/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include <aws/ec2/EC2_EXPORTS.h> #include <aws/ec2/EC2Request.h> #include <aws/core/utils/memory/stl/AWSVector.h> #include <aws/core/utils/memory/stl/AWSString.h> #include <aws/ec2/model/Filter.h> #include <utility> namespace Aws { namespace EC2 { namespace Model { /** */ class DescribeNetworkAclsRequest : public EC2Request { public: AWS_EC2_API DescribeNetworkAclsRequest(); // Service request name is the Operation name which will send this request out, // each operation should has unique request name, so that we can get operation's name from this request. // Note: this is not true for response, multiple operations may have the same response name, // so we can not get operation's name from response. inline virtual const char* GetServiceRequestName() const override { return "DescribeNetworkAcls"; } AWS_EC2_API Aws::String SerializePayload() const override; protected: AWS_EC2_API void DumpBodyToUrl(Aws::Http::URI& uri ) const override; public: /** * <p>The filters.</p> <ul> <li> <p> <code>association.association-id</code> - The * ID of an association ID for the ACL.</p> </li> <li> <p> * <code>association.network-acl-id</code> - The ID of the network ACL involved in * the association.</p> </li> <li> <p> <code>association.subnet-id</code> - The ID * of the subnet involved in the association.</p> </li> <li> <p> * <code>default</code> - Indicates whether the ACL is the default network ACL for * the VPC.</p> </li> <li> <p> <code>entry.cidr</code> - The IPv4 CIDR range * specified in the entry.</p> </li> <li> <p> <code>entry.icmp.code</code> - The * ICMP code specified in the entry, if any.</p> </li> <li> <p> * <code>entry.icmp.type</code> - The ICMP type specified in the entry, if any.</p> * </li> <li> <p> <code>entry.ipv6-cidr</code> - The IPv6 CIDR range specified in * the entry.</p> </li> <li> <p> <code>entry.port-range.from</code> - The start of * the port range specified in the entry. </p> </li> <li> <p> * <code>entry.port-range.to</code> - The end of the port range specified in the * entry. </p> </li> <li> <p> <code>entry.protocol</code> - The protocol specified * in the entry (<code>tcp</code> | <code>udp</code> | <code>icmp</code> or a * protocol number).</p> </li> <li> <p> <code>entry.rule-action</code> - Allows or * denies the matching traffic (<code>allow</code> | <code>deny</code>).</p> </li> * <li> <p> <code>entry.egress</code> - A Boolean that indicates the type of rule. * Specify <code>true</code> for egress rules, or <code>false</code> for ingress * rules.</p> </li> <li> <p> <code>entry.rule-number</code> - The number of an * entry (in other words, rule) in the set of ACL entries.</p> </li> <li> <p> * <code>network-acl-id</code> - The ID of the network ACL.</p> </li> <li> <p> * <code>owner-id</code> - The ID of the Amazon Web Services account that owns the * network ACL.</p> </li> <li> <p> <code>tag</code>:<key> - The key/value * combination of a tag assigned to the resource. Use the tag key in the filter * name and the tag value as the filter value. For example, to find all resources * that have a tag with the key <code>Owner</code> and the value * <code>TeamA</code>, specify <code>tag:Owner</code> for the filter name and * <code>TeamA</code> for the filter value.</p> </li> <li> <p> <code>tag-key</code> * - The key of a tag assigned to the resource. Use this filter to find all * resources assigned a tag with a specific key, regardless of the tag value.</p> * </li> <li> <p> <code>vpc-id</code> - The ID of the VPC for the network ACL.</p> * </li> </ul> */ inline const Aws::Vector<Filter>& GetFilters() const{ return m_filters; } /** * <p>The filters.</p> <ul> <li> <p> <code>association.association-id</code> - The * ID of an association ID for the ACL.</p> </li> <li> <p> * <code>association.network-acl-id</code> - The ID of the network ACL involved in * the association.</p> </li> <li> <p> <code>association.subnet-id</code> - The ID * of the subnet involved in the association.</p> </li> <li> <p> * <code>default</code> - Indicates whether the ACL is the default network ACL for * the VPC.</p> </li> <li> <p> <code>entry.cidr</code> - The IPv4 CIDR range * specified in the entry.</p> </li> <li> <p> <code>entry.icmp.code</code> - The * ICMP code specified in the entry, if any.</p> </li> <li> <p> * <code>entry.icmp.type</code> - The ICMP type specified in the entry, if any.</p> * </li> <li> <p> <code>entry.ipv6-cidr</code> - The IPv6 CIDR range specified in * the entry.</p> </li> <li> <p> <code>entry.port-range.from</code> - The start of * the port range specified in the entry. </p> </li> <li> <p> * <code>entry.port-range.to</code> - The end of the port range specified in the * entry. </p> </li> <li> <p> <code>entry.protocol</code> - The protocol specified * in the entry (<code>tcp</code> | <code>udp</code> | <code>icmp</code> or a * protocol number).</p> </li> <li> <p> <code>entry.rule-action</code> - Allows or * denies the matching traffic (<code>allow</code> | <code>deny</code>).</p> </li> * <li> <p> <code>entry.egress</code> - A Boolean that indicates the type of rule. * Specify <code>true</code> for egress rules, or <code>false</code> for ingress * rules.</p> </li> <li> <p> <code>entry.rule-number</code> - The number of an * entry (in other words, rule) in the set of ACL entries.</p> </li> <li> <p> * <code>network-acl-id</code> - The ID of the network ACL.</p> </li> <li> <p> * <code>owner-id</code> - The ID of the Amazon Web Services account that owns the * network ACL.</p> </li> <li> <p> <code>tag</code>:<key> - The key/value * combination of a tag assigned to the resource. Use the tag key in the filter * name and the tag value as the filter value. For example, to find all resources * that have a tag with the key <code>Owner</code> and the value * <code>TeamA</code>, specify <code>tag:Owner</code> for the filter name and * <code>TeamA</code> for the filter value.</p> </li> <li> <p> <code>tag-key</code> * - The key of a tag assigned to the resource. Use this filter to find all * resources assigned a tag with a specific key, regardless of the tag value.</p> * </li> <li> <p> <code>vpc-id</code> - The ID of the VPC for the network ACL.</p> * </li> </ul> */ inline bool FiltersHasBeenSet() const { return m_filtersHasBeenSet; } /** * <p>The filters.</p> <ul> <li> <p> <code>association.association-id</code> - The * ID of an association ID for the ACL.</p> </li> <li> <p> * <code>association.network-acl-id</code> - The ID of the network ACL involved in * the association.</p> </li> <li> <p> <code>association.subnet-id</code> - The ID * of the subnet involved in the association.</p> </li> <li> <p> * <code>default</code> - Indicates whether the ACL is the default network ACL for * the VPC.</p> </li> <li> <p> <code>entry.cidr</code> - The IPv4 CIDR range * specified in the entry.</p> </li> <li> <p> <code>entry.icmp.code</code> - The * ICMP code specified in the entry, if any.</p> </li> <li> <p> * <code>entry.icmp.type</code> - The ICMP type specified in the entry, if any.</p> * </li> <li> <p> <code>entry.ipv6-cidr</code> - The IPv6 CIDR range specified in * the entry.</p> </li> <li> <p> <code>entry.port-range.from</code> - The start of * the port range specified in the entry. </p> </li> <li> <p> * <code>entry.port-range.to</code> - The end of the port range specified in the * entry. </p> </li> <li> <p> <code>entry.protocol</code> - The protocol specified * in the entry (<code>tcp</code> | <code>udp</code> | <code>icmp</code> or a * protocol number).</p> </li> <li> <p> <code>entry.rule-action</code> - Allows or * denies the matching traffic (<code>allow</code> | <code>deny</code>).</p> </li> * <li> <p> <code>entry.egress</code> - A Boolean that indicates the type of rule. * Specify <code>true</code> for egress rules, or <code>false</code> for ingress * rules.</p> </li> <li> <p> <code>entry.rule-number</code> - The number of an * entry (in other words, rule) in the set of ACL entries.</p> </li> <li> <p> * <code>network-acl-id</code> - The ID of the network ACL.</p> </li> <li> <p> * <code>owner-id</code> - The ID of the Amazon Web Services account that owns the * network ACL.</p> </li> <li> <p> <code>tag</code>:<key> - The key/value * combination of a tag assigned to the resource. Use the tag key in the filter * name and the tag value as the filter value. For example, to find all resources * that have a tag with the key <code>Owner</code> and the value * <code>TeamA</code>, specify <code>tag:Owner</code> for the filter name and * <code>TeamA</code> for the filter value.</p> </li> <li> <p> <code>tag-key</code> * - The key of a tag assigned to the resource. Use this filter to find all * resources assigned a tag with a specific key, regardless of the tag value.</p> * </li> <li> <p> <code>vpc-id</code> - The ID of the VPC for the network ACL.</p> * </li> </ul> */ inline void SetFilters(const Aws::Vector<Filter>& value) { m_filtersHasBeenSet = true; m_filters = value; } /** * <p>The filters.</p> <ul> <li> <p> <code>association.association-id</code> - The * ID of an association ID for the ACL.</p> </li> <li> <p> * <code>association.network-acl-id</code> - The ID of the network ACL involved in * the association.</p> </li> <li> <p> <code>association.subnet-id</code> - The ID * of the subnet involved in the association.</p> </li> <li> <p> * <code>default</code> - Indicates whether the ACL is the default network ACL for * the VPC.</p> </li> <li> <p> <code>entry.cidr</code> - The IPv4 CIDR range * specified in the entry.</p> </li> <li> <p> <code>entry.icmp.code</code> - The * ICMP code specified in the entry, if any.</p> </li> <li> <p> * <code>entry.icmp.type</code> - The ICMP type specified in the entry, if any.</p> * </li> <li> <p> <code>entry.ipv6-cidr</code> - The IPv6 CIDR range specified in * the entry.</p> </li> <li> <p> <code>entry.port-range.from</code> - The start of * the port range specified in the entry. </p> </li> <li> <p> * <code>entry.port-range.to</code> - The end of the port range specified in the * entry. </p> </li> <li> <p> <code>entry.protocol</code> - The protocol specified * in the entry (<code>tcp</code> | <code>udp</code> | <code>icmp</code> or a * protocol number).</p> </li> <li> <p> <code>entry.rule-action</code> - Allows or * denies the matching traffic (<code>allow</code> | <code>deny</code>).</p> </li> * <li> <p> <code>entry.egress</code> - A Boolean that indicates the type of rule. * Specify <code>true</code> for egress rules, or <code>false</code> for ingress * rules.</p> </li> <li> <p> <code>entry.rule-number</code> - The number of an * entry (in other words, rule) in the set of ACL entries.</p> </li> <li> <p> * <code>network-acl-id</code> - The ID of the network ACL.</p> </li> <li> <p> * <code>owner-id</code> - The ID of the Amazon Web Services account that owns the * network ACL.</p> </li> <li> <p> <code>tag</code>:<key> - The key/value * combination of a tag assigned to the resource. Use the tag key in the filter * name and the tag value as the filter value. For example, to find all resources * that have a tag with the key <code>Owner</code> and the value * <code>TeamA</code>, specify <code>tag:Owner</code> for the filter name and * <code>TeamA</code> for the filter value.</p> </li> <li> <p> <code>tag-key</code> * - The key of a tag assigned to the resource. Use this filter to find all * resources assigned a tag with a specific key, regardless of the tag value.</p> * </li> <li> <p> <code>vpc-id</code> - The ID of the VPC for the network ACL.</p> * </li> </ul> */ inline void SetFilters(Aws::Vector<Filter>&& value) { m_filtersHasBeenSet = true; m_filters = std::move(value); } /** * <p>The filters.</p> <ul> <li> <p> <code>association.association-id</code> - The * ID of an association ID for the ACL.</p> </li> <li> <p> * <code>association.network-acl-id</code> - The ID of the network ACL involved in * the association.</p> </li> <li> <p> <code>association.subnet-id</code> - The ID * of the subnet involved in the association.</p> </li> <li> <p> * <code>default</code> - Indicates whether the ACL is the default network ACL for * the VPC.</p> </li> <li> <p> <code>entry.cidr</code> - The IPv4 CIDR range * specified in the entry.</p> </li> <li> <p> <code>entry.icmp.code</code> - The * ICMP code specified in the entry, if any.</p> </li> <li> <p> * <code>entry.icmp.type</code> - The ICMP type specified in the entry, if any.</p> * </li> <li> <p> <code>entry.ipv6-cidr</code> - The IPv6 CIDR range specified in * the entry.</p> </li> <li> <p> <code>entry.port-range.from</code> - The start of * the port range specified in the entry. </p> </li> <li> <p> * <code>entry.port-range.to</code> - The end of the port range specified in the * entry. </p> </li> <li> <p> <code>entry.protocol</code> - The protocol specified * in the entry (<code>tcp</code> | <code>udp</code> | <code>icmp</code> or a * protocol number).</p> </li> <li> <p> <code>entry.rule-action</code> - Allows or * denies the matching traffic (<code>allow</code> | <code>deny</code>).</p> </li> * <li> <p> <code>entry.egress</code> - A Boolean that indicates the type of rule. * Specify <code>true</code> for egress rules, or <code>false</code> for ingress * rules.</p> </li> <li> <p> <code>entry.rule-number</code> - The number of an * entry (in other words, rule) in the set of ACL entries.</p> </li> <li> <p> * <code>network-acl-id</code> - The ID of the network ACL.</p> </li> <li> <p> * <code>owner-id</code> - The ID of the Amazon Web Services account that owns the * network ACL.</p> </li> <li> <p> <code>tag</code>:<key> - The key/value * combination of a tag assigned to the resource. Use the tag key in the filter * name and the tag value as the filter value. For example, to find all resources * that have a tag with the key <code>Owner</code> and the value * <code>TeamA</code>, specify <code>tag:Owner</code> for the filter name and * <code>TeamA</code> for the filter value.</p> </li> <li> <p> <code>tag-key</code> * - The key of a tag assigned to the resource. Use this filter to find all * resources assigned a tag with a specific key, regardless of the tag value.</p> * </li> <li> <p> <code>vpc-id</code> - The ID of the VPC for the network ACL.</p> * </li> </ul> */ inline DescribeNetworkAclsRequest& WithFilters(const Aws::Vector<Filter>& value) { SetFilters(value); return *this;} /** * <p>The filters.</p> <ul> <li> <p> <code>association.association-id</code> - The * ID of an association ID for the ACL.</p> </li> <li> <p> * <code>association.network-acl-id</code> - The ID of the network ACL involved in * the association.</p> </li> <li> <p> <code>association.subnet-id</code> - The ID * of the subnet involved in the association.</p> </li> <li> <p> * <code>default</code> - Indicates whether the ACL is the default network ACL for * the VPC.</p> </li> <li> <p> <code>entry.cidr</code> - The IPv4 CIDR range * specified in the entry.</p> </li> <li> <p> <code>entry.icmp.code</code> - The * ICMP code specified in the entry, if any.</p> </li> <li> <p> * <code>entry.icmp.type</code> - The ICMP type specified in the entry, if any.</p> * </li> <li> <p> <code>entry.ipv6-cidr</code> - The IPv6 CIDR range specified in * the entry.</p> </li> <li> <p> <code>entry.port-range.from</code> - The start of * the port range specified in the entry. </p> </li> <li> <p> * <code>entry.port-range.to</code> - The end of the port range specified in the * entry. </p> </li> <li> <p> <code>entry.protocol</code> - The protocol specified * in the entry (<code>tcp</code> | <code>udp</code> | <code>icmp</code> or a * protocol number).</p> </li> <li> <p> <code>entry.rule-action</code> - Allows or * denies the matching traffic (<code>allow</code> | <code>deny</code>).</p> </li> * <li> <p> <code>entry.egress</code> - A Boolean that indicates the type of rule. * Specify <code>true</code> for egress rules, or <code>false</code> for ingress * rules.</p> </li> <li> <p> <code>entry.rule-number</code> - The number of an * entry (in other words, rule) in the set of ACL entries.</p> </li> <li> <p> * <code>network-acl-id</code> - The ID of the network ACL.</p> </li> <li> <p> * <code>owner-id</code> - The ID of the Amazon Web Services account that owns the * network ACL.</p> </li> <li> <p> <code>tag</code>:<key> - The key/value * combination of a tag assigned to the resource. Use the tag key in the filter * name and the tag value as the filter value. For example, to find all resources * that have a tag with the key <code>Owner</code> and the value * <code>TeamA</code>, specify <code>tag:Owner</code> for the filter name and * <code>TeamA</code> for the filter value.</p> </li> <li> <p> <code>tag-key</code> * - The key of a tag assigned to the resource. Use this filter to find all * resources assigned a tag with a specific key, regardless of the tag value.</p> * </li> <li> <p> <code>vpc-id</code> - The ID of the VPC for the network ACL.</p> * </li> </ul> */ inline DescribeNetworkAclsRequest& WithFilters(Aws::Vector<Filter>&& value) { SetFilters(std::move(value)); return *this;} /** * <p>The filters.</p> <ul> <li> <p> <code>association.association-id</code> - The * ID of an association ID for the ACL.</p> </li> <li> <p> * <code>association.network-acl-id</code> - The ID of the network ACL involved in * the association.</p> </li> <li> <p> <code>association.subnet-id</code> - The ID * of the subnet involved in the association.</p> </li> <li> <p> * <code>default</code> - Indicates whether the ACL is the default network ACL for * the VPC.</p> </li> <li> <p> <code>entry.cidr</code> - The IPv4 CIDR range * specified in the entry.</p> </li> <li> <p> <code>entry.icmp.code</code> - The * ICMP code specified in the entry, if any.</p> </li> <li> <p> * <code>entry.icmp.type</code> - The ICMP type specified in the entry, if any.</p> * </li> <li> <p> <code>entry.ipv6-cidr</code> - The IPv6 CIDR range specified in * the entry.</p> </li> <li> <p> <code>entry.port-range.from</code> - The start of * the port range specified in the entry. </p> </li> <li> <p> * <code>entry.port-range.to</code> - The end of the port range specified in the * entry. </p> </li> <li> <p> <code>entry.protocol</code> - The protocol specified * in the entry (<code>tcp</code> | <code>udp</code> | <code>icmp</code> or a * protocol number).</p> </li> <li> <p> <code>entry.rule-action</code> - Allows or * denies the matching traffic (<code>allow</code> | <code>deny</code>).</p> </li> * <li> <p> <code>entry.egress</code> - A Boolean that indicates the type of rule. * Specify <code>true</code> for egress rules, or <code>false</code> for ingress * rules.</p> </li> <li> <p> <code>entry.rule-number</code> - The number of an * entry (in other words, rule) in the set of ACL entries.</p> </li> <li> <p> * <code>network-acl-id</code> - The ID of the network ACL.</p> </li> <li> <p> * <code>owner-id</code> - The ID of the Amazon Web Services account that owns the * network ACL.</p> </li> <li> <p> <code>tag</code>:<key> - The key/value * combination of a tag assigned to the resource. Use the tag key in the filter * name and the tag value as the filter value. For example, to find all resources * that have a tag with the key <code>Owner</code> and the value * <code>TeamA</code>, specify <code>tag:Owner</code> for the filter name and * <code>TeamA</code> for the filter value.</p> </li> <li> <p> <code>tag-key</code> * - The key of a tag assigned to the resource. Use this filter to find all * resources assigned a tag with a specific key, regardless of the tag value.</p> * </li> <li> <p> <code>vpc-id</code> - The ID of the VPC for the network ACL.</p> * </li> </ul> */ inline DescribeNetworkAclsRequest& AddFilters(const Filter& value) { m_filtersHasBeenSet = true; m_filters.push_back(value); return *this; } /** * <p>The filters.</p> <ul> <li> <p> <code>association.association-id</code> - The * ID of an association ID for the ACL.</p> </li> <li> <p> * <code>association.network-acl-id</code> - The ID of the network ACL involved in * the association.</p> </li> <li> <p> <code>association.subnet-id</code> - The ID * of the subnet involved in the association.</p> </li> <li> <p> * <code>default</code> - Indicates whether the ACL is the default network ACL for * the VPC.</p> </li> <li> <p> <code>entry.cidr</code> - The IPv4 CIDR range * specified in the entry.</p> </li> <li> <p> <code>entry.icmp.code</code> - The * ICMP code specified in the entry, if any.</p> </li> <li> <p> * <code>entry.icmp.type</code> - The ICMP type specified in the entry, if any.</p> * </li> <li> <p> <code>entry.ipv6-cidr</code> - The IPv6 CIDR range specified in * the entry.</p> </li> <li> <p> <code>entry.port-range.from</code> - The start of * the port range specified in the entry. </p> </li> <li> <p> * <code>entry.port-range.to</code> - The end of the port range specified in the * entry. </p> </li> <li> <p> <code>entry.protocol</code> - The protocol specified * in the entry (<code>tcp</code> | <code>udp</code> | <code>icmp</code> or a * protocol number).</p> </li> <li> <p> <code>entry.rule-action</code> - Allows or * denies the matching traffic (<code>allow</code> | <code>deny</code>).</p> </li> * <li> <p> <code>entry.egress</code> - A Boolean that indicates the type of rule. * Specify <code>true</code> for egress rules, or <code>false</code> for ingress * rules.</p> </li> <li> <p> <code>entry.rule-number</code> - The number of an * entry (in other words, rule) in the set of ACL entries.</p> </li> <li> <p> * <code>network-acl-id</code> - The ID of the network ACL.</p> </li> <li> <p> * <code>owner-id</code> - The ID of the Amazon Web Services account that owns the * network ACL.</p> </li> <li> <p> <code>tag</code>:<key> - The key/value * combination of a tag assigned to the resource. Use the tag key in the filter * name and the tag value as the filter value. For example, to find all resources * that have a tag with the key <code>Owner</code> and the value * <code>TeamA</code>, specify <code>tag:Owner</code> for the filter name and * <code>TeamA</code> for the filter value.</p> </li> <li> <p> <code>tag-key</code> * - The key of a tag assigned to the resource. Use this filter to find all * resources assigned a tag with a specific key, regardless of the tag value.</p> * </li> <li> <p> <code>vpc-id</code> - The ID of the VPC for the network ACL.</p> * </li> </ul> */ inline DescribeNetworkAclsRequest& AddFilters(Filter&& value) { m_filtersHasBeenSet = true; m_filters.push_back(std::move(value)); return *this; } /** * <p>Checks whether you have the required permissions for the action, without * actually making the request, and provides an error response. If you have the * required permissions, the error response is <code>DryRunOperation</code>. * Otherwise, it is <code>UnauthorizedOperation</code>.</p> */ inline bool GetDryRun() const{ return m_dryRun; } /** * <p>Checks whether you have the required permissions for the action, without * actually making the request, and provides an error response. If you have the * required permissions, the error response is <code>DryRunOperation</code>. * Otherwise, it is <code>UnauthorizedOperation</code>.</p> */ inline bool DryRunHasBeenSet() const { return m_dryRunHasBeenSet; } /** * <p>Checks whether you have the required permissions for the action, without * actually making the request, and provides an error response. If you have the * required permissions, the error response is <code>DryRunOperation</code>. * Otherwise, it is <code>UnauthorizedOperation</code>.</p> */ inline void SetDryRun(bool value) { m_dryRunHasBeenSet = true; m_dryRun = value; } /** * <p>Checks whether you have the required permissions for the action, without * actually making the request, and provides an error response. If you have the * required permissions, the error response is <code>DryRunOperation</code>. * Otherwise, it is <code>UnauthorizedOperation</code>.</p> */ inline DescribeNetworkAclsRequest& WithDryRun(bool value) { SetDryRun(value); return *this;} /** * <p>The IDs of the network ACLs.</p> <p>Default: Describes all your network * ACLs.</p> */ inline const Aws::Vector<Aws::String>& GetNetworkAclIds() const{ return m_networkAclIds; } /** * <p>The IDs of the network ACLs.</p> <p>Default: Describes all your network * ACLs.</p> */ inline bool NetworkAclIdsHasBeenSet() const { return m_networkAclIdsHasBeenSet; } /** * <p>The IDs of the network ACLs.</p> <p>Default: Describes all your network * ACLs.</p> */ inline void SetNetworkAclIds(const Aws::Vector<Aws::String>& value) { m_networkAclIdsHasBeenSet = true; m_networkAclIds = value; } /** * <p>The IDs of the network ACLs.</p> <p>Default: Describes all your network * ACLs.</p> */ inline void SetNetworkAclIds(Aws::Vector<Aws::String>&& value) { m_networkAclIdsHasBeenSet = true; m_networkAclIds = std::move(value); } /** * <p>The IDs of the network ACLs.</p> <p>Default: Describes all your network * ACLs.</p> */ inline DescribeNetworkAclsRequest& WithNetworkAclIds(const Aws::Vector<Aws::String>& value) { SetNetworkAclIds(value); return *this;} /** * <p>The IDs of the network ACLs.</p> <p>Default: Describes all your network * ACLs.</p> */ inline DescribeNetworkAclsRequest& WithNetworkAclIds(Aws::Vector<Aws::String>&& value) { SetNetworkAclIds(std::move(value)); return *this;} /** * <p>The IDs of the network ACLs.</p> <p>Default: Describes all your network * ACLs.</p> */ inline DescribeNetworkAclsRequest& AddNetworkAclIds(const Aws::String& value) { m_networkAclIdsHasBeenSet = true; m_networkAclIds.push_back(value); return *this; } /** * <p>The IDs of the network ACLs.</p> <p>Default: Describes all your network * ACLs.</p> */ inline DescribeNetworkAclsRequest& AddNetworkAclIds(Aws::String&& value) { m_networkAclIdsHasBeenSet = true; m_networkAclIds.push_back(std::move(value)); return *this; } /** * <p>The IDs of the network ACLs.</p> <p>Default: Describes all your network * ACLs.</p> */ inline DescribeNetworkAclsRequest& AddNetworkAclIds(const char* value) { m_networkAclIdsHasBeenSet = true; m_networkAclIds.push_back(value); return *this; } /** * <p>The token returned from a previous paginated request. Pagination continues * from the end of the items returned by the previous request.</p> */ inline const Aws::String& GetNextToken() const{ return m_nextToken; } /** * <p>The token returned from a previous paginated request. Pagination continues * from the end of the items returned by the previous request.</p> */ inline bool NextTokenHasBeenSet() const { return m_nextTokenHasBeenSet; } /** * <p>The token returned from a previous paginated request. Pagination continues * from the end of the items returned by the previous request.</p> */ inline void SetNextToken(const Aws::String& value) { m_nextTokenHasBeenSet = true; m_nextToken = value; } /** * <p>The token returned from a previous paginated request. Pagination continues * from the end of the items returned by the previous request.</p> */ inline void SetNextToken(Aws::String&& value) { m_nextTokenHasBeenSet = true; m_nextToken = std::move(value); } /** * <p>The token returned from a previous paginated request. Pagination continues * from the end of the items returned by the previous request.</p> */ inline void SetNextToken(const char* value) { m_nextTokenHasBeenSet = true; m_nextToken.assign(value); } /** * <p>The token returned from a previous paginated request. Pagination continues * from the end of the items returned by the previous request.</p> */ inline DescribeNetworkAclsRequest& WithNextToken(const Aws::String& value) { SetNextToken(value); return *this;} /** * <p>The token returned from a previous paginated request. Pagination continues * from the end of the items returned by the previous request.</p> */ inline DescribeNetworkAclsRequest& WithNextToken(Aws::String&& value) { SetNextToken(std::move(value)); return *this;} /** * <p>The token returned from a previous paginated request. Pagination continues * from the end of the items returned by the previous request.</p> */ inline DescribeNetworkAclsRequest& WithNextToken(const char* value) { SetNextToken(value); return *this;} /** * <p>The maximum number of items to return for this request. To get the next page * of items, make another request with the token returned in the output. For more * information, see <a * href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/Query-Requests.html#api-pagination">Pagination</a>.</p> */ inline int GetMaxResults() const{ return m_maxResults; } /** * <p>The maximum number of items to return for this request. To get the next page * of items, make another request with the token returned in the output. For more * information, see <a * href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/Query-Requests.html#api-pagination">Pagination</a>.</p> */ inline bool MaxResultsHasBeenSet() const { return m_maxResultsHasBeenSet; } /** * <p>The maximum number of items to return for this request. To get the next page * of items, make another request with the token returned in the output. For more * information, see <a * href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/Query-Requests.html#api-pagination">Pagination</a>.</p> */ inline void SetMaxResults(int value) { m_maxResultsHasBeenSet = true; m_maxResults = value; } /** * <p>The maximum number of items to return for this request. To get the next page * of items, make another request with the token returned in the output. For more * information, see <a * href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/Query-Requests.html#api-pagination">Pagination</a>.</p> */ inline DescribeNetworkAclsRequest& WithMaxResults(int value) { SetMaxResults(value); return *this;} private: Aws::Vector<Filter> m_filters; bool m_filtersHasBeenSet = false; bool m_dryRun; bool m_dryRunHasBeenSet = false; Aws::Vector<Aws::String> m_networkAclIds; bool m_networkAclIdsHasBeenSet = false; Aws::String m_nextToken; bool m_nextTokenHasBeenSet = false; int m_maxResults; bool m_maxResultsHasBeenSet = false; }; } // namespace Model } // namespace EC2 } // namespace Aws