gophercloud: github.com/rackspace/gophercloud/openstack/networking/v2/extensions/security/rules Index | Files

package rules

import "github.com/rackspace/gophercloud/openstack/networking/v2/extensions/security/rules"

Index

Package Files

requests.go results.go urls.go

Constants

const (
    DirIngress   = "ingress"
    DirEgress    = "egress"
    Ether4       = "IPv4"
    Ether6       = "IPv6"
    ProtocolTCP  = "tcp"
    ProtocolUDP  = "udp"
    ProtocolICMP = "icmp"
)

Constants useful for CreateOpts

func ExtractRules Uses

func ExtractRules(page pagination.Page) ([]SecGroupRule, error)

ExtractRules accepts a Page struct, specifically a SecGroupRulePage struct, and extracts the elements into a slice of SecGroupRule structs. In other words, a generic collection is mapped into a relevant slice.

func List Uses

func List(c *gophercloud.ServiceClient, opts ListOpts) pagination.Pager

List returns a Pager which allows you to iterate over a collection of security group rules. It accepts a ListOpts struct, which allows you to filter and sort the returned collection for greater efficiency.

type CreateOpts Uses

type CreateOpts struct {
    // Required. Must be either "ingress" or "egress": the direction in which the
    // security group rule is applied.
    Direction string

    // Required. Must be "IPv4" or "IPv6", and addresses represented in CIDR must
    // match the ingress or egress rules.
    EtherType string

    // Required. The security group ID to associate with this security group rule.
    SecGroupID string

    // Optional. The maximum port number in the range that is matched by the
    // security group rule. The PortRangeMin attribute constrains the PortRangeMax
    // attribute. If the protocol is ICMP, this value must be an ICMP type.
    PortRangeMax int

    // Optional. The minimum port number in the range that is matched by the
    // security group rule. If the protocol is TCP or UDP, this value must be
    // less than or equal to the value of the PortRangeMax attribute. If the
    // protocol is ICMP, this value must be an ICMP type.
    PortRangeMin int

    // Optional. The protocol that is matched by the security group rule. Valid
    // values are "tcp", "udp", "icmp" or an empty string.
    Protocol string

    // Optional. The remote group ID to be associated with this security group
    // rule. You can specify either RemoteGroupID or RemoteIPPrefix.
    RemoteGroupID string

    // Optional. The remote IP prefix to be associated with this security group
    // rule. You can specify either RemoteGroupID or RemoteIPPrefix. This
    // attribute matches the specified IP prefix as the source IP address of the
    // IP packet.
    RemoteIPPrefix string

    // Required for admins. Indicates the owner of the VIP.
    TenantID string
}

CreateOpts contains all the values needed to create a new security group rule.

type CreateResult Uses

type CreateResult struct {
    // contains filtered or unexported fields
}

CreateResult represents the result of a create operation.

func Create Uses

func Create(c *gophercloud.ServiceClient, opts CreateOpts) CreateResult

Create is an operation which adds a new security group rule and associates it with an existing security group (whose ID is specified in CreateOpts).

func (CreateResult) Extract Uses

func (r CreateResult) Extract() (*SecGroupRule, error)

Extract is a function that accepts a result and extracts a security rule.

type DeleteResult Uses

type DeleteResult struct {
    gophercloud.ErrResult
}

DeleteResult represents the result of a delete operation.

func Delete Uses

func Delete(c *gophercloud.ServiceClient, id string) DeleteResult

Delete will permanently delete a particular security group rule based on its unique ID.

type GetResult Uses

type GetResult struct {
    // contains filtered or unexported fields
}

GetResult represents the result of a get operation.

func Get Uses

func Get(c *gophercloud.ServiceClient, id string) GetResult

Get retrieves a particular security group rule based on its unique ID.

func (GetResult) Extract Uses

func (r GetResult) Extract() (*SecGroupRule, error)

Extract is a function that accepts a result and extracts a security rule.

type ListOpts Uses

type ListOpts struct {
    Direction      string `q:"direction"`
    EtherType      string `q:"ethertype"`
    ID             string `q:"id"`
    PortRangeMax   int    `q:"port_range_max"`
    PortRangeMin   int    `q:"port_range_min"`
    Protocol       string `q:"protocol"`
    RemoteGroupID  string `q:"remote_group_id"`
    RemoteIPPrefix string `q:"remote_ip_prefix"`
    SecGroupID     string `q:"security_group_id"`
    TenantID       string `q:"tenant_id"`
    Limit          int    `q:"limit"`
    Marker         string `q:"marker"`
    SortKey        string `q:"sort_key"`
    SortDir        string `q:"sort_dir"`
}

ListOpts allows the filtering and sorting of paginated collections through the API. Filtering is achieved by passing in struct field values that map to the security group attributes you want to see returned. SortKey allows you to sort by a particular network attribute. SortDir sets the direction, and is either `asc' or `desc'. Marker and Limit are used for pagination.

type SecGroupRule Uses

type SecGroupRule struct {
    // The UUID for this security group rule.
    ID  string

    // The direction in which the security group rule is applied. The only values
    // allowed are "ingress" or "egress". For a compute instance, an ingress
    // security group rule is applied to incoming (ingress) traffic for that
    // instance. An egress rule is applied to traffic leaving the instance.
    Direction string

    // Must be IPv4 or IPv6, and addresses represented in CIDR must match the
    // ingress or egress rules.
    EtherType string `json:"ethertype" mapstructure:"ethertype"`

    // The security group ID to associate with this security group rule.
    SecGroupID string `json:"security_group_id" mapstructure:"security_group_id"`

    // The minimum port number in the range that is matched by the security group
    // rule. If the protocol is TCP or UDP, this value must be less than or equal
    // to the value of the PortRangeMax attribute. If the protocol is ICMP, this
    // value must be an ICMP type.
    PortRangeMin int `json:"port_range_min" mapstructure:"port_range_min"`

    // The maximum port number in the range that is matched by the security group
    // rule. The PortRangeMin attribute constrains the PortRangeMax attribute. If
    // the protocol is ICMP, this value must be an ICMP type.
    PortRangeMax int `json:"port_range_max" mapstructure:"port_range_max"`

    // The protocol that is matched by the security group rule. Valid values are
    // "tcp", "udp", "icmp" or an empty string.
    Protocol string

    // The remote group ID to be associated with this security group rule. You
    // can specify either RemoteGroupID or RemoteIPPrefix.
    RemoteGroupID string `json:"remote_group_id" mapstructure:"remote_group_id"`

    // The remote IP prefix to be associated with this security group rule. You
    // can specify either RemoteGroupID or RemoteIPPrefix . This attribute
    // matches the specified IP prefix as the source IP address of the IP packet.
    RemoteIPPrefix string `json:"remote_ip_prefix" mapstructure:"remote_ip_prefix"`

    // The owner of this security group rule.
    TenantID string `json:"tenant_id" mapstructure:"tenant_id"`
}

SecGroupRule represents a rule to dictate the behaviour of incoming or outgoing traffic for a particular security group.

type SecGroupRulePage Uses

type SecGroupRulePage struct {
    pagination.LinkedPageBase
}

SecGroupRulePage is the page returned by a pager when traversing over a collection of security group rules.

func (SecGroupRulePage) IsEmpty Uses

func (p SecGroupRulePage) IsEmpty() (bool, error)

IsEmpty checks whether a SecGroupRulePage struct is empty.

func (SecGroupRulePage) NextPageURL Uses

func (p SecGroupRulePage) NextPageURL() (string, error)

NextPageURL is invoked when a paginated collection of security group rules has reached the end of a page and the pager seeks to traverse over a new one. In order to do this, it needs to construct the next page's URL.

Package rules imports 4 packages (graph) and is imported by 13 packages. Updated 2016-07-24. Refresh now. Tools for package owners.