pub struct DeletePolicyFluentBuilder { /* private fields */ }
Expand description
Fluent builder constructing a request to DeletePolicy
.
Permanently deletes an Firewall Manager policy.
Implementations§
source§impl DeletePolicyFluentBuilder
impl DeletePolicyFluentBuilder
sourcepub fn as_input(&self) -> &DeletePolicyInputBuilder
pub fn as_input(&self) -> &DeletePolicyInputBuilder
Access the DeletePolicy as a reference.
sourcepub async fn send(
self
) -> Result<DeletePolicyOutput, SdkError<DeletePolicyError, HttpResponse>>
pub async fn send( self ) -> Result<DeletePolicyOutput, SdkError<DeletePolicyError, HttpResponse>>
Sends the request and returns the response.
If an error occurs, an SdkError
will be returned with additional details that
can be matched against.
By default, any retryable failures will be retried twice. Retry behavior is configurable with the RetryConfig, which can be set when configuring the client.
sourcepub fn customize(
self
) -> CustomizableOperation<DeletePolicyOutput, DeletePolicyError, Self>
pub fn customize( self ) -> CustomizableOperation<DeletePolicyOutput, DeletePolicyError, Self>
Consumes this builder, creating a customizable operation that can be modified before being sent.
sourcepub fn policy_id(self, input: impl Into<String>) -> Self
pub fn policy_id(self, input: impl Into<String>) -> Self
The ID of the policy that you want to delete. You can retrieve this ID from PutPolicy
and ListPolicies
.
sourcepub fn set_policy_id(self, input: Option<String>) -> Self
pub fn set_policy_id(self, input: Option<String>) -> Self
The ID of the policy that you want to delete. You can retrieve this ID from PutPolicy
and ListPolicies
.
sourcepub fn get_policy_id(&self) -> &Option<String>
pub fn get_policy_id(&self) -> &Option<String>
The ID of the policy that you want to delete. You can retrieve this ID from PutPolicy
and ListPolicies
.
sourcepub fn delete_all_policy_resources(self, input: bool) -> Self
pub fn delete_all_policy_resources(self, input: bool) -> Self
If True
, the request performs cleanup according to the policy type.
For WAF and Shield Advanced policies, the cleanup does the following:
-
Deletes rule groups created by Firewall Manager
-
Removes web ACLs from in-scope resources
-
Deletes web ACLs that contain no rules or rule groups
For security group policies, the cleanup does the following for each security group in the policy:
-
Disassociates the security group from in-scope resources
-
Deletes the security group if it was created through Firewall Manager and if it's no longer associated with any resources through another policy
For security group common policies, even if set to False
, Firewall Manager deletes all security groups created by Firewall Manager that aren't associated with any other resources through another policy.
After the cleanup, in-scope resources are no longer protected by web ACLs in this policy. Protection of out-of-scope resources remains unchanged. Scope is determined by tags that you create and accounts that you associate with the policy. When creating the policy, if you specify that only resources in specific accounts or with specific tags are in scope of the policy, those accounts and resources are handled by the policy. All others are out of scope. If you don't specify tags or accounts, all resources are in scope.
sourcepub fn set_delete_all_policy_resources(self, input: Option<bool>) -> Self
pub fn set_delete_all_policy_resources(self, input: Option<bool>) -> Self
If True
, the request performs cleanup according to the policy type.
For WAF and Shield Advanced policies, the cleanup does the following:
-
Deletes rule groups created by Firewall Manager
-
Removes web ACLs from in-scope resources
-
Deletes web ACLs that contain no rules or rule groups
For security group policies, the cleanup does the following for each security group in the policy:
-
Disassociates the security group from in-scope resources
-
Deletes the security group if it was created through Firewall Manager and if it's no longer associated with any resources through another policy
For security group common policies, even if set to False
, Firewall Manager deletes all security groups created by Firewall Manager that aren't associated with any other resources through another policy.
After the cleanup, in-scope resources are no longer protected by web ACLs in this policy. Protection of out-of-scope resources remains unchanged. Scope is determined by tags that you create and accounts that you associate with the policy. When creating the policy, if you specify that only resources in specific accounts or with specific tags are in scope of the policy, those accounts and resources are handled by the policy. All others are out of scope. If you don't specify tags or accounts, all resources are in scope.
sourcepub fn get_delete_all_policy_resources(&self) -> &Option<bool>
pub fn get_delete_all_policy_resources(&self) -> &Option<bool>
If True
, the request performs cleanup according to the policy type.
For WAF and Shield Advanced policies, the cleanup does the following:
-
Deletes rule groups created by Firewall Manager
-
Removes web ACLs from in-scope resources
-
Deletes web ACLs that contain no rules or rule groups
For security group policies, the cleanup does the following for each security group in the policy:
-
Disassociates the security group from in-scope resources
-
Deletes the security group if it was created through Firewall Manager and if it's no longer associated with any resources through another policy
For security group common policies, even if set to False
, Firewall Manager deletes all security groups created by Firewall Manager that aren't associated with any other resources through another policy.
After the cleanup, in-scope resources are no longer protected by web ACLs in this policy. Protection of out-of-scope resources remains unchanged. Scope is determined by tags that you create and accounts that you associate with the policy. When creating the policy, if you specify that only resources in specific accounts or with specific tags are in scope of the policy, those accounts and resources are handled by the policy. All others are out of scope. If you don't specify tags or accounts, all resources are in scope.
Trait Implementations§
source§impl Clone for DeletePolicyFluentBuilder
impl Clone for DeletePolicyFluentBuilder
source§fn clone(&self) -> DeletePolicyFluentBuilder
fn clone(&self) -> DeletePolicyFluentBuilder
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreAuto Trait Implementations§
impl Freeze for DeletePolicyFluentBuilder
impl !RefUnwindSafe for DeletePolicyFluentBuilder
impl Send for DeletePolicyFluentBuilder
impl Sync for DeletePolicyFluentBuilder
impl Unpin for DeletePolicyFluentBuilder
impl !UnwindSafe for DeletePolicyFluentBuilder
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> Instrument for T
impl<T> Instrument for T
source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoEither for T
impl<T> IntoEither for T
source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moresource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more