// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
pub use crate::operation::put_permission::_put_permission_input::PutPermissionInputBuilder;
pub use crate::operation::put_permission::_put_permission_output::PutPermissionOutputBuilder;
impl crate::operation::put_permission::builders::PutPermissionInputBuilder {
/// Sends a request with this input using the given client.
pub async fn send_with(
self,
client: &crate::Client,
) -> ::std::result::Result<
crate::operation::put_permission::PutPermissionOutput,
::aws_smithy_runtime_api::client::result::SdkError<
crate::operation::put_permission::PutPermissionError,
::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
>,
> {
let mut fluent_builder = client.put_permission();
fluent_builder.inner = self;
fluent_builder.send().await
}
}
/// Fluent builder constructing a request to `PutPermission`.
///
/// <p>Adds permissions to a profiling group's resource-based policy that are provided using an action group. If a profiling group doesn't have a resource-based policy, one is created for it using the permissions in the action group and the roles and users in the <code>principals</code> parameter.</p>
/// <p>The one supported action group that can be added is <code>agentPermission</code> which grants <code>ConfigureAgent</code> and <code>PostAgent</code> permissions. For more information, see <a href="https://docs.aws.amazon.com/codeguru/latest/profiler-ug/resource-based-policies.html">Resource-based policies in CodeGuru Profiler</a> in the <i>Amazon CodeGuru Profiler User Guide</i>, <a href="https://docs.aws.amazon.com/codeguru/latest/profiler-api/API_ConfigureAgent.html"> <code>ConfigureAgent</code> </a>, and <a href="https://docs.aws.amazon.com/codeguru/latest/profiler-api/API_PostAgentProfile.html"> <code>PostAgentProfile</code> </a>.</p>
/// <p>The first time you call <code>PutPermission</code> on a profiling group, do not specify a <code>revisionId</code> because it doesn't have a resource-based policy. Subsequent calls must provide a <code>revisionId</code> to specify which revision of the resource-based policy to add the permissions to.</p>
/// <p>The response contains the profiling group's JSON-formatted resource policy.</p>
#[derive(::std::clone::Clone, ::std::fmt::Debug)]
pub struct PutPermissionFluentBuilder {
handle: ::std::sync::Arc<crate::client::Handle>,
inner: crate::operation::put_permission::builders::PutPermissionInputBuilder,
config_override: ::std::option::Option<crate::config::Builder>,
}
impl
crate::client::customize::internal::CustomizableSend<
crate::operation::put_permission::PutPermissionOutput,
crate::operation::put_permission::PutPermissionError,
> for PutPermissionFluentBuilder
{
fn send(
self,
config_override: crate::config::Builder,
) -> crate::client::customize::internal::BoxFuture<
crate::client::customize::internal::SendResult<
crate::operation::put_permission::PutPermissionOutput,
crate::operation::put_permission::PutPermissionError,
>,
> {
::std::boxed::Box::pin(async move { self.config_override(config_override).send().await })
}
}
impl PutPermissionFluentBuilder {
/// Creates a new `PutPermissionFluentBuilder`.
pub(crate) fn new(handle: ::std::sync::Arc<crate::client::Handle>) -> Self {
Self {
handle,
inner: ::std::default::Default::default(),
config_override: ::std::option::Option::None,
}
}
/// Access the PutPermission as a reference.
pub fn as_input(&self) -> &crate::operation::put_permission::builders::PutPermissionInputBuilder {
&self.inner
}
/// Sends the request and returns the response.
///
/// If an error occurs, an `SdkError` will be returned with additional details that
/// can be matched against.
///
/// By default, any retryable failures will be retried twice. Retry behavior
/// is configurable with the [RetryConfig](aws_smithy_types::retry::RetryConfig), which can be
/// set when configuring the client.
pub async fn send(
self,
) -> ::std::result::Result<
crate::operation::put_permission::PutPermissionOutput,
::aws_smithy_runtime_api::client::result::SdkError<
crate::operation::put_permission::PutPermissionError,
::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
>,
> {
let input = self
.inner
.build()
.map_err(::aws_smithy_runtime_api::client::result::SdkError::construction_failure)?;
let runtime_plugins = crate::operation::put_permission::PutPermission::operation_runtime_plugins(
self.handle.runtime_plugins.clone(),
&self.handle.conf,
self.config_override,
);
crate::operation::put_permission::PutPermission::orchestrate(&runtime_plugins, input).await
}
/// Consumes this builder, creating a customizable operation that can be modified before being sent.
pub fn customize(
self,
) -> crate::client::customize::CustomizableOperation<
crate::operation::put_permission::PutPermissionOutput,
crate::operation::put_permission::PutPermissionError,
Self,
> {
crate::client::customize::CustomizableOperation::new(self)
}
pub(crate) fn config_override(mut self, config_override: impl ::std::convert::Into<crate::config::Builder>) -> Self {
self.set_config_override(::std::option::Option::Some(config_override.into()));
self
}
pub(crate) fn set_config_override(&mut self, config_override: ::std::option::Option<crate::config::Builder>) -> &mut Self {
self.config_override = config_override;
self
}
/// <p>The name of the profiling group to grant access to.</p>
pub fn profiling_group_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
self.inner = self.inner.profiling_group_name(input.into());
self
}
/// <p>The name of the profiling group to grant access to.</p>
pub fn set_profiling_group_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
self.inner = self.inner.set_profiling_group_name(input);
self
}
/// <p>The name of the profiling group to grant access to.</p>
pub fn get_profiling_group_name(&self) -> &::std::option::Option<::std::string::String> {
self.inner.get_profiling_group_name()
}
/// <p>Specifies an action group that contains permissions to add to a profiling group resource. One action group is supported, <code>agentPermissions</code>, which grants permission to perform actions required by the profiling agent, <code>ConfigureAgent</code> and <code>PostAgentProfile</code> permissions.</p>
pub fn action_group(mut self, input: crate::types::ActionGroup) -> Self {
self.inner = self.inner.action_group(input);
self
}
/// <p>Specifies an action group that contains permissions to add to a profiling group resource. One action group is supported, <code>agentPermissions</code>, which grants permission to perform actions required by the profiling agent, <code>ConfigureAgent</code> and <code>PostAgentProfile</code> permissions.</p>
pub fn set_action_group(mut self, input: ::std::option::Option<crate::types::ActionGroup>) -> Self {
self.inner = self.inner.set_action_group(input);
self
}
/// <p>Specifies an action group that contains permissions to add to a profiling group resource. One action group is supported, <code>agentPermissions</code>, which grants permission to perform actions required by the profiling agent, <code>ConfigureAgent</code> and <code>PostAgentProfile</code> permissions.</p>
pub fn get_action_group(&self) -> &::std::option::Option<crate::types::ActionGroup> {
self.inner.get_action_group()
}
///
/// Appends an item to `principals`.
///
/// To override the contents of this collection use [`set_principals`](Self::set_principals).
///
/// <p>A list ARNs for the roles and users you want to grant access to the profiling group. Wildcards are not are supported in the ARNs.</p>
pub fn principals(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
self.inner = self.inner.principals(input.into());
self
}
/// <p>A list ARNs for the roles and users you want to grant access to the profiling group. Wildcards are not are supported in the ARNs.</p>
pub fn set_principals(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self {
self.inner = self.inner.set_principals(input);
self
}
/// <p>A list ARNs for the roles and users you want to grant access to the profiling group. Wildcards are not are supported in the ARNs.</p>
pub fn get_principals(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> {
self.inner.get_principals()
}
/// <p>A universally unique identifier (UUID) for the revision of the policy you are adding to the profiling group. Do not specify this when you add permissions to a profiling group for the first time. If a policy already exists on the profiling group, you must specify the <code>revisionId</code>.</p>
pub fn revision_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
self.inner = self.inner.revision_id(input.into());
self
}
/// <p>A universally unique identifier (UUID) for the revision of the policy you are adding to the profiling group. Do not specify this when you add permissions to a profiling group for the first time. If a policy already exists on the profiling group, you must specify the <code>revisionId</code>.</p>
pub fn set_revision_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
self.inner = self.inner.set_revision_id(input);
self
}
/// <p>A universally unique identifier (UUID) for the revision of the policy you are adding to the profiling group. Do not specify this when you add permissions to a profiling group for the first time. If a policy already exists on the profiling group, you must specify the <code>revisionId</code>.</p>
pub fn get_revision_id(&self) -> &::std::option::Option<::std::string::String> {
self.inner.get_revision_id()
}
}