aws_sdk_accessanalyzer/operation/check_access_not_granted/
builders.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2pub use crate::operation::check_access_not_granted::_check_access_not_granted_output::CheckAccessNotGrantedOutputBuilder;
3
4pub use crate::operation::check_access_not_granted::_check_access_not_granted_input::CheckAccessNotGrantedInputBuilder;
5
6impl crate::operation::check_access_not_granted::builders::CheckAccessNotGrantedInputBuilder {
7    /// Sends a request with this input using the given client.
8    pub async fn send_with(
9        self,
10        client: &crate::Client,
11    ) -> ::std::result::Result<
12        crate::operation::check_access_not_granted::CheckAccessNotGrantedOutput,
13        ::aws_smithy_runtime_api::client::result::SdkError<
14            crate::operation::check_access_not_granted::CheckAccessNotGrantedError,
15            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
16        >,
17    > {
18        let mut fluent_builder = client.check_access_not_granted();
19        fluent_builder.inner = self;
20        fluent_builder.send().await
21    }
22}
23/// Fluent builder constructing a request to `CheckAccessNotGranted`.
24///
25/// <p>Checks whether the specified access isn't allowed by a policy.</p>
26#[derive(::std::clone::Clone, ::std::fmt::Debug)]
27pub struct CheckAccessNotGrantedFluentBuilder {
28    handle: ::std::sync::Arc<crate::client::Handle>,
29    inner: crate::operation::check_access_not_granted::builders::CheckAccessNotGrantedInputBuilder,
30    config_override: ::std::option::Option<crate::config::Builder>,
31}
32impl
33    crate::client::customize::internal::CustomizableSend<
34        crate::operation::check_access_not_granted::CheckAccessNotGrantedOutput,
35        crate::operation::check_access_not_granted::CheckAccessNotGrantedError,
36    > for CheckAccessNotGrantedFluentBuilder
37{
38    fn send(
39        self,
40        config_override: crate::config::Builder,
41    ) -> crate::client::customize::internal::BoxFuture<
42        crate::client::customize::internal::SendResult<
43            crate::operation::check_access_not_granted::CheckAccessNotGrantedOutput,
44            crate::operation::check_access_not_granted::CheckAccessNotGrantedError,
45        >,
46    > {
47        ::std::boxed::Box::pin(async move { self.config_override(config_override).send().await })
48    }
49}
50impl CheckAccessNotGrantedFluentBuilder {
51    /// Creates a new `CheckAccessNotGrantedFluentBuilder`.
52    pub(crate) fn new(handle: ::std::sync::Arc<crate::client::Handle>) -> Self {
53        Self {
54            handle,
55            inner: ::std::default::Default::default(),
56            config_override: ::std::option::Option::None,
57        }
58    }
59    /// Access the CheckAccessNotGranted as a reference.
60    pub fn as_input(&self) -> &crate::operation::check_access_not_granted::builders::CheckAccessNotGrantedInputBuilder {
61        &self.inner
62    }
63    /// Sends the request and returns the response.
64    ///
65    /// If an error occurs, an `SdkError` will be returned with additional details that
66    /// can be matched against.
67    ///
68    /// By default, any retryable failures will be retried twice. Retry behavior
69    /// is configurable with the [RetryConfig](aws_smithy_types::retry::RetryConfig), which can be
70    /// set when configuring the client.
71    pub async fn send(
72        self,
73    ) -> ::std::result::Result<
74        crate::operation::check_access_not_granted::CheckAccessNotGrantedOutput,
75        ::aws_smithy_runtime_api::client::result::SdkError<
76            crate::operation::check_access_not_granted::CheckAccessNotGrantedError,
77            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
78        >,
79    > {
80        let input = self
81            .inner
82            .build()
83            .map_err(::aws_smithy_runtime_api::client::result::SdkError::construction_failure)?;
84        let runtime_plugins = crate::operation::check_access_not_granted::CheckAccessNotGranted::operation_runtime_plugins(
85            self.handle.runtime_plugins.clone(),
86            &self.handle.conf,
87            self.config_override,
88        );
89        crate::operation::check_access_not_granted::CheckAccessNotGranted::orchestrate(&runtime_plugins, input).await
90    }
91
92    /// Consumes this builder, creating a customizable operation that can be modified before being sent.
93    pub fn customize(
94        self,
95    ) -> crate::client::customize::CustomizableOperation<
96        crate::operation::check_access_not_granted::CheckAccessNotGrantedOutput,
97        crate::operation::check_access_not_granted::CheckAccessNotGrantedError,
98        Self,
99    > {
100        crate::client::customize::CustomizableOperation::new(self)
101    }
102    pub(crate) fn config_override(mut self, config_override: impl ::std::convert::Into<crate::config::Builder>) -> Self {
103        self.set_config_override(::std::option::Option::Some(config_override.into()));
104        self
105    }
106
107    pub(crate) fn set_config_override(&mut self, config_override: ::std::option::Option<crate::config::Builder>) -> &mut Self {
108        self.config_override = config_override;
109        self
110    }
111    /// <p>The JSON policy document to use as the content for the policy.</p>
112    pub fn policy_document(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
113        self.inner = self.inner.policy_document(input.into());
114        self
115    }
116    /// <p>The JSON policy document to use as the content for the policy.</p>
117    pub fn set_policy_document(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
118        self.inner = self.inner.set_policy_document(input);
119        self
120    }
121    /// <p>The JSON policy document to use as the content for the policy.</p>
122    pub fn get_policy_document(&self) -> &::std::option::Option<::std::string::String> {
123        self.inner.get_policy_document()
124    }
125    ///
126    /// Appends an item to `access`.
127    ///
128    /// To override the contents of this collection use [`set_access`](Self::set_access).
129    ///
130    /// <p>An access object containing the permissions that shouldn't be granted by the specified policy. If only actions are specified, IAM Access Analyzer checks for access to peform at least one of the actions on any resource in the policy. If only resources are specified, then IAM Access Analyzer checks for access to perform any action on at least one of the resources. If both actions and resources are specified, IAM Access Analyzer checks for access to perform at least one of the specified actions on at least one of the specified resources.</p>
131    pub fn access(mut self, input: crate::types::Access) -> Self {
132        self.inner = self.inner.access(input);
133        self
134    }
135    /// <p>An access object containing the permissions that shouldn't be granted by the specified policy. If only actions are specified, IAM Access Analyzer checks for access to peform at least one of the actions on any resource in the policy. If only resources are specified, then IAM Access Analyzer checks for access to perform any action on at least one of the resources. If both actions and resources are specified, IAM Access Analyzer checks for access to perform at least one of the specified actions on at least one of the specified resources.</p>
136    pub fn set_access(mut self, input: ::std::option::Option<::std::vec::Vec<crate::types::Access>>) -> Self {
137        self.inner = self.inner.set_access(input);
138        self
139    }
140    /// <p>An access object containing the permissions that shouldn't be granted by the specified policy. If only actions are specified, IAM Access Analyzer checks for access to peform at least one of the actions on any resource in the policy. If only resources are specified, then IAM Access Analyzer checks for access to perform any action on at least one of the resources. If both actions and resources are specified, IAM Access Analyzer checks for access to perform at least one of the specified actions on at least one of the specified resources.</p>
141    pub fn get_access(&self) -> &::std::option::Option<::std::vec::Vec<crate::types::Access>> {
142        self.inner.get_access()
143    }
144    /// <p>The type of policy. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p>
145    /// <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets.</p>
146    pub fn policy_type(mut self, input: crate::types::AccessCheckPolicyType) -> Self {
147        self.inner = self.inner.policy_type(input);
148        self
149    }
150    /// <p>The type of policy. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p>
151    /// <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets.</p>
152    pub fn set_policy_type(mut self, input: ::std::option::Option<crate::types::AccessCheckPolicyType>) -> Self {
153        self.inner = self.inner.set_policy_type(input);
154        self
155    }
156    /// <p>The type of policy. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p>
157    /// <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets.</p>
158    pub fn get_policy_type(&self) -> &::std::option::Option<crate::types::AccessCheckPolicyType> {
159        self.inner.get_policy_type()
160    }
161}