[][src]Struct dfw::types::WiderWorldToContainerRule

pub struct WiderWorldToContainerRule {
    pub network: String,
    pub dst_container: String,
    pub expose_port: Vec<ExposePort>,
    pub external_network_interface: Option<String>,
    pub expose_via_ipv6: bool,
    pub source_cidr_v4: Option<Vec<String>>,
    pub source_cidr_v6: Option<Vec<String>>,
}

Definition for a rule to be used in the wider-world-to-container section.

Fields

network: String

Network of the destination container to apply the rule to.

dst_container: String

Destination container to apply the rule to.

expose_port: Vec<ExposePort>

Ports to apply the rule to.

Defined as:

Example

All of the following are legal TOML fragments:

expose_port = 80
expose_port = [80, 443]
expose_port = "53/udp"
expose_port = ["80/tcp", "53/udp"]

# The following four all result in the same definition
expose_port = { host_port = 8080 }
expose_port = { host_port = 8080, container_port = 8080 }
expose_port = { host_port = 8080, family = "tcp" }
expose_port = { host_port = 8080, container_port = 8080, family = "tcp" }

expose_port = [
    { host_port = 80 },
    { host_port = 53, family = "udp" },
    { host_port = 443, container_port = 8443 },
]
external_network_interface: Option<String>

Specific external network interface to target.

expose_via_ipv6: bool

Configure if the container should be exposed via IPv6, too. (Default: true).

Example

expose_via_ipv6 = false

expose_via_ipv6 = false
source_cidr_v4: Option<Vec<String>>

Source CIDRs (IPv4) to which incoming traffic should be restricted.

This can be:

There is no validation whether the provided CIDRs are actually valid.

Example

All of the following are legal TOML fragments:

source_cidr_v4 = "127.0.0.0/8"

source_cidr_v4 = ["127.0.0.0/8", "192.0.2.1/32"]
source_cidr_v6: Option<Vec<String>>

Source CIDRs (IPv6) to which incoming traffic should be restricted.

This can be:

There is no validation whether the provided CIDRs are actually valid.

Example

All of the following are legal TOML fragments:

source_cidr_v6 = "fe80::/10"

source_cidr_v6 = ["fe80::/10", "2001:db8::/32"]

Trait Implementations

impl Clone for WiderWorldToContainerRule[src]

impl Debug for WiderWorldToContainerRule[src]

impl<'de> Deserialize<'de> for WiderWorldToContainerRule[src]

impl Eq for WiderWorldToContainerRule[src]

impl Hash for WiderWorldToContainerRule[src]

impl PartialEq<WiderWorldToContainerRule> for WiderWorldToContainerRule[src]

impl Process<Iptables> for WiderWorldToContainerRule[src]

impl Process<Nftables> for WiderWorldToContainerRule[src]

impl StructuralEq for WiderWorldToContainerRule[src]

impl StructuralPartialEq for WiderWorldToContainerRule[src]

Auto Trait Implementations

impl RefUnwindSafe for WiderWorldToContainerRule

impl Send for WiderWorldToContainerRule

impl Sync for WiderWorldToContainerRule

impl Unpin for WiderWorldToContainerRule

impl UnwindSafe for WiderWorldToContainerRule

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> DeserializeOwned for T where
    T: for<'de> Deserialize<'de>, 
[src]

impl<Q, K> Equivalent<K> for Q where
    K: Borrow<Q> + ?Sized,
    Q: Eq + ?Sized
[src]

impl<T> From<T> for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T> Sealed<T> for T where
    T: ?Sized

impl<T> SendSyncUnwindSafe for T where
    T: Send + Sync + UnwindSafe + ?Sized

impl<T> ToOwned for T where
    T: Clone
[src]

type Owned = T

The resulting type after obtaining ownership.

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

impl<V, T> VZip<V> for T where
    V: MultiLane<T>,