1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160
// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
pub use crate::operation::update_firewall_config::_update_firewall_config_output::UpdateFirewallConfigOutputBuilder;
pub use crate::operation::update_firewall_config::_update_firewall_config_input::UpdateFirewallConfigInputBuilder;
impl UpdateFirewallConfigInputBuilder {
/// Sends a request with this input using the given client.
pub async fn send_with(
self,
client: &crate::Client,
) -> ::std::result::Result<
crate::operation::update_firewall_config::UpdateFirewallConfigOutput,
::aws_smithy_runtime_api::client::result::SdkError<
crate::operation::update_firewall_config::UpdateFirewallConfigError,
::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
>,
> {
let mut fluent_builder = client.update_firewall_config();
fluent_builder.inner = self;
fluent_builder.send().await
}
}
/// Fluent builder constructing a request to `UpdateFirewallConfig`.
///
/// <p>Updates the configuration of the firewall behavior provided by DNS Firewall for a single VPC from Amazon Virtual Private Cloud (Amazon VPC).</p>
#[derive(::std::clone::Clone, ::std::fmt::Debug)]
pub struct UpdateFirewallConfigFluentBuilder {
handle: ::std::sync::Arc<crate::client::Handle>,
inner: crate::operation::update_firewall_config::builders::UpdateFirewallConfigInputBuilder,
config_override: ::std::option::Option<crate::config::Builder>,
}
impl
crate::client::customize::internal::CustomizableSend<
crate::operation::update_firewall_config::UpdateFirewallConfigOutput,
crate::operation::update_firewall_config::UpdateFirewallConfigError,
> for UpdateFirewallConfigFluentBuilder
{
fn send(
self,
config_override: crate::config::Builder,
) -> crate::client::customize::internal::BoxFuture<
crate::client::customize::internal::SendResult<
crate::operation::update_firewall_config::UpdateFirewallConfigOutput,
crate::operation::update_firewall_config::UpdateFirewallConfigError,
>,
> {
::std::boxed::Box::pin(async move { self.config_override(config_override).send().await })
}
}
impl UpdateFirewallConfigFluentBuilder {
/// Creates a new `UpdateFirewallConfig`.
pub(crate) fn new(handle: ::std::sync::Arc<crate::client::Handle>) -> Self {
Self {
handle,
inner: ::std::default::Default::default(),
config_override: ::std::option::Option::None,
}
}
/// Access the UpdateFirewallConfig as a reference.
pub fn as_input(&self) -> &crate::operation::update_firewall_config::builders::UpdateFirewallConfigInputBuilder {
&self.inner
}
/// Sends the request and returns the response.
///
/// If an error occurs, an `SdkError` will be returned with additional details that
/// can be matched against.
///
/// By default, any retryable failures will be retried twice. Retry behavior
/// is configurable with the [RetryConfig](aws_smithy_types::retry::RetryConfig), which can be
/// set when configuring the client.
pub async fn send(
self,
) -> ::std::result::Result<
crate::operation::update_firewall_config::UpdateFirewallConfigOutput,
::aws_smithy_runtime_api::client::result::SdkError<
crate::operation::update_firewall_config::UpdateFirewallConfigError,
::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
>,
> {
let input = self
.inner
.build()
.map_err(::aws_smithy_runtime_api::client::result::SdkError::construction_failure)?;
let runtime_plugins = crate::operation::update_firewall_config::UpdateFirewallConfig::operation_runtime_plugins(
self.handle.runtime_plugins.clone(),
&self.handle.conf,
self.config_override,
);
crate::operation::update_firewall_config::UpdateFirewallConfig::orchestrate(&runtime_plugins, input).await
}
/// Consumes this builder, creating a customizable operation that can be modified before being sent.
pub fn customize(
self,
) -> crate::client::customize::CustomizableOperation<
crate::operation::update_firewall_config::UpdateFirewallConfigOutput,
crate::operation::update_firewall_config::UpdateFirewallConfigError,
Self,
> {
crate::client::customize::CustomizableOperation::new(self)
}
pub(crate) fn config_override(mut self, config_override: impl Into<crate::config::Builder>) -> Self {
self.set_config_override(Some(config_override.into()));
self
}
pub(crate) fn set_config_override(&mut self, config_override: Option<crate::config::Builder>) -> &mut Self {
self.config_override = config_override;
self
}
/// <p>The ID of the VPC that the configuration is for.</p>
pub fn resource_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
self.inner = self.inner.resource_id(input.into());
self
}
/// <p>The ID of the VPC that the configuration is for.</p>
pub fn set_resource_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
self.inner = self.inner.set_resource_id(input);
self
}
/// <p>The ID of the VPC that the configuration is for.</p>
pub fn get_resource_id(&self) -> &::std::option::Option<::std::string::String> {
self.inner.get_resource_id()
}
/// <p>Determines how Route 53 Resolver handles queries during failures, for example when all traffic that is sent to DNS Firewall fails to receive a reply.</p>
/// <ul>
/// <li>
/// <p>By default, fail open is disabled, which means the failure mode is closed. This approach favors security over availability. DNS Firewall blocks queries that it is unable to evaluate properly.</p></li>
/// <li>
/// <p>If you enable this option, the failure mode is open. This approach favors availability over security. DNS Firewall allows queries to proceed if it is unable to properly evaluate them.</p></li>
/// </ul>
/// <p>This behavior is only enforced for VPCs that have at least one DNS Firewall rule group association.</p>
pub fn firewall_fail_open(mut self, input: crate::types::FirewallFailOpenStatus) -> Self {
self.inner = self.inner.firewall_fail_open(input);
self
}
/// <p>Determines how Route 53 Resolver handles queries during failures, for example when all traffic that is sent to DNS Firewall fails to receive a reply.</p>
/// <ul>
/// <li>
/// <p>By default, fail open is disabled, which means the failure mode is closed. This approach favors security over availability. DNS Firewall blocks queries that it is unable to evaluate properly.</p></li>
/// <li>
/// <p>If you enable this option, the failure mode is open. This approach favors availability over security. DNS Firewall allows queries to proceed if it is unable to properly evaluate them.</p></li>
/// </ul>
/// <p>This behavior is only enforced for VPCs that have at least one DNS Firewall rule group association.</p>
pub fn set_firewall_fail_open(mut self, input: ::std::option::Option<crate::types::FirewallFailOpenStatus>) -> Self {
self.inner = self.inner.set_firewall_fail_open(input);
self
}
/// <p>Determines how Route 53 Resolver handles queries during failures, for example when all traffic that is sent to DNS Firewall fails to receive a reply.</p>
/// <ul>
/// <li>
/// <p>By default, fail open is disabled, which means the failure mode is closed. This approach favors security over availability. DNS Firewall blocks queries that it is unable to evaluate properly.</p></li>
/// <li>
/// <p>If you enable this option, the failure mode is open. This approach favors availability over security. DNS Firewall allows queries to proceed if it is unable to properly evaluate them.</p></li>
/// </ul>
/// <p>This behavior is only enforced for VPCs that have at least one DNS Firewall rule group association.</p>
pub fn get_firewall_fail_open(&self) -> &::std::option::Option<crate::types::FirewallFailOpenStatus> {
self.inner.get_firewall_fail_open()
}
}