All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.awsnative.networkfirewall.kotlin.inputs.RuleGroupHeaderArgs.kt Maven / Gradle / Ivy

Go to download

Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.

There is a newer version: 1.11.0.0
Show newest version
@file:Suppress("NAME_SHADOWING", "DEPRECATION")

package com.pulumi.awsnative.networkfirewall.kotlin.inputs

import com.pulumi.awsnative.networkfirewall.inputs.RuleGroupHeaderArgs.builder
import com.pulumi.awsnative.networkfirewall.kotlin.enums.RuleGroupHeaderDirection
import com.pulumi.awsnative.networkfirewall.kotlin.enums.RuleGroupHeaderProtocol
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiNullFieldException
import com.pulumi.kotlin.PulumiTagMarker
import kotlin.String
import kotlin.Suppress
import kotlin.jvm.JvmName

/**
 *
 * @property destination The destination IP address or address range to inspect for, in CIDR notation. To match with any address, specify `ANY` .
 * Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4 and IPv6.
 * Examples:
 * - To configure Network Firewall to inspect for the IP address 192.0.2.44, specify `192.0.2.44/32` .
 * - To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify `192.0.2.0/24` .
 * - To configure Network Firewall to inspect for the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify `1111:0000:0000:0000:0000:0000:0000:0111/128` .
 * - To configure Network Firewall to inspect for IP addresses from 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify `1111:0000:0000:0000:0000:0000:0000:0000/64` .
 * For more information about CIDR notation, see the Wikipedia entry [Classless Inter-Domain Routing](https://docs.aws.amazon.com/https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) .
 * @property destinationPort The destination port to inspect for. You can specify an individual port, for example `1994` and you can specify a port range, for example `1990:1994` . To match with any port, specify `ANY` .
 * @property direction The direction of traffic flow to inspect. If set to `ANY` , the inspection matches bidirectional traffic, both from the source to the destination and from the destination to the source. If set to `FORWARD` , the inspection only matches traffic going from the source to the destination.
 * @property protocol The protocol to inspect for. To specify all, you can use `IP` , because all traffic on AWS and on the internet is IP.
 * @property source The source IP address or address range to inspect for, in CIDR notation. To match with any address, specify `ANY` .
 * Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4 and IPv6.
 * Examples:
 * - To configure Network Firewall to inspect for the IP address 192.0.2.44, specify `192.0.2.44/32` .
 * - To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify `192.0.2.0/24` .
 * - To configure Network Firewall to inspect for the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify `1111:0000:0000:0000:0000:0000:0000:0111/128` .
 * - To configure Network Firewall to inspect for IP addresses from 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify `1111:0000:0000:0000:0000:0000:0000:0000/64` .
 * For more information about CIDR notation, see the Wikipedia entry [Classless Inter-Domain Routing](https://docs.aws.amazon.com/https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) .
 * @property sourcePort The source port to inspect for. You can specify an individual port, for example `1994` and you can specify a port range, for example `1990:1994` . To match with any port, specify `ANY` .
 */
public data class RuleGroupHeaderArgs(
    public val destination: Output,
    public val destinationPort: Output,
    public val direction: Output,
    public val protocol: Output,
    public val source: Output,
    public val sourcePort: Output,
) : ConvertibleToJava {
    override fun toJava(): com.pulumi.awsnative.networkfirewall.inputs.RuleGroupHeaderArgs =
        com.pulumi.awsnative.networkfirewall.inputs.RuleGroupHeaderArgs.builder()
            .destination(destination.applyValue({ args0 -> args0 }))
            .destinationPort(destinationPort.applyValue({ args0 -> args0 }))
            .direction(direction.applyValue({ args0 -> args0.let({ args0 -> args0.toJava() }) }))
            .protocol(protocol.applyValue({ args0 -> args0.let({ args0 -> args0.toJava() }) }))
            .source(source.applyValue({ args0 -> args0 }))
            .sourcePort(sourcePort.applyValue({ args0 -> args0 })).build()
}

/**
 * Builder for [RuleGroupHeaderArgs].
 */
@PulumiTagMarker
public class RuleGroupHeaderArgsBuilder internal constructor() {
    private var destination: Output? = null

    private var destinationPort: Output? = null

    private var direction: Output? = null

    private var protocol: Output? = null

    private var source: Output? = null

    private var sourcePort: Output? = null

    /**
     * @param value The destination IP address or address range to inspect for, in CIDR notation. To match with any address, specify `ANY` .
     * Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4 and IPv6.
     * Examples:
     * - To configure Network Firewall to inspect for the IP address 192.0.2.44, specify `192.0.2.44/32` .
     * - To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify `192.0.2.0/24` .
     * - To configure Network Firewall to inspect for the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify `1111:0000:0000:0000:0000:0000:0000:0111/128` .
     * - To configure Network Firewall to inspect for IP addresses from 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify `1111:0000:0000:0000:0000:0000:0000:0000/64` .
     * For more information about CIDR notation, see the Wikipedia entry [Classless Inter-Domain Routing](https://docs.aws.amazon.com/https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) .
     */
    @JvmName("sdyjhlmumvfqpaen")
    public suspend fun destination(`value`: Output) {
        this.destination = value
    }

    /**
     * @param value The destination port to inspect for. You can specify an individual port, for example `1994` and you can specify a port range, for example `1990:1994` . To match with any port, specify `ANY` .
     */
    @JvmName("pqrbbqicctgcocft")
    public suspend fun destinationPort(`value`: Output) {
        this.destinationPort = value
    }

    /**
     * @param value The direction of traffic flow to inspect. If set to `ANY` , the inspection matches bidirectional traffic, both from the source to the destination and from the destination to the source. If set to `FORWARD` , the inspection only matches traffic going from the source to the destination.
     */
    @JvmName("jtshnlvomyqyonvu")
    public suspend fun direction(`value`: Output) {
        this.direction = value
    }

    /**
     * @param value The protocol to inspect for. To specify all, you can use `IP` , because all traffic on AWS and on the internet is IP.
     */
    @JvmName("ebyyknhmpbbdesuc")
    public suspend fun protocol(`value`: Output) {
        this.protocol = value
    }

    /**
     * @param value The source IP address or address range to inspect for, in CIDR notation. To match with any address, specify `ANY` .
     * Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4 and IPv6.
     * Examples:
     * - To configure Network Firewall to inspect for the IP address 192.0.2.44, specify `192.0.2.44/32` .
     * - To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify `192.0.2.0/24` .
     * - To configure Network Firewall to inspect for the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify `1111:0000:0000:0000:0000:0000:0000:0111/128` .
     * - To configure Network Firewall to inspect for IP addresses from 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify `1111:0000:0000:0000:0000:0000:0000:0000/64` .
     * For more information about CIDR notation, see the Wikipedia entry [Classless Inter-Domain Routing](https://docs.aws.amazon.com/https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) .
     */
    @JvmName("vhhicyujilrjwwua")
    public suspend fun source(`value`: Output) {
        this.source = value
    }

    /**
     * @param value The source port to inspect for. You can specify an individual port, for example `1994` and you can specify a port range, for example `1990:1994` . To match with any port, specify `ANY` .
     */
    @JvmName("vmcquuxincbfuskd")
    public suspend fun sourcePort(`value`: Output) {
        this.sourcePort = value
    }

    /**
     * @param value The destination IP address or address range to inspect for, in CIDR notation. To match with any address, specify `ANY` .
     * Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4 and IPv6.
     * Examples:
     * - To configure Network Firewall to inspect for the IP address 192.0.2.44, specify `192.0.2.44/32` .
     * - To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify `192.0.2.0/24` .
     * - To configure Network Firewall to inspect for the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify `1111:0000:0000:0000:0000:0000:0000:0111/128` .
     * - To configure Network Firewall to inspect for IP addresses from 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify `1111:0000:0000:0000:0000:0000:0000:0000/64` .
     * For more information about CIDR notation, see the Wikipedia entry [Classless Inter-Domain Routing](https://docs.aws.amazon.com/https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) .
     */
    @JvmName("ysmoagufsxnvvjfb")
    public suspend fun destination(`value`: String) {
        val toBeMapped = value
        val mapped = toBeMapped.let({ args0 -> of(args0) })
        this.destination = mapped
    }

    /**
     * @param value The destination port to inspect for. You can specify an individual port, for example `1994` and you can specify a port range, for example `1990:1994` . To match with any port, specify `ANY` .
     */
    @JvmName("rfcvmyvxjitjwmot")
    public suspend fun destinationPort(`value`: String) {
        val toBeMapped = value
        val mapped = toBeMapped.let({ args0 -> of(args0) })
        this.destinationPort = mapped
    }

    /**
     * @param value The direction of traffic flow to inspect. If set to `ANY` , the inspection matches bidirectional traffic, both from the source to the destination and from the destination to the source. If set to `FORWARD` , the inspection only matches traffic going from the source to the destination.
     */
    @JvmName("ixhgwpnrwvroxckk")
    public suspend fun direction(`value`: RuleGroupHeaderDirection) {
        val toBeMapped = value
        val mapped = toBeMapped.let({ args0 -> of(args0) })
        this.direction = mapped
    }

    /**
     * @param value The protocol to inspect for. To specify all, you can use `IP` , because all traffic on AWS and on the internet is IP.
     */
    @JvmName("ateauwtgrutxqecp")
    public suspend fun protocol(`value`: RuleGroupHeaderProtocol) {
        val toBeMapped = value
        val mapped = toBeMapped.let({ args0 -> of(args0) })
        this.protocol = mapped
    }

    /**
     * @param value The source IP address or address range to inspect for, in CIDR notation. To match with any address, specify `ANY` .
     * Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4 and IPv6.
     * Examples:
     * - To configure Network Firewall to inspect for the IP address 192.0.2.44, specify `192.0.2.44/32` .
     * - To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify `192.0.2.0/24` .
     * - To configure Network Firewall to inspect for the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify `1111:0000:0000:0000:0000:0000:0000:0111/128` .
     * - To configure Network Firewall to inspect for IP addresses from 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify `1111:0000:0000:0000:0000:0000:0000:0000/64` .
     * For more information about CIDR notation, see the Wikipedia entry [Classless Inter-Domain Routing](https://docs.aws.amazon.com/https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) .
     */
    @JvmName("tevjvumcpjndtjey")
    public suspend fun source(`value`: String) {
        val toBeMapped = value
        val mapped = toBeMapped.let({ args0 -> of(args0) })
        this.source = mapped
    }

    /**
     * @param value The source port to inspect for. You can specify an individual port, for example `1994` and you can specify a port range, for example `1990:1994` . To match with any port, specify `ANY` .
     */
    @JvmName("sltanryrlamtbnwk")
    public suspend fun sourcePort(`value`: String) {
        val toBeMapped = value
        val mapped = toBeMapped.let({ args0 -> of(args0) })
        this.sourcePort = mapped
    }

    internal fun build(): RuleGroupHeaderArgs = RuleGroupHeaderArgs(
        destination = destination ?: throw PulumiNullFieldException("destination"),
        destinationPort = destinationPort ?: throw PulumiNullFieldException("destinationPort"),
        direction = direction ?: throw PulumiNullFieldException("direction"),
        protocol = protocol ?: throw PulumiNullFieldException("protocol"),
        source = source ?: throw PulumiNullFieldException("source"),
        sourcePort = sourcePort ?: throw PulumiNullFieldException("sourcePort"),
    )
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy