aws-sdk-ec2 1.0.0.rc7 → 1.0.0.rc8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -38,12 +38,24 @@ module Aws::EC2
38
38
  @destination_cidr_block
39
39
  end
40
40
 
41
+ # The IPv6 CIDR block used for the destination match.
42
+ # @return [String]
43
+ def destination_ipv_6_cidr_block
44
+ data.destination_ipv_6_cidr_block
45
+ end
46
+
41
47
  # The prefix of the AWS service.
42
48
  # @return [String]
43
49
  def destination_prefix_list_id
44
50
  data.destination_prefix_list_id
45
51
  end
46
52
 
53
+ # The ID of the egress-only Internet gateway.
54
+ # @return [String]
55
+ def egress_only_internet_gateway_id
56
+ data.egress_only_internet_gateway_id
57
+ end
58
+
47
59
  # The ID of a gateway attached to your VPC.
48
60
  # @return [String]
49
61
  def gateway_id
@@ -62,31 +74,16 @@ module Aws::EC2
62
74
  data.instance_owner_id
63
75
  end
64
76
 
65
- # The ID of the network interface.
66
- # @return [String]
67
- def network_interface_id
68
- data.network_interface_id
69
- end
70
-
71
- # The ID of the VPC peering connection.
72
- # @return [String]
73
- def vpc_peering_connection_id
74
- data.vpc_peering_connection_id
75
- end
76
-
77
77
  # The ID of a NAT gateway.
78
78
  # @return [String]
79
79
  def nat_gateway_id
80
80
  data.nat_gateway_id
81
81
  end
82
82
 
83
- # The state of the route. The `blackhole` state indicates that the
84
- # route's target isn't available (for example, the specified gateway
85
- # isn't attached to the VPC, or the specified NAT instance has been
86
- # terminated).
83
+ # The ID of the network interface.
87
84
  # @return [String]
88
- def state
89
- data.state
85
+ def network_interface_id
86
+ data.network_interface_id
90
87
  end
91
88
 
92
89
  # Describes how the route was created.
@@ -103,16 +100,19 @@ module Aws::EC2
103
100
  data.origin
104
101
  end
105
102
 
106
- # The IPv6 CIDR block used for the destination match.
103
+ # The state of the route. The `blackhole` state indicates that the
104
+ # route's target isn't available (for example, the specified gateway
105
+ # isn't attached to the VPC, or the specified NAT instance has been
106
+ # terminated).
107
107
  # @return [String]
108
- def destination_ipv_6_cidr_block
109
- data.destination_ipv_6_cidr_block
108
+ def state
109
+ data.state
110
110
  end
111
111
 
112
- # The ID of the egress-only Internet gateway.
112
+ # The ID of the VPC peering connection.
113
113
  # @return [String]
114
- def egress_only_internet_gateway_id
115
- data.egress_only_internet_gateway_id
114
+ def vpc_peering_connection_id
115
+ data.vpc_peering_connection_id
116
116
  end
117
117
 
118
118
  # @!endgroup
@@ -150,18 +150,18 @@ module Aws::EC2
150
150
  # @example Request syntax with placeholder values
151
151
  #
152
152
  # route.delete({
153
- # dry_run: false,
154
153
  # destination_ipv_6_cidr_block: "String",
154
+ # dry_run: false,
155
155
  # })
156
156
  # @param [Hash] options ({})
157
+ # @option options [String] :destination_ipv_6_cidr_block
158
+ # The IPv6 CIDR range for the route. The value you specify must match
159
+ # the CIDR for the route exactly.
157
160
  # @option options [Boolean] :dry_run
158
161
  # Checks whether you have the required permissions for the action,
159
162
  # without actually making the request, and provides an error response.
160
163
  # If you have the required permissions, the error response is
161
164
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
162
- # @option options [String] :destination_ipv_6_cidr_block
163
- # The IPv6 CIDR range for the route. The value you specify must match
164
- # the CIDR for the route exactly.
165
165
  # @return [EmptyStructure]
166
166
  def delete(options = {})
167
167
  options = options.merge(
@@ -175,36 +175,36 @@ module Aws::EC2
175
175
  # @example Request syntax with placeholder values
176
176
  #
177
177
  # route.replace({
178
- # dry_run: false,
179
- # gateway_id: "String",
180
178
  # destination_ipv_6_cidr_block: "String",
179
+ # dry_run: false,
181
180
  # egress_only_internet_gateway_id: "String",
181
+ # gateway_id: "String",
182
182
  # instance_id: "String",
183
+ # nat_gateway_id: "String",
183
184
  # network_interface_id: "String",
184
185
  # vpc_peering_connection_id: "String",
185
- # nat_gateway_id: "String",
186
186
  # })
187
187
  # @param [Hash] options ({})
188
+ # @option options [String] :destination_ipv_6_cidr_block
189
+ # The IPv6 CIDR address block used for the destination match. The value
190
+ # you provide must match the CIDR of an existing route in the table.
188
191
  # @option options [Boolean] :dry_run
189
192
  # Checks whether you have the required permissions for the action,
190
193
  # without actually making the request, and provides an error response.
191
194
  # If you have the required permissions, the error response is
192
195
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
193
- # @option options [String] :gateway_id
194
- # The ID of an Internet gateway or virtual private gateway.
195
- # @option options [String] :destination_ipv_6_cidr_block
196
- # The IPv6 CIDR address block used for the destination match. The value
197
- # you provide must match the CIDR of an existing route in the table.
198
196
  # @option options [String] :egress_only_internet_gateway_id
199
197
  # \[IPv6 traffic only\] The ID of an egress-only Internet gateway.
198
+ # @option options [String] :gateway_id
199
+ # The ID of an Internet gateway or virtual private gateway.
200
200
  # @option options [String] :instance_id
201
201
  # The ID of a NAT instance in your VPC.
202
+ # @option options [String] :nat_gateway_id
203
+ # \[IPv4 traffic only\] The ID of a NAT gateway.
202
204
  # @option options [String] :network_interface_id
203
205
  # The ID of a network interface.
204
206
  # @option options [String] :vpc_peering_connection_id
205
207
  # The ID of a VPC peering connection.
206
- # @option options [String] :nat_gateway_id
207
- # \[IPv4 traffic only\] The ID of a NAT gateway.
208
208
  # @return [EmptyStructure]
209
209
  def replace(options = {})
210
210
  options = options.merge(
@@ -31,10 +31,10 @@ module Aws::EC2
31
31
  end
32
32
  alias :route_table_id :id
33
33
 
34
- # The ID of the VPC.
35
- # @return [String]
36
- def vpc_id
37
- data.vpc_id
34
+ # Any virtual private gateway (VGW) propagating routes.
35
+ # @return [Array<Types::PropagatingVgw>]
36
+ def propagating_vgws
37
+ data.propagating_vgws
38
38
  end
39
39
 
40
40
  # Any tags assigned to the route table.
@@ -43,10 +43,10 @@ module Aws::EC2
43
43
  data.tags
44
44
  end
45
45
 
46
- # Any virtual private gateway (VGW) propagating routes.
47
- # @return [Array<Types::PropagatingVgw>]
48
- def propagating_vgws
49
- data.propagating_vgws
46
+ # The ID of the VPC.
47
+ # @return [String]
48
+ def vpc_id
49
+ data.vpc_id
50
50
  end
51
51
 
52
52
  # @!endgroup
@@ -113,43 +113,43 @@ module Aws::EC2
113
113
  # @example Request syntax with placeholder values
114
114
  #
115
115
  # route = route_table.create_route({
116
- # dry_run: false,
117
116
  # destination_cidr_block: "String",
118
- # gateway_id: "String",
119
117
  # destination_ipv_6_cidr_block: "String",
118
+ # dry_run: false,
120
119
  # egress_only_internet_gateway_id: "String",
120
+ # gateway_id: "String",
121
121
  # instance_id: "String",
122
+ # nat_gateway_id: "String",
122
123
  # network_interface_id: "String",
123
124
  # vpc_peering_connection_id: "String",
124
- # nat_gateway_id: "String",
125
125
  # })
126
126
  # @param [Hash] options ({})
127
- # @option options [Boolean] :dry_run
128
- # Checks whether you have the required permissions for the action,
129
- # without actually making the request, and provides an error response.
130
- # If you have the required permissions, the error response is
131
- # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
132
127
  # @option options [String] :destination_cidr_block
133
128
  # The IPv4 CIDR address block used for the destination match. Routing
134
129
  # decisions are based on the most specific match.
135
- # @option options [String] :gateway_id
136
- # The ID of an Internet gateway or virtual private gateway attached to
137
- # your VPC.
138
130
  # @option options [String] :destination_ipv_6_cidr_block
139
131
  # The IPv6 CIDR block used for the destination match. Routing decisions
140
132
  # are based on the most specific match.
133
+ # @option options [Boolean] :dry_run
134
+ # Checks whether you have the required permissions for the action,
135
+ # without actually making the request, and provides an error response.
136
+ # If you have the required permissions, the error response is
137
+ # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
141
138
  # @option options [String] :egress_only_internet_gateway_id
142
139
  # \[IPv6 traffic only\] The ID of an egress-only Internet gateway.
140
+ # @option options [String] :gateway_id
141
+ # The ID of an Internet gateway or virtual private gateway attached to
142
+ # your VPC.
143
143
  # @option options [String] :instance_id
144
144
  # The ID of a NAT instance in your VPC. The operation fails if you
145
145
  # specify an instance ID unless exactly one network interface is
146
146
  # attached.
147
+ # @option options [String] :nat_gateway_id
148
+ # \[IPv4 traffic only\] The ID of a NAT gateway.
147
149
  # @option options [String] :network_interface_id
148
150
  # The ID of a network interface.
149
151
  # @option options [String] :vpc_peering_connection_id
150
152
  # The ID of a VPC peering connection.
151
- # @option options [String] :nat_gateway_id
152
- # \[IPv4 traffic only\] The ID of a NAT gateway.
153
153
  # @return [Route]
154
154
  def create_route(options = {})
155
155
  options = options.merge(route_table_id: @id)
@@ -31,6 +31,12 @@ module Aws::EC2
31
31
  end
32
32
  alias :route_table_association_id :id
33
33
 
34
+ # Indicates whether this is the main route table.
35
+ # @return [Boolean]
36
+ def main
37
+ data.main
38
+ end
39
+
34
40
  # The ID of the route table.
35
41
  # @return [String]
36
42
  def route_table_id
@@ -44,12 +50,6 @@ module Aws::EC2
44
50
  data.subnet_id
45
51
  end
46
52
 
47
- # Indicates whether this is the main route table.
48
- # @return [Boolean]
49
- def main
50
- data.main
51
- end
52
-
53
53
  # @!endgroup
54
54
 
55
55
  # @return [Client]
@@ -31,10 +31,10 @@ module Aws::EC2
31
31
  end
32
32
  alias :group_id :id
33
33
 
34
- # The AWS account ID of the owner of the security group.
34
+ # A description of the security group.
35
35
  # @return [String]
36
- def owner_id
37
- data.owner_id
36
+ def description
37
+ data.description
38
38
  end
39
39
 
40
40
  # The name of the security group.
@@ -43,18 +43,18 @@ module Aws::EC2
43
43
  data.group_name
44
44
  end
45
45
 
46
- # A description of the security group.
47
- # @return [String]
48
- def description
49
- data.description
50
- end
51
-
52
46
  # One or more inbound rules associated with the security group.
53
47
  # @return [Array<Types::IpPermission>]
54
48
  def ip_permissions
55
49
  data.ip_permissions
56
50
  end
57
51
 
52
+ # The AWS account ID of the owner of the security group.
53
+ # @return [String]
54
+ def owner_id
55
+ data.owner_id
56
+ end
57
+
58
58
  # \[EC2-VPC\] One or more outbound rules associated with the security
59
59
  # group.
60
60
  # @return [Array<Types::IpPermission>]
@@ -62,18 +62,18 @@ module Aws::EC2
62
62
  data.ip_permissions_egress
63
63
  end
64
64
 
65
- # \[EC2-VPC\] The ID of the VPC for the security group.
66
- # @return [String]
67
- def vpc_id
68
- data.vpc_id
69
- end
70
-
71
65
  # Any tags assigned to the security group.
72
66
  # @return [Array<Types::Tag>]
73
67
  def tags
74
68
  data.tags
75
69
  end
76
70
 
71
+ # \[EC2-VPC\] The ID of the VPC for the security group.
72
+ # @return [String]
73
+ def vpc_id
74
+ data.vpc_id
75
+ end
76
+
77
77
  # @!endgroup
78
78
 
79
79
  # @return [Client]
@@ -115,27 +115,10 @@ module Aws::EC2
115
115
  #
116
116
  # security_group.authorize_egress({
117
117
  # dry_run: false,
118
- # source_security_group_name: "String",
119
- # source_security_group_owner_id: "String",
120
- # ip_protocol: "String",
121
- # from_port: 1,
122
- # to_port: 1,
123
- # cidr_ip: "String",
124
118
  # ip_permissions: [
125
119
  # {
126
- # ip_protocol: "String",
127
120
  # from_port: 1,
128
- # to_port: 1,
129
- # user_id_group_pairs: [
130
- # {
131
- # user_id: "String",
132
- # group_name: "String",
133
- # group_id: "String",
134
- # vpc_id: "String",
135
- # vpc_peering_connection_id: "String",
136
- # peering_status: "String",
137
- # },
138
- # ],
121
+ # ip_protocol: "String",
139
122
  # ip_ranges: [
140
123
  # {
141
124
  # cidr_ip: "String",
@@ -151,8 +134,25 @@ module Aws::EC2
151
134
  # prefix_list_id: "String",
152
135
  # },
153
136
  # ],
137
+ # to_port: 1,
138
+ # user_id_group_pairs: [
139
+ # {
140
+ # group_id: "String",
141
+ # group_name: "String",
142
+ # peering_status: "String",
143
+ # user_id: "String",
144
+ # vpc_id: "String",
145
+ # vpc_peering_connection_id: "String",
146
+ # },
147
+ # ],
154
148
  # },
155
149
  # ],
150
+ # cidr_ip: "String",
151
+ # from_port: 1,
152
+ # ip_protocol: "String",
153
+ # to_port: 1,
154
+ # source_security_group_name: "String",
155
+ # source_security_group_owner_id: "String",
156
156
  # })
157
157
  # @param [Hash] options ({})
158
158
  # @option options [Boolean] :dry_run
@@ -160,31 +160,31 @@ module Aws::EC2
160
160
  # without actually making the request, and provides an error response.
161
161
  # If you have the required permissions, the error response is
162
162
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
163
- # @option options [String] :source_security_group_name
164
- # The name of a destination security group. To authorize outbound access
165
- # to a destination security group, we recommend that you use a set of IP
166
- # permissions instead.
167
- # @option options [String] :source_security_group_owner_id
168
- # The AWS account number for a destination security group. To authorize
169
- # outbound access to a destination security group, we recommend that you
170
- # use a set of IP permissions instead.
171
- # @option options [String] :ip_protocol
172
- # The IP protocol name or number. We recommend that you specify the
173
- # protocol in a set of IP permissions instead.
163
+ # @option options [Array<Types::IpPermission>] :ip_permissions
164
+ # A set of IP permissions. You can't specify a destination security
165
+ # group and a CIDR IP address range.
166
+ # @option options [String] :cidr_ip
167
+ # The CIDR IPv4 address range. We recommend that you specify the CIDR
168
+ # range in a set of IP permissions instead.
174
169
  # @option options [Integer] :from_port
175
170
  # The start of port range for the TCP and UDP protocols, or an ICMP type
176
171
  # number. We recommend that you specify the port range in a set of IP
177
172
  # permissions instead.
173
+ # @option options [String] :ip_protocol
174
+ # The IP protocol name or number. We recommend that you specify the
175
+ # protocol in a set of IP permissions instead.
178
176
  # @option options [Integer] :to_port
179
177
  # The end of port range for the TCP and UDP protocols, or an ICMP type
180
178
  # number. We recommend that you specify the port range in a set of IP
181
179
  # permissions instead.
182
- # @option options [String] :cidr_ip
183
- # The CIDR IPv4 address range. We recommend that you specify the CIDR
184
- # range in a set of IP permissions instead.
185
- # @option options [Array<Types::IpPermission>] :ip_permissions
186
- # A set of IP permissions. You can't specify a destination security
187
- # group and a CIDR IP address range.
180
+ # @option options [String] :source_security_group_name
181
+ # The name of a destination security group. To authorize outbound access
182
+ # to a destination security group, we recommend that you use a set of IP
183
+ # permissions instead.
184
+ # @option options [String] :source_security_group_owner_id
185
+ # The AWS account number for a destination security group. To authorize
186
+ # outbound access to a destination security group, we recommend that you
187
+ # use a set of IP permissions instead.
188
188
  # @return [EmptyStructure]
189
189
  def authorize_egress(options = {})
190
190
  options = options.merge(group_id: @id)
@@ -195,29 +195,13 @@ module Aws::EC2
195
195
  # @example Request syntax with placeholder values
196
196
  #
197
197
  # security_group.authorize_ingress({
198
- # dry_run: false,
199
- # group_name: "String",
200
- # source_security_group_name: "String",
201
- # source_security_group_owner_id: "String",
202
- # ip_protocol: "String",
203
- # from_port: 1,
204
- # to_port: 1,
205
198
  # cidr_ip: "String",
199
+ # from_port: 1,
200
+ # group_name: "String",
206
201
  # ip_permissions: [
207
202
  # {
208
- # ip_protocol: "String",
209
203
  # from_port: 1,
210
- # to_port: 1,
211
- # user_id_group_pairs: [
212
- # {
213
- # user_id: "String",
214
- # group_name: "String",
215
- # group_id: "String",
216
- # vpc_id: "String",
217
- # vpc_peering_connection_id: "String",
218
- # peering_status: "String",
219
- # },
220
- # ],
204
+ # ip_protocol: "String",
221
205
  # ip_ranges: [
222
206
  # {
223
207
  # cidr_ip: "String",
@@ -233,17 +217,50 @@ module Aws::EC2
233
217
  # prefix_list_id: "String",
234
218
  # },
235
219
  # ],
220
+ # to_port: 1,
221
+ # user_id_group_pairs: [
222
+ # {
223
+ # group_id: "String",
224
+ # group_name: "String",
225
+ # peering_status: "String",
226
+ # user_id: "String",
227
+ # vpc_id: "String",
228
+ # vpc_peering_connection_id: "String",
229
+ # },
230
+ # ],
236
231
  # },
237
232
  # ],
233
+ # ip_protocol: "String",
234
+ # source_security_group_name: "String",
235
+ # source_security_group_owner_id: "String",
236
+ # to_port: 1,
237
+ # dry_run: false,
238
238
  # })
239
239
  # @param [Hash] options ({})
240
- # @option options [Boolean] :dry_run
241
- # Checks whether you have the required permissions for the action,
242
- # without actually making the request, and provides an error response.
243
- # If you have the required permissions, the error response is
244
- # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
240
+ # @option options [String] :cidr_ip
241
+ # The CIDR IPv4 address range. You can't specify this parameter when
242
+ # specifying a source security group.
243
+ # @option options [Integer] :from_port
244
+ # The start of port range for the TCP and UDP protocols, or an
245
+ # ICMP/ICMPv6 type number. For the ICMP/ICMPv6 type number, use `-1` to
246
+ # specify all types.
245
247
  # @option options [String] :group_name
246
248
  # \[EC2-Classic, default VPC\] The name of the security group.
249
+ # @option options [Array<Types::IpPermission>] :ip_permissions
250
+ # A set of IP permissions. Can be used to specify multiple rules in a
251
+ # single command.
252
+ # @option options [String] :ip_protocol
253
+ # The IP protocol name (`tcp`, `udp`, `icmp`) or number (see [Protocol
254
+ # Numbers][1]). (VPC only) Use `-1` to specify all protocols. If you
255
+ # specify `-1`, or a protocol number other than `tcp`, `udp`, `icmp`, or
256
+ # `58` (ICMPv6), traffic on all ports is allowed, regardless of any
257
+ # ports you specify. For `tcp`, `udp`, and `icmp`, you must specify a
258
+ # port range. For protocol `58` (ICMPv6), you can optionally specify a
259
+ # port range; if you don't, traffic for all types and codes is allowed.
260
+ #
261
+ #
262
+ #
263
+ # [1]: http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
247
264
  # @option options [String] :source_security_group_name
248
265
  # \[EC2-Classic, default VPC\] The name of the source security group.
249
266
  # You can't specify this parameter in combination with the following
@@ -260,32 +277,15 @@ module Aws::EC2
260
277
  # range, and the end of the port range. Creates rules that grant full
261
278
  # ICMP, UDP, and TCP access. To create a rule with a specific IP
262
279
  # protocol and port range, use a set of IP permissions instead.
263
- # @option options [String] :ip_protocol
264
- # The IP protocol name (`tcp`, `udp`, `icmp`) or number (see [Protocol
265
- # Numbers][1]). (VPC only) Use `-1` to specify all protocols. If you
266
- # specify `-1`, or a protocol number other than `tcp`, `udp`, `icmp`, or
267
- # `58` (ICMPv6), traffic on all ports is allowed, regardless of any
268
- # ports you specify. For `tcp`, `udp`, and `icmp`, you must specify a
269
- # port range. For protocol `58` (ICMPv6), you can optionally specify a
270
- # port range; if you don't, traffic for all types and codes is allowed.
271
- #
272
- #
273
- #
274
- # [1]: http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
275
- # @option options [Integer] :from_port
276
- # The start of port range for the TCP and UDP protocols, or an
277
- # ICMP/ICMPv6 type number. For the ICMP/ICMPv6 type number, use `-1` to
278
- # specify all types.
279
280
  # @option options [Integer] :to_port
280
281
  # The end of port range for the TCP and UDP protocols, or an ICMP/ICMPv6
281
282
  # code number. For the ICMP/ICMPv6 code number, use `-1` to specify all
282
283
  # codes.
283
- # @option options [String] :cidr_ip
284
- # The CIDR IPv4 address range. You can't specify this parameter when
285
- # specifying a source security group.
286
- # @option options [Array<Types::IpPermission>] :ip_permissions
287
- # A set of IP permissions. Can be used to specify multiple rules in a
288
- # single command.
284
+ # @option options [Boolean] :dry_run
285
+ # Checks whether you have the required permissions for the action,
286
+ # without actually making the request, and provides an error response.
287
+ # If you have the required permissions, the error response is
288
+ # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
289
289
  # @return [EmptyStructure]
290
290
  def authorize_ingress(options = {})
291
291
  options = options.merge(group_id: @id)
@@ -333,18 +333,18 @@ module Aws::EC2
333
333
  # @example Request syntax with placeholder values
334
334
  #
335
335
  # security_group.delete({
336
- # dry_run: false,
337
336
  # group_name: "String",
337
+ # dry_run: false,
338
338
  # })
339
339
  # @param [Hash] options ({})
340
+ # @option options [String] :group_name
341
+ # \[EC2-Classic, default VPC\] The name of the security group. You can
342
+ # specify either the security group name or the security group ID.
340
343
  # @option options [Boolean] :dry_run
341
344
  # Checks whether you have the required permissions for the action,
342
345
  # without actually making the request, and provides an error response.
343
346
  # If you have the required permissions, the error response is
344
347
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
345
- # @option options [String] :group_name
346
- # \[EC2-Classic, default VPC\] The name of the security group. You can
347
- # specify either the security group name or the security group ID.
348
348
  # @return [EmptyStructure]
349
349
  def delete(options = {})
350
350
  options = options.merge(group_id: @id)
@@ -356,27 +356,10 @@ module Aws::EC2
356
356
  #
357
357
  # security_group.revoke_egress({
358
358
  # dry_run: false,
359
- # source_security_group_name: "String",
360
- # source_security_group_owner_id: "String",
361
- # ip_protocol: "String",
362
- # from_port: 1,
363
- # to_port: 1,
364
- # cidr_ip: "String",
365
359
  # ip_permissions: [
366
360
  # {
367
- # ip_protocol: "String",
368
361
  # from_port: 1,
369
- # to_port: 1,
370
- # user_id_group_pairs: [
371
- # {
372
- # user_id: "String",
373
- # group_name: "String",
374
- # group_id: "String",
375
- # vpc_id: "String",
376
- # vpc_peering_connection_id: "String",
377
- # peering_status: "String",
378
- # },
379
- # ],
362
+ # ip_protocol: "String",
380
363
  # ip_ranges: [
381
364
  # {
382
365
  # cidr_ip: "String",
@@ -392,8 +375,25 @@ module Aws::EC2
392
375
  # prefix_list_id: "String",
393
376
  # },
394
377
  # ],
378
+ # to_port: 1,
379
+ # user_id_group_pairs: [
380
+ # {
381
+ # group_id: "String",
382
+ # group_name: "String",
383
+ # peering_status: "String",
384
+ # user_id: "String",
385
+ # vpc_id: "String",
386
+ # vpc_peering_connection_id: "String",
387
+ # },
388
+ # ],
395
389
  # },
396
390
  # ],
391
+ # cidr_ip: "String",
392
+ # from_port: 1,
393
+ # ip_protocol: "String",
394
+ # to_port: 1,
395
+ # source_security_group_name: "String",
396
+ # source_security_group_owner_id: "String",
397
397
  # })
398
398
  # @param [Hash] options ({})
399
399
  # @option options [Boolean] :dry_run
@@ -401,31 +401,31 @@ module Aws::EC2
401
401
  # without actually making the request, and provides an error response.
402
402
  # If you have the required permissions, the error response is
403
403
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
404
- # @option options [String] :source_security_group_name
405
- # The name of a destination security group. To revoke outbound access to
406
- # a destination security group, we recommend that you use a set of IP
407
- # permissions instead.
408
- # @option options [String] :source_security_group_owner_id
409
- # The AWS account number for a destination security group. To revoke
410
- # outbound access to a destination security group, we recommend that you
411
- # use a set of IP permissions instead.
412
- # @option options [String] :ip_protocol
413
- # The IP protocol name or number. We recommend that you specify the
414
- # protocol in a set of IP permissions instead.
404
+ # @option options [Array<Types::IpPermission>] :ip_permissions
405
+ # A set of IP permissions. You can't specify a destination security
406
+ # group and a CIDR IP address range.
407
+ # @option options [String] :cidr_ip
408
+ # The CIDR IP address range. We recommend that you specify the CIDR
409
+ # range in a set of IP permissions instead.
415
410
  # @option options [Integer] :from_port
416
411
  # The start of port range for the TCP and UDP protocols, or an ICMP type
417
412
  # number. We recommend that you specify the port range in a set of IP
418
413
  # permissions instead.
414
+ # @option options [String] :ip_protocol
415
+ # The IP protocol name or number. We recommend that you specify the
416
+ # protocol in a set of IP permissions instead.
419
417
  # @option options [Integer] :to_port
420
418
  # The end of port range for the TCP and UDP protocols, or an ICMP type
421
419
  # number. We recommend that you specify the port range in a set of IP
422
420
  # permissions instead.
423
- # @option options [String] :cidr_ip
424
- # The CIDR IP address range. We recommend that you specify the CIDR
425
- # range in a set of IP permissions instead.
426
- # @option options [Array<Types::IpPermission>] :ip_permissions
427
- # A set of IP permissions. You can't specify a destination security
428
- # group and a CIDR IP address range.
421
+ # @option options [String] :source_security_group_name
422
+ # The name of a destination security group. To revoke outbound access to
423
+ # a destination security group, we recommend that you use a set of IP
424
+ # permissions instead.
425
+ # @option options [String] :source_security_group_owner_id
426
+ # The AWS account number for a destination security group. To revoke
427
+ # outbound access to a destination security group, we recommend that you
428
+ # use a set of IP permissions instead.
429
429
  # @return [EmptyStructure]
430
430
  def revoke_egress(options = {})
431
431
  options = options.merge(group_id: @id)
@@ -436,29 +436,13 @@ module Aws::EC2
436
436
  # @example Request syntax with placeholder values
437
437
  #
438
438
  # security_group.revoke_ingress({
439
- # dry_run: false,
440
- # group_name: "String",
441
- # source_security_group_name: "String",
442
- # source_security_group_owner_id: "String",
443
- # ip_protocol: "String",
444
- # from_port: 1,
445
- # to_port: 1,
446
439
  # cidr_ip: "String",
440
+ # from_port: 1,
441
+ # group_name: "String",
447
442
  # ip_permissions: [
448
443
  # {
449
- # ip_protocol: "String",
450
444
  # from_port: 1,
451
- # to_port: 1,
452
- # user_id_group_pairs: [
453
- # {
454
- # user_id: "String",
455
- # group_name: "String",
456
- # group_id: "String",
457
- # vpc_id: "String",
458
- # vpc_peering_connection_id: "String",
459
- # peering_status: "String",
460
- # },
461
- # ],
445
+ # ip_protocol: "String",
462
446
  # ip_ranges: [
463
447
  # {
464
448
  # cidr_ip: "String",
@@ -474,17 +458,44 @@ module Aws::EC2
474
458
  # prefix_list_id: "String",
475
459
  # },
476
460
  # ],
461
+ # to_port: 1,
462
+ # user_id_group_pairs: [
463
+ # {
464
+ # group_id: "String",
465
+ # group_name: "String",
466
+ # peering_status: "String",
467
+ # user_id: "String",
468
+ # vpc_id: "String",
469
+ # vpc_peering_connection_id: "String",
470
+ # },
471
+ # ],
477
472
  # },
478
473
  # ],
474
+ # ip_protocol: "String",
475
+ # source_security_group_name: "String",
476
+ # source_security_group_owner_id: "String",
477
+ # to_port: 1,
478
+ # dry_run: false,
479
479
  # })
480
480
  # @param [Hash] options ({})
481
- # @option options [Boolean] :dry_run
482
- # Checks whether you have the required permissions for the action,
483
- # without actually making the request, and provides an error response.
484
- # If you have the required permissions, the error response is
485
- # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
481
+ # @option options [String] :cidr_ip
482
+ # The CIDR IP address range. You can't specify this parameter when
483
+ # specifying a source security group.
484
+ # @option options [Integer] :from_port
485
+ # The start of port range for the TCP and UDP protocols, or an ICMP type
486
+ # number. For the ICMP type number, use `-1` to specify all ICMP types.
486
487
  # @option options [String] :group_name
487
488
  # \[EC2-Classic, default VPC\] The name of the security group.
489
+ # @option options [Array<Types::IpPermission>] :ip_permissions
490
+ # A set of IP permissions. You can't specify a source security group
491
+ # and a CIDR IP address range.
492
+ # @option options [String] :ip_protocol
493
+ # The IP protocol name (`tcp`, `udp`, `icmp`) or number (see [Protocol
494
+ # Numbers][1]). Use `-1` to specify all.
495
+ #
496
+ #
497
+ #
498
+ # [1]: http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
488
499
  # @option options [String] :source_security_group_name
489
500
  # \[EC2-Classic, default VPC\] The name of the source security group.
490
501
  # You can't specify this parameter in combination with the following
@@ -500,26 +511,15 @@ module Aws::EC2
500
511
  # the CIDR IP address range, the IP protocol, the start of the port
501
512
  # range, and the end of the port range. To revoke a specific rule for an
502
513
  # IP protocol and port range, use a set of IP permissions instead.
503
- # @option options [String] :ip_protocol
504
- # The IP protocol name (`tcp`, `udp`, `icmp`) or number (see [Protocol
505
- # Numbers][1]). Use `-1` to specify all.
506
- #
507
- #
508
- #
509
- # [1]: http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
510
- # @option options [Integer] :from_port
511
- # The start of port range for the TCP and UDP protocols, or an ICMP type
512
- # number. For the ICMP type number, use `-1` to specify all ICMP types.
513
514
  # @option options [Integer] :to_port
514
515
  # The end of port range for the TCP and UDP protocols, or an ICMP code
515
516
  # number. For the ICMP code number, use `-1` to specify all ICMP codes
516
517
  # for the ICMP type.
517
- # @option options [String] :cidr_ip
518
- # The CIDR IP address range. You can't specify this parameter when
519
- # specifying a source security group.
520
- # @option options [Array<Types::IpPermission>] :ip_permissions
521
- # A set of IP permissions. You can't specify a source security group
522
- # and a CIDR IP address range.
518
+ # @option options [Boolean] :dry_run
519
+ # Checks whether you have the required permissions for the action,
520
+ # without actually making the request, and provides an error response.
521
+ # If you have the required permissions, the error response is
522
+ # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
523
523
  # @return [EmptyStructure]
524
524
  def revoke_ingress(options = {})
525
525
  options = options.merge(group_id: @id)