1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
pub use crate::operation::start_detect_mitigation_actions_task::_start_detect_mitigation_actions_task_output::StartDetectMitigationActionsTaskOutputBuilder;

pub use crate::operation::start_detect_mitigation_actions_task::_start_detect_mitigation_actions_task_input::StartDetectMitigationActionsTaskInputBuilder;

/// Fluent builder constructing a request to `StartDetectMitigationActionsTask`.
///
/// <p> Starts a Device Defender ML Detect mitigation actions task. </p>
/// <p>Requires permission to access the <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awsiot.html#awsiot-actions-as-permissions">StartDetectMitigationActionsTask</a> action.</p>
#[derive(std::clone::Clone, std::fmt::Debug)]
pub struct StartDetectMitigationActionsTaskFluentBuilder {
                handle: std::sync::Arc<crate::client::Handle>,
                inner: crate::operation::start_detect_mitigation_actions_task::builders::StartDetectMitigationActionsTaskInputBuilder
            }
impl StartDetectMitigationActionsTaskFluentBuilder {
    /// Creates a new `StartDetectMitigationActionsTask`.
    pub(crate) fn new(handle: std::sync::Arc<crate::client::Handle>) -> Self {
        Self {
            handle,
            inner: Default::default(),
        }
    }

    /// Consume this builder, creating a customizable operation that can be modified before being
    /// sent. The operation's inner [http::Request] can be modified as well.
                    pub async fn customize(self) -> std::result::Result<
                        crate::client::customize::CustomizableOperation<crate::operation::start_detect_mitigation_actions_task::StartDetectMitigationActionsTask, aws_http::retry::AwsResponseRetryClassifier,>,
                        aws_smithy_http::result::SdkError<crate::operation::start_detect_mitigation_actions_task::StartDetectMitigationActionsTaskError>
    >{
        let handle = self.handle.clone();
        let operation = self
            .inner
            .build()
            .map_err(aws_smithy_http::result::SdkError::construction_failure)?
            .make_operation(&handle.conf)
            .await
            .map_err(aws_smithy_http::result::SdkError::construction_failure)?;
        Ok(crate::client::customize::CustomizableOperation { handle, operation })
    }

    /// Sends the request and returns the response.
    ///
    /// If an error occurs, an `SdkError` will be returned with additional details that
    /// can be matched against.
    ///
    /// By default, any retryable failures will be retried twice. Retry behavior
    /// is configurable with the [RetryConfig](aws_smithy_types::retry::RetryConfig), which can be
    /// set when configuring the client.
                    pub async fn send(self) -> std::result::Result<crate::operation::start_detect_mitigation_actions_task::StartDetectMitigationActionsTaskOutput, aws_smithy_http::result::SdkError<crate::operation::start_detect_mitigation_actions_task::StartDetectMitigationActionsTaskError>>
                     {
        let op = self
            .inner
            .build()
            .map_err(aws_smithy_http::result::SdkError::construction_failure)?
            .make_operation(&self.handle.conf)
            .await
            .map_err(aws_smithy_http::result::SdkError::construction_failure)?;
        self.handle.client.call(op).await
    }
    /// <p> The unique identifier of the task. </p>
    pub fn task_id(mut self, input: impl Into<std::string::String>) -> Self {
        self.inner = self.inner.task_id(input.into());
        self
    }
    /// <p> The unique identifier of the task. </p>
    pub fn set_task_id(mut self, input: std::option::Option<std::string::String>) -> Self {
        self.inner = self.inner.set_task_id(input);
        self
    }
    /// <p> Specifies the ML Detect findings to which the mitigation actions are applied. </p>
    pub fn target(mut self, input: crate::types::DetectMitigationActionsTaskTarget) -> Self {
        self.inner = self.inner.target(input);
        self
    }
    /// <p> Specifies the ML Detect findings to which the mitigation actions are applied. </p>
    pub fn set_target(
        mut self,
        input: std::option::Option<crate::types::DetectMitigationActionsTaskTarget>,
    ) -> Self {
        self.inner = self.inner.set_target(input);
        self
    }
    /// Appends an item to `actions`.
    ///
    /// To override the contents of this collection use [`set_actions`](Self::set_actions).
    ///
    /// <p> The actions to be performed when a device has unexpected behavior. </p>
    pub fn actions(mut self, input: impl Into<std::string::String>) -> Self {
        self.inner = self.inner.actions(input.into());
        self
    }
    /// <p> The actions to be performed when a device has unexpected behavior. </p>
    pub fn set_actions(
        mut self,
        input: std::option::Option<std::vec::Vec<std::string::String>>,
    ) -> Self {
        self.inner = self.inner.set_actions(input);
        self
    }
    /// <p> Specifies the time period of which violation events occurred between. </p>
    pub fn violation_event_occurrence_range(
        mut self,
        input: crate::types::ViolationEventOccurrenceRange,
    ) -> Self {
        self.inner = self.inner.violation_event_occurrence_range(input);
        self
    }
    /// <p> Specifies the time period of which violation events occurred between. </p>
    pub fn set_violation_event_occurrence_range(
        mut self,
        input: std::option::Option<crate::types::ViolationEventOccurrenceRange>,
    ) -> Self {
        self.inner = self.inner.set_violation_event_occurrence_range(input);
        self
    }
    /// <p> Specifies to list only active violations. </p>
    pub fn include_only_active_violations(mut self, input: bool) -> Self {
        self.inner = self.inner.include_only_active_violations(input);
        self
    }
    /// <p> Specifies to list only active violations. </p>
    pub fn set_include_only_active_violations(mut self, input: std::option::Option<bool>) -> Self {
        self.inner = self.inner.set_include_only_active_violations(input);
        self
    }
    /// <p> Specifies to include suppressed alerts. </p>
    pub fn include_suppressed_alerts(mut self, input: bool) -> Self {
        self.inner = self.inner.include_suppressed_alerts(input);
        self
    }
    /// <p> Specifies to include suppressed alerts. </p>
    pub fn set_include_suppressed_alerts(mut self, input: std::option::Option<bool>) -> Self {
        self.inner = self.inner.set_include_suppressed_alerts(input);
        self
    }
    /// <p> Each mitigation action task must have a unique client request token. If you try to create a new task with the same token as a task that already exists, an exception occurs. If you omit this value, Amazon Web Services SDKs will automatically generate a unique client request. </p>
    pub fn client_request_token(mut self, input: impl Into<std::string::String>) -> Self {
        self.inner = self.inner.client_request_token(input.into());
        self
    }
    /// <p> Each mitigation action task must have a unique client request token. If you try to create a new task with the same token as a task that already exists, an exception occurs. If you omit this value, Amazon Web Services SDKs will automatically generate a unique client request. </p>
    pub fn set_client_request_token(
        mut self,
        input: std::option::Option<std::string::String>,
    ) -> Self {
        self.inner = self.inner.set_client_request_token(input);
        self
    }
}