#[non_exhaustive]
pub struct InstancePatchStateBuilder { /* private fields */ }
Expand description

A builder for InstancePatchState.

Implementations§

source§

impl InstancePatchStateBuilder

source

pub fn instance_id(self, input: impl Into<String>) -> Self

The ID of the managed node the high-level patch compliance information was collected for.

This field is required.
source

pub fn set_instance_id(self, input: Option<String>) -> Self

The ID of the managed node the high-level patch compliance information was collected for.

source

pub fn get_instance_id(&self) -> &Option<String>

The ID of the managed node the high-level patch compliance information was collected for.

source

pub fn patch_group(self, input: impl Into<String>) -> Self

The name of the patch group the managed node belongs to.

This field is required.
source

pub fn set_patch_group(self, input: Option<String>) -> Self

The name of the patch group the managed node belongs to.

source

pub fn get_patch_group(&self) -> &Option<String>

The name of the patch group the managed node belongs to.

source

pub fn baseline_id(self, input: impl Into<String>) -> Self

The ID of the patch baseline used to patch the managed node.

This field is required.
source

pub fn set_baseline_id(self, input: Option<String>) -> Self

The ID of the patch baseline used to patch the managed node.

source

pub fn get_baseline_id(&self) -> &Option<String>

The ID of the patch baseline used to patch the managed node.

source

pub fn snapshot_id(self, input: impl Into<String>) -> Self

The ID of the patch baseline snapshot used during the patching operation when this compliance data was collected.

source

pub fn set_snapshot_id(self, input: Option<String>) -> Self

The ID of the patch baseline snapshot used during the patching operation when this compliance data was collected.

source

pub fn get_snapshot_id(&self) -> &Option<String>

The ID of the patch baseline snapshot used during the patching operation when this compliance data was collected.

source

pub fn install_override_list(self, input: impl Into<String>) -> Self

An https URL or an Amazon Simple Storage Service (Amazon S3) path-style URL to a list of patches to be installed. This patch installation list, which you maintain in an S3 bucket in YAML format and specify in the SSM document AWS-RunPatchBaseline, overrides the patches specified by the default patch baseline.

For more information about the InstallOverrideList parameter, see About the AWS-RunPatchBaseline SSM document in the Amazon Web Services Systems Manager User Guide.

source

pub fn set_install_override_list(self, input: Option<String>) -> Self

An https URL or an Amazon Simple Storage Service (Amazon S3) path-style URL to a list of patches to be installed. This patch installation list, which you maintain in an S3 bucket in YAML format and specify in the SSM document AWS-RunPatchBaseline, overrides the patches specified by the default patch baseline.

For more information about the InstallOverrideList parameter, see About the AWS-RunPatchBaseline SSM document in the Amazon Web Services Systems Manager User Guide.

source

pub fn get_install_override_list(&self) -> &Option<String>

An https URL or an Amazon Simple Storage Service (Amazon S3) path-style URL to a list of patches to be installed. This patch installation list, which you maintain in an S3 bucket in YAML format and specify in the SSM document AWS-RunPatchBaseline, overrides the patches specified by the default patch baseline.

For more information about the InstallOverrideList parameter, see About the AWS-RunPatchBaseline SSM document in the Amazon Web Services Systems Manager User Guide.

source

pub fn owner_information(self, input: impl Into<String>) -> Self

Placeholder information. This field will always be empty in the current release of the service.

source

pub fn set_owner_information(self, input: Option<String>) -> Self

Placeholder information. This field will always be empty in the current release of the service.

source

pub fn get_owner_information(&self) -> &Option<String>

Placeholder information. This field will always be empty in the current release of the service.

source

pub fn installed_count(self, input: i32) -> Self

The number of patches from the patch baseline that are installed on the managed node.

source

pub fn set_installed_count(self, input: Option<i32>) -> Self

The number of patches from the patch baseline that are installed on the managed node.

source

pub fn get_installed_count(&self) -> &Option<i32>

The number of patches from the patch baseline that are installed on the managed node.

source

pub fn installed_other_count(self, input: i32) -> Self

The number of patches not specified in the patch baseline that are installed on the managed node.

source

pub fn set_installed_other_count(self, input: Option<i32>) -> Self

The number of patches not specified in the patch baseline that are installed on the managed node.

source

pub fn get_installed_other_count(&self) -> &Option<i32>

The number of patches not specified in the patch baseline that are installed on the managed node.

source

pub fn installed_pending_reboot_count(self, input: i32) -> Self

The number of patches installed by Patch Manager since the last time the managed node was rebooted.

source

pub fn set_installed_pending_reboot_count(self, input: Option<i32>) -> Self

The number of patches installed by Patch Manager since the last time the managed node was rebooted.

source

pub fn get_installed_pending_reboot_count(&self) -> &Option<i32>

The number of patches installed by Patch Manager since the last time the managed node was rebooted.

source

pub fn installed_rejected_count(self, input: i32) -> Self

The number of patches installed on a managed node that are specified in a RejectedPatches list. Patches with a status of InstalledRejected were typically installed before they were added to a RejectedPatches list.

If ALLOW_AS_DEPENDENCY is the specified option for RejectedPatchesAction, the value of InstalledRejectedCount will always be 0 (zero).

source

pub fn set_installed_rejected_count(self, input: Option<i32>) -> Self

The number of patches installed on a managed node that are specified in a RejectedPatches list. Patches with a status of InstalledRejected were typically installed before they were added to a RejectedPatches list.

If ALLOW_AS_DEPENDENCY is the specified option for RejectedPatchesAction, the value of InstalledRejectedCount will always be 0 (zero).

source

pub fn get_installed_rejected_count(&self) -> &Option<i32>

The number of patches installed on a managed node that are specified in a RejectedPatches list. Patches with a status of InstalledRejected were typically installed before they were added to a RejectedPatches list.

If ALLOW_AS_DEPENDENCY is the specified option for RejectedPatchesAction, the value of InstalledRejectedCount will always be 0 (zero).

source

pub fn missing_count(self, input: i32) -> Self

The number of patches from the patch baseline that are applicable for the managed node but aren't currently installed.

source

pub fn set_missing_count(self, input: Option<i32>) -> Self

The number of patches from the patch baseline that are applicable for the managed node but aren't currently installed.

source

pub fn get_missing_count(&self) -> &Option<i32>

The number of patches from the patch baseline that are applicable for the managed node but aren't currently installed.

source

pub fn failed_count(self, input: i32) -> Self

The number of patches from the patch baseline that were attempted to be installed during the last patching operation, but failed to install.

source

pub fn set_failed_count(self, input: Option<i32>) -> Self

The number of patches from the patch baseline that were attempted to be installed during the last patching operation, but failed to install.

source

pub fn get_failed_count(&self) -> &Option<i32>

The number of patches from the patch baseline that were attempted to be installed during the last patching operation, but failed to install.

source

pub fn unreported_not_applicable_count(self, input: i32) -> Self

The number of patches beyond the supported limit of NotApplicableCount that aren't reported by name to Inventory. Inventory is a capability of Amazon Web Services Systems Manager.

source

pub fn set_unreported_not_applicable_count(self, input: Option<i32>) -> Self

The number of patches beyond the supported limit of NotApplicableCount that aren't reported by name to Inventory. Inventory is a capability of Amazon Web Services Systems Manager.

source

pub fn get_unreported_not_applicable_count(&self) -> &Option<i32>

The number of patches beyond the supported limit of NotApplicableCount that aren't reported by name to Inventory. Inventory is a capability of Amazon Web Services Systems Manager.

source

pub fn not_applicable_count(self, input: i32) -> Self

The number of patches from the patch baseline that aren't applicable for the managed node and therefore aren't installed on the node. This number may be truncated if the list of patch names is very large. The number of patches beyond this limit are reported in UnreportedNotApplicableCount.

source

pub fn set_not_applicable_count(self, input: Option<i32>) -> Self

The number of patches from the patch baseline that aren't applicable for the managed node and therefore aren't installed on the node. This number may be truncated if the list of patch names is very large. The number of patches beyond this limit are reported in UnreportedNotApplicableCount.

source

pub fn get_not_applicable_count(&self) -> &Option<i32>

The number of patches from the patch baseline that aren't applicable for the managed node and therefore aren't installed on the node. This number may be truncated if the list of patch names is very large. The number of patches beyond this limit are reported in UnreportedNotApplicableCount.

source

pub fn operation_start_time(self, input: DateTime) -> Self

The time the most recent patching operation was started on the managed node.

This field is required.
source

pub fn set_operation_start_time(self, input: Option<DateTime>) -> Self

The time the most recent patching operation was started on the managed node.

source

pub fn get_operation_start_time(&self) -> &Option<DateTime>

The time the most recent patching operation was started on the managed node.

source

pub fn operation_end_time(self, input: DateTime) -> Self

The time the most recent patching operation completed on the managed node.

This field is required.
source

pub fn set_operation_end_time(self, input: Option<DateTime>) -> Self

The time the most recent patching operation completed on the managed node.

source

pub fn get_operation_end_time(&self) -> &Option<DateTime>

The time the most recent patching operation completed on the managed node.

source

pub fn operation(self, input: PatchOperationType) -> Self

The type of patching operation that was performed: or

  • SCAN assesses the patch compliance state.

  • INSTALL installs missing patches.

This field is required.
source

pub fn set_operation(self, input: Option<PatchOperationType>) -> Self

The type of patching operation that was performed: or

  • SCAN assesses the patch compliance state.

  • INSTALL installs missing patches.

source

pub fn get_operation(&self) -> &Option<PatchOperationType>

The type of patching operation that was performed: or

  • SCAN assesses the patch compliance state.

  • INSTALL installs missing patches.

source

pub fn last_no_reboot_install_operation_time(self, input: DateTime) -> Self

The time of the last attempt to patch the managed node with NoReboot specified as the reboot option.

source

pub fn set_last_no_reboot_install_operation_time( self, input: Option<DateTime> ) -> Self

The time of the last attempt to patch the managed node with NoReboot specified as the reboot option.

source

pub fn get_last_no_reboot_install_operation_time(&self) -> &Option<DateTime>

The time of the last attempt to patch the managed node with NoReboot specified as the reboot option.

source

pub fn reboot_option(self, input: RebootOption) -> Self

Indicates the reboot option specified in the patch baseline.

Reboot options apply to Install operations only. Reboots aren't attempted for Patch Manager Scan operations.

  • RebootIfNeeded: Patch Manager tries to reboot the managed node if it installed any patches, or if any patches are detected with a status of InstalledPendingReboot.

  • NoReboot: Patch Manager attempts to install missing packages without trying to reboot the system. Patches installed with this option are assigned a status of InstalledPendingReboot. These patches might not be in effect until a reboot is performed.

source

pub fn set_reboot_option(self, input: Option<RebootOption>) -> Self

Indicates the reboot option specified in the patch baseline.

Reboot options apply to Install operations only. Reboots aren't attempted for Patch Manager Scan operations.

  • RebootIfNeeded: Patch Manager tries to reboot the managed node if it installed any patches, or if any patches are detected with a status of InstalledPendingReboot.

  • NoReboot: Patch Manager attempts to install missing packages without trying to reboot the system. Patches installed with this option are assigned a status of InstalledPendingReboot. These patches might not be in effect until a reboot is performed.

source

pub fn get_reboot_option(&self) -> &Option<RebootOption>

Indicates the reboot option specified in the patch baseline.

Reboot options apply to Install operations only. Reboots aren't attempted for Patch Manager Scan operations.

  • RebootIfNeeded: Patch Manager tries to reboot the managed node if it installed any patches, or if any patches are detected with a status of InstalledPendingReboot.

  • NoReboot: Patch Manager attempts to install missing packages without trying to reboot the system. Patches installed with this option are assigned a status of InstalledPendingReboot. These patches might not be in effect until a reboot is performed.

source

pub fn critical_non_compliant_count(self, input: i32) -> Self

The number of patches per node that are specified as Critical for compliance reporting in the patch baseline aren't installed. These patches might be missing, have failed installation, were rejected, or were installed but awaiting a required managed node reboot. The status of these managed nodes is NON_COMPLIANT.

source

pub fn set_critical_non_compliant_count(self, input: Option<i32>) -> Self

The number of patches per node that are specified as Critical for compliance reporting in the patch baseline aren't installed. These patches might be missing, have failed installation, were rejected, or were installed but awaiting a required managed node reboot. The status of these managed nodes is NON_COMPLIANT.

source

pub fn get_critical_non_compliant_count(&self) -> &Option<i32>

The number of patches per node that are specified as Critical for compliance reporting in the patch baseline aren't installed. These patches might be missing, have failed installation, were rejected, or were installed but awaiting a required managed node reboot. The status of these managed nodes is NON_COMPLIANT.

source

pub fn security_non_compliant_count(self, input: i32) -> Self

The number of patches per node that are specified as Security in a patch advisory aren't installed. These patches might be missing, have failed installation, were rejected, or were installed but awaiting a required managed node reboot. The status of these managed nodes is NON_COMPLIANT.

source

pub fn set_security_non_compliant_count(self, input: Option<i32>) -> Self

The number of patches per node that are specified as Security in a patch advisory aren't installed. These patches might be missing, have failed installation, were rejected, or were installed but awaiting a required managed node reboot. The status of these managed nodes is NON_COMPLIANT.

source

pub fn get_security_non_compliant_count(&self) -> &Option<i32>

The number of patches per node that are specified as Security in a patch advisory aren't installed. These patches might be missing, have failed installation, were rejected, or were installed but awaiting a required managed node reboot. The status of these managed nodes is NON_COMPLIANT.

source

pub fn other_non_compliant_count(self, input: i32) -> Self

The number of patches per node that are specified as other than Critical or Security but aren't compliant with the patch baseline. The status of these managed nodes is NON_COMPLIANT.

source

pub fn set_other_non_compliant_count(self, input: Option<i32>) -> Self

The number of patches per node that are specified as other than Critical or Security but aren't compliant with the patch baseline. The status of these managed nodes is NON_COMPLIANT.

source

pub fn get_other_non_compliant_count(&self) -> &Option<i32>

The number of patches per node that are specified as other than Critical or Security but aren't compliant with the patch baseline. The status of these managed nodes is NON_COMPLIANT.

source

pub fn build(self) -> Result<InstancePatchState, BuildError>

Consumes the builder and constructs a InstancePatchState. This method will fail if any of the following fields are not set:

Trait Implementations§

source§

impl Clone for InstancePatchStateBuilder

source§

fn clone(&self) -> InstancePatchStateBuilder

Returns a copy of the value. Read more
1.0.0 · source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
source§

impl Debug for InstancePatchStateBuilder

source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
source§

impl Default for InstancePatchStateBuilder

source§

fn default() -> InstancePatchStateBuilder

Returns the “default value” for a type. Read more
source§

impl PartialEq for InstancePatchStateBuilder

source§

fn eq(&self, other: &InstancePatchStateBuilder) -> bool

This method tests for self and other values to be equal, and is used by ==.
1.0.0 · source§

fn ne(&self, other: &Rhs) -> bool

This method tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
source§

impl StructuralPartialEq for InstancePatchStateBuilder

Auto Trait Implementations§

Blanket Implementations§

source§

impl<T> Any for T
where T: 'static + ?Sized,

source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
source§

impl<T> Borrow<T> for T
where T: ?Sized,

source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
source§

impl<T> From<T> for T

source§

fn from(t: T) -> T

Returns the argument unchanged.

source§

impl<T> Instrument for T

source§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided Span, returning an Instrumented wrapper. Read more
source§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
source§

impl<T, U> Into<U> for T
where U: From<T>,

source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

source§

impl<Unshared, Shared> IntoShared<Shared> for Unshared
where Shared: FromUnshared<Unshared>,

source§

fn into_shared(self) -> Shared

Creates a shared type from an unshared type.
source§

impl<T> Same for T

§

type Output = T

Should always be Self
source§

impl<T> ToOwned for T
where T: Clone,

§

type Owned = T

The resulting type after obtaining ownership.
source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

§

type Error = Infallible

The type returned in the event of a conversion error.
source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
source§

impl<T> WithSubscriber for T

source§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>
where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a WithDispatch wrapper. Read more
source§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a WithDispatch wrapper. Read more