line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
|
2
|
|
|
|
|
|
|
package Paws::EC2::AuthorizeSecurityGroupIngress; |
3
|
1
|
|
|
1
|
|
697
|
use Moose; |
|
1
|
|
|
|
|
3
|
|
|
1
|
|
|
|
|
12
|
|
4
|
|
|
|
|
|
|
has CidrIp => (is => 'ro', isa => 'Str'); |
5
|
|
|
|
|
|
|
has DryRun => (is => 'ro', isa => 'Bool', traits => ['NameInRequest'], request_name => 'dryRun' ); |
6
|
|
|
|
|
|
|
has FromPort => (is => 'ro', isa => 'Int'); |
7
|
|
|
|
|
|
|
has GroupId => (is => 'ro', isa => 'Str'); |
8
|
|
|
|
|
|
|
has GroupName => (is => 'ro', isa => 'Str'); |
9
|
|
|
|
|
|
|
has IpPermissions => (is => 'ro', isa => 'ArrayRef[Paws::EC2::IpPermission]'); |
10
|
|
|
|
|
|
|
has IpProtocol => (is => 'ro', isa => 'Str'); |
11
|
|
|
|
|
|
|
has SourceSecurityGroupName => (is => 'ro', isa => 'Str'); |
12
|
|
|
|
|
|
|
has SourceSecurityGroupOwnerId => (is => 'ro', isa => 'Str'); |
13
|
|
|
|
|
|
|
has ToPort => (is => 'ro', isa => 'Int'); |
14
|
|
|
|
|
|
|
|
15
|
1
|
|
|
1
|
|
18114
|
use MooseX::ClassAttribute; |
|
1
|
|
|
|
|
6
|
|
|
1
|
|
|
|
|
14
|
|
16
|
|
|
|
|
|
|
|
17
|
|
|
|
|
|
|
class_has _api_call => (isa => 'Str', is => 'ro', default => 'AuthorizeSecurityGroupIngress'); |
18
|
|
|
|
|
|
|
class_has _returns => (isa => 'Str', is => 'ro', default => 'Paws::API::Response'); |
19
|
|
|
|
|
|
|
class_has _result_key => (isa => 'Str', is => 'ro'); |
20
|
|
|
|
|
|
|
1; |
21
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
### main pod documentation begin ### |
23
|
|
|
|
|
|
|
|
24
|
|
|
|
|
|
|
=head1 NAME |
25
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
Paws::EC2::AuthorizeSecurityGroupIngress - Arguments for method AuthorizeSecurityGroupIngress on Paws::EC2 |
27
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
=head1 DESCRIPTION |
29
|
|
|
|
|
|
|
|
30
|
|
|
|
|
|
|
This class represents the parameters used for calling the method AuthorizeSecurityGroupIngress on the |
31
|
|
|
|
|
|
|
Amazon Elastic Compute Cloud service. Use the attributes of this class |
32
|
|
|
|
|
|
|
as arguments to method AuthorizeSecurityGroupIngress. |
33
|
|
|
|
|
|
|
|
34
|
|
|
|
|
|
|
You shouldn't make instances of this class. Each attribute should be used as a named argument in the call to AuthorizeSecurityGroupIngress. |
35
|
|
|
|
|
|
|
|
36
|
|
|
|
|
|
|
As an example: |
37
|
|
|
|
|
|
|
|
38
|
|
|
|
|
|
|
$service_obj->AuthorizeSecurityGroupIngress(Att1 => $value1, Att2 => $value2, ...); |
39
|
|
|
|
|
|
|
|
40
|
|
|
|
|
|
|
Values for attributes that are native types (Int, String, Float, etc) can passed as-is (scalar values). Values for complex Types (objects) can be passed as a HashRef. The keys and values of the hashref will be used to instance the underlying object. |
41
|
|
|
|
|
|
|
|
42
|
|
|
|
|
|
|
=head1 ATTRIBUTES |
43
|
|
|
|
|
|
|
|
44
|
|
|
|
|
|
|
|
45
|
|
|
|
|
|
|
=head2 CidrIp => Str |
46
|
|
|
|
|
|
|
|
47
|
|
|
|
|
|
|
The CIDR IPv4 address range. You can't specify this parameter when |
48
|
|
|
|
|
|
|
specifying a source security group. |
49
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
|
51
|
|
|
|
|
|
|
|
52
|
|
|
|
|
|
|
=head2 DryRun => Bool |
53
|
|
|
|
|
|
|
|
54
|
|
|
|
|
|
|
Checks whether you have the required permissions for the action, |
55
|
|
|
|
|
|
|
without actually making the request, and provides an error response. If |
56
|
|
|
|
|
|
|
you have the required permissions, the error response is |
57
|
|
|
|
|
|
|
C<DryRunOperation>. Otherwise, it is C<UnauthorizedOperation>. |
58
|
|
|
|
|
|
|
|
59
|
|
|
|
|
|
|
|
60
|
|
|
|
|
|
|
|
61
|
|
|
|
|
|
|
=head2 FromPort => Int |
62
|
|
|
|
|
|
|
|
63
|
|
|
|
|
|
|
The start of port range for the TCP and UDP protocols, or an |
64
|
|
|
|
|
|
|
ICMP/ICMPv6 type number. For the ICMP/ICMPv6 type number, use C<-1> to |
65
|
|
|
|
|
|
|
specify all types. If you specify all ICMP/ICMPv6 types, you must |
66
|
|
|
|
|
|
|
specify all codes. |
67
|
|
|
|
|
|
|
|
68
|
|
|
|
|
|
|
|
69
|
|
|
|
|
|
|
|
70
|
|
|
|
|
|
|
=head2 GroupId => Str |
71
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
The ID of the security group. You must specify either the security |
73
|
|
|
|
|
|
|
group ID or the security group name in the request. For security groups |
74
|
|
|
|
|
|
|
in a nondefault VPC, you must specify the security group ID. |
75
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
|
77
|
|
|
|
|
|
|
|
78
|
|
|
|
|
|
|
=head2 GroupName => Str |
79
|
|
|
|
|
|
|
|
80
|
|
|
|
|
|
|
[EC2-Classic, default VPC] The name of the security group. You must |
81
|
|
|
|
|
|
|
specify either the security group ID or the security group name in the |
82
|
|
|
|
|
|
|
request. |
83
|
|
|
|
|
|
|
|
84
|
|
|
|
|
|
|
|
85
|
|
|
|
|
|
|
|
86
|
|
|
|
|
|
|
=head2 IpPermissions => ArrayRef[L<Paws::EC2::IpPermission>] |
87
|
|
|
|
|
|
|
|
88
|
|
|
|
|
|
|
A set of IP permissions. Can be used to specify multiple rules in a |
89
|
|
|
|
|
|
|
single command. |
90
|
|
|
|
|
|
|
|
91
|
|
|
|
|
|
|
|
92
|
|
|
|
|
|
|
|
93
|
|
|
|
|
|
|
=head2 IpProtocol => Str |
94
|
|
|
|
|
|
|
|
95
|
|
|
|
|
|
|
The IP protocol name (C<tcp>, C<udp>, C<icmp>) or number (see Protocol |
96
|
|
|
|
|
|
|
Numbers). (VPC only) Use C<-1> to specify all protocols. If you specify |
97
|
|
|
|
|
|
|
C<-1>, or a protocol number other than C<tcp>, C<udp>, C<icmp>, or |
98
|
|
|
|
|
|
|
C<58> (ICMPv6), traffic on all ports is allowed, regardless of any |
99
|
|
|
|
|
|
|
ports you specify. For C<tcp>, C<udp>, and C<icmp>, you must specify a |
100
|
|
|
|
|
|
|
port range. For protocol C<58> (ICMPv6), you can optionally specify a |
101
|
|
|
|
|
|
|
port range; if you don't, traffic for all types and codes is allowed. |
102
|
|
|
|
|
|
|
|
103
|
|
|
|
|
|
|
|
104
|
|
|
|
|
|
|
|
105
|
|
|
|
|
|
|
=head2 SourceSecurityGroupName => Str |
106
|
|
|
|
|
|
|
|
107
|
|
|
|
|
|
|
[EC2-Classic, default VPC] The name of the source security group. You |
108
|
|
|
|
|
|
|
can't specify this parameter in combination with the following |
109
|
|
|
|
|
|
|
parameters: the CIDR IP address range, the start of the port range, the |
110
|
|
|
|
|
|
|
IP protocol, and the end of the port range. Creates rules that grant |
111
|
|
|
|
|
|
|
full ICMP, UDP, and TCP access. To create a rule with a specific IP |
112
|
|
|
|
|
|
|
protocol and port range, use a set of IP permissions instead. For |
113
|
|
|
|
|
|
|
EC2-VPC, the source security group must be in the same VPC. |
114
|
|
|
|
|
|
|
|
115
|
|
|
|
|
|
|
|
116
|
|
|
|
|
|
|
|
117
|
|
|
|
|
|
|
=head2 SourceSecurityGroupOwnerId => Str |
118
|
|
|
|
|
|
|
|
119
|
|
|
|
|
|
|
[EC2-Classic] The AWS account number for the source security group, if |
120
|
|
|
|
|
|
|
the source security group is in a different account. You can't specify |
121
|
|
|
|
|
|
|
this parameter in combination with the following parameters: the CIDR |
122
|
|
|
|
|
|
|
IP address range, the IP protocol, the start of the port range, and the |
123
|
|
|
|
|
|
|
end of the port range. Creates rules that grant full ICMP, UDP, and TCP |
124
|
|
|
|
|
|
|
access. To create a rule with a specific IP protocol and port range, |
125
|
|
|
|
|
|
|
use a set of IP permissions instead. |
126
|
|
|
|
|
|
|
|
127
|
|
|
|
|
|
|
|
128
|
|
|
|
|
|
|
|
129
|
|
|
|
|
|
|
=head2 ToPort => Int |
130
|
|
|
|
|
|
|
|
131
|
|
|
|
|
|
|
The end of port range for the TCP and UDP protocols, or an ICMP/ICMPv6 |
132
|
|
|
|
|
|
|
code number. For the ICMP/ICMPv6 code number, use C<-1> to specify all |
133
|
|
|
|
|
|
|
codes. If you specify all ICMP/ICMPv6 types, you must specify all |
134
|
|
|
|
|
|
|
codes. |
135
|
|
|
|
|
|
|
|
136
|
|
|
|
|
|
|
|
137
|
|
|
|
|
|
|
|
138
|
|
|
|
|
|
|
|
139
|
|
|
|
|
|
|
=head1 SEE ALSO |
140
|
|
|
|
|
|
|
|
141
|
|
|
|
|
|
|
This class forms part of L<Paws>, documenting arguments for method AuthorizeSecurityGroupIngress in L<Paws::EC2> |
142
|
|
|
|
|
|
|
|
143
|
|
|
|
|
|
|
=head1 BUGS and CONTRIBUTIONS |
144
|
|
|
|
|
|
|
|
145
|
|
|
|
|
|
|
The source code is located here: https://github.com/pplu/aws-sdk-perl |
146
|
|
|
|
|
|
|
|
147
|
|
|
|
|
|
|
Please report bugs to: https://github.com/pplu/aws-sdk-perl/issues |
148
|
|
|
|
|
|
|
|
149
|
|
|
|
|
|
|
=cut |
150
|
|
|
|
|
|
|
|