#[non_exhaustive]pub struct CreateCanaryInput {Show 15 fields
pub name: Option<String>,
pub code: Option<CanaryCodeInput>,
pub artifact_s3_location: Option<String>,
pub execution_role_arn: Option<String>,
pub schedule: Option<CanaryScheduleInput>,
pub run_config: Option<CanaryRunConfigInput>,
pub success_retention_period_in_days: Option<i32>,
pub failure_retention_period_in_days: Option<i32>,
pub runtime_version: Option<String>,
pub vpc_config: Option<VpcConfigInput>,
pub resources_to_replicate_tags: Option<Vec<ResourceToTag>>,
pub provisioned_resource_cleanup: Option<ProvisionedResourceCleanupSetting>,
pub browser_configs: Option<Vec<BrowserConfig>>,
pub tags: Option<HashMap<String, String>>,
pub artifact_config: Option<ArtifactConfigInput>,
}
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.name: Option<String>
The name for this canary. Be sure to give it a descriptive name that distinguishes it from other canaries in your account.
Do not include secrets or proprietary information in your canary names. The canary name makes up part of the canary ARN, and the ARN is included in outbound calls over the internet. For more information, see Security Considerations for Synthetics Canaries.
code: Option<CanaryCodeInput>
A structure that includes the entry point from which the canary should start running your script. If the script is stored in an Amazon S3 bucket, the bucket name, key, and version are also included.
artifact_s3_location: Option<String>
The location in Amazon S3 where Synthetics stores artifacts from the test runs of this canary. Artifacts include the log file, screenshots, and HAR files. The name of the Amazon S3 bucket can't include a period (.).
execution_role_arn: Option<String>
The ARN of the IAM role to be used to run the canary. This role must already exist, and must include lambda.amazonaws.com
as a principal in the trust policy. The role must also have the following permissions:
-
s3:PutObject
-
s3:GetBucketLocation
-
s3:ListAllMyBuckets
-
cloudwatch:PutMetricData
-
logs:CreateLogGroup
-
logs:CreateLogStream
-
logs:PutLogEvents
schedule: Option<CanaryScheduleInput>
A structure that contains information about how often the canary is to run and when these test runs are to stop.
run_config: Option<CanaryRunConfigInput>
A structure that contains the configuration for individual canary runs, such as timeout value and environment variables.
Environment variable keys and values are encrypted at rest using Amazon Web Services owned KMS keys. However, the environment variables are not encrypted on the client side. Do not store sensitive information in them.
success_retention_period_in_days: Option<i32>
The number of days to retain data about successful runs of this canary. If you omit this field, the default of 31 days is used. The valid range is 1 to 455 days.
This setting affects the range of information returned by GetCanaryRuns, as well as the range of information displayed in the Synthetics console.
failure_retention_period_in_days: Option<i32>
The number of days to retain data about failed runs of this canary. If you omit this field, the default of 31 days is used. The valid range is 1 to 455 days.
This setting affects the range of information returned by GetCanaryRuns, as well as the range of information displayed in the Synthetics console.
runtime_version: Option<String>
Specifies the runtime version to use for the canary. For a list of valid runtime versions and more information about runtime versions, see Canary Runtime Versions.
vpc_config: Option<VpcConfigInput>
If this canary is to test an endpoint in a VPC, this structure contains information about the subnet and security groups of the VPC endpoint. For more information, see Running a Canary in a VPC.
To have the tags that you apply to this canary also be applied to the Lambda function that the canary uses, specify this parameter with the value lambda-function
.
If you specify this parameter and don't specify any tags in the Tags
parameter, the canary creation fails.
provisioned_resource_cleanup: Option<ProvisionedResourceCleanupSetting>
Specifies whether to also delete the Lambda functions and layers used by this canary when the canary is deleted. If you omit this parameter, the default of AUTOMATIC
is used, which means that the Lambda functions and layers will be deleted when the canary is deleted.
If the value of this parameter is OFF
, then the value of the DeleteLambda
parameter of the DeleteCanary operation determines whether the Lambda functions and layers will be deleted.
browser_configs: Option<Vec<BrowserConfig>>
CloudWatch Synthetics now supports multibrowser canaries for syn-nodejs-puppeteer-11.0
and syn-nodejs-playwright-3.0
runtimes. This feature allows you to run your canaries on both Firefox and Chrome browsers. To create a multibrowser canary, you need to specify the BrowserConfigs with a list of browsers you want to use.
If not specified, browserConfigs
defaults to Chrome.
A list of key-value pairs to associate with the canary. You can associate as many as 50 tags with a canary.
Tags can help you organize and categorize your resources. You can also use them to scope user permissions, by granting a user permission to access or change only the resources that have certain tag values.
To have the tags that you apply to this canary also be applied to the Lambda function that the canary uses, specify this parameter with the value lambda-function
.
artifact_config: Option<ArtifactConfigInput>
A structure that contains the configuration for canary artifacts, including the encryption-at-rest settings for artifacts that the canary uploads to Amazon S3.
Implementations§
Source§impl CreateCanaryInput
impl CreateCanaryInput
Sourcepub fn name(&self) -> Option<&str>
pub fn name(&self) -> Option<&str>
The name for this canary. Be sure to give it a descriptive name that distinguishes it from other canaries in your account.
Do not include secrets or proprietary information in your canary names. The canary name makes up part of the canary ARN, and the ARN is included in outbound calls over the internet. For more information, see Security Considerations for Synthetics Canaries.
Sourcepub fn code(&self) -> Option<&CanaryCodeInput>
pub fn code(&self) -> Option<&CanaryCodeInput>
A structure that includes the entry point from which the canary should start running your script. If the script is stored in an Amazon S3 bucket, the bucket name, key, and version are also included.
Sourcepub fn artifact_s3_location(&self) -> Option<&str>
pub fn artifact_s3_location(&self) -> Option<&str>
The location in Amazon S3 where Synthetics stores artifacts from the test runs of this canary. Artifacts include the log file, screenshots, and HAR files. The name of the Amazon S3 bucket can't include a period (.).
Sourcepub fn execution_role_arn(&self) -> Option<&str>
pub fn execution_role_arn(&self) -> Option<&str>
The ARN of the IAM role to be used to run the canary. This role must already exist, and must include lambda.amazonaws.com
as a principal in the trust policy. The role must also have the following permissions:
-
s3:PutObject
-
s3:GetBucketLocation
-
s3:ListAllMyBuckets
-
cloudwatch:PutMetricData
-
logs:CreateLogGroup
-
logs:CreateLogStream
-
logs:PutLogEvents
Sourcepub fn schedule(&self) -> Option<&CanaryScheduleInput>
pub fn schedule(&self) -> Option<&CanaryScheduleInput>
A structure that contains information about how often the canary is to run and when these test runs are to stop.
Sourcepub fn run_config(&self) -> Option<&CanaryRunConfigInput>
pub fn run_config(&self) -> Option<&CanaryRunConfigInput>
A structure that contains the configuration for individual canary runs, such as timeout value and environment variables.
Environment variable keys and values are encrypted at rest using Amazon Web Services owned KMS keys. However, the environment variables are not encrypted on the client side. Do not store sensitive information in them.
Sourcepub fn success_retention_period_in_days(&self) -> Option<i32>
pub fn success_retention_period_in_days(&self) -> Option<i32>
The number of days to retain data about successful runs of this canary. If you omit this field, the default of 31 days is used. The valid range is 1 to 455 days.
This setting affects the range of information returned by GetCanaryRuns, as well as the range of information displayed in the Synthetics console.
Sourcepub fn failure_retention_period_in_days(&self) -> Option<i32>
pub fn failure_retention_period_in_days(&self) -> Option<i32>
The number of days to retain data about failed runs of this canary. If you omit this field, the default of 31 days is used. The valid range is 1 to 455 days.
This setting affects the range of information returned by GetCanaryRuns, as well as the range of information displayed in the Synthetics console.
Sourcepub fn runtime_version(&self) -> Option<&str>
pub fn runtime_version(&self) -> Option<&str>
Specifies the runtime version to use for the canary. For a list of valid runtime versions and more information about runtime versions, see Canary Runtime Versions.
Sourcepub fn vpc_config(&self) -> Option<&VpcConfigInput>
pub fn vpc_config(&self) -> Option<&VpcConfigInput>
If this canary is to test an endpoint in a VPC, this structure contains information about the subnet and security groups of the VPC endpoint. For more information, see Running a Canary in a VPC.
To have the tags that you apply to this canary also be applied to the Lambda function that the canary uses, specify this parameter with the value lambda-function
.
If you specify this parameter and don't specify any tags in the Tags
parameter, the canary creation fails.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .resources_to_replicate_tags.is_none()
.
Sourcepub fn provisioned_resource_cleanup(
&self,
) -> Option<&ProvisionedResourceCleanupSetting>
pub fn provisioned_resource_cleanup( &self, ) -> Option<&ProvisionedResourceCleanupSetting>
Specifies whether to also delete the Lambda functions and layers used by this canary when the canary is deleted. If you omit this parameter, the default of AUTOMATIC
is used, which means that the Lambda functions and layers will be deleted when the canary is deleted.
If the value of this parameter is OFF
, then the value of the DeleteLambda
parameter of the DeleteCanary operation determines whether the Lambda functions and layers will be deleted.
Sourcepub fn browser_configs(&self) -> &[BrowserConfig]
pub fn browser_configs(&self) -> &[BrowserConfig]
CloudWatch Synthetics now supports multibrowser canaries for syn-nodejs-puppeteer-11.0
and syn-nodejs-playwright-3.0
runtimes. This feature allows you to run your canaries on both Firefox and Chrome browsers. To create a multibrowser canary, you need to specify the BrowserConfigs with a list of browsers you want to use.
If not specified, browserConfigs
defaults to Chrome.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .browser_configs.is_none()
.
A list of key-value pairs to associate with the canary. You can associate as many as 50 tags with a canary.
Tags can help you organize and categorize your resources. You can also use them to scope user permissions, by granting a user permission to access or change only the resources that have certain tag values.
To have the tags that you apply to this canary also be applied to the Lambda function that the canary uses, specify this parameter with the value lambda-function
.
Sourcepub fn artifact_config(&self) -> Option<&ArtifactConfigInput>
pub fn artifact_config(&self) -> Option<&ArtifactConfigInput>
A structure that contains the configuration for canary artifacts, including the encryption-at-rest settings for artifacts that the canary uploads to Amazon S3.
Source§impl CreateCanaryInput
impl CreateCanaryInput
Sourcepub fn builder() -> CreateCanaryInputBuilder
pub fn builder() -> CreateCanaryInputBuilder
Creates a new builder-style object to manufacture CreateCanaryInput
.
Trait Implementations§
Source§impl Clone for CreateCanaryInput
impl Clone for CreateCanaryInput
Source§fn clone(&self) -> CreateCanaryInput
fn clone(&self) -> CreateCanaryInput
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreSource§impl Debug for CreateCanaryInput
impl Debug for CreateCanaryInput
Source§impl PartialEq for CreateCanaryInput
impl PartialEq for CreateCanaryInput
impl StructuralPartialEq for CreateCanaryInput
Auto Trait Implementations§
impl Freeze for CreateCanaryInput
impl RefUnwindSafe for CreateCanaryInput
impl Send for CreateCanaryInput
impl Sync for CreateCanaryInput
impl Unpin for CreateCanaryInput
impl UnwindSafe for CreateCanaryInput
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<T> Instrument for T
impl<T> Instrument for T
Source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
Source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moreSource§impl<T> Paint for Twhere
T: ?Sized,
impl<T> Paint for Twhere
T: ?Sized,
Source§fn fg(&self, value: Color) -> Painted<&T>
fn fg(&self, value: Color) -> Painted<&T>
Returns a styled value derived from self
with the foreground set to
value
.
This method should be used rarely. Instead, prefer to use color-specific
builder methods like red()
and
green()
, which have the same functionality but are
pithier.
§Example
Set foreground color to white using fg()
:
use yansi::{Paint, Color};
painted.fg(Color::White);
Set foreground color to white using white()
.
use yansi::Paint;
painted.white();
Source§fn bright_black(&self) -> Painted<&T>
fn bright_black(&self) -> Painted<&T>
Source§fn bright_red(&self) -> Painted<&T>
fn bright_red(&self) -> Painted<&T>
Source§fn bright_green(&self) -> Painted<&T>
fn bright_green(&self) -> Painted<&T>
Source§fn bright_yellow(&self) -> Painted<&T>
fn bright_yellow(&self) -> Painted<&T>
Source§fn bright_blue(&self) -> Painted<&T>
fn bright_blue(&self) -> Painted<&T>
Source§fn bright_magenta(&self) -> Painted<&T>
fn bright_magenta(&self) -> Painted<&T>
Source§fn bright_cyan(&self) -> Painted<&T>
fn bright_cyan(&self) -> Painted<&T>
Source§fn bright_white(&self) -> Painted<&T>
fn bright_white(&self) -> Painted<&T>
Source§fn bg(&self, value: Color) -> Painted<&T>
fn bg(&self, value: Color) -> Painted<&T>
Returns a styled value derived from self
with the background set to
value
.
This method should be used rarely. Instead, prefer to use color-specific
builder methods like on_red()
and
on_green()
, which have the same functionality but
are pithier.
§Example
Set background color to red using fg()
:
use yansi::{Paint, Color};
painted.bg(Color::Red);
Set background color to red using on_red()
.
use yansi::Paint;
painted.on_red();
Source§fn on_primary(&self) -> Painted<&T>
fn on_primary(&self) -> Painted<&T>
Source§fn on_magenta(&self) -> Painted<&T>
fn on_magenta(&self) -> Painted<&T>
Source§fn on_bright_black(&self) -> Painted<&T>
fn on_bright_black(&self) -> Painted<&T>
Source§fn on_bright_red(&self) -> Painted<&T>
fn on_bright_red(&self) -> Painted<&T>
Source§fn on_bright_green(&self) -> Painted<&T>
fn on_bright_green(&self) -> Painted<&T>
Source§fn on_bright_yellow(&self) -> Painted<&T>
fn on_bright_yellow(&self) -> Painted<&T>
Source§fn on_bright_blue(&self) -> Painted<&T>
fn on_bright_blue(&self) -> Painted<&T>
Source§fn on_bright_magenta(&self) -> Painted<&T>
fn on_bright_magenta(&self) -> Painted<&T>
Source§fn on_bright_cyan(&self) -> Painted<&T>
fn on_bright_cyan(&self) -> Painted<&T>
Source§fn on_bright_white(&self) -> Painted<&T>
fn on_bright_white(&self) -> Painted<&T>
Source§fn attr(&self, value: Attribute) -> Painted<&T>
fn attr(&self, value: Attribute) -> Painted<&T>
Enables the styling Attribute
value
.
This method should be used rarely. Instead, prefer to use
attribute-specific builder methods like bold()
and
underline()
, which have the same functionality
but are pithier.
§Example
Make text bold using attr()
:
use yansi::{Paint, Attribute};
painted.attr(Attribute::Bold);
Make text bold using using bold()
.
use yansi::Paint;
painted.bold();
Source§fn rapid_blink(&self) -> Painted<&T>
fn rapid_blink(&self) -> Painted<&T>
Source§fn quirk(&self, value: Quirk) -> Painted<&T>
fn quirk(&self, value: Quirk) -> Painted<&T>
Enables the yansi
Quirk
value
.
This method should be used rarely. Instead, prefer to use quirk-specific
builder methods like mask()
and
wrap()
, which have the same functionality but are
pithier.
§Example
Enable wrapping using .quirk()
:
use yansi::{Paint, Quirk};
painted.quirk(Quirk::Wrap);
Enable wrapping using wrap()
.
use yansi::Paint;
painted.wrap();
Source§fn clear(&self) -> Painted<&T>
👎Deprecated since 1.0.1: renamed to resetting()
due to conflicts with Vec::clear()
.
The clear()
method will be removed in a future release.
fn clear(&self) -> Painted<&T>
resetting()
due to conflicts with Vec::clear()
.
The clear()
method will be removed in a future release.Source§fn whenever(&self, value: Condition) -> Painted<&T>
fn whenever(&self, value: Condition) -> Painted<&T>
Conditionally enable styling based on whether the Condition
value
applies. Replaces any previous condition.
See the crate level docs for more details.
§Example
Enable styling painted
only when both stdout
and stderr
are TTYs:
use yansi::{Paint, Condition};
painted.red().on_yellow().whenever(Condition::STDOUTERR_ARE_TTY);