Struct google_api_proto::google::cloud::compute::v1::FirewallPolicyRuleMatcher
source · pub struct FirewallPolicyRuleMatcher {
pub dest_address_groups: Vec<String>,
pub dest_fqdns: Vec<String>,
pub dest_ip_ranges: Vec<String>,
pub dest_region_codes: Vec<String>,
pub dest_threat_intelligences: Vec<String>,
pub layer4_configs: Vec<FirewallPolicyRuleMatcherLayer4Config>,
pub src_address_groups: Vec<String>,
pub src_fqdns: Vec<String>,
pub src_ip_ranges: Vec<String>,
pub src_region_codes: Vec<String>,
pub src_secure_tags: Vec<FirewallPolicyRuleSecureTag>,
pub src_threat_intelligences: Vec<String>,
}
Expand description
Represents a match condition that incoming traffic is evaluated against. Exactly one field must be specified.
Fields§
§dest_address_groups: Vec<String>
Address groups which should be matched against the traffic destination. Maximum number of destination address groups is 10.
dest_fqdns: Vec<String>
Fully Qualified Domain Name (FQDN) which should be matched against traffic destination. Maximum number of destination fqdn allowed is 100.
dest_ip_ranges: Vec<String>
CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
dest_region_codes: Vec<String>
Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.“US” Maximum number of dest region codes allowed is 5000.
dest_threat_intelligences: Vec<String>
Names of Network Threat Intelligence lists. The IPs in these lists will be matched against traffic destination.
layer4_configs: Vec<FirewallPolicyRuleMatcherLayer4Config>
Pairs of IP protocols and ports that the rule should match.
src_address_groups: Vec<String>
Address groups which should be matched against the traffic source. Maximum number of source address groups is 10.
src_fqdns: Vec<String>
Fully Qualified Domain Name (FQDN) which should be matched against traffic source. Maximum number of source fqdn allowed is 100.
src_ip_ranges: Vec<String>
CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
src_region_codes: Vec<String>
Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.“US” Maximum number of source region codes allowed is 5000.
List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
src_threat_intelligences: Vec<String>
Names of Network Threat Intelligence lists. The IPs in these lists will be matched against traffic source.
Trait Implementations§
source§impl Clone for FirewallPolicyRuleMatcher
impl Clone for FirewallPolicyRuleMatcher
source§fn clone(&self) -> FirewallPolicyRuleMatcher
fn clone(&self) -> FirewallPolicyRuleMatcher
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for FirewallPolicyRuleMatcher
impl Debug for FirewallPolicyRuleMatcher
source§impl Default for FirewallPolicyRuleMatcher
impl Default for FirewallPolicyRuleMatcher
source§impl Message for FirewallPolicyRuleMatcher
impl Message for FirewallPolicyRuleMatcher
source§fn encoded_len(&self) -> usize
fn encoded_len(&self) -> usize
source§fn encode(&self, buf: &mut impl BufMut) -> Result<(), EncodeError>where
Self: Sized,
fn encode(&self, buf: &mut impl BufMut) -> Result<(), EncodeError>where
Self: Sized,
source§fn encode_to_vec(&self) -> Vec<u8>where
Self: Sized,
fn encode_to_vec(&self) -> Vec<u8>where
Self: Sized,
source§fn encode_length_delimited(
&self,
buf: &mut impl BufMut,
) -> Result<(), EncodeError>where
Self: Sized,
fn encode_length_delimited(
&self,
buf: &mut impl BufMut,
) -> Result<(), EncodeError>where
Self: Sized,
source§fn encode_length_delimited_to_vec(&self) -> Vec<u8>where
Self: Sized,
fn encode_length_delimited_to_vec(&self) -> Vec<u8>where
Self: Sized,
source§fn decode(buf: impl Buf) -> Result<Self, DecodeError>where
Self: Default,
fn decode(buf: impl Buf) -> Result<Self, DecodeError>where
Self: Default,
source§fn decode_length_delimited(buf: impl Buf) -> Result<Self, DecodeError>where
Self: Default,
fn decode_length_delimited(buf: impl Buf) -> Result<Self, DecodeError>where
Self: Default,
source§fn merge(&mut self, buf: impl Buf) -> Result<(), DecodeError>where
Self: Sized,
fn merge(&mut self, buf: impl Buf) -> Result<(), DecodeError>where
Self: Sized,
self
. Read moresource§fn merge_length_delimited(&mut self, buf: impl Buf) -> Result<(), DecodeError>where
Self: Sized,
fn merge_length_delimited(&mut self, buf: impl Buf) -> Result<(), DecodeError>where
Self: Sized,
self
.source§impl PartialEq for FirewallPolicyRuleMatcher
impl PartialEq for FirewallPolicyRuleMatcher
source§fn eq(&self, other: &FirewallPolicyRuleMatcher) -> bool
fn eq(&self, other: &FirewallPolicyRuleMatcher) -> bool
self
and other
values to be equal, and is used
by ==
.impl StructuralPartialEq for FirewallPolicyRuleMatcher
Auto Trait Implementations§
impl Freeze for FirewallPolicyRuleMatcher
impl RefUnwindSafe for FirewallPolicyRuleMatcher
impl Send for FirewallPolicyRuleMatcher
impl Sync for FirewallPolicyRuleMatcher
impl Unpin for FirewallPolicyRuleMatcher
impl UnwindSafe for FirewallPolicyRuleMatcher
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
§impl<T> Instrument for T
impl<T> Instrument for T
§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoRequest<T> for T
impl<T> IntoRequest<T> for T
source§fn into_request(self) -> Request<T>
fn into_request(self) -> Request<T>
T
in a tonic::Request