1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161
// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
pub use crate::operation::create_directory_config::_create_directory_config_output::CreateDirectoryConfigOutputBuilder;
pub use crate::operation::create_directory_config::_create_directory_config_input::CreateDirectoryConfigInputBuilder;
impl CreateDirectoryConfigInputBuilder {
/// Sends a request with this input using the given client.
pub async fn send_with(
self,
client: &crate::Client,
) -> ::std::result::Result<
crate::operation::create_directory_config::CreateDirectoryConfigOutput,
::aws_smithy_http::result::SdkError<
crate::operation::create_directory_config::CreateDirectoryConfigError,
::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
>,
> {
let mut fluent_builder = client.create_directory_config();
fluent_builder.inner = self;
fluent_builder.send().await
}
}
/// Fluent builder constructing a request to `CreateDirectoryConfig`.
///
/// <p>Creates a Directory Config object in AppStream 2.0. This object includes the configuration information required to join fleets and image builders to Microsoft Active Directory domains.</p>
#[derive(::std::clone::Clone, ::std::fmt::Debug)]
pub struct CreateDirectoryConfigFluentBuilder {
handle: ::std::sync::Arc<crate::client::Handle>,
inner: crate::operation::create_directory_config::builders::CreateDirectoryConfigInputBuilder,
config_override: ::std::option::Option<crate::config::Builder>,
}
impl CreateDirectoryConfigFluentBuilder {
/// Creates a new `CreateDirectoryConfig`.
pub(crate) fn new(handle: ::std::sync::Arc<crate::client::Handle>) -> Self {
Self {
handle,
inner: ::std::default::Default::default(),
config_override: ::std::option::Option::None,
}
}
/// Access the CreateDirectoryConfig as a reference.
pub fn as_input(&self) -> &crate::operation::create_directory_config::builders::CreateDirectoryConfigInputBuilder {
&self.inner
}
/// Sends the request and returns the response.
///
/// If an error occurs, an `SdkError` will be returned with additional details that
/// can be matched against.
///
/// By default, any retryable failures will be retried twice. Retry behavior
/// is configurable with the [RetryConfig](aws_smithy_types::retry::RetryConfig), which can be
/// set when configuring the client.
pub async fn send(
self,
) -> ::std::result::Result<
crate::operation::create_directory_config::CreateDirectoryConfigOutput,
::aws_smithy_http::result::SdkError<
crate::operation::create_directory_config::CreateDirectoryConfigError,
::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
>,
> {
let input = self.inner.build().map_err(::aws_smithy_http::result::SdkError::construction_failure)?;
let runtime_plugins = crate::operation::create_directory_config::CreateDirectoryConfig::operation_runtime_plugins(
self.handle.runtime_plugins.clone(),
&self.handle.conf,
self.config_override,
);
crate::operation::create_directory_config::CreateDirectoryConfig::orchestrate(&runtime_plugins, input).await
}
/// Consumes this builder, creating a customizable operation that can be modified before being
/// sent.
// TODO(enableNewSmithyRuntimeCleanup): Remove `async` and `Result` once we switch to orchestrator
pub async fn customize(
self,
) -> ::std::result::Result<
crate::client::customize::orchestrator::CustomizableOperation<
crate::operation::create_directory_config::CreateDirectoryConfigOutput,
crate::operation::create_directory_config::CreateDirectoryConfigError,
>,
::aws_smithy_http::result::SdkError<crate::operation::create_directory_config::CreateDirectoryConfigError>,
> {
::std::result::Result::Ok(crate::client::customize::orchestrator::CustomizableOperation {
customizable_send: ::std::boxed::Box::new(move |config_override| {
::std::boxed::Box::pin(async { self.config_override(config_override).send().await })
}),
config_override: None,
interceptors: vec![],
runtime_plugins: vec![],
})
}
pub(crate) fn config_override(mut self, config_override: impl Into<crate::config::Builder>) -> Self {
self.set_config_override(Some(config_override.into()));
self
}
pub(crate) fn set_config_override(&mut self, config_override: Option<crate::config::Builder>) -> &mut Self {
self.config_override = config_override;
self
}
/// <p>The fully qualified name of the directory (for example, corp.example.com).</p>
pub fn directory_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
self.inner = self.inner.directory_name(input.into());
self
}
/// <p>The fully qualified name of the directory (for example, corp.example.com).</p>
pub fn set_directory_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
self.inner = self.inner.set_directory_name(input);
self
}
/// <p>The fully qualified name of the directory (for example, corp.example.com).</p>
pub fn get_directory_name(&self) -> &::std::option::Option<::std::string::String> {
self.inner.get_directory_name()
}
/// Appends an item to `OrganizationalUnitDistinguishedNames`.
///
/// To override the contents of this collection use [`set_organizational_unit_distinguished_names`](Self::set_organizational_unit_distinguished_names).
///
/// <p>The distinguished names of the organizational units for computer accounts.</p>
pub fn organizational_unit_distinguished_names(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
self.inner = self.inner.organizational_unit_distinguished_names(input.into());
self
}
/// <p>The distinguished names of the organizational units for computer accounts.</p>
pub fn set_organizational_unit_distinguished_names(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self {
self.inner = self.inner.set_organizational_unit_distinguished_names(input);
self
}
/// <p>The distinguished names of the organizational units for computer accounts.</p>
pub fn get_organizational_unit_distinguished_names(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> {
self.inner.get_organizational_unit_distinguished_names()
}
/// <p>The credentials for the service account used by the fleet or image builder to connect to the directory.</p>
pub fn service_account_credentials(mut self, input: crate::types::ServiceAccountCredentials) -> Self {
self.inner = self.inner.service_account_credentials(input);
self
}
/// <p>The credentials for the service account used by the fleet or image builder to connect to the directory.</p>
pub fn set_service_account_credentials(mut self, input: ::std::option::Option<crate::types::ServiceAccountCredentials>) -> Self {
self.inner = self.inner.set_service_account_credentials(input);
self
}
/// <p>The credentials for the service account used by the fleet or image builder to connect to the directory.</p>
pub fn get_service_account_credentials(&self) -> &::std::option::Option<crate::types::ServiceAccountCredentials> {
self.inner.get_service_account_credentials()
}
/// <p>The certificate-based authentication properties used to authenticate SAML 2.0 Identity Provider (IdP) user identities to Active Directory domain-joined streaming instances. Fallback is turned on by default when certificate-based authentication is <b>Enabled</b> . Fallback allows users to log in using their AD domain password if certificate-based authentication is unsuccessful, or to unlock a desktop lock screen. <b>Enabled_no_directory_login_fallback</b> enables certificate-based authentication, but does not allow users to log in using their AD domain password. Users will be disconnected to re-authenticate using certificates.</p>
pub fn certificate_based_auth_properties(mut self, input: crate::types::CertificateBasedAuthProperties) -> Self {
self.inner = self.inner.certificate_based_auth_properties(input);
self
}
/// <p>The certificate-based authentication properties used to authenticate SAML 2.0 Identity Provider (IdP) user identities to Active Directory domain-joined streaming instances. Fallback is turned on by default when certificate-based authentication is <b>Enabled</b> . Fallback allows users to log in using their AD domain password if certificate-based authentication is unsuccessful, or to unlock a desktop lock screen. <b>Enabled_no_directory_login_fallback</b> enables certificate-based authentication, but does not allow users to log in using their AD domain password. Users will be disconnected to re-authenticate using certificates.</p>
pub fn set_certificate_based_auth_properties(mut self, input: ::std::option::Option<crate::types::CertificateBasedAuthProperties>) -> Self {
self.inner = self.inner.set_certificate_based_auth_properties(input);
self
}
/// <p>The certificate-based authentication properties used to authenticate SAML 2.0 Identity Provider (IdP) user identities to Active Directory domain-joined streaming instances. Fallback is turned on by default when certificate-based authentication is <b>Enabled</b> . Fallback allows users to log in using their AD domain password if certificate-based authentication is unsuccessful, or to unlock a desktop lock screen. <b>Enabled_no_directory_login_fallback</b> enables certificate-based authentication, but does not allow users to log in using their AD domain password. Users will be disconnected to re-authenticate using certificates.</p>
pub fn get_certificate_based_auth_properties(&self) -> &::std::option::Option<crate::types::CertificateBasedAuthProperties> {
self.inner.get_certificate_based_auth_properties()
}
}