// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
pub use crate::operation::update_security_hub_configuration::_update_security_hub_configuration_input::UpdateSecurityHubConfigurationInputBuilder;
pub use crate::operation::update_security_hub_configuration::_update_security_hub_configuration_output::UpdateSecurityHubConfigurationOutputBuilder;
impl crate::operation::update_security_hub_configuration::builders::UpdateSecurityHubConfigurationInputBuilder {
/// Sends a request with this input using the given client.
pub async fn send_with(
self,
client: &crate::Client,
) -> ::std::result::Result<
crate::operation::update_security_hub_configuration::UpdateSecurityHubConfigurationOutput,
::aws_smithy_runtime_api::client::result::SdkError<
crate::operation::update_security_hub_configuration::UpdateSecurityHubConfigurationError,
::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
>,
> {
let mut fluent_builder = client.update_security_hub_configuration();
fluent_builder.inner = self;
fluent_builder.send().await
}
}
/// Fluent builder constructing a request to `UpdateSecurityHubConfiguration`.
///
/// <p>Updates configuration options for Security Hub CSPM.</p>
#[derive(::std::clone::Clone, ::std::fmt::Debug)]
pub struct UpdateSecurityHubConfigurationFluentBuilder {
handle: ::std::sync::Arc<crate::client::Handle>,
inner: crate::operation::update_security_hub_configuration::builders::UpdateSecurityHubConfigurationInputBuilder,
config_override: ::std::option::Option<crate::config::Builder>,
}
impl
crate::client::customize::internal::CustomizableSend<
crate::operation::update_security_hub_configuration::UpdateSecurityHubConfigurationOutput,
crate::operation::update_security_hub_configuration::UpdateSecurityHubConfigurationError,
> for UpdateSecurityHubConfigurationFluentBuilder
{
fn send(
self,
config_override: crate::config::Builder,
) -> crate::client::customize::internal::BoxFuture<
crate::client::customize::internal::SendResult<
crate::operation::update_security_hub_configuration::UpdateSecurityHubConfigurationOutput,
crate::operation::update_security_hub_configuration::UpdateSecurityHubConfigurationError,
>,
> {
::std::boxed::Box::pin(async move { self.config_override(config_override).send().await })
}
}
impl UpdateSecurityHubConfigurationFluentBuilder {
/// Creates a new `UpdateSecurityHubConfigurationFluentBuilder`.
pub(crate) fn new(handle: ::std::sync::Arc<crate::client::Handle>) -> Self {
Self {
handle,
inner: ::std::default::Default::default(),
config_override: ::std::option::Option::None,
}
}
/// Access the UpdateSecurityHubConfiguration as a reference.
pub fn as_input(&self) -> &crate::operation::update_security_hub_configuration::builders::UpdateSecurityHubConfigurationInputBuilder {
&self.inner
}
/// Sends the request and returns the response.
///
/// If an error occurs, an `SdkError` will be returned with additional details that
/// can be matched against.
///
/// By default, any retryable failures will be retried twice. Retry behavior
/// is configurable with the [RetryConfig](aws_smithy_types::retry::RetryConfig), which can be
/// set when configuring the client.
pub async fn send(
self,
) -> ::std::result::Result<
crate::operation::update_security_hub_configuration::UpdateSecurityHubConfigurationOutput,
::aws_smithy_runtime_api::client::result::SdkError<
crate::operation::update_security_hub_configuration::UpdateSecurityHubConfigurationError,
::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
>,
> {
let input = self
.inner
.build()
.map_err(::aws_smithy_runtime_api::client::result::SdkError::construction_failure)?;
let runtime_plugins = crate::operation::update_security_hub_configuration::UpdateSecurityHubConfiguration::operation_runtime_plugins(
self.handle.runtime_plugins.clone(),
&self.handle.conf,
self.config_override,
);
crate::operation::update_security_hub_configuration::UpdateSecurityHubConfiguration::orchestrate(&runtime_plugins, input).await
}
/// Consumes this builder, creating a customizable operation that can be modified before being sent.
pub fn customize(
self,
) -> crate::client::customize::CustomizableOperation<
crate::operation::update_security_hub_configuration::UpdateSecurityHubConfigurationOutput,
crate::operation::update_security_hub_configuration::UpdateSecurityHubConfigurationError,
Self,
> {
crate::client::customize::CustomizableOperation::new(self)
}
pub(crate) fn config_override(mut self, config_override: impl ::std::convert::Into<crate::config::Builder>) -> Self {
self.set_config_override(::std::option::Option::Some(config_override.into()));
self
}
pub(crate) fn set_config_override(&mut self, config_override: ::std::option::Option<crate::config::Builder>) -> &mut Self {
self.config_override = config_override;
self
}
/// <p>Whether to automatically enable new controls when they are added to standards that are enabled.</p>
/// <p>By default, this is set to <code>true</code>, and new controls are enabled automatically. To not automatically enable new controls, set this to <code>false</code>.</p>
/// <p>When you automatically enable new controls, you can interact with the controls in the console and programmatically immediately after release. However, automatically enabled controls have a temporary default status of <code>DISABLED</code>. It can take up to several days for Security Hub CSPM to process the control release and designate the control as <code>ENABLED</code> in your account. During the processing period, you can manually enable or disable a control, and Security Hub CSPM will maintain that designation regardless of whether you have <code>AutoEnableControls</code> set to <code>true</code>.</p>
pub fn auto_enable_controls(mut self, input: bool) -> Self {
self.inner = self.inner.auto_enable_controls(input);
self
}
/// <p>Whether to automatically enable new controls when they are added to standards that are enabled.</p>
/// <p>By default, this is set to <code>true</code>, and new controls are enabled automatically. To not automatically enable new controls, set this to <code>false</code>.</p>
/// <p>When you automatically enable new controls, you can interact with the controls in the console and programmatically immediately after release. However, automatically enabled controls have a temporary default status of <code>DISABLED</code>. It can take up to several days for Security Hub CSPM to process the control release and designate the control as <code>ENABLED</code> in your account. During the processing period, you can manually enable or disable a control, and Security Hub CSPM will maintain that designation regardless of whether you have <code>AutoEnableControls</code> set to <code>true</code>.</p>
pub fn set_auto_enable_controls(mut self, input: ::std::option::Option<bool>) -> Self {
self.inner = self.inner.set_auto_enable_controls(input);
self
}
/// <p>Whether to automatically enable new controls when they are added to standards that are enabled.</p>
/// <p>By default, this is set to <code>true</code>, and new controls are enabled automatically. To not automatically enable new controls, set this to <code>false</code>.</p>
/// <p>When you automatically enable new controls, you can interact with the controls in the console and programmatically immediately after release. However, automatically enabled controls have a temporary default status of <code>DISABLED</code>. It can take up to several days for Security Hub CSPM to process the control release and designate the control as <code>ENABLED</code> in your account. During the processing period, you can manually enable or disable a control, and Security Hub CSPM will maintain that designation regardless of whether you have <code>AutoEnableControls</code> set to <code>true</code>.</p>
pub fn get_auto_enable_controls(&self) -> &::std::option::Option<bool> {
self.inner.get_auto_enable_controls()
}
/// <p>Updates whether the calling account has consolidated control findings turned on. If the value for this field is set to <code>SECURITY_CONTROL</code>, Security Hub CSPM generates a single finding for a control check even when the check applies to multiple enabled standards.</p>
/// <p>If the value for this field is set to <code>STANDARD_CONTROL</code>, Security Hub CSPM generates separate findings for a control check when the check applies to multiple enabled standards.</p>
/// <p>For accounts that are part of an organization, this value can only be updated in the administrator account.</p>
pub fn control_finding_generator(mut self, input: crate::types::ControlFindingGenerator) -> Self {
self.inner = self.inner.control_finding_generator(input);
self
}
/// <p>Updates whether the calling account has consolidated control findings turned on. If the value for this field is set to <code>SECURITY_CONTROL</code>, Security Hub CSPM generates a single finding for a control check even when the check applies to multiple enabled standards.</p>
/// <p>If the value for this field is set to <code>STANDARD_CONTROL</code>, Security Hub CSPM generates separate findings for a control check when the check applies to multiple enabled standards.</p>
/// <p>For accounts that are part of an organization, this value can only be updated in the administrator account.</p>
pub fn set_control_finding_generator(mut self, input: ::std::option::Option<crate::types::ControlFindingGenerator>) -> Self {
self.inner = self.inner.set_control_finding_generator(input);
self
}
/// <p>Updates whether the calling account has consolidated control findings turned on. If the value for this field is set to <code>SECURITY_CONTROL</code>, Security Hub CSPM generates a single finding for a control check even when the check applies to multiple enabled standards.</p>
/// <p>If the value for this field is set to <code>STANDARD_CONTROL</code>, Security Hub CSPM generates separate findings for a control check when the check applies to multiple enabled standards.</p>
/// <p>For accounts that are part of an organization, this value can only be updated in the administrator account.</p>
pub fn get_control_finding_generator(&self) -> &::std::option::Option<crate::types::ControlFindingGenerator> {
self.inner.get_control_finding_generator()
}
}