aws-sdk-ec2 1.0.0.rc7 → 1.0.0.rc8

Sign up to get free protection for your applications and to get access to all the features.
@@ -38,12 +38,24 @@ module Aws::EC2
38
38
  @destination_cidr_block
39
39
  end
40
40
 
41
+ # The IPv6 CIDR block used for the destination match.
42
+ # @return [String]
43
+ def destination_ipv_6_cidr_block
44
+ data.destination_ipv_6_cidr_block
45
+ end
46
+
41
47
  # The prefix of the AWS service.
42
48
  # @return [String]
43
49
  def destination_prefix_list_id
44
50
  data.destination_prefix_list_id
45
51
  end
46
52
 
53
+ # The ID of the egress-only Internet gateway.
54
+ # @return [String]
55
+ def egress_only_internet_gateway_id
56
+ data.egress_only_internet_gateway_id
57
+ end
58
+
47
59
  # The ID of a gateway attached to your VPC.
48
60
  # @return [String]
49
61
  def gateway_id
@@ -62,31 +74,16 @@ module Aws::EC2
62
74
  data.instance_owner_id
63
75
  end
64
76
 
65
- # The ID of the network interface.
66
- # @return [String]
67
- def network_interface_id
68
- data.network_interface_id
69
- end
70
-
71
- # The ID of the VPC peering connection.
72
- # @return [String]
73
- def vpc_peering_connection_id
74
- data.vpc_peering_connection_id
75
- end
76
-
77
77
  # The ID of a NAT gateway.
78
78
  # @return [String]
79
79
  def nat_gateway_id
80
80
  data.nat_gateway_id
81
81
  end
82
82
 
83
- # The state of the route. The `blackhole` state indicates that the
84
- # route's target isn't available (for example, the specified gateway
85
- # isn't attached to the VPC, or the specified NAT instance has been
86
- # terminated).
83
+ # The ID of the network interface.
87
84
  # @return [String]
88
- def state
89
- data.state
85
+ def network_interface_id
86
+ data.network_interface_id
90
87
  end
91
88
 
92
89
  # Describes how the route was created.
@@ -103,16 +100,19 @@ module Aws::EC2
103
100
  data.origin
104
101
  end
105
102
 
106
- # The IPv6 CIDR block used for the destination match.
103
+ # The state of the route. The `blackhole` state indicates that the
104
+ # route's target isn't available (for example, the specified gateway
105
+ # isn't attached to the VPC, or the specified NAT instance has been
106
+ # terminated).
107
107
  # @return [String]
108
- def destination_ipv_6_cidr_block
109
- data.destination_ipv_6_cidr_block
108
+ def state
109
+ data.state
110
110
  end
111
111
 
112
- # The ID of the egress-only Internet gateway.
112
+ # The ID of the VPC peering connection.
113
113
  # @return [String]
114
- def egress_only_internet_gateway_id
115
- data.egress_only_internet_gateway_id
114
+ def vpc_peering_connection_id
115
+ data.vpc_peering_connection_id
116
116
  end
117
117
 
118
118
  # @!endgroup
@@ -150,18 +150,18 @@ module Aws::EC2
150
150
  # @example Request syntax with placeholder values
151
151
  #
152
152
  # route.delete({
153
- # dry_run: false,
154
153
  # destination_ipv_6_cidr_block: "String",
154
+ # dry_run: false,
155
155
  # })
156
156
  # @param [Hash] options ({})
157
+ # @option options [String] :destination_ipv_6_cidr_block
158
+ # The IPv6 CIDR range for the route. The value you specify must match
159
+ # the CIDR for the route exactly.
157
160
  # @option options [Boolean] :dry_run
158
161
  # Checks whether you have the required permissions for the action,
159
162
  # without actually making the request, and provides an error response.
160
163
  # If you have the required permissions, the error response is
161
164
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
162
- # @option options [String] :destination_ipv_6_cidr_block
163
- # The IPv6 CIDR range for the route. The value you specify must match
164
- # the CIDR for the route exactly.
165
165
  # @return [EmptyStructure]
166
166
  def delete(options = {})
167
167
  options = options.merge(
@@ -175,36 +175,36 @@ module Aws::EC2
175
175
  # @example Request syntax with placeholder values
176
176
  #
177
177
  # route.replace({
178
- # dry_run: false,
179
- # gateway_id: "String",
180
178
  # destination_ipv_6_cidr_block: "String",
179
+ # dry_run: false,
181
180
  # egress_only_internet_gateway_id: "String",
181
+ # gateway_id: "String",
182
182
  # instance_id: "String",
183
+ # nat_gateway_id: "String",
183
184
  # network_interface_id: "String",
184
185
  # vpc_peering_connection_id: "String",
185
- # nat_gateway_id: "String",
186
186
  # })
187
187
  # @param [Hash] options ({})
188
+ # @option options [String] :destination_ipv_6_cidr_block
189
+ # The IPv6 CIDR address block used for the destination match. The value
190
+ # you provide must match the CIDR of an existing route in the table.
188
191
  # @option options [Boolean] :dry_run
189
192
  # Checks whether you have the required permissions for the action,
190
193
  # without actually making the request, and provides an error response.
191
194
  # If you have the required permissions, the error response is
192
195
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
193
- # @option options [String] :gateway_id
194
- # The ID of an Internet gateway or virtual private gateway.
195
- # @option options [String] :destination_ipv_6_cidr_block
196
- # The IPv6 CIDR address block used for the destination match. The value
197
- # you provide must match the CIDR of an existing route in the table.
198
196
  # @option options [String] :egress_only_internet_gateway_id
199
197
  # \[IPv6 traffic only\] The ID of an egress-only Internet gateway.
198
+ # @option options [String] :gateway_id
199
+ # The ID of an Internet gateway or virtual private gateway.
200
200
  # @option options [String] :instance_id
201
201
  # The ID of a NAT instance in your VPC.
202
+ # @option options [String] :nat_gateway_id
203
+ # \[IPv4 traffic only\] The ID of a NAT gateway.
202
204
  # @option options [String] :network_interface_id
203
205
  # The ID of a network interface.
204
206
  # @option options [String] :vpc_peering_connection_id
205
207
  # The ID of a VPC peering connection.
206
- # @option options [String] :nat_gateway_id
207
- # \[IPv4 traffic only\] The ID of a NAT gateway.
208
208
  # @return [EmptyStructure]
209
209
  def replace(options = {})
210
210
  options = options.merge(
@@ -31,10 +31,10 @@ module Aws::EC2
31
31
  end
32
32
  alias :route_table_id :id
33
33
 
34
- # The ID of the VPC.
35
- # @return [String]
36
- def vpc_id
37
- data.vpc_id
34
+ # Any virtual private gateway (VGW) propagating routes.
35
+ # @return [Array<Types::PropagatingVgw>]
36
+ def propagating_vgws
37
+ data.propagating_vgws
38
38
  end
39
39
 
40
40
  # Any tags assigned to the route table.
@@ -43,10 +43,10 @@ module Aws::EC2
43
43
  data.tags
44
44
  end
45
45
 
46
- # Any virtual private gateway (VGW) propagating routes.
47
- # @return [Array<Types::PropagatingVgw>]
48
- def propagating_vgws
49
- data.propagating_vgws
46
+ # The ID of the VPC.
47
+ # @return [String]
48
+ def vpc_id
49
+ data.vpc_id
50
50
  end
51
51
 
52
52
  # @!endgroup
@@ -113,43 +113,43 @@ module Aws::EC2
113
113
  # @example Request syntax with placeholder values
114
114
  #
115
115
  # route = route_table.create_route({
116
- # dry_run: false,
117
116
  # destination_cidr_block: "String",
118
- # gateway_id: "String",
119
117
  # destination_ipv_6_cidr_block: "String",
118
+ # dry_run: false,
120
119
  # egress_only_internet_gateway_id: "String",
120
+ # gateway_id: "String",
121
121
  # instance_id: "String",
122
+ # nat_gateway_id: "String",
122
123
  # network_interface_id: "String",
123
124
  # vpc_peering_connection_id: "String",
124
- # nat_gateway_id: "String",
125
125
  # })
126
126
  # @param [Hash] options ({})
127
- # @option options [Boolean] :dry_run
128
- # Checks whether you have the required permissions for the action,
129
- # without actually making the request, and provides an error response.
130
- # If you have the required permissions, the error response is
131
- # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
132
127
  # @option options [String] :destination_cidr_block
133
128
  # The IPv4 CIDR address block used for the destination match. Routing
134
129
  # decisions are based on the most specific match.
135
- # @option options [String] :gateway_id
136
- # The ID of an Internet gateway or virtual private gateway attached to
137
- # your VPC.
138
130
  # @option options [String] :destination_ipv_6_cidr_block
139
131
  # The IPv6 CIDR block used for the destination match. Routing decisions
140
132
  # are based on the most specific match.
133
+ # @option options [Boolean] :dry_run
134
+ # Checks whether you have the required permissions for the action,
135
+ # without actually making the request, and provides an error response.
136
+ # If you have the required permissions, the error response is
137
+ # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
141
138
  # @option options [String] :egress_only_internet_gateway_id
142
139
  # \[IPv6 traffic only\] The ID of an egress-only Internet gateway.
140
+ # @option options [String] :gateway_id
141
+ # The ID of an Internet gateway or virtual private gateway attached to
142
+ # your VPC.
143
143
  # @option options [String] :instance_id
144
144
  # The ID of a NAT instance in your VPC. The operation fails if you
145
145
  # specify an instance ID unless exactly one network interface is
146
146
  # attached.
147
+ # @option options [String] :nat_gateway_id
148
+ # \[IPv4 traffic only\] The ID of a NAT gateway.
147
149
  # @option options [String] :network_interface_id
148
150
  # The ID of a network interface.
149
151
  # @option options [String] :vpc_peering_connection_id
150
152
  # The ID of a VPC peering connection.
151
- # @option options [String] :nat_gateway_id
152
- # \[IPv4 traffic only\] The ID of a NAT gateway.
153
153
  # @return [Route]
154
154
  def create_route(options = {})
155
155
  options = options.merge(route_table_id: @id)
@@ -31,6 +31,12 @@ module Aws::EC2
31
31
  end
32
32
  alias :route_table_association_id :id
33
33
 
34
+ # Indicates whether this is the main route table.
35
+ # @return [Boolean]
36
+ def main
37
+ data.main
38
+ end
39
+
34
40
  # The ID of the route table.
35
41
  # @return [String]
36
42
  def route_table_id
@@ -44,12 +50,6 @@ module Aws::EC2
44
50
  data.subnet_id
45
51
  end
46
52
 
47
- # Indicates whether this is the main route table.
48
- # @return [Boolean]
49
- def main
50
- data.main
51
- end
52
-
53
53
  # @!endgroup
54
54
 
55
55
  # @return [Client]
@@ -31,10 +31,10 @@ module Aws::EC2
31
31
  end
32
32
  alias :group_id :id
33
33
 
34
- # The AWS account ID of the owner of the security group.
34
+ # A description of the security group.
35
35
  # @return [String]
36
- def owner_id
37
- data.owner_id
36
+ def description
37
+ data.description
38
38
  end
39
39
 
40
40
  # The name of the security group.
@@ -43,18 +43,18 @@ module Aws::EC2
43
43
  data.group_name
44
44
  end
45
45
 
46
- # A description of the security group.
47
- # @return [String]
48
- def description
49
- data.description
50
- end
51
-
52
46
  # One or more inbound rules associated with the security group.
53
47
  # @return [Array<Types::IpPermission>]
54
48
  def ip_permissions
55
49
  data.ip_permissions
56
50
  end
57
51
 
52
+ # The AWS account ID of the owner of the security group.
53
+ # @return [String]
54
+ def owner_id
55
+ data.owner_id
56
+ end
57
+
58
58
  # \[EC2-VPC\] One or more outbound rules associated with the security
59
59
  # group.
60
60
  # @return [Array<Types::IpPermission>]
@@ -62,18 +62,18 @@ module Aws::EC2
62
62
  data.ip_permissions_egress
63
63
  end
64
64
 
65
- # \[EC2-VPC\] The ID of the VPC for the security group.
66
- # @return [String]
67
- def vpc_id
68
- data.vpc_id
69
- end
70
-
71
65
  # Any tags assigned to the security group.
72
66
  # @return [Array<Types::Tag>]
73
67
  def tags
74
68
  data.tags
75
69
  end
76
70
 
71
+ # \[EC2-VPC\] The ID of the VPC for the security group.
72
+ # @return [String]
73
+ def vpc_id
74
+ data.vpc_id
75
+ end
76
+
77
77
  # @!endgroup
78
78
 
79
79
  # @return [Client]
@@ -115,27 +115,10 @@ module Aws::EC2
115
115
  #
116
116
  # security_group.authorize_egress({
117
117
  # dry_run: false,
118
- # source_security_group_name: "String",
119
- # source_security_group_owner_id: "String",
120
- # ip_protocol: "String",
121
- # from_port: 1,
122
- # to_port: 1,
123
- # cidr_ip: "String",
124
118
  # ip_permissions: [
125
119
  # {
126
- # ip_protocol: "String",
127
120
  # from_port: 1,
128
- # to_port: 1,
129
- # user_id_group_pairs: [
130
- # {
131
- # user_id: "String",
132
- # group_name: "String",
133
- # group_id: "String",
134
- # vpc_id: "String",
135
- # vpc_peering_connection_id: "String",
136
- # peering_status: "String",
137
- # },
138
- # ],
121
+ # ip_protocol: "String",
139
122
  # ip_ranges: [
140
123
  # {
141
124
  # cidr_ip: "String",
@@ -151,8 +134,25 @@ module Aws::EC2
151
134
  # prefix_list_id: "String",
152
135
  # },
153
136
  # ],
137
+ # to_port: 1,
138
+ # user_id_group_pairs: [
139
+ # {
140
+ # group_id: "String",
141
+ # group_name: "String",
142
+ # peering_status: "String",
143
+ # user_id: "String",
144
+ # vpc_id: "String",
145
+ # vpc_peering_connection_id: "String",
146
+ # },
147
+ # ],
154
148
  # },
155
149
  # ],
150
+ # cidr_ip: "String",
151
+ # from_port: 1,
152
+ # ip_protocol: "String",
153
+ # to_port: 1,
154
+ # source_security_group_name: "String",
155
+ # source_security_group_owner_id: "String",
156
156
  # })
157
157
  # @param [Hash] options ({})
158
158
  # @option options [Boolean] :dry_run
@@ -160,31 +160,31 @@ module Aws::EC2
160
160
  # without actually making the request, and provides an error response.
161
161
  # If you have the required permissions, the error response is
162
162
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
163
- # @option options [String] :source_security_group_name
164
- # The name of a destination security group. To authorize outbound access
165
- # to a destination security group, we recommend that you use a set of IP
166
- # permissions instead.
167
- # @option options [String] :source_security_group_owner_id
168
- # The AWS account number for a destination security group. To authorize
169
- # outbound access to a destination security group, we recommend that you
170
- # use a set of IP permissions instead.
171
- # @option options [String] :ip_protocol
172
- # The IP protocol name or number. We recommend that you specify the
173
- # protocol in a set of IP permissions instead.
163
+ # @option options [Array<Types::IpPermission>] :ip_permissions
164
+ # A set of IP permissions. You can't specify a destination security
165
+ # group and a CIDR IP address range.
166
+ # @option options [String] :cidr_ip
167
+ # The CIDR IPv4 address range. We recommend that you specify the CIDR
168
+ # range in a set of IP permissions instead.
174
169
  # @option options [Integer] :from_port
175
170
  # The start of port range for the TCP and UDP protocols, or an ICMP type
176
171
  # number. We recommend that you specify the port range in a set of IP
177
172
  # permissions instead.
173
+ # @option options [String] :ip_protocol
174
+ # The IP protocol name or number. We recommend that you specify the
175
+ # protocol in a set of IP permissions instead.
178
176
  # @option options [Integer] :to_port
179
177
  # The end of port range for the TCP and UDP protocols, or an ICMP type
180
178
  # number. We recommend that you specify the port range in a set of IP
181
179
  # permissions instead.
182
- # @option options [String] :cidr_ip
183
- # The CIDR IPv4 address range. We recommend that you specify the CIDR
184
- # range in a set of IP permissions instead.
185
- # @option options [Array<Types::IpPermission>] :ip_permissions
186
- # A set of IP permissions. You can't specify a destination security
187
- # group and a CIDR IP address range.
180
+ # @option options [String] :source_security_group_name
181
+ # The name of a destination security group. To authorize outbound access
182
+ # to a destination security group, we recommend that you use a set of IP
183
+ # permissions instead.
184
+ # @option options [String] :source_security_group_owner_id
185
+ # The AWS account number for a destination security group. To authorize
186
+ # outbound access to a destination security group, we recommend that you
187
+ # use a set of IP permissions instead.
188
188
  # @return [EmptyStructure]
189
189
  def authorize_egress(options = {})
190
190
  options = options.merge(group_id: @id)
@@ -195,29 +195,13 @@ module Aws::EC2
195
195
  # @example Request syntax with placeholder values
196
196
  #
197
197
  # security_group.authorize_ingress({
198
- # dry_run: false,
199
- # group_name: "String",
200
- # source_security_group_name: "String",
201
- # source_security_group_owner_id: "String",
202
- # ip_protocol: "String",
203
- # from_port: 1,
204
- # to_port: 1,
205
198
  # cidr_ip: "String",
199
+ # from_port: 1,
200
+ # group_name: "String",
206
201
  # ip_permissions: [
207
202
  # {
208
- # ip_protocol: "String",
209
203
  # from_port: 1,
210
- # to_port: 1,
211
- # user_id_group_pairs: [
212
- # {
213
- # user_id: "String",
214
- # group_name: "String",
215
- # group_id: "String",
216
- # vpc_id: "String",
217
- # vpc_peering_connection_id: "String",
218
- # peering_status: "String",
219
- # },
220
- # ],
204
+ # ip_protocol: "String",
221
205
  # ip_ranges: [
222
206
  # {
223
207
  # cidr_ip: "String",
@@ -233,17 +217,50 @@ module Aws::EC2
233
217
  # prefix_list_id: "String",
234
218
  # },
235
219
  # ],
220
+ # to_port: 1,
221
+ # user_id_group_pairs: [
222
+ # {
223
+ # group_id: "String",
224
+ # group_name: "String",
225
+ # peering_status: "String",
226
+ # user_id: "String",
227
+ # vpc_id: "String",
228
+ # vpc_peering_connection_id: "String",
229
+ # },
230
+ # ],
236
231
  # },
237
232
  # ],
233
+ # ip_protocol: "String",
234
+ # source_security_group_name: "String",
235
+ # source_security_group_owner_id: "String",
236
+ # to_port: 1,
237
+ # dry_run: false,
238
238
  # })
239
239
  # @param [Hash] options ({})
240
- # @option options [Boolean] :dry_run
241
- # Checks whether you have the required permissions for the action,
242
- # without actually making the request, and provides an error response.
243
- # If you have the required permissions, the error response is
244
- # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
240
+ # @option options [String] :cidr_ip
241
+ # The CIDR IPv4 address range. You can't specify this parameter when
242
+ # specifying a source security group.
243
+ # @option options [Integer] :from_port
244
+ # The start of port range for the TCP and UDP protocols, or an
245
+ # ICMP/ICMPv6 type number. For the ICMP/ICMPv6 type number, use `-1` to
246
+ # specify all types.
245
247
  # @option options [String] :group_name
246
248
  # \[EC2-Classic, default VPC\] The name of the security group.
249
+ # @option options [Array<Types::IpPermission>] :ip_permissions
250
+ # A set of IP permissions. Can be used to specify multiple rules in a
251
+ # single command.
252
+ # @option options [String] :ip_protocol
253
+ # The IP protocol name (`tcp`, `udp`, `icmp`) or number (see [Protocol
254
+ # Numbers][1]). (VPC only) Use `-1` to specify all protocols. If you
255
+ # specify `-1`, or a protocol number other than `tcp`, `udp`, `icmp`, or
256
+ # `58` (ICMPv6), traffic on all ports is allowed, regardless of any
257
+ # ports you specify. For `tcp`, `udp`, and `icmp`, you must specify a
258
+ # port range. For protocol `58` (ICMPv6), you can optionally specify a
259
+ # port range; if you don't, traffic for all types and codes is allowed.
260
+ #
261
+ #
262
+ #
263
+ # [1]: http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
247
264
  # @option options [String] :source_security_group_name
248
265
  # \[EC2-Classic, default VPC\] The name of the source security group.
249
266
  # You can't specify this parameter in combination with the following
@@ -260,32 +277,15 @@ module Aws::EC2
260
277
  # range, and the end of the port range. Creates rules that grant full
261
278
  # ICMP, UDP, and TCP access. To create a rule with a specific IP
262
279
  # protocol and port range, use a set of IP permissions instead.
263
- # @option options [String] :ip_protocol
264
- # The IP protocol name (`tcp`, `udp`, `icmp`) or number (see [Protocol
265
- # Numbers][1]). (VPC only) Use `-1` to specify all protocols. If you
266
- # specify `-1`, or a protocol number other than `tcp`, `udp`, `icmp`, or
267
- # `58` (ICMPv6), traffic on all ports is allowed, regardless of any
268
- # ports you specify. For `tcp`, `udp`, and `icmp`, you must specify a
269
- # port range. For protocol `58` (ICMPv6), you can optionally specify a
270
- # port range; if you don't, traffic for all types and codes is allowed.
271
- #
272
- #
273
- #
274
- # [1]: http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
275
- # @option options [Integer] :from_port
276
- # The start of port range for the TCP and UDP protocols, or an
277
- # ICMP/ICMPv6 type number. For the ICMP/ICMPv6 type number, use `-1` to
278
- # specify all types.
279
280
  # @option options [Integer] :to_port
280
281
  # The end of port range for the TCP and UDP protocols, or an ICMP/ICMPv6
281
282
  # code number. For the ICMP/ICMPv6 code number, use `-1` to specify all
282
283
  # codes.
283
- # @option options [String] :cidr_ip
284
- # The CIDR IPv4 address range. You can't specify this parameter when
285
- # specifying a source security group.
286
- # @option options [Array<Types::IpPermission>] :ip_permissions
287
- # A set of IP permissions. Can be used to specify multiple rules in a
288
- # single command.
284
+ # @option options [Boolean] :dry_run
285
+ # Checks whether you have the required permissions for the action,
286
+ # without actually making the request, and provides an error response.
287
+ # If you have the required permissions, the error response is
288
+ # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
289
289
  # @return [EmptyStructure]
290
290
  def authorize_ingress(options = {})
291
291
  options = options.merge(group_id: @id)
@@ -333,18 +333,18 @@ module Aws::EC2
333
333
  # @example Request syntax with placeholder values
334
334
  #
335
335
  # security_group.delete({
336
- # dry_run: false,
337
336
  # group_name: "String",
337
+ # dry_run: false,
338
338
  # })
339
339
  # @param [Hash] options ({})
340
+ # @option options [String] :group_name
341
+ # \[EC2-Classic, default VPC\] The name of the security group. You can
342
+ # specify either the security group name or the security group ID.
340
343
  # @option options [Boolean] :dry_run
341
344
  # Checks whether you have the required permissions for the action,
342
345
  # without actually making the request, and provides an error response.
343
346
  # If you have the required permissions, the error response is
344
347
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
345
- # @option options [String] :group_name
346
- # \[EC2-Classic, default VPC\] The name of the security group. You can
347
- # specify either the security group name or the security group ID.
348
348
  # @return [EmptyStructure]
349
349
  def delete(options = {})
350
350
  options = options.merge(group_id: @id)
@@ -356,27 +356,10 @@ module Aws::EC2
356
356
  #
357
357
  # security_group.revoke_egress({
358
358
  # dry_run: false,
359
- # source_security_group_name: "String",
360
- # source_security_group_owner_id: "String",
361
- # ip_protocol: "String",
362
- # from_port: 1,
363
- # to_port: 1,
364
- # cidr_ip: "String",
365
359
  # ip_permissions: [
366
360
  # {
367
- # ip_protocol: "String",
368
361
  # from_port: 1,
369
- # to_port: 1,
370
- # user_id_group_pairs: [
371
- # {
372
- # user_id: "String",
373
- # group_name: "String",
374
- # group_id: "String",
375
- # vpc_id: "String",
376
- # vpc_peering_connection_id: "String",
377
- # peering_status: "String",
378
- # },
379
- # ],
362
+ # ip_protocol: "String",
380
363
  # ip_ranges: [
381
364
  # {
382
365
  # cidr_ip: "String",
@@ -392,8 +375,25 @@ module Aws::EC2
392
375
  # prefix_list_id: "String",
393
376
  # },
394
377
  # ],
378
+ # to_port: 1,
379
+ # user_id_group_pairs: [
380
+ # {
381
+ # group_id: "String",
382
+ # group_name: "String",
383
+ # peering_status: "String",
384
+ # user_id: "String",
385
+ # vpc_id: "String",
386
+ # vpc_peering_connection_id: "String",
387
+ # },
388
+ # ],
395
389
  # },
396
390
  # ],
391
+ # cidr_ip: "String",
392
+ # from_port: 1,
393
+ # ip_protocol: "String",
394
+ # to_port: 1,
395
+ # source_security_group_name: "String",
396
+ # source_security_group_owner_id: "String",
397
397
  # })
398
398
  # @param [Hash] options ({})
399
399
  # @option options [Boolean] :dry_run
@@ -401,31 +401,31 @@ module Aws::EC2
401
401
  # without actually making the request, and provides an error response.
402
402
  # If you have the required permissions, the error response is
403
403
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
404
- # @option options [String] :source_security_group_name
405
- # The name of a destination security group. To revoke outbound access to
406
- # a destination security group, we recommend that you use a set of IP
407
- # permissions instead.
408
- # @option options [String] :source_security_group_owner_id
409
- # The AWS account number for a destination security group. To revoke
410
- # outbound access to a destination security group, we recommend that you
411
- # use a set of IP permissions instead.
412
- # @option options [String] :ip_protocol
413
- # The IP protocol name or number. We recommend that you specify the
414
- # protocol in a set of IP permissions instead.
404
+ # @option options [Array<Types::IpPermission>] :ip_permissions
405
+ # A set of IP permissions. You can't specify a destination security
406
+ # group and a CIDR IP address range.
407
+ # @option options [String] :cidr_ip
408
+ # The CIDR IP address range. We recommend that you specify the CIDR
409
+ # range in a set of IP permissions instead.
415
410
  # @option options [Integer] :from_port
416
411
  # The start of port range for the TCP and UDP protocols, or an ICMP type
417
412
  # number. We recommend that you specify the port range in a set of IP
418
413
  # permissions instead.
414
+ # @option options [String] :ip_protocol
415
+ # The IP protocol name or number. We recommend that you specify the
416
+ # protocol in a set of IP permissions instead.
419
417
  # @option options [Integer] :to_port
420
418
  # The end of port range for the TCP and UDP protocols, or an ICMP type
421
419
  # number. We recommend that you specify the port range in a set of IP
422
420
  # permissions instead.
423
- # @option options [String] :cidr_ip
424
- # The CIDR IP address range. We recommend that you specify the CIDR
425
- # range in a set of IP permissions instead.
426
- # @option options [Array<Types::IpPermission>] :ip_permissions
427
- # A set of IP permissions. You can't specify a destination security
428
- # group and a CIDR IP address range.
421
+ # @option options [String] :source_security_group_name
422
+ # The name of a destination security group. To revoke outbound access to
423
+ # a destination security group, we recommend that you use a set of IP
424
+ # permissions instead.
425
+ # @option options [String] :source_security_group_owner_id
426
+ # The AWS account number for a destination security group. To revoke
427
+ # outbound access to a destination security group, we recommend that you
428
+ # use a set of IP permissions instead.
429
429
  # @return [EmptyStructure]
430
430
  def revoke_egress(options = {})
431
431
  options = options.merge(group_id: @id)
@@ -436,29 +436,13 @@ module Aws::EC2
436
436
  # @example Request syntax with placeholder values
437
437
  #
438
438
  # security_group.revoke_ingress({
439
- # dry_run: false,
440
- # group_name: "String",
441
- # source_security_group_name: "String",
442
- # source_security_group_owner_id: "String",
443
- # ip_protocol: "String",
444
- # from_port: 1,
445
- # to_port: 1,
446
439
  # cidr_ip: "String",
440
+ # from_port: 1,
441
+ # group_name: "String",
447
442
  # ip_permissions: [
448
443
  # {
449
- # ip_protocol: "String",
450
444
  # from_port: 1,
451
- # to_port: 1,
452
- # user_id_group_pairs: [
453
- # {
454
- # user_id: "String",
455
- # group_name: "String",
456
- # group_id: "String",
457
- # vpc_id: "String",
458
- # vpc_peering_connection_id: "String",
459
- # peering_status: "String",
460
- # },
461
- # ],
445
+ # ip_protocol: "String",
462
446
  # ip_ranges: [
463
447
  # {
464
448
  # cidr_ip: "String",
@@ -474,17 +458,44 @@ module Aws::EC2
474
458
  # prefix_list_id: "String",
475
459
  # },
476
460
  # ],
461
+ # to_port: 1,
462
+ # user_id_group_pairs: [
463
+ # {
464
+ # group_id: "String",
465
+ # group_name: "String",
466
+ # peering_status: "String",
467
+ # user_id: "String",
468
+ # vpc_id: "String",
469
+ # vpc_peering_connection_id: "String",
470
+ # },
471
+ # ],
477
472
  # },
478
473
  # ],
474
+ # ip_protocol: "String",
475
+ # source_security_group_name: "String",
476
+ # source_security_group_owner_id: "String",
477
+ # to_port: 1,
478
+ # dry_run: false,
479
479
  # })
480
480
  # @param [Hash] options ({})
481
- # @option options [Boolean] :dry_run
482
- # Checks whether you have the required permissions for the action,
483
- # without actually making the request, and provides an error response.
484
- # If you have the required permissions, the error response is
485
- # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
481
+ # @option options [String] :cidr_ip
482
+ # The CIDR IP address range. You can't specify this parameter when
483
+ # specifying a source security group.
484
+ # @option options [Integer] :from_port
485
+ # The start of port range for the TCP and UDP protocols, or an ICMP type
486
+ # number. For the ICMP type number, use `-1` to specify all ICMP types.
486
487
  # @option options [String] :group_name
487
488
  # \[EC2-Classic, default VPC\] The name of the security group.
489
+ # @option options [Array<Types::IpPermission>] :ip_permissions
490
+ # A set of IP permissions. You can't specify a source security group
491
+ # and a CIDR IP address range.
492
+ # @option options [String] :ip_protocol
493
+ # The IP protocol name (`tcp`, `udp`, `icmp`) or number (see [Protocol
494
+ # Numbers][1]). Use `-1` to specify all.
495
+ #
496
+ #
497
+ #
498
+ # [1]: http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
488
499
  # @option options [String] :source_security_group_name
489
500
  # \[EC2-Classic, default VPC\] The name of the source security group.
490
501
  # You can't specify this parameter in combination with the following
@@ -500,26 +511,15 @@ module Aws::EC2
500
511
  # the CIDR IP address range, the IP protocol, the start of the port
501
512
  # range, and the end of the port range. To revoke a specific rule for an
502
513
  # IP protocol and port range, use a set of IP permissions instead.
503
- # @option options [String] :ip_protocol
504
- # The IP protocol name (`tcp`, `udp`, `icmp`) or number (see [Protocol
505
- # Numbers][1]). Use `-1` to specify all.
506
- #
507
- #
508
- #
509
- # [1]: http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
510
- # @option options [Integer] :from_port
511
- # The start of port range for the TCP and UDP protocols, or an ICMP type
512
- # number. For the ICMP type number, use `-1` to specify all ICMP types.
513
514
  # @option options [Integer] :to_port
514
515
  # The end of port range for the TCP and UDP protocols, or an ICMP code
515
516
  # number. For the ICMP code number, use `-1` to specify all ICMP codes
516
517
  # for the ICMP type.
517
- # @option options [String] :cidr_ip
518
- # The CIDR IP address range. You can't specify this parameter when
519
- # specifying a source security group.
520
- # @option options [Array<Types::IpPermission>] :ip_permissions
521
- # A set of IP permissions. You can't specify a source security group
522
- # and a CIDR IP address range.
518
+ # @option options [Boolean] :dry_run
519
+ # Checks whether you have the required permissions for the action,
520
+ # without actually making the request, and provides an error response.
521
+ # If you have the required permissions, the error response is
522
+ # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
523
523
  # @return [EmptyStructure]
524
524
  def revoke_ingress(options = {})
525
525
  options = options.merge(group_id: @id)