#[non_exhaustive]pub struct CreatePatchBaselineInput {Show 13 fields
pub operating_system: Option<OperatingSystem>,
pub name: Option<String>,
pub global_filters: Option<PatchFilterGroup>,
pub approval_rules: Option<PatchRuleGroup>,
pub approved_patches: Option<Vec<String>>,
pub approved_patches_compliance_level: Option<PatchComplianceLevel>,
pub approved_patches_enable_non_security: Option<bool>,
pub rejected_patches: Option<Vec<String>>,
pub rejected_patches_action: Option<PatchAction>,
pub description: Option<String>,
pub sources: Option<Vec<PatchSource>>,
pub client_token: Option<String>,
pub tags: Option<Vec<Tag>>,
}
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.operating_system: Option<OperatingSystem>
Defines the operating system the patch baseline applies to. The default value is WINDOWS
.
name: Option<String>
The name of the patch baseline.
global_filters: Option<PatchFilterGroup>
A set of global filters used to include patches in the baseline.
approval_rules: Option<PatchRuleGroup>
A set of rules used to include patches in the baseline.
approved_patches: Option<Vec<String>>
A list of explicitly approved patches for the baseline.
For information about accepted formats for lists of approved patches and rejected patches, see About package name formats for approved and rejected patch lists in the Amazon Web Services Systems Manager User Guide.
approved_patches_compliance_level: Option<PatchComplianceLevel>
Defines the compliance level for approved patches. When an approved patch is reported as missing, this value describes the severity of the compliance violation. The default value is UNSPECIFIED
.
approved_patches_enable_non_security: Option<bool>
Indicates whether the list of approved patches includes non-security updates that should be applied to the managed nodes. The default value is false
. Applies to Linux managed nodes only.
rejected_patches: Option<Vec<String>>
A list of explicitly rejected patches for the baseline.
For information about accepted formats for lists of approved patches and rejected patches, see About package name formats for approved and rejected patch lists in the Amazon Web Services Systems Manager User Guide.
rejected_patches_action: Option<PatchAction>
The action for Patch Manager to take on patches included in the RejectedPackages
list.
-
ALLOW_AS_DEPENDENCY
: A package in theRejected
patches list is installed only if it is a dependency of another package. It is considered compliant with the patch baseline, and its status is reported asInstalledOther
. This is the default action if no option is specified. -
BLOCK: Packages in the Rejected patches list, and packages that include them as dependencies, aren't installed by Patch Manager under any circumstances. If a package was installed before it was added to the Rejected patches list, or is installed outside of Patch Manager afterward, it's considered noncompliant with the patch baseline and its status is reported as InstalledRejected.
description: Option<String>
A description of the patch baseline.
sources: Option<Vec<PatchSource>>
Information about the patches to use to update the managed nodes, including target operating systems and source repositories. Applies to Linux managed nodes only.
client_token: Option<String>
User-provided idempotency token.
Optional metadata that you assign to a resource. Tags enable you to categorize a resource in different ways, such as by purpose, owner, or environment. For example, you might want to tag a patch baseline to identify the severity level of patches it specifies and the operating system family it applies to. In this case, you could specify the following key-value pairs:
-
Key=PatchSeverity,Value=Critical
-
Key=OS,Value=Windows
To add tags to an existing patch baseline, use the AddTagsToResource
operation.
Implementations§
source§impl CreatePatchBaselineInput
impl CreatePatchBaselineInput
sourcepub fn operating_system(&self) -> Option<&OperatingSystem>
pub fn operating_system(&self) -> Option<&OperatingSystem>
Defines the operating system the patch baseline applies to. The default value is WINDOWS
.
sourcepub fn global_filters(&self) -> Option<&PatchFilterGroup>
pub fn global_filters(&self) -> Option<&PatchFilterGroup>
A set of global filters used to include patches in the baseline.
sourcepub fn approval_rules(&self) -> Option<&PatchRuleGroup>
pub fn approval_rules(&self) -> Option<&PatchRuleGroup>
A set of rules used to include patches in the baseline.
sourcepub fn approved_patches(&self) -> &[String]
pub fn approved_patches(&self) -> &[String]
A list of explicitly approved patches for the baseline.
For information about accepted formats for lists of approved patches and rejected patches, see About package name formats for approved and rejected patch lists in the Amazon Web Services Systems Manager User Guide.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .approved_patches.is_none()
.
sourcepub fn approved_patches_compliance_level(&self) -> Option<&PatchComplianceLevel>
pub fn approved_patches_compliance_level(&self) -> Option<&PatchComplianceLevel>
Defines the compliance level for approved patches. When an approved patch is reported as missing, this value describes the severity of the compliance violation. The default value is UNSPECIFIED
.
sourcepub fn approved_patches_enable_non_security(&self) -> Option<bool>
pub fn approved_patches_enable_non_security(&self) -> Option<bool>
Indicates whether the list of approved patches includes non-security updates that should be applied to the managed nodes. The default value is false
. Applies to Linux managed nodes only.
sourcepub fn rejected_patches(&self) -> &[String]
pub fn rejected_patches(&self) -> &[String]
A list of explicitly rejected patches for the baseline.
For information about accepted formats for lists of approved patches and rejected patches, see About package name formats for approved and rejected patch lists in the Amazon Web Services Systems Manager User Guide.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .rejected_patches.is_none()
.
sourcepub fn rejected_patches_action(&self) -> Option<&PatchAction>
pub fn rejected_patches_action(&self) -> Option<&PatchAction>
The action for Patch Manager to take on patches included in the RejectedPackages
list.
-
ALLOW_AS_DEPENDENCY
: A package in theRejected
patches list is installed only if it is a dependency of another package. It is considered compliant with the patch baseline, and its status is reported asInstalledOther
. This is the default action if no option is specified. -
BLOCK: Packages in the Rejected patches list, and packages that include them as dependencies, aren't installed by Patch Manager under any circumstances. If a package was installed before it was added to the Rejected patches list, or is installed outside of Patch Manager afterward, it's considered noncompliant with the patch baseline and its status is reported as InstalledRejected.
sourcepub fn description(&self) -> Option<&str>
pub fn description(&self) -> Option<&str>
A description of the patch baseline.
sourcepub fn sources(&self) -> &[PatchSource]
pub fn sources(&self) -> &[PatchSource]
Information about the patches to use to update the managed nodes, including target operating systems and source repositories. Applies to Linux managed nodes only.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .sources.is_none()
.
sourcepub fn client_token(&self) -> Option<&str>
pub fn client_token(&self) -> Option<&str>
User-provided idempotency token.
Optional metadata that you assign to a resource. Tags enable you to categorize a resource in different ways, such as by purpose, owner, or environment. For example, you might want to tag a patch baseline to identify the severity level of patches it specifies and the operating system family it applies to. In this case, you could specify the following key-value pairs:
-
Key=PatchSeverity,Value=Critical
-
Key=OS,Value=Windows
To add tags to an existing patch baseline, use the AddTagsToResource
operation.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .tags.is_none()
.
source§impl CreatePatchBaselineInput
impl CreatePatchBaselineInput
sourcepub fn builder() -> CreatePatchBaselineInputBuilder
pub fn builder() -> CreatePatchBaselineInputBuilder
Creates a new builder-style object to manufacture CreatePatchBaselineInput
.
Trait Implementations§
source§impl Clone for CreatePatchBaselineInput
impl Clone for CreatePatchBaselineInput
source§fn clone(&self) -> CreatePatchBaselineInput
fn clone(&self) -> CreatePatchBaselineInput
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for CreatePatchBaselineInput
impl Debug for CreatePatchBaselineInput
source§impl PartialEq for CreatePatchBaselineInput
impl PartialEq for CreatePatchBaselineInput
source§fn eq(&self, other: &CreatePatchBaselineInput) -> bool
fn eq(&self, other: &CreatePatchBaselineInput) -> bool
self
and other
values to be equal, and is used
by ==
.