Skip to content

/AWS1/IF_EC2=>DESCRIBEVPCENCCONTROLS()

About DescribeVpcEncryptionControls

Describes one or more VPC Encryption Control configurations. VPC Encryption Control enables you to enforce encryption for all data in transit within and between VPCs to meet compliance requirements You can filter the results to return information about specific encryption controls or VPCs.

For more information, see Enforce VPC encryption in transit in the Amazon VPC User Guide.

Method Signature

METHODS /AWS1/IF_EC2~DESCRIBEVPCENCCONTROLS
  IMPORTING
    !IV_DRYRUN TYPE /AWS1/EC2BOOLEAN OPTIONAL
    !IT_FILTERS TYPE /AWS1/CL_EC2FILTER=>TT_FILTERLIST OPTIONAL
    !IT_VPCENCRYPTIONCONTROLIDS TYPE /AWS1/CL_EC2VPCENCCTLIDLIST_W=>TT_VPCENCRYPTIONCONTROLIDLIST OPTIONAL
    !IT_VPCIDS TYPE /AWS1/CL_EC2VPCIDSTRINGLIST_W=>TT_VPCIDSTRINGLIST OPTIONAL
    !IV_NEXTTOKEN TYPE /AWS1/EC2STRING OPTIONAL
    !IV_MAXRESULTS TYPE /AWS1/EC2DSCVPCENCCTLSMAXRSS OPTIONAL
  RETURNING
    VALUE(OO_OUTPUT) TYPE REF TO /aws1/cl_ec2dscvpcencctlsrs
  RAISING
    /AWS1/CX_EC2CLIENTEXC
    /AWS1/CX_EC2SERVEREXC
    /AWS1/CX_RT_TECHNICAL_GENERIC
    /AWS1/CX_RT_SERVICE_GENERIC.

IMPORTING

Optional arguments:

iv_dryrun TYPE /AWS1/EC2BOOLEAN /AWS1/EC2BOOLEAN

Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation. Otherwise, it is UnauthorizedOperation.

it_filters TYPE /AWS1/CL_EC2FILTER=>TT_FILTERLIST TT_FILTERLIST

The filters to apply to the request.

it_vpcencryptioncontrolids TYPE /AWS1/CL_EC2VPCENCCTLIDLIST_W=>TT_VPCENCRYPTIONCONTROLIDLIST TT_VPCENCRYPTIONCONTROLIDLIST

The IDs of the VPC Encryption Control configurations to describe.

it_vpcids TYPE /AWS1/CL_EC2VPCIDSTRINGLIST_W=>TT_VPCIDSTRINGLIST TT_VPCIDSTRINGLIST

The IDs of the VPCs to describe encryption control configurations for.

iv_nexttoken TYPE /AWS1/EC2STRING /AWS1/EC2STRING

The token returned from a previous paginated request. Pagination continues from the end of the items returned by the previous request.

iv_maxresults TYPE /AWS1/EC2DSCVPCENCCTLSMAXRSS /AWS1/EC2DSCVPCENCCTLSMAXRSS

The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output. For more information, see Pagination.

RETURNING

oo_output TYPE REF TO /aws1/cl_ec2dscvpcencctlsrs /AWS1/CL_EC2DSCVPCENCCTLSRS

Domain /AWS1/RT_ACCOUNT_ID
Primitive Type NUMC

Examples

Syntax Example

This is an example of the syntax for calling the method. It includes every possible argument and initializes every possible value. The data provided is not necessarily semantically accurate (for example the value "string" may be provided for something that is intended to be an instance ID, or in some cases two arguments may be mutually exclusive). The syntax shows the ABAP syntax for creating the various data structures.

DATA(lo_result) = lo_client->describevpcenccontrols(
  it_filters = VALUE /aws1/cl_ec2filter=>tt_filterlist(
    (
      new /aws1/cl_ec2filter(
        it_values = VALUE /aws1/cl_ec2valuestringlist_w=>tt_valuestringlist(
          ( new /aws1/cl_ec2valuestringlist_w( |string| ) )
        )
        iv_name = |string|
      )
    )
  )
  it_vpcencryptioncontrolids = VALUE /aws1/cl_ec2vpcencctlidlist_w=>tt_vpcencryptioncontrolidlist(
    ( new /aws1/cl_ec2vpcencctlidlist_w( |string| ) )
  )
  it_vpcids = VALUE /aws1/cl_ec2vpcidstringlist_w=>tt_vpcidstringlist(
    ( new /aws1/cl_ec2vpcidstringlist_w( |string| ) )
  )
  iv_dryrun = ABAP_TRUE
  iv_maxresults = 123
  iv_nexttoken = |string|
).

This is an example of reading all possible response values

lo_result = lo_result.
IF lo_result IS NOT INITIAL.
  LOOP AT lo_result->get_vpcencryptioncontrols( ) into lo_row.
    lo_row_1 = lo_row.
    IF lo_row_1 IS NOT INITIAL.
      lv_vpcid = lo_row_1->get_vpcid( ).
      lv_vpcencryptioncontrolid = lo_row_1->get_vpcencryptioncontrolid( ).
      lv_vpcencryptioncontrolmod = lo_row_1->get_mode( ).
      lv_vpcencryptioncontrolsta = lo_row_1->get_state( ).
      lv_string = lo_row_1->get_statemessage( ).
      lo_vpcencryptioncontrolexc = lo_row_1->get_resourceexclusions( ).
      IF lo_vpcencryptioncontrolexc IS NOT INITIAL.
        lo_vpcencryptioncontrolexc_1 = lo_vpcencryptioncontrolexc->get_internetgateway( ).
        IF lo_vpcencryptioncontrolexc_1 IS NOT INITIAL.
          lv_vpcencryptioncontrolexc_2 = lo_vpcencryptioncontrolexc_1->get_state( ).
          lv_string = lo_vpcencryptioncontrolexc_1->get_statemessage( ).
        ENDIF.
        lo_vpcencryptioncontrolexc_1 = lo_vpcencryptioncontrolexc->get_egressonlyinternetgw( ).
        IF lo_vpcencryptioncontrolexc_1 IS NOT INITIAL.
          lv_vpcencryptioncontrolexc_2 = lo_vpcencryptioncontrolexc_1->get_state( ).
          lv_string = lo_vpcencryptioncontrolexc_1->get_statemessage( ).
        ENDIF.
        lo_vpcencryptioncontrolexc_1 = lo_vpcencryptioncontrolexc->get_natgateway( ).
        IF lo_vpcencryptioncontrolexc_1 IS NOT INITIAL.
          lv_vpcencryptioncontrolexc_2 = lo_vpcencryptioncontrolexc_1->get_state( ).
          lv_string = lo_vpcencryptioncontrolexc_1->get_statemessage( ).
        ENDIF.
        lo_vpcencryptioncontrolexc_1 = lo_vpcencryptioncontrolexc->get_virtualprivategateway( ).
        IF lo_vpcencryptioncontrolexc_1 IS NOT INITIAL.
          lv_vpcencryptioncontrolexc_2 = lo_vpcencryptioncontrolexc_1->get_state( ).
          lv_string = lo_vpcencryptioncontrolexc_1->get_statemessage( ).
        ENDIF.
        lo_vpcencryptioncontrolexc_1 = lo_vpcencryptioncontrolexc->get_vpcpeering( ).
        IF lo_vpcencryptioncontrolexc_1 IS NOT INITIAL.
          lv_vpcencryptioncontrolexc_2 = lo_vpcencryptioncontrolexc_1->get_state( ).
          lv_string = lo_vpcencryptioncontrolexc_1->get_statemessage( ).
        ENDIF.
        lo_vpcencryptioncontrolexc_1 = lo_vpcencryptioncontrolexc->get_lambda( ).
        IF lo_vpcencryptioncontrolexc_1 IS NOT INITIAL.
          lv_vpcencryptioncontrolexc_2 = lo_vpcencryptioncontrolexc_1->get_state( ).
          lv_string = lo_vpcencryptioncontrolexc_1->get_statemessage( ).
        ENDIF.
        lo_vpcencryptioncontrolexc_1 = lo_vpcencryptioncontrolexc->get_vpclattice( ).
        IF lo_vpcencryptioncontrolexc_1 IS NOT INITIAL.
          lv_vpcencryptioncontrolexc_2 = lo_vpcencryptioncontrolexc_1->get_state( ).
          lv_string = lo_vpcencryptioncontrolexc_1->get_statemessage( ).
        ENDIF.
        lo_vpcencryptioncontrolexc_1 = lo_vpcencryptioncontrolexc->get_elasticfilesystem( ).
        IF lo_vpcencryptioncontrolexc_1 IS NOT INITIAL.
          lv_vpcencryptioncontrolexc_2 = lo_vpcencryptioncontrolexc_1->get_state( ).
          lv_string = lo_vpcencryptioncontrolexc_1->get_statemessage( ).
        ENDIF.
      ENDIF.
      LOOP AT lo_row_1->get_tags( ) into lo_row_2.
        lo_row_3 = lo_row_2.
        IF lo_row_3 IS NOT INITIAL.
          lv_string = lo_row_3->get_key( ).
          lv_string = lo_row_3->get_value( ).
        ENDIF.
      ENDLOOP.
    ENDIF.
  ENDLOOP.
  lv_string = lo_result->get_nexttoken( ).
ENDIF.