amazonka-ec2-2.0: Amazon Elastic Compute Cloud SDK.
Copyright(c) 2013-2023 Brendan Hay
LicenseMozilla Public License, v. 2.0.
MaintainerBrendan Hay
Stabilityauto-generated
Portabilitynon-portable (GHC extensions)
Safe HaskellSafe-Inferred
LanguageHaskell2010

Amazonka.EC2.ReplaceNetworkAclEntry

Description

Replaces an entry (rule) in a network ACL. For more information, see Network ACLs in the Amazon Virtual Private Cloud User Guide.

Synopsis

Creating a Request

data ReplaceNetworkAclEntry Source #

See: newReplaceNetworkAclEntry smart constructor.

Constructors

ReplaceNetworkAclEntry' 

Fields

  • cidrBlock :: Maybe Text

    The IPv4 network range to allow or deny, in CIDR notation (for example 172.16.0.0/24).

  • dryRun :: Maybe Bool

    Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation. Otherwise, it is UnauthorizedOperation.

  • icmpTypeCode :: Maybe IcmpTypeCode

    ICMP protocol: The ICMP or ICMPv6 type and code. Required if specifying protocol 1 (ICMP) or protocol 58 (ICMPv6) with an IPv6 CIDR block.

  • ipv6CidrBlock :: Maybe Text

    The IPv6 network range to allow or deny, in CIDR notation (for example 2001:bd8:1234:1a00::/64).

  • portRange :: Maybe PortRange

    TCP or UDP protocols: The range of ports the rule applies to. Required if specifying protocol 6 (TCP) or 17 (UDP).

  • egress :: Bool

    Indicates whether to replace the egress rule.

    Default: If no value is specified, we replace the ingress rule.

  • networkAclId :: Text

    The ID of the ACL.

  • protocol :: Text

    The protocol number. A value of "-1" means all protocols. If you specify "-1" or a protocol number other than "6" (TCP), "17" (UDP), or "1" (ICMP), traffic on all ports is allowed, regardless of any ports or ICMP types or codes that you specify. If you specify protocol "58" (ICMPv6) and specify an IPv4 CIDR block, traffic for all ICMP types and codes allowed, regardless of any that you specify. If you specify protocol "58" (ICMPv6) and specify an IPv6 CIDR block, you must specify an ICMP type and code.

  • ruleAction :: RuleAction

    Indicates whether to allow or deny the traffic that matches the rule.

  • ruleNumber :: Int

    The rule number of the entry to replace.

Instances

Instances details
ToHeaders ReplaceNetworkAclEntry Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

ToPath ReplaceNetworkAclEntry Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

ToQuery ReplaceNetworkAclEntry Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

AWSRequest ReplaceNetworkAclEntry Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

Associated Types

type AWSResponse ReplaceNetworkAclEntry #

Generic ReplaceNetworkAclEntry Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

Associated Types

type Rep ReplaceNetworkAclEntry :: Type -> Type #

Read ReplaceNetworkAclEntry Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

Show ReplaceNetworkAclEntry Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

NFData ReplaceNetworkAclEntry Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

Methods

rnf :: ReplaceNetworkAclEntry -> () #

Eq ReplaceNetworkAclEntry Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

Hashable ReplaceNetworkAclEntry Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

type AWSResponse ReplaceNetworkAclEntry Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

type Rep ReplaceNetworkAclEntry Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

newReplaceNetworkAclEntry Source #

Create a value of ReplaceNetworkAclEntry with all optional fields omitted.

Use generic-lens or optics to modify other optional fields.

The following record fields are available, with the corresponding lenses provided for backwards compatibility:

ReplaceNetworkAclEntry, replaceNetworkAclEntry_cidrBlock - The IPv4 network range to allow or deny, in CIDR notation (for example 172.16.0.0/24).

$sel:dryRun:ReplaceNetworkAclEntry', replaceNetworkAclEntry_dryRun - Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation. Otherwise, it is UnauthorizedOperation.

ReplaceNetworkAclEntry, replaceNetworkAclEntry_icmpTypeCode - ICMP protocol: The ICMP or ICMPv6 type and code. Required if specifying protocol 1 (ICMP) or protocol 58 (ICMPv6) with an IPv6 CIDR block.

ReplaceNetworkAclEntry, replaceNetworkAclEntry_ipv6CidrBlock - The IPv6 network range to allow or deny, in CIDR notation (for example 2001:bd8:1234:1a00::/64).

ReplaceNetworkAclEntry, replaceNetworkAclEntry_portRange - TCP or UDP protocols: The range of ports the rule applies to. Required if specifying protocol 6 (TCP) or 17 (UDP).

ReplaceNetworkAclEntry, replaceNetworkAclEntry_egress - Indicates whether to replace the egress rule.

Default: If no value is specified, we replace the ingress rule.

ReplaceNetworkAclEntry, replaceNetworkAclEntry_networkAclId - The ID of the ACL.

ReplaceNetworkAclEntry, replaceNetworkAclEntry_protocol - The protocol number. A value of "-1" means all protocols. If you specify "-1" or a protocol number other than "6" (TCP), "17" (UDP), or "1" (ICMP), traffic on all ports is allowed, regardless of any ports or ICMP types or codes that you specify. If you specify protocol "58" (ICMPv6) and specify an IPv4 CIDR block, traffic for all ICMP types and codes allowed, regardless of any that you specify. If you specify protocol "58" (ICMPv6) and specify an IPv6 CIDR block, you must specify an ICMP type and code.

ReplaceNetworkAclEntry, replaceNetworkAclEntry_ruleAction - Indicates whether to allow or deny the traffic that matches the rule.

ReplaceNetworkAclEntry, replaceNetworkAclEntry_ruleNumber - The rule number of the entry to replace.

Request Lenses

replaceNetworkAclEntry_cidrBlock :: Lens' ReplaceNetworkAclEntry (Maybe Text) Source #

The IPv4 network range to allow or deny, in CIDR notation (for example 172.16.0.0/24).

replaceNetworkAclEntry_dryRun :: Lens' ReplaceNetworkAclEntry (Maybe Bool) Source #

Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation. Otherwise, it is UnauthorizedOperation.

replaceNetworkAclEntry_icmpTypeCode :: Lens' ReplaceNetworkAclEntry (Maybe IcmpTypeCode) Source #

ICMP protocol: The ICMP or ICMPv6 type and code. Required if specifying protocol 1 (ICMP) or protocol 58 (ICMPv6) with an IPv6 CIDR block.

replaceNetworkAclEntry_ipv6CidrBlock :: Lens' ReplaceNetworkAclEntry (Maybe Text) Source #

The IPv6 network range to allow or deny, in CIDR notation (for example 2001:bd8:1234:1a00::/64).

replaceNetworkAclEntry_portRange :: Lens' ReplaceNetworkAclEntry (Maybe PortRange) Source #

TCP or UDP protocols: The range of ports the rule applies to. Required if specifying protocol 6 (TCP) or 17 (UDP).

replaceNetworkAclEntry_egress :: Lens' ReplaceNetworkAclEntry Bool Source #

Indicates whether to replace the egress rule.

Default: If no value is specified, we replace the ingress rule.

replaceNetworkAclEntry_protocol :: Lens' ReplaceNetworkAclEntry Text Source #

The protocol number. A value of "-1" means all protocols. If you specify "-1" or a protocol number other than "6" (TCP), "17" (UDP), or "1" (ICMP), traffic on all ports is allowed, regardless of any ports or ICMP types or codes that you specify. If you specify protocol "58" (ICMPv6) and specify an IPv4 CIDR block, traffic for all ICMP types and codes allowed, regardless of any that you specify. If you specify protocol "58" (ICMPv6) and specify an IPv6 CIDR block, you must specify an ICMP type and code.

replaceNetworkAclEntry_ruleAction :: Lens' ReplaceNetworkAclEntry RuleAction Source #

Indicates whether to allow or deny the traffic that matches the rule.

replaceNetworkAclEntry_ruleNumber :: Lens' ReplaceNetworkAclEntry Int Source #

The rule number of the entry to replace.

Destructuring the Response

data ReplaceNetworkAclEntryResponse Source #

See: newReplaceNetworkAclEntryResponse smart constructor.

Instances

Instances details
Generic ReplaceNetworkAclEntryResponse Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

Associated Types

type Rep ReplaceNetworkAclEntryResponse :: Type -> Type #

Read ReplaceNetworkAclEntryResponse Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

Show ReplaceNetworkAclEntryResponse Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

NFData ReplaceNetworkAclEntryResponse Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

Eq ReplaceNetworkAclEntryResponse Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

type Rep ReplaceNetworkAclEntryResponse Source # 
Instance details

Defined in Amazonka.EC2.ReplaceNetworkAclEntry

type Rep ReplaceNetworkAclEntryResponse = D1 ('MetaData "ReplaceNetworkAclEntryResponse" "Amazonka.EC2.ReplaceNetworkAclEntry" "amazonka-ec2-2.0-48L9RAJvmvzAdBkRegqWCL" 'False) (C1 ('MetaCons "ReplaceNetworkAclEntryResponse'" 'PrefixI 'False) (U1 :: Type -> Type))

newReplaceNetworkAclEntryResponse :: ReplaceNetworkAclEntryResponse Source #

Create a value of ReplaceNetworkAclEntryResponse with all optional fields omitted.

Use generic-lens or optics to modify other optional fields.