pub struct SecurityGroupRuleResult {
pub cidr_blocks: Output<Option<Vec<String>>>,
pub description: Output<Option<String>>,
pub from_port: Output<i32>,
pub ipv6_cidr_blocks: Output<Option<Vec<String>>>,
pub prefix_list_ids: Output<Option<Vec<String>>>,
pub protocol: Output<String>,
pub security_group_id: Output<String>,
pub security_group_rule_id: Output<String>,
pub self_: Output<Option<bool>>,
pub source_security_group_id: Output<String>,
pub to_port: Output<i32>,
pub type_: Output<String>,
}
Fields§
§cidr_blocks: Output<Option<Vec<String>>>
List of CIDR blocks. Cannot be specified with source_security_group_id
or self
.
description: Output<Option<String>>
Description of the rule.
from_port: Output<i32>
Start port (or ICMP type number if protocol is “icmp” or “icmpv6”).
ipv6_cidr_blocks: Output<Option<Vec<String>>>
List of IPv6 CIDR blocks. Cannot be specified with source_security_group_id
or self
.
prefix_list_ids: Output<Option<Vec<String>>>
List of Prefix List IDs.
protocol: Output<String>
Protocol. If not icmp, icmpv6, tcp, udp, or all use the protocol number
security_group_id: Output<String>
Security group to apply this rule to.
security_group_rule_id: Output<String>
If the aws.ec2.SecurityGroupRule
resource has a single source or destination then this is the AWS Security Group Rule resource ID. Otherwise it is empty.
self_: Output<Option<bool>>
Whether the security group itself will be added as a source to this ingress rule. Cannot be specified with cidr_blocks
, ipv6_cidr_blocks
, or source_security_group_id
.
source_security_group_id: Output<String>
Security group id to allow access to/from, depending on the type
. Cannot be specified with cidr_blocks
, ipv6_cidr_blocks
, or self
.
to_port: Output<i32>
End port (or ICMP code if protocol is “icmp”).
type_: Output<String>
Type of rule being created. Valid options are ingress
(inbound)
or egress
(outbound).
The following arguments are optional:
Note Although
cidr_blocks
,ipv6_cidr_blocks
,prefix_list_ids
, andsource_security_group_id
are all marked as optional, you must provide one of them in order to configure the source of the traffic.