// Code generated by smithy-go-codegen DO NOT EDIT. package ec2 import ( "context" awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware" "github.com/aws/aws-sdk-go-v2/aws/signer/v4" "github.com/aws/aws-sdk-go-v2/service/ec2/types" "github.com/aws/smithy-go/middleware" smithyhttp "github.com/aws/smithy-go/transport/http" ) // Removes the specified inbound (ingress) rules from a security group. You can // specify rules using either rule IDs or security group rule properties. If you // use rule properties, the values that you specify (for example, ports) must match // the existing rule's values exactly. Each rule has a protocol, from and to ports, // and source (CIDR range, security group, or prefix list). For the TCP and UDP // protocols, you must also specify the destination port or range of ports. For the // ICMP protocol, you must also specify the ICMP type and code. If the security // group rule has a description, you do not need to specify the description to // revoke the rule. For a default VPC, if the values you specify do not match the // existing rule's values, no error is returned, and the output describes the // security group rules that were not revoked. Amazon Web Services recommends that // you describe the security group to verify that the rules were removed. Rule // changes are propagated to instances within the security group as quickly as // possible. However, a small delay might occur. func (c *Client) RevokeSecurityGroupIngress(ctx context.Context, params *RevokeSecurityGroupIngressInput, optFns ...func(*Options)) (*RevokeSecurityGroupIngressOutput, error) { if params == nil { params = &RevokeSecurityGroupIngressInput{} } result, metadata, err := c.invokeOperation(ctx, "RevokeSecurityGroupIngress", params, optFns, c.addOperationRevokeSecurityGroupIngressMiddlewares) if err != nil { return nil, err } out := result.(*RevokeSecurityGroupIngressOutput) out.ResultMetadata = metadata return out, nil } type RevokeSecurityGroupIngressInput struct { // The CIDR IP address range. You can't specify this parameter when specifying a // source security group. CidrIp *string // Checks whether you have the required permissions for the action, without // actually making the request, and provides an error response. If you have the // required permissions, the error response is DryRunOperation . Otherwise, it is // UnauthorizedOperation . DryRun *bool // If the protocol is TCP or UDP, this is the start of the port range. If the // protocol is ICMP, this is the type number. A value of -1 indicates all ICMP // types. FromPort *int32 // The ID of the security group. GroupId *string // [Default VPC] The name of the security group. You must specify either the // security group ID or the security group name in the request. For security groups // in a nondefault VPC, you must specify the security group ID. GroupName *string // The sets of IP permissions. You can't specify a source security group and a // CIDR IP address range in the same set of permissions. IpPermissions []types.IpPermission // The IP protocol name ( tcp , udp , icmp ) or number (see Protocol Numbers (http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml) // ). Use -1 to specify all. IpProtocol *string // The IDs of the security group rules. SecurityGroupRuleIds []string // [Default VPC] The name of the source security group. You can't specify this // parameter in combination with the following parameters: the CIDR IP address // range, the start of the port range, the IP protocol, and the end of the port // range. The source security group must be in the same VPC. To revoke a specific // rule for an IP protocol and port range, use a set of IP permissions instead. SourceSecurityGroupName *string // Not supported. SourceSecurityGroupOwnerId *string // If the protocol is TCP or UDP, this is the end of the port range. If the // protocol is ICMP, this is the code. A value of -1 indicates all ICMP codes. ToPort *int32 noSmithyDocumentSerde } type RevokeSecurityGroupIngressOutput struct { // Returns true if the request succeeds; otherwise, returns an error. Return *bool // The inbound rules that were unknown to the service. In some cases, // unknownIpPermissionSet might be in a different format from the request parameter. UnknownIpPermissions []types.IpPermission // Metadata pertaining to the operation's result. ResultMetadata middleware.Metadata noSmithyDocumentSerde } func (c *Client) addOperationRevokeSecurityGroupIngressMiddlewares(stack *middleware.Stack, options Options) (err error) { err = stack.Serialize.Add(&awsEc2query_serializeOpRevokeSecurityGroupIngress{}, middleware.After) if err != nil { return err } err = stack.Deserialize.Add(&awsEc2query_deserializeOpRevokeSecurityGroupIngress{}, middleware.After) if err != nil { return err } if err = addSetLoggerMiddleware(stack, options); err != nil { return err } if err = awsmiddleware.AddClientRequestIDMiddleware(stack); err != nil { return err } if err = smithyhttp.AddComputeContentLengthMiddleware(stack); err != nil { return err } if err = addResolveEndpointMiddleware(stack, options); err != nil { return err } if err = v4.AddComputePayloadSHA256Middleware(stack); err != nil { return err } if err = addRetryMiddlewares(stack, options); err != nil { return err } if err = addHTTPSignerV4Middleware(stack, options); err != nil { return err } if err = awsmiddleware.AddRawResponseToMetadata(stack); err != nil { return err } if err = awsmiddleware.AddRecordResponseTiming(stack); err != nil { return err } if err = addClientUserAgent(stack, options); err != nil { return err } if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil { return err } if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil { return err } if err = stack.Initialize.Add(newServiceMetadataMiddleware_opRevokeSecurityGroupIngress(options.Region), middleware.Before); err != nil { return err } if err = awsmiddleware.AddRecursionDetection(stack); err != nil { return err } if err = addRequestIDRetrieverMiddleware(stack); err != nil { return err } if err = addResponseErrorMiddleware(stack); err != nil { return err } if err = addRequestResponseLogging(stack, options); err != nil { return err } return nil } func newServiceMetadataMiddleware_opRevokeSecurityGroupIngress(region string) *awsmiddleware.RegisterServiceMetadata { return &awsmiddleware.RegisterServiceMetadata{ Region: region, ServiceID: ServiceID, SigningName: "ec2", OperationName: "RevokeSecurityGroupIngress", } }