Sha256: 2681519931c99ccef36077d3d215d9cad581a3c7b08e36f7a763983601264887

Contents?: true

Size: 1.95 KB

Versions: 20

Compression:

Stored size: 1.95 KB

Contents

unless Fog.mocking?

  module Fog
    module AWS
      class EC2

        # Add permissions to a security group
        #
        # ==== Parameters
        # * options<~Hash>:
        #   * 'GroupName'<~String> - Name of group
        #   * 'SourceSecurityGroupName'<~String> - Name of security group to authorize
        #   * 'SourceSecurityGroupOwnerId'<~String> - Name of owner to authorize
        #   or
        #   * 'CidrIp' - CIDR range
        #   * 'FromPort' - Start of port range (or -1 for ICMP wildcard)
        #   * 'GroupName' - Name of group to modify
        #   * 'IpProtocol' - Ip protocol, must be in ['tcp', 'udp', 'icmp']
        #   * 'ToPort' - End of port range (or -1 for ICMP wildcard)
        #
        # === Returns
        # * response<~Fog::AWS::Response>:
        #   * body<~Hash>:
        #     * 'requestId'<~String> - Id of request
        #     * 'return'<~Boolean> - success?
        def authorize_security_group_ingress(options = {})
          request({
            'Action' => 'AuthorizeSecurityGroupIngress'
          }.merge!(options), Fog::Parsers::AWS::EC2::Basic.new)
        end

      end
    end
  end

else

  module Fog
    module AWS
      class EC2

        # TODO: handle the GroupName/Source/Source case
        def authorize_security_group_ingress(options = {})
          response = Fog::Response.new
          group = Fog::AWS::EC2.data[:security_groups][options['GroupName']]

          group['ipPermissions'] ||= []
          group['ipPermissions'] << {
            'groups'      => [],
            'fromPort'    => options['FromPort'],
            'ipRanges'    => [{ 'cidrIp' => options['CidrIp'] }],
            'ipProtocol'  => options['IpProtocol'],
            'toPort'      => options['ToPort']
          }

          response.status = 200
          response.body = {
            'requestId' => Fog::AWS::Mock.request_id,
            'return'    => true
          }
          response
        end

      end
    end
  end

end

Version data entries

20 entries across 20 versions & 1 rubygems

Version Path
fog-0.0.29 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.28 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.27 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.26 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.25 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.24 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.23 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.22 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.21 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.20 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.19 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.18 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.17 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.16 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.15 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.14 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.13 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.12 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.11 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb
fog-0.0.10 lib/fog/aws/requests/ec2/authorize_security_group_ingress.rb