Struct aws_sdk_workmail::operation::put_access_control_rule::builders::PutAccessControlRuleFluentBuilder
source · pub struct PutAccessControlRuleFluentBuilder { /* private fields */ }
Expand description
Fluent builder constructing a request to PutAccessControlRule
.
Adds a new access control rule for the specified organization. The rule allows or denies access to the organization for the specified IPv4 addresses, access protocol actions, user IDs and impersonation IDs. Adding a new rule with the same name as an existing rule replaces the older rule.
Implementations§
source§impl PutAccessControlRuleFluentBuilder
impl PutAccessControlRuleFluentBuilder
sourcepub fn as_input(&self) -> &PutAccessControlRuleInputBuilder
pub fn as_input(&self) -> &PutAccessControlRuleInputBuilder
Access the PutAccessControlRule as a reference.
sourcepub async fn send(
self
) -> Result<PutAccessControlRuleOutput, SdkError<PutAccessControlRuleError, HttpResponse>>
pub async fn send( self ) -> Result<PutAccessControlRuleOutput, SdkError<PutAccessControlRuleError, HttpResponse>>
Sends the request and returns the response.
If an error occurs, an SdkError
will be returned with additional details that
can be matched against.
By default, any retryable failures will be retried twice. Retry behavior is configurable with the RetryConfig, which can be set when configuring the client.
sourcepub fn customize(
self
) -> CustomizableOperation<PutAccessControlRuleOutput, PutAccessControlRuleError, Self>
pub fn customize( self ) -> CustomizableOperation<PutAccessControlRuleOutput, PutAccessControlRuleError, Self>
Consumes this builder, creating a customizable operation that can be modified before being sent.
sourcepub fn effect(self, input: AccessControlRuleEffect) -> Self
pub fn effect(self, input: AccessControlRuleEffect) -> Self
The rule effect.
sourcepub fn set_effect(self, input: Option<AccessControlRuleEffect>) -> Self
pub fn set_effect(self, input: Option<AccessControlRuleEffect>) -> Self
The rule effect.
sourcepub fn get_effect(&self) -> &Option<AccessControlRuleEffect>
pub fn get_effect(&self) -> &Option<AccessControlRuleEffect>
The rule effect.
sourcepub fn description(self, input: impl Into<String>) -> Self
pub fn description(self, input: impl Into<String>) -> Self
The rule description.
sourcepub fn set_description(self, input: Option<String>) -> Self
pub fn set_description(self, input: Option<String>) -> Self
The rule description.
sourcepub fn get_description(&self) -> &Option<String>
pub fn get_description(&self) -> &Option<String>
The rule description.
sourcepub fn ip_ranges(self, input: impl Into<String>) -> Self
pub fn ip_ranges(self, input: impl Into<String>) -> Self
Appends an item to IpRanges
.
To override the contents of this collection use set_ip_ranges
.
IPv4 CIDR ranges to include in the rule.
sourcepub fn set_ip_ranges(self, input: Option<Vec<String>>) -> Self
pub fn set_ip_ranges(self, input: Option<Vec<String>>) -> Self
IPv4 CIDR ranges to include in the rule.
sourcepub fn get_ip_ranges(&self) -> &Option<Vec<String>>
pub fn get_ip_ranges(&self) -> &Option<Vec<String>>
IPv4 CIDR ranges to include in the rule.
sourcepub fn not_ip_ranges(self, input: impl Into<String>) -> Self
pub fn not_ip_ranges(self, input: impl Into<String>) -> Self
Appends an item to NotIpRanges
.
To override the contents of this collection use set_not_ip_ranges
.
IPv4 CIDR ranges to exclude from the rule.
sourcepub fn set_not_ip_ranges(self, input: Option<Vec<String>>) -> Self
pub fn set_not_ip_ranges(self, input: Option<Vec<String>>) -> Self
IPv4 CIDR ranges to exclude from the rule.
sourcepub fn get_not_ip_ranges(&self) -> &Option<Vec<String>>
pub fn get_not_ip_ranges(&self) -> &Option<Vec<String>>
IPv4 CIDR ranges to exclude from the rule.
sourcepub fn actions(self, input: impl Into<String>) -> Self
pub fn actions(self, input: impl Into<String>) -> Self
Appends an item to Actions
.
To override the contents of this collection use set_actions
.
Access protocol actions to include in the rule. Valid values include ActiveSync
, AutoDiscover
, EWS
, IMAP
, SMTP
, WindowsOutlook
, and WebMail
.
sourcepub fn set_actions(self, input: Option<Vec<String>>) -> Self
pub fn set_actions(self, input: Option<Vec<String>>) -> Self
Access protocol actions to include in the rule. Valid values include ActiveSync
, AutoDiscover
, EWS
, IMAP
, SMTP
, WindowsOutlook
, and WebMail
.
sourcepub fn get_actions(&self) -> &Option<Vec<String>>
pub fn get_actions(&self) -> &Option<Vec<String>>
Access protocol actions to include in the rule. Valid values include ActiveSync
, AutoDiscover
, EWS
, IMAP
, SMTP
, WindowsOutlook
, and WebMail
.
sourcepub fn not_actions(self, input: impl Into<String>) -> Self
pub fn not_actions(self, input: impl Into<String>) -> Self
Appends an item to NotActions
.
To override the contents of this collection use set_not_actions
.
Access protocol actions to exclude from the rule. Valid values include ActiveSync
, AutoDiscover
, EWS
, IMAP
, SMTP
, WindowsOutlook
, and WebMail
.
sourcepub fn set_not_actions(self, input: Option<Vec<String>>) -> Self
pub fn set_not_actions(self, input: Option<Vec<String>>) -> Self
Access protocol actions to exclude from the rule. Valid values include ActiveSync
, AutoDiscover
, EWS
, IMAP
, SMTP
, WindowsOutlook
, and WebMail
.
sourcepub fn get_not_actions(&self) -> &Option<Vec<String>>
pub fn get_not_actions(&self) -> &Option<Vec<String>>
Access protocol actions to exclude from the rule. Valid values include ActiveSync
, AutoDiscover
, EWS
, IMAP
, SMTP
, WindowsOutlook
, and WebMail
.
sourcepub fn user_ids(self, input: impl Into<String>) -> Self
pub fn user_ids(self, input: impl Into<String>) -> Self
Appends an item to UserIds
.
To override the contents of this collection use set_user_ids
.
User IDs to include in the rule.
sourcepub fn set_user_ids(self, input: Option<Vec<String>>) -> Self
pub fn set_user_ids(self, input: Option<Vec<String>>) -> Self
User IDs to include in the rule.
sourcepub fn get_user_ids(&self) -> &Option<Vec<String>>
pub fn get_user_ids(&self) -> &Option<Vec<String>>
User IDs to include in the rule.
sourcepub fn not_user_ids(self, input: impl Into<String>) -> Self
pub fn not_user_ids(self, input: impl Into<String>) -> Self
Appends an item to NotUserIds
.
To override the contents of this collection use set_not_user_ids
.
User IDs to exclude from the rule.
sourcepub fn set_not_user_ids(self, input: Option<Vec<String>>) -> Self
pub fn set_not_user_ids(self, input: Option<Vec<String>>) -> Self
User IDs to exclude from the rule.
sourcepub fn get_not_user_ids(&self) -> &Option<Vec<String>>
pub fn get_not_user_ids(&self) -> &Option<Vec<String>>
User IDs to exclude from the rule.
sourcepub fn organization_id(self, input: impl Into<String>) -> Self
pub fn organization_id(self, input: impl Into<String>) -> Self
The identifier of the organization.
sourcepub fn set_organization_id(self, input: Option<String>) -> Self
pub fn set_organization_id(self, input: Option<String>) -> Self
The identifier of the organization.
sourcepub fn get_organization_id(&self) -> &Option<String>
pub fn get_organization_id(&self) -> &Option<String>
The identifier of the organization.
sourcepub fn impersonation_role_ids(self, input: impl Into<String>) -> Self
pub fn impersonation_role_ids(self, input: impl Into<String>) -> Self
Appends an item to ImpersonationRoleIds
.
To override the contents of this collection use set_impersonation_role_ids
.
Impersonation role IDs to include in the rule.
sourcepub fn set_impersonation_role_ids(self, input: Option<Vec<String>>) -> Self
pub fn set_impersonation_role_ids(self, input: Option<Vec<String>>) -> Self
Impersonation role IDs to include in the rule.
sourcepub fn get_impersonation_role_ids(&self) -> &Option<Vec<String>>
pub fn get_impersonation_role_ids(&self) -> &Option<Vec<String>>
Impersonation role IDs to include in the rule.
sourcepub fn not_impersonation_role_ids(self, input: impl Into<String>) -> Self
pub fn not_impersonation_role_ids(self, input: impl Into<String>) -> Self
Appends an item to NotImpersonationRoleIds
.
To override the contents of this collection use set_not_impersonation_role_ids
.
Impersonation role IDs to exclude from the rule.
sourcepub fn set_not_impersonation_role_ids(self, input: Option<Vec<String>>) -> Self
pub fn set_not_impersonation_role_ids(self, input: Option<Vec<String>>) -> Self
Impersonation role IDs to exclude from the rule.
sourcepub fn get_not_impersonation_role_ids(&self) -> &Option<Vec<String>>
pub fn get_not_impersonation_role_ids(&self) -> &Option<Vec<String>>
Impersonation role IDs to exclude from the rule.
Trait Implementations§
source§impl Clone for PutAccessControlRuleFluentBuilder
impl Clone for PutAccessControlRuleFluentBuilder
source§fn clone(&self) -> PutAccessControlRuleFluentBuilder
fn clone(&self) -> PutAccessControlRuleFluentBuilder
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreAuto Trait Implementations§
impl Freeze for PutAccessControlRuleFluentBuilder
impl !RefUnwindSafe for PutAccessControlRuleFluentBuilder
impl Send for PutAccessControlRuleFluentBuilder
impl Sync for PutAccessControlRuleFluentBuilder
impl Unpin for PutAccessControlRuleFluentBuilder
impl !UnwindSafe for PutAccessControlRuleFluentBuilder
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> Instrument for T
impl<T> Instrument for T
source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoEither for T
impl<T> IntoEither for T
source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moresource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more