aws_sdk_ec2/operation/modify_vpc_encryption_control/
builders.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2pub use crate::operation::modify_vpc_encryption_control::_modify_vpc_encryption_control_output::ModifyVpcEncryptionControlOutputBuilder;
3
4pub use crate::operation::modify_vpc_encryption_control::_modify_vpc_encryption_control_input::ModifyVpcEncryptionControlInputBuilder;
5
6impl crate::operation::modify_vpc_encryption_control::builders::ModifyVpcEncryptionControlInputBuilder {
7    /// Sends a request with this input using the given client.
8    pub async fn send_with(
9        self,
10        client: &crate::Client,
11    ) -> ::std::result::Result<
12        crate::operation::modify_vpc_encryption_control::ModifyVpcEncryptionControlOutput,
13        ::aws_smithy_runtime_api::client::result::SdkError<
14            crate::operation::modify_vpc_encryption_control::ModifyVpcEncryptionControlError,
15            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
16        >,
17    > {
18        let mut fluent_builder = client.modify_vpc_encryption_control();
19        fluent_builder.inner = self;
20        fluent_builder.send().await
21    }
22}
23/// Fluent builder constructing a request to `ModifyVpcEncryptionControl`.
24///
25/// <p>Modifies the encryption control configuration for a VPC. You can update the encryption mode and exclusion settings for various gateway types and peering connections.</p>
26/// <p>For more information, see <a href="https://docs.aws.amazon.com/vpc/latest/userguide/vpc-encryption-controls.html">Enforce VPC encryption in transit</a> in the <i>Amazon VPC User Guide</i>.</p>
27#[derive(::std::clone::Clone, ::std::fmt::Debug)]
28pub struct ModifyVpcEncryptionControlFluentBuilder {
29    handle: ::std::sync::Arc<crate::client::Handle>,
30    inner: crate::operation::modify_vpc_encryption_control::builders::ModifyVpcEncryptionControlInputBuilder,
31    config_override: ::std::option::Option<crate::config::Builder>,
32}
33impl
34    crate::client::customize::internal::CustomizableSend<
35        crate::operation::modify_vpc_encryption_control::ModifyVpcEncryptionControlOutput,
36        crate::operation::modify_vpc_encryption_control::ModifyVpcEncryptionControlError,
37    > for ModifyVpcEncryptionControlFluentBuilder
38{
39    fn send(
40        self,
41        config_override: crate::config::Builder,
42    ) -> crate::client::customize::internal::BoxFuture<
43        crate::client::customize::internal::SendResult<
44            crate::operation::modify_vpc_encryption_control::ModifyVpcEncryptionControlOutput,
45            crate::operation::modify_vpc_encryption_control::ModifyVpcEncryptionControlError,
46        >,
47    > {
48        ::std::boxed::Box::pin(async move { self.config_override(config_override).send().await })
49    }
50}
51impl ModifyVpcEncryptionControlFluentBuilder {
52    /// Creates a new `ModifyVpcEncryptionControlFluentBuilder`.
53    pub(crate) fn new(handle: ::std::sync::Arc<crate::client::Handle>) -> Self {
54        Self {
55            handle,
56            inner: ::std::default::Default::default(),
57            config_override: ::std::option::Option::None,
58        }
59    }
60    /// Access the ModifyVpcEncryptionControl as a reference.
61    pub fn as_input(&self) -> &crate::operation::modify_vpc_encryption_control::builders::ModifyVpcEncryptionControlInputBuilder {
62        &self.inner
63    }
64    /// Sends the request and returns the response.
65    ///
66    /// If an error occurs, an `SdkError` will be returned with additional details that
67    /// can be matched against.
68    ///
69    /// By default, any retryable failures will be retried twice. Retry behavior
70    /// is configurable with the [RetryConfig](aws_smithy_types::retry::RetryConfig), which can be
71    /// set when configuring the client.
72    pub async fn send(
73        self,
74    ) -> ::std::result::Result<
75        crate::operation::modify_vpc_encryption_control::ModifyVpcEncryptionControlOutput,
76        ::aws_smithy_runtime_api::client::result::SdkError<
77            crate::operation::modify_vpc_encryption_control::ModifyVpcEncryptionControlError,
78            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
79        >,
80    > {
81        let input = self
82            .inner
83            .build()
84            .map_err(::aws_smithy_runtime_api::client::result::SdkError::construction_failure)?;
85        let runtime_plugins = crate::operation::modify_vpc_encryption_control::ModifyVpcEncryptionControl::operation_runtime_plugins(
86            self.handle.runtime_plugins.clone(),
87            &self.handle.conf,
88            self.config_override,
89        );
90        crate::operation::modify_vpc_encryption_control::ModifyVpcEncryptionControl::orchestrate(&runtime_plugins, input).await
91    }
92
93    /// Consumes this builder, creating a customizable operation that can be modified before being sent.
94    pub fn customize(
95        self,
96    ) -> crate::client::customize::CustomizableOperation<
97        crate::operation::modify_vpc_encryption_control::ModifyVpcEncryptionControlOutput,
98        crate::operation::modify_vpc_encryption_control::ModifyVpcEncryptionControlError,
99        Self,
100    > {
101        crate::client::customize::CustomizableOperation::new(self)
102    }
103    pub(crate) fn config_override(mut self, config_override: impl ::std::convert::Into<crate::config::Builder>) -> Self {
104        self.set_config_override(::std::option::Option::Some(config_override.into()));
105        self
106    }
107
108    pub(crate) fn set_config_override(&mut self, config_override: ::std::option::Option<crate::config::Builder>) -> &mut Self {
109        self.config_override = config_override;
110        self
111    }
112    /// <p>Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is <code>DryRunOperation</code>. Otherwise, it is <code>UnauthorizedOperation</code>.</p>
113    pub fn dry_run(mut self, input: bool) -> Self {
114        self.inner = self.inner.dry_run(input);
115        self
116    }
117    /// <p>Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is <code>DryRunOperation</code>. Otherwise, it is <code>UnauthorizedOperation</code>.</p>
118    pub fn set_dry_run(mut self, input: ::std::option::Option<bool>) -> Self {
119        self.inner = self.inner.set_dry_run(input);
120        self
121    }
122    /// <p>Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is <code>DryRunOperation</code>. Otherwise, it is <code>UnauthorizedOperation</code>.</p>
123    pub fn get_dry_run(&self) -> &::std::option::Option<bool> {
124        self.inner.get_dry_run()
125    }
126    /// <p>The ID of the VPC Encryption Control resource to modify.</p>
127    pub fn vpc_encryption_control_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
128        self.inner = self.inner.vpc_encryption_control_id(input.into());
129        self
130    }
131    /// <p>The ID of the VPC Encryption Control resource to modify.</p>
132    pub fn set_vpc_encryption_control_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
133        self.inner = self.inner.set_vpc_encryption_control_id(input);
134        self
135    }
136    /// <p>The ID of the VPC Encryption Control resource to modify.</p>
137    pub fn get_vpc_encryption_control_id(&self) -> &::std::option::Option<::std::string::String> {
138        self.inner.get_vpc_encryption_control_id()
139    }
140    /// <p>The encryption mode for the VPC Encryption Control configuration.</p>
141    pub fn mode(mut self, input: crate::types::VpcEncryptionControlMode) -> Self {
142        self.inner = self.inner.mode(input);
143        self
144    }
145    /// <p>The encryption mode for the VPC Encryption Control configuration.</p>
146    pub fn set_mode(mut self, input: ::std::option::Option<crate::types::VpcEncryptionControlMode>) -> Self {
147        self.inner = self.inner.set_mode(input);
148        self
149    }
150    /// <p>The encryption mode for the VPC Encryption Control configuration.</p>
151    pub fn get_mode(&self) -> &::std::option::Option<crate::types::VpcEncryptionControlMode> {
152        self.inner.get_mode()
153    }
154    /// <p>Specifies whether to exclude internet gateway traffic from encryption enforcement.</p>
155    pub fn internet_gateway_exclusion(mut self, input: crate::types::VpcEncryptionControlExclusionStateInput) -> Self {
156        self.inner = self.inner.internet_gateway_exclusion(input);
157        self
158    }
159    /// <p>Specifies whether to exclude internet gateway traffic from encryption enforcement.</p>
160    pub fn set_internet_gateway_exclusion(mut self, input: ::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput>) -> Self {
161        self.inner = self.inner.set_internet_gateway_exclusion(input);
162        self
163    }
164    /// <p>Specifies whether to exclude internet gateway traffic from encryption enforcement.</p>
165    pub fn get_internet_gateway_exclusion(&self) -> &::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput> {
166        self.inner.get_internet_gateway_exclusion()
167    }
168    /// <p>Specifies whether to exclude egress-only internet gateway traffic from encryption enforcement.</p>
169    pub fn egress_only_internet_gateway_exclusion(mut self, input: crate::types::VpcEncryptionControlExclusionStateInput) -> Self {
170        self.inner = self.inner.egress_only_internet_gateway_exclusion(input);
171        self
172    }
173    /// <p>Specifies whether to exclude egress-only internet gateway traffic from encryption enforcement.</p>
174    pub fn set_egress_only_internet_gateway_exclusion(
175        mut self,
176        input: ::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput>,
177    ) -> Self {
178        self.inner = self.inner.set_egress_only_internet_gateway_exclusion(input);
179        self
180    }
181    /// <p>Specifies whether to exclude egress-only internet gateway traffic from encryption enforcement.</p>
182    pub fn get_egress_only_internet_gateway_exclusion(&self) -> &::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput> {
183        self.inner.get_egress_only_internet_gateway_exclusion()
184    }
185    /// <p>Specifies whether to exclude NAT gateway traffic from encryption enforcement.</p>
186    pub fn nat_gateway_exclusion(mut self, input: crate::types::VpcEncryptionControlExclusionStateInput) -> Self {
187        self.inner = self.inner.nat_gateway_exclusion(input);
188        self
189    }
190    /// <p>Specifies whether to exclude NAT gateway traffic from encryption enforcement.</p>
191    pub fn set_nat_gateway_exclusion(mut self, input: ::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput>) -> Self {
192        self.inner = self.inner.set_nat_gateway_exclusion(input);
193        self
194    }
195    /// <p>Specifies whether to exclude NAT gateway traffic from encryption enforcement.</p>
196    pub fn get_nat_gateway_exclusion(&self) -> &::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput> {
197        self.inner.get_nat_gateway_exclusion()
198    }
199    /// <p>Specifies whether to exclude virtual private gateway traffic from encryption enforcement.</p>
200    pub fn virtual_private_gateway_exclusion(mut self, input: crate::types::VpcEncryptionControlExclusionStateInput) -> Self {
201        self.inner = self.inner.virtual_private_gateway_exclusion(input);
202        self
203    }
204    /// <p>Specifies whether to exclude virtual private gateway traffic from encryption enforcement.</p>
205    pub fn set_virtual_private_gateway_exclusion(
206        mut self,
207        input: ::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput>,
208    ) -> Self {
209        self.inner = self.inner.set_virtual_private_gateway_exclusion(input);
210        self
211    }
212    /// <p>Specifies whether to exclude virtual private gateway traffic from encryption enforcement.</p>
213    pub fn get_virtual_private_gateway_exclusion(&self) -> &::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput> {
214        self.inner.get_virtual_private_gateway_exclusion()
215    }
216    /// <p>Specifies whether to exclude VPC peering connection traffic from encryption enforcement.</p>
217    pub fn vpc_peering_exclusion(mut self, input: crate::types::VpcEncryptionControlExclusionStateInput) -> Self {
218        self.inner = self.inner.vpc_peering_exclusion(input);
219        self
220    }
221    /// <p>Specifies whether to exclude VPC peering connection traffic from encryption enforcement.</p>
222    pub fn set_vpc_peering_exclusion(mut self, input: ::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput>) -> Self {
223        self.inner = self.inner.set_vpc_peering_exclusion(input);
224        self
225    }
226    /// <p>Specifies whether to exclude VPC peering connection traffic from encryption enforcement.</p>
227    pub fn get_vpc_peering_exclusion(&self) -> &::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput> {
228        self.inner.get_vpc_peering_exclusion()
229    }
230    /// <p>Specifies whether to exclude Lambda function traffic from encryption enforcement.</p>
231    pub fn lambda_exclusion(mut self, input: crate::types::VpcEncryptionControlExclusionStateInput) -> Self {
232        self.inner = self.inner.lambda_exclusion(input);
233        self
234    }
235    /// <p>Specifies whether to exclude Lambda function traffic from encryption enforcement.</p>
236    pub fn set_lambda_exclusion(mut self, input: ::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput>) -> Self {
237        self.inner = self.inner.set_lambda_exclusion(input);
238        self
239    }
240    /// <p>Specifies whether to exclude Lambda function traffic from encryption enforcement.</p>
241    pub fn get_lambda_exclusion(&self) -> &::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput> {
242        self.inner.get_lambda_exclusion()
243    }
244    /// <p>Specifies whether to exclude VPC Lattice traffic from encryption enforcement.</p>
245    pub fn vpc_lattice_exclusion(mut self, input: crate::types::VpcEncryptionControlExclusionStateInput) -> Self {
246        self.inner = self.inner.vpc_lattice_exclusion(input);
247        self
248    }
249    /// <p>Specifies whether to exclude VPC Lattice traffic from encryption enforcement.</p>
250    pub fn set_vpc_lattice_exclusion(mut self, input: ::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput>) -> Self {
251        self.inner = self.inner.set_vpc_lattice_exclusion(input);
252        self
253    }
254    /// <p>Specifies whether to exclude VPC Lattice traffic from encryption enforcement.</p>
255    pub fn get_vpc_lattice_exclusion(&self) -> &::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput> {
256        self.inner.get_vpc_lattice_exclusion()
257    }
258    /// <p>Specifies whether to exclude Elastic File System traffic from encryption enforcement.</p>
259    pub fn elastic_file_system_exclusion(mut self, input: crate::types::VpcEncryptionControlExclusionStateInput) -> Self {
260        self.inner = self.inner.elastic_file_system_exclusion(input);
261        self
262    }
263    /// <p>Specifies whether to exclude Elastic File System traffic from encryption enforcement.</p>
264    pub fn set_elastic_file_system_exclusion(mut self, input: ::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput>) -> Self {
265        self.inner = self.inner.set_elastic_file_system_exclusion(input);
266        self
267    }
268    /// <p>Specifies whether to exclude Elastic File System traffic from encryption enforcement.</p>
269    pub fn get_elastic_file_system_exclusion(&self) -> &::std::option::Option<crate::types::VpcEncryptionControlExclusionStateInput> {
270        self.inner.get_elastic_file_system_exclusion()
271    }
272}