGroupEgress Source # 
ToQuery AuthorizeSecurityGroupEgress Source # 
type Rep AuthorizeSecurityGroupEgress Source # 
type Rep AuthorizeSecurityGroupEgress = D1 * (MetaData "AuthorizeSecurityGroupEgress" "Network.AWS.EC2.AuthorizeSecurityGroupEgress" "amazonka-ec2-1.6.0-Kkew7Kpgof6EYi20Z0WOzs" False) (C1 * (MetaCons "AuthorizeSecurityGroupEgress'" PrefixI True) ((:*:) * ((:*:) * ((:*:) * (S1 * (MetaSel (Just Symbol "_asgeFromPort") NoSourceUnpackedness SourceStrict DecidedStrict) (Rec0 * (Maybe Int))) (S1 * (MetaSel (Just Symbol "_asgeIPPermissions") NoSourceUnpackedness SourceStrict DecidedStrict) (Rec0 * (Maybe [IPPermission])))) ((:*:) * (S1 * (MetaSel (Just Symbol "_asgeIPProtocol") NoSourceUnpackedness SourceStrict DecidedStrict) (Rec0 * (Maybe Text))) (S1 * (MetaSel (Just Symbol "_asgeToPort") NoSourceUnpackedness SourceStrict DecidedStrict) (Rec0 * (Maybe Int))))) ((:*:) * ((:*:) * (S1 * (MetaSel (Just Symbol "_asgeCidrIP") NoSourceUnpackedness SourceStrict DecidedStrict) (Rec0 * (Maybe Text))) (S1 * (MetaSel (Just Symbol "_asgeSourceSecurityGroupOwnerId") NoSourceUnpackedness SourceStrict DecidedStrict) (Rec0 * (Maybe Text)))) ((:*:) * (S1 * (MetaSel (Just Symbol "_asgeSourceSecurityGroupName") NoSourceUnpackedness SourceStrict DecidedStrict) (Rec0 * (Maybe Text))) ((:*:) * (S1 * (MetaSel (Just Symbol "_asgeDryRun") NoSourceUnpackedness SourceStrict DecidedStrict) (Rec0 * (Maybe Bool))) (S1 * (MetaSel (Just Symbol "_asgeGroupId") NoSourceUnpackedness SourceStrict DecidedStrict) (Rec0 * Text)))))))
type Rs AuthorizeSecurityGroupEgress Source # 

Request Lenses

asgeFromPort :: Lens' AuthorizeSecurityGroupEgress (Maybe Int) Source #

Not supported. Use a set of IP permissions to specify the port.

asgeIPPermissions :: Lens' AuthorizeSecurityGroupEgress [IPPermission] Source #

One or more sets of IP permissions. You can't specify a destination security group and a CIDR IP address range in the same set of permissions.

asgeIPProtocol :: Lens' AuthorizeSecurityGroupEgress (Maybe Text) Source #

Not supported. Use a set of IP permissions to specify the protocol name or number.

asgeToPort :: Lens' AuthorizeSecurityGroupEgress (Maybe Int) Source #

Not supported. Use a set of IP permissions to specify the port.

asgeCidrIP :: Lens' AuthorizeSecurityGroupEgress (Maybe Text) Source #

Not supported. Use a set of IP permissions to specify the CIDR.

asgeSourceSecurityGroupOwnerId :: Lens' AuthorizeSecurityGroupEgress (Maybe Text) Source #

Not supported. Use a set of IP permissions to specify a destination security group.

asgeSourceSecurityGroupName :: Lens' AuthorizeSecurityGroupEgress (Maybe Text) Source #

Not supported. Use a set of IP permissions to specify a destination security group.

asgeDryRun :: Lens' AuthorizeSecurityGroupEgress (Maybe Bool) Source #

Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation . Otherwise, it is UnauthorizedOperation .

asgeGroupId :: Lens' AuthorizeSecurityGroupEgress Text Source #

The ID of the security group.

Destructuring the Response

authorizeSecurityGroupEgressResponse :: AuthorizeSecurityGroupEgressResponse Source #

Creates a value of AuthorizeSecurityGroupEgressResponse with the minimum fields required to make a request.

data AuthorizeSecurityGroupEgressResponse Source #

See: authorizeSecurityGroupEgressResponse smart constructor.

Instances

Eq AuthorizeSecurityGroupEgressResponse Source # 
Data AuthorizeSecurityGroupEgressResponse Source # 

Methods

gfoldl :: (forall d b. Data d => c (d -> b) -> d -> c b) -> (forall g. g -> c g) -> AuthorizeSecurityGroupEgressResponse -> c AuthorizeSecurityGroupEgressResponse #

gunfold :: (forall b r. Data b => c (b -> r) -> c r) -> (forall r. r -> c r) -> Constr -> c AuthorizeSecurityGroupEgressResponse #

toConstr :: AuthorizeSecurityGroupEgressResponse -> Constr #

dataTypeOf :: AuthorizeSecurityGroupEgressResponse -> DataType #

dataCast1 :: Typeable (* -> *) t => (forall d. Data d => c (t d)) -> Maybe (c AuthorizeSecurityGroupEgressResponse) #

dataCast2 :: Typeable (* -> * -> *) t => (forall d e. (Data d, Data e) => c (t d e)) -> Maybe (c AuthorizeSecurityGroupEgressResponse) #

gmapT :: (forall b. Data b => b -> b) -> AuthorizeSecurityGroupEgressResponse -> AuthorizeSecurityGroupEgressResponse #

gmapQl :: (r -> r' -> r) -> r -> (forall d. Data d => d -> r') -> AuthorizeSecurityGroupEgressResponse -> r #

gmapQr :: (r' -> r -> r) -> r -> (forall d. Data d => d -> r') -> AuthorizeSecurityGroupEgressResponse -> r #

gmapQ :: (forall d. Data d => d -> u) -> AuthorizeSecurityGroupEgressResponse -> [u] #

gmapQi :: Int -> (forall d. Data d => d -> u) -> AuthorizeSecurityGroupEgressResponse -> u #

gmapM :: Monad m => (forall d. Data d => d -> m d) -> AuthorizeSecurityGroupEgressResponse -> m AuthorizeSecurityGroupEgressResponse #

gmapMp :: MonadPlus m => (forall d. Data d => d -> m d) -> AuthorizeSecurityGroupEgressResponse -> m AuthorizeSecurityGroupEgressResponse #

gmapMo :: MonadPlus m => (forall d. Data d => d -> m d) -> AuthorizeSecurityGroupEgressResponse -> m AuthorizeSecurityGroupEgressResponse #

Read AuthorizeSecurityGroupEgressResponse Source # 
Show AuthorizeSecurityGroupEgressResponse Source # 
Generic AuthorizeSecurityGroupEgressResponse Source # 
NFData AuthorizeSecurityGroupEgressResponse Source # 
type Rep AuthorizeSecurityGroupEgressResponse Source # 
type Rep AuthorizeSecurityGroupEgressResponse = D1 * (MetaData "AuthorizeSecurityGroupEgressResponse" "Network.AWS.EC2.AuthorizeSecurityGroupEgress" "amazonka-ec2-1.6.0-Kkew7Kpgof6EYi20Z0WOzs" False) (C1 * (MetaCons "AuthorizeSecurityGroupEgressResponse'" PrefixI False) (U1 *))