#![allow(unused_mut)]
#![allow(unused_variables)]
#![allow(unused_imports)]
#![allow(clippy::redundant_clone)]
pub mod models;
#[derive(Clone)]
pub struct Client {
endpoint: String,
credential: std::sync::Arc<dyn azure_core::auth::TokenCredential>,
scopes: Vec<String>,
pipeline: azure_core::Pipeline,
}
#[derive(Clone)]
pub struct ClientBuilder {
credential: std::sync::Arc<dyn azure_core::auth::TokenCredential>,
endpoint: Option<String>,
scopes: Option<Vec<String>>,
options: azure_core::ClientOptions,
}
pub const DEFAULT_ENDPOINT: &str = azure_core::resource_manager_endpoint::AZURE_PUBLIC_CLOUD;
impl ClientBuilder {
#[doc = "Create a new instance of `ClientBuilder`."]
#[must_use]
pub fn new(credential: std::sync::Arc<dyn azure_core::auth::TokenCredential>) -> Self {
Self {
credential,
endpoint: None,
scopes: None,
options: azure_core::ClientOptions::default(),
}
}
#[doc = "Set the endpoint."]
#[must_use]
pub fn endpoint(mut self, endpoint: impl Into<String>) -> Self {
self.endpoint = Some(endpoint.into());
self
}
#[doc = "Set the scopes."]
#[must_use]
pub fn scopes(mut self, scopes: &[&str]) -> Self {
self.scopes = Some(scopes.iter().map(|scope| (*scope).to_owned()).collect());
self
}
#[doc = "Set the retry options."]
#[must_use]
pub fn retry(mut self, retry: impl Into<azure_core::RetryOptions>) -> Self {
self.options = self.options.retry(retry);
self
}
#[doc = "Set the transport options."]
#[must_use]
pub fn transport(mut self, transport: impl Into<azure_core::TransportOptions>) -> Self {
self.options = self.options.transport(transport);
self
}
#[doc = "Convert the builder into a `Client` instance."]
#[must_use]
pub fn build(self) -> Client {
let endpoint = self.endpoint.unwrap_or_else(|| DEFAULT_ENDPOINT.to_owned());
let scopes = self.scopes.unwrap_or_else(|| vec![format!("{}/", endpoint)]);
Client::new(endpoint, self.credential, scopes, self.options)
}
}
impl Client {
pub(crate) fn endpoint(&self) -> &str {
self.endpoint.as_str()
}
pub(crate) fn token_credential(&self) -> &dyn azure_core::auth::TokenCredential {
self.credential.as_ref()
}
pub(crate) fn scopes(&self) -> Vec<&str> {
self.scopes.iter().map(String::as_str).collect()
}
pub(crate) async fn send(&self, request: &mut azure_core::Request) -> azure_core::Result<azure_core::Response> {
let mut context = azure_core::Context::default();
self.pipeline.send(&mut context, request).await
}
#[doc = "Create a new `ClientBuilder`."]
#[must_use]
pub fn builder(credential: std::sync::Arc<dyn azure_core::auth::TokenCredential>) -> ClientBuilder {
ClientBuilder::new(credential)
}
#[doc = "Create a new `Client`."]
#[must_use]
pub fn new(
endpoint: impl Into<String>,
credential: std::sync::Arc<dyn azure_core::auth::TokenCredential>,
scopes: Vec<String>,
options: azure_core::ClientOptions,
) -> Self {
let endpoint = endpoint.into();
let pipeline = azure_core::Pipeline::new(
option_env!("CARGO_PKG_NAME"),
option_env!("CARGO_PKG_VERSION"),
options,
Vec::new(),
Vec::new(),
);
Self {
endpoint,
credential,
scopes,
pipeline,
}
}
pub fn governance_assignments_client(&self) -> governance_assignments::Client {
governance_assignments::Client(self.clone())
}
pub fn governance_rule_client(&self) -> governance_rule::Client {
governance_rule::Client(self.clone())
}
pub fn governance_rules_client(&self) -> governance_rules::Client {
governance_rules::Client(self.clone())
}
pub fn security_connector_governance_rule_client(&self) -> security_connector_governance_rule::Client {
security_connector_governance_rule::Client(self.clone())
}
pub fn security_connector_governance_rules_client(&self) -> security_connector_governance_rules::Client {
security_connector_governance_rules::Client(self.clone())
}
pub fn security_connector_governance_rules_execute_status_client(&self) -> security_connector_governance_rules_execute_status::Client {
security_connector_governance_rules_execute_status::Client(self.clone())
}
pub fn subscription_governance_rules_execute_status_client(&self) -> subscription_governance_rules_execute_status::Client {
subscription_governance_rules_execute_status::Client(self.clone())
}
}
pub mod governance_rule {
use super::models;
pub struct Client(pub(crate) super::Client);
impl Client {
#[doc = "Get a list of all relevant governanceRules over a subscription level scope"]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `subscription_id`: Azure subscription ID"]
pub fn list(&self, subscription_id: impl Into<String>) -> list::Builder {
list::Builder {
client: self.0.clone(),
subscription_id: subscription_id.into(),
}
}
}
pub mod list {
use super::models;
type Response = models::GovernanceRuleList;
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) subscription_id: String,
}
impl Builder {
pub fn into_stream(self) -> azure_core::Pageable<Response, azure_core::error::Error> {
let make_request = move |continuation: Option<String>| {
let this = self.clone();
async move {
let mut url = azure_core::Url::parse(&format!(
"{}/subscriptions/{}/providers/Microsoft.Security/governanceRules",
this.client.endpoint(),
&this.subscription_id
))?;
let rsp = match continuation {
Some(value) => {
url.set_path("");
url = url.join(&value)?;
let mut req = azure_core::Request::new(url, azure_core::Method::Get);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
let has_api_version_already =
req.url_mut().query_pairs().any(|(k, _)| k == azure_core::query_param::API_VERSION);
if !has_api_version_already {
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
}
let req_body = azure_core::EMPTY_BODY;
req.set_body(req_body);
this.client.send(&mut req).await?
}
None => {
let mut req = azure_core::Request::new(url, azure_core::Method::Get);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
let req_body = azure_core::EMPTY_BODY;
req.set_body(req_body);
this.client.send(&mut req).await?
}
};
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Ok => {
let rsp_body = rsp_stream.collect().await?;
let rsp_value: models::GovernanceRuleList = serde_json::from_slice(&rsp_body)?;
Ok(rsp_value)
}
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
};
azure_core::Pageable::new(make_request)
}
}
}
}
pub mod governance_rules {
use super::models;
pub struct Client(pub(crate) super::Client);
impl Client {
#[doc = "Get a specific governanceRule for the requested scope by ruleId"]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `subscription_id`: Azure subscription ID"]
#[doc = "* `rule_id`: The security GovernanceRule key - unique key for the standard GovernanceRule"]
pub fn get(&self, subscription_id: impl Into<String>, rule_id: impl Into<String>) -> get::Builder {
get::Builder {
client: self.0.clone(),
subscription_id: subscription_id.into(),
rule_id: rule_id.into(),
}
}
#[doc = "Creates or update a security GovernanceRule on the given subscription."]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `subscription_id`: Azure subscription ID"]
#[doc = "* `rule_id`: The security GovernanceRule key - unique key for the standard GovernanceRule"]
#[doc = "* `governance_rule`: GovernanceRule over a subscription scope"]
pub fn create_or_update(
&self,
subscription_id: impl Into<String>,
rule_id: impl Into<String>,
governance_rule: impl Into<models::GovernanceRule>,
) -> create_or_update::Builder {
create_or_update::Builder {
client: self.0.clone(),
subscription_id: subscription_id.into(),
rule_id: rule_id.into(),
governance_rule: governance_rule.into(),
}
}
#[doc = "Delete a GovernanceRule over a given scope"]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `subscription_id`: Azure subscription ID"]
#[doc = "* `rule_id`: The security GovernanceRule key - unique key for the standard GovernanceRule"]
pub fn delete(&self, subscription_id: impl Into<String>, rule_id: impl Into<String>) -> delete::Builder {
delete::Builder {
client: self.0.clone(),
subscription_id: subscription_id.into(),
rule_id: rule_id.into(),
}
}
#[doc = "Execute a security GovernanceRule on the given subscription."]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `subscription_id`: Azure subscription ID"]
#[doc = "* `rule_id`: The security GovernanceRule key - unique key for the standard GovernanceRule"]
pub fn rule_id_execute_single_subscription(
&self,
subscription_id: impl Into<String>,
rule_id: impl Into<String>,
) -> rule_id_execute_single_subscription::Builder {
rule_id_execute_single_subscription::Builder {
client: self.0.clone(),
subscription_id: subscription_id.into(),
rule_id: rule_id.into(),
execute_governance_rule_params: None,
}
}
#[doc = "Execute a security GovernanceRule on the given security connector."]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `subscription_id`: Azure subscription ID"]
#[doc = "* `resource_group_name`: The name of the resource group within the user's subscription. The name is case insensitive."]
#[doc = "* `security_connector_name`: The security connector name."]
#[doc = "* `rule_id`: The security GovernanceRule key - unique key for the standard GovernanceRule"]
pub fn rule_id_execute_single_security_connector(
&self,
subscription_id: impl Into<String>,
resource_group_name: impl Into<String>,
security_connector_name: impl Into<String>,
rule_id: impl Into<String>,
) -> rule_id_execute_single_security_connector::Builder {
rule_id_execute_single_security_connector::Builder {
client: self.0.clone(),
subscription_id: subscription_id.into(),
resource_group_name: resource_group_name.into(),
security_connector_name: security_connector_name.into(),
rule_id: rule_id.into(),
execute_governance_rule_params: None,
}
}
}
pub mod get {
use super::models;
type Response = models::GovernanceRule;
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) subscription_id: String,
pub(crate) rule_id: String,
}
impl Builder {
pub fn into_future(self) -> futures::future::BoxFuture<'static, azure_core::Result<Response>> {
Box::pin({
let this = self.clone();
async move {
let url = azure_core::Url::parse(&format!(
"{}/subscriptions/{}/providers/Microsoft.Security/governanceRules/{}",
this.client.endpoint(),
&this.subscription_id,
&this.rule_id
))?;
let mut req = azure_core::Request::new(url, azure_core::Method::Get);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
let req_body = azure_core::EMPTY_BODY;
req.set_body(req_body);
let rsp = this.client.send(&mut req).await?;
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Ok => {
let rsp_body = rsp_stream.collect().await?;
let rsp_value: models::GovernanceRule = serde_json::from_slice(&rsp_body)?;
Ok(rsp_value)
}
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
})
}
}
}
pub mod create_or_update {
use super::models;
#[derive(Debug)]
pub enum Response {
Created201(models::GovernanceRule),
Ok200(models::GovernanceRule),
}
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) subscription_id: String,
pub(crate) rule_id: String,
pub(crate) governance_rule: models::GovernanceRule,
}
impl Builder {
pub fn into_future(self) -> futures::future::BoxFuture<'static, azure_core::Result<Response>> {
Box::pin({
let this = self.clone();
async move {
let url = azure_core::Url::parse(&format!(
"{}/subscriptions/{}/providers/Microsoft.Security/governanceRules/{}",
this.client.endpoint(),
&this.subscription_id,
&this.rule_id
))?;
let mut req = azure_core::Request::new(url, azure_core::Method::Put);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
req.insert_header("content-type", "application/json");
let req_body = azure_core::to_json(&this.governance_rule)?;
req.set_body(req_body);
let rsp = this.client.send(&mut req).await?;
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Created => {
let rsp_body = rsp_stream.collect().await?;
let rsp_value: models::GovernanceRule = serde_json::from_slice(&rsp_body)?;
Ok(Response::Created201(rsp_value))
}
azure_core::StatusCode::Ok => {
let rsp_body = rsp_stream.collect().await?;
let rsp_value: models::GovernanceRule = serde_json::from_slice(&rsp_body)?;
Ok(Response::Ok200(rsp_value))
}
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
})
}
}
}
pub mod delete {
use super::models;
#[derive(Debug)]
pub enum Response {
Ok200,
NoContent204,
}
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) subscription_id: String,
pub(crate) rule_id: String,
}
impl Builder {
pub fn into_future(self) -> futures::future::BoxFuture<'static, azure_core::Result<Response>> {
Box::pin({
let this = self.clone();
async move {
let url = azure_core::Url::parse(&format!(
"{}/subscriptions/{}/providers/Microsoft.Security/governanceRules/{}",
this.client.endpoint(),
&this.subscription_id,
&this.rule_id
))?;
let mut req = azure_core::Request::new(url, azure_core::Method::Delete);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
let req_body = azure_core::EMPTY_BODY;
req.set_body(req_body);
let rsp = this.client.send(&mut req).await?;
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Ok => Ok(Response::Ok200),
azure_core::StatusCode::NoContent => Ok(Response::NoContent204),
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
})
}
}
}
pub mod rule_id_execute_single_subscription {
use super::models;
type Response = ();
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) subscription_id: String,
pub(crate) rule_id: String,
pub(crate) execute_governance_rule_params: Option<models::ExecuteGovernanceRuleParams>,
}
impl Builder {
#[doc = "GovernanceRule over a subscription scope"]
pub fn execute_governance_rule_params(
mut self,
execute_governance_rule_params: impl Into<models::ExecuteGovernanceRuleParams>,
) -> Self {
self.execute_governance_rule_params = Some(execute_governance_rule_params.into());
self
}
#[doc = "only the first response will be fetched as long running operations are not supported yet"]
pub fn into_future(self) -> futures::future::BoxFuture<'static, azure_core::Result<Response>> {
Box::pin({
let this = self.clone();
async move {
let url = azure_core::Url::parse(&format!(
"{}/subscriptions/{}/providers/Microsoft.Security/governanceRules/{}/execute",
this.client.endpoint(),
&this.subscription_id,
&this.rule_id
))?;
let mut req = azure_core::Request::new(url, azure_core::Method::Post);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
let req_body = if let Some(execute_governance_rule_params) = &this.execute_governance_rule_params {
req.insert_header("content-type", "application/json");
azure_core::to_json(execute_governance_rule_params)?
} else {
azure_core::EMPTY_BODY
};
req.set_body(req_body);
let rsp = this.client.send(&mut req).await?;
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Accepted => Ok(()),
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
})
}
}
}
pub mod rule_id_execute_single_security_connector {
use super::models;
type Response = ();
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) subscription_id: String,
pub(crate) resource_group_name: String,
pub(crate) security_connector_name: String,
pub(crate) rule_id: String,
pub(crate) execute_governance_rule_params: Option<models::ExecuteGovernanceRuleParams>,
}
impl Builder {
#[doc = "GovernanceRule over a subscription scope"]
pub fn execute_governance_rule_params(
mut self,
execute_governance_rule_params: impl Into<models::ExecuteGovernanceRuleParams>,
) -> Self {
self.execute_governance_rule_params = Some(execute_governance_rule_params.into());
self
}
#[doc = "only the first response will be fetched as long running operations are not supported yet"]
pub fn into_future(self) -> futures::future::BoxFuture<'static, azure_core::Result<Response>> {
Box::pin({
let this = self.clone();
async move {
let url = azure_core :: Url :: parse (& format ! ("{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.Security/securityConnectors/{}/providers/Microsoft.Security/governanceRules/{}/execute" , this . client . endpoint () , & this . subscription_id , & this . resource_group_name , & this . security_connector_name , & this . rule_id)) ? ;
let mut req = azure_core::Request::new(url, azure_core::Method::Post);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
let req_body = if let Some(execute_governance_rule_params) = &this.execute_governance_rule_params {
req.insert_header("content-type", "application/json");
azure_core::to_json(execute_governance_rule_params)?
} else {
azure_core::EMPTY_BODY
};
req.set_body(req_body);
let rsp = this.client.send(&mut req).await?;
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Accepted => Ok(()),
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
})
}
}
}
}
pub mod security_connector_governance_rule {
use super::models;
pub struct Client(pub(crate) super::Client);
impl Client {
#[doc = "Get a list of all relevant governanceRules over a security connector level scope"]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `subscription_id`: Azure subscription ID"]
#[doc = "* `resource_group_name`: The name of the resource group within the user's subscription. The name is case insensitive."]
#[doc = "* `security_connector_name`: The security connector name."]
pub fn list(
&self,
subscription_id: impl Into<String>,
resource_group_name: impl Into<String>,
security_connector_name: impl Into<String>,
) -> list::Builder {
list::Builder {
client: self.0.clone(),
subscription_id: subscription_id.into(),
resource_group_name: resource_group_name.into(),
security_connector_name: security_connector_name.into(),
}
}
}
pub mod list {
use super::models;
type Response = models::GovernanceRuleList;
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) subscription_id: String,
pub(crate) resource_group_name: String,
pub(crate) security_connector_name: String,
}
impl Builder {
pub fn into_stream(self) -> azure_core::Pageable<Response, azure_core::error::Error> {
let make_request = move |continuation: Option<String>| {
let this = self.clone();
async move {
let mut url = azure_core :: Url :: parse (& format ! ("{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.Security/securityConnectors/{}/providers/Microsoft.Security/governanceRules" , this . client . endpoint () , & this . subscription_id , & this . resource_group_name , & this . security_connector_name)) ? ;
let rsp = match continuation {
Some(value) => {
url.set_path("");
url = url.join(&value)?;
let mut req = azure_core::Request::new(url, azure_core::Method::Get);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
let has_api_version_already =
req.url_mut().query_pairs().any(|(k, _)| k == azure_core::query_param::API_VERSION);
if !has_api_version_already {
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
}
let req_body = azure_core::EMPTY_BODY;
req.set_body(req_body);
this.client.send(&mut req).await?
}
None => {
let mut req = azure_core::Request::new(url, azure_core::Method::Get);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
let req_body = azure_core::EMPTY_BODY;
req.set_body(req_body);
this.client.send(&mut req).await?
}
};
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Ok => {
let rsp_body = rsp_stream.collect().await?;
let rsp_value: models::GovernanceRuleList = serde_json::from_slice(&rsp_body)?;
Ok(rsp_value)
}
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
};
azure_core::Pageable::new(make_request)
}
}
}
}
pub mod security_connector_governance_rules {
use super::models;
pub struct Client(pub(crate) super::Client);
impl Client {
#[doc = "Get a specific governanceRule for the requested scope by ruleId"]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `subscription_id`: Azure subscription ID"]
#[doc = "* `resource_group_name`: The name of the resource group within the user's subscription. The name is case insensitive."]
#[doc = "* `security_connector_name`: The security connector name."]
#[doc = "* `rule_id`: The security GovernanceRule key - unique key for the standard GovernanceRule"]
pub fn get(
&self,
subscription_id: impl Into<String>,
resource_group_name: impl Into<String>,
security_connector_name: impl Into<String>,
rule_id: impl Into<String>,
) -> get::Builder {
get::Builder {
client: self.0.clone(),
subscription_id: subscription_id.into(),
resource_group_name: resource_group_name.into(),
security_connector_name: security_connector_name.into(),
rule_id: rule_id.into(),
}
}
#[doc = "Creates or update a security GovernanceRule on the given security connector."]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `subscription_id`: Azure subscription ID"]
#[doc = "* `resource_group_name`: The name of the resource group within the user's subscription. The name is case insensitive."]
#[doc = "* `security_connector_name`: The security connector name."]
#[doc = "* `rule_id`: The security GovernanceRule key - unique key for the standard GovernanceRule"]
#[doc = "* `governance_rule`: GovernanceRule over a subscription scope"]
pub fn create_or_update(
&self,
subscription_id: impl Into<String>,
resource_group_name: impl Into<String>,
security_connector_name: impl Into<String>,
rule_id: impl Into<String>,
governance_rule: impl Into<models::GovernanceRule>,
) -> create_or_update::Builder {
create_or_update::Builder {
client: self.0.clone(),
subscription_id: subscription_id.into(),
resource_group_name: resource_group_name.into(),
security_connector_name: security_connector_name.into(),
rule_id: rule_id.into(),
governance_rule: governance_rule.into(),
}
}
#[doc = "Delete a GovernanceRule over a given scope"]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `subscription_id`: Azure subscription ID"]
#[doc = "* `resource_group_name`: The name of the resource group within the user's subscription. The name is case insensitive."]
#[doc = "* `security_connector_name`: The security connector name."]
#[doc = "* `rule_id`: The security GovernanceRule key - unique key for the standard GovernanceRule"]
pub fn delete(
&self,
subscription_id: impl Into<String>,
resource_group_name: impl Into<String>,
security_connector_name: impl Into<String>,
rule_id: impl Into<String>,
) -> delete::Builder {
delete::Builder {
client: self.0.clone(),
subscription_id: subscription_id.into(),
resource_group_name: resource_group_name.into(),
security_connector_name: security_connector_name.into(),
rule_id: rule_id.into(),
}
}
}
pub mod get {
use super::models;
type Response = models::GovernanceRule;
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) subscription_id: String,
pub(crate) resource_group_name: String,
pub(crate) security_connector_name: String,
pub(crate) rule_id: String,
}
impl Builder {
pub fn into_future(self) -> futures::future::BoxFuture<'static, azure_core::Result<Response>> {
Box::pin({
let this = self.clone();
async move {
let url = azure_core :: Url :: parse (& format ! ("{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.Security/securityConnectors/{}/providers/Microsoft.Security/governanceRules/{}" , this . client . endpoint () , & this . subscription_id , & this . resource_group_name , & this . security_connector_name , & this . rule_id)) ? ;
let mut req = azure_core::Request::new(url, azure_core::Method::Get);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
let req_body = azure_core::EMPTY_BODY;
req.set_body(req_body);
let rsp = this.client.send(&mut req).await?;
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Ok => {
let rsp_body = rsp_stream.collect().await?;
let rsp_value: models::GovernanceRule = serde_json::from_slice(&rsp_body)?;
Ok(rsp_value)
}
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
})
}
}
}
pub mod create_or_update {
use super::models;
#[derive(Debug)]
pub enum Response {
Created201(models::GovernanceRule),
Ok200(models::GovernanceRule),
}
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) subscription_id: String,
pub(crate) resource_group_name: String,
pub(crate) security_connector_name: String,
pub(crate) rule_id: String,
pub(crate) governance_rule: models::GovernanceRule,
}
impl Builder {
pub fn into_future(self) -> futures::future::BoxFuture<'static, azure_core::Result<Response>> {
Box::pin({
let this = self.clone();
async move {
let url = azure_core :: Url :: parse (& format ! ("{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.Security/securityConnectors/{}/providers/Microsoft.Security/governanceRules/{}" , this . client . endpoint () , & this . subscription_id , & this . resource_group_name , & this . security_connector_name , & this . rule_id)) ? ;
let mut req = azure_core::Request::new(url, azure_core::Method::Put);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
req.insert_header("content-type", "application/json");
let req_body = azure_core::to_json(&this.governance_rule)?;
req.set_body(req_body);
let rsp = this.client.send(&mut req).await?;
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Created => {
let rsp_body = rsp_stream.collect().await?;
let rsp_value: models::GovernanceRule = serde_json::from_slice(&rsp_body)?;
Ok(Response::Created201(rsp_value))
}
azure_core::StatusCode::Ok => {
let rsp_body = rsp_stream.collect().await?;
let rsp_value: models::GovernanceRule = serde_json::from_slice(&rsp_body)?;
Ok(Response::Ok200(rsp_value))
}
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
})
}
}
}
pub mod delete {
use super::models;
#[derive(Debug)]
pub enum Response {
Ok200,
NoContent204,
}
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) subscription_id: String,
pub(crate) resource_group_name: String,
pub(crate) security_connector_name: String,
pub(crate) rule_id: String,
}
impl Builder {
pub fn into_future(self) -> futures::future::BoxFuture<'static, azure_core::Result<Response>> {
Box::pin({
let this = self.clone();
async move {
let url = azure_core :: Url :: parse (& format ! ("{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.Security/securityConnectors/{}/providers/Microsoft.Security/governanceRules/{}" , this . client . endpoint () , & this . subscription_id , & this . resource_group_name , & this . security_connector_name , & this . rule_id)) ? ;
let mut req = azure_core::Request::new(url, azure_core::Method::Delete);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
let req_body = azure_core::EMPTY_BODY;
req.set_body(req_body);
let rsp = this.client.send(&mut req).await?;
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Ok => Ok(Response::Ok200),
azure_core::StatusCode::NoContent => Ok(Response::NoContent204),
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
})
}
}
}
}
pub mod subscription_governance_rules_execute_status {
use super::models;
pub struct Client(pub(crate) super::Client);
impl Client {
#[doc = "Get a specific governanceRule execution status for the requested scope by ruleId and operationId"]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `subscription_id`: Azure subscription ID"]
#[doc = "* `rule_id`: The security GovernanceRule key - unique key for the standard GovernanceRule"]
#[doc = "* `operation_id`: The security GovernanceRule execution key - unique key for the execution of GovernanceRule"]
pub fn get(&self, subscription_id: impl Into<String>, rule_id: impl Into<String>, operation_id: impl Into<String>) -> get::Builder {
get::Builder {
client: self.0.clone(),
subscription_id: subscription_id.into(),
rule_id: rule_id.into(),
operation_id: operation_id.into(),
}
}
}
pub mod get {
use super::models;
#[derive(Debug)]
pub enum Response {
Ok200(models::ExecuteRuleStatus),
Accepted202,
}
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) subscription_id: String,
pub(crate) rule_id: String,
pub(crate) operation_id: String,
}
impl Builder {
#[doc = "only the first response will be fetched as long running operations are not supported yet"]
pub fn into_future(self) -> futures::future::BoxFuture<'static, azure_core::Result<Response>> {
Box::pin({
let this = self.clone();
async move {
let url = azure_core::Url::parse(&format!(
"{}/subscriptions/{}/providers/Microsoft.Security/governanceRules/{}/operationResults/{}",
this.client.endpoint(),
&this.subscription_id,
&this.rule_id,
&this.operation_id
))?;
let mut req = azure_core::Request::new(url, azure_core::Method::Get);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
let req_body = azure_core::EMPTY_BODY;
req.set_body(req_body);
let rsp = this.client.send(&mut req).await?;
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Ok => {
let rsp_body = rsp_stream.collect().await?;
let rsp_value: models::ExecuteRuleStatus = serde_json::from_slice(&rsp_body)?;
Ok(Response::Ok200(rsp_value))
}
azure_core::StatusCode::Accepted => Ok(Response::Accepted202),
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
})
}
}
}
}
pub mod security_connector_governance_rules_execute_status {
use super::models;
pub struct Client(pub(crate) super::Client);
impl Client {
#[doc = "Get a specific governanceRule execution status for the requested scope by ruleId and operationId"]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `subscription_id`: Azure subscription ID"]
#[doc = "* `resource_group_name`: The name of the resource group within the user's subscription. The name is case insensitive."]
#[doc = "* `security_connector_name`: The security connector name."]
#[doc = "* `rule_id`: The security GovernanceRule key - unique key for the standard GovernanceRule"]
#[doc = "* `operation_id`: The security GovernanceRule execution key - unique key for the execution of GovernanceRule"]
pub fn get(
&self,
subscription_id: impl Into<String>,
resource_group_name: impl Into<String>,
security_connector_name: impl Into<String>,
rule_id: impl Into<String>,
operation_id: impl Into<String>,
) -> get::Builder {
get::Builder {
client: self.0.clone(),
subscription_id: subscription_id.into(),
resource_group_name: resource_group_name.into(),
security_connector_name: security_connector_name.into(),
rule_id: rule_id.into(),
operation_id: operation_id.into(),
}
}
}
pub mod get {
use super::models;
#[derive(Debug)]
pub enum Response {
Ok200(models::ExecuteRuleStatus),
Accepted202,
}
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) subscription_id: String,
pub(crate) resource_group_name: String,
pub(crate) security_connector_name: String,
pub(crate) rule_id: String,
pub(crate) operation_id: String,
}
impl Builder {
#[doc = "only the first response will be fetched as long running operations are not supported yet"]
pub fn into_future(self) -> futures::future::BoxFuture<'static, azure_core::Result<Response>> {
Box::pin({
let this = self.clone();
async move {
let url = azure_core :: Url :: parse (& format ! ("{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.Security/securityConnectors/{}/providers/Microsoft.Security/governanceRules/{}/operationResults/{}" , this . client . endpoint () , & this . subscription_id , & this . resource_group_name , & this . security_connector_name , & this . rule_id , & this . operation_id)) ? ;
let mut req = azure_core::Request::new(url, azure_core::Method::Get);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
let req_body = azure_core::EMPTY_BODY;
req.set_body(req_body);
let rsp = this.client.send(&mut req).await?;
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Ok => {
let rsp_body = rsp_stream.collect().await?;
let rsp_value: models::ExecuteRuleStatus = serde_json::from_slice(&rsp_body)?;
Ok(Response::Ok200(rsp_value))
}
azure_core::StatusCode::Accepted => Ok(Response::Accepted202),
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
})
}
}
}
}
pub mod governance_assignments {
use super::models;
pub struct Client(pub(crate) super::Client);
impl Client {
#[doc = "Get security governanceAssignments on all your resources inside a scope"]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `scope`: Scope of the query, can be subscription (/subscriptions/0b06d9ea-afe6-4779-bd59-30e5c2d9d13f) or management group (/providers/Microsoft.Management/managementGroups/mgName)."]
#[doc = "* `assessment_name`: The Assessment Key - Unique key for the assessment type"]
pub fn list(&self, scope: impl Into<String>, assessment_name: impl Into<String>) -> list::Builder {
list::Builder {
client: self.0.clone(),
scope: scope.into(),
assessment_name: assessment_name.into(),
}
}
#[doc = "Get a specific governanceAssignment for the requested scope by AssignmentKey"]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `scope`: Scope of the query, can be subscription (/subscriptions/0b06d9ea-afe6-4779-bd59-30e5c2d9d13f) or management group (/providers/Microsoft.Management/managementGroups/mgName)."]
#[doc = "* `assessment_name`: The Assessment Key - Unique key for the assessment type"]
#[doc = "* `assignment_key`: The security governance assignment key - the assessment key of the required governance assignment"]
pub fn get(&self, scope: impl Into<String>, assessment_name: impl Into<String>, assignment_key: impl Into<String>) -> get::Builder {
get::Builder {
client: self.0.clone(),
scope: scope.into(),
assessment_name: assessment_name.into(),
assignment_key: assignment_key.into(),
}
}
#[doc = "Creates or update a security GovernanceAssignment on the given subscription."]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `scope`: Scope of the query, can be subscription (/subscriptions/0b06d9ea-afe6-4779-bd59-30e5c2d9d13f) or management group (/providers/Microsoft.Management/managementGroups/mgName)."]
#[doc = "* `assessment_name`: The Assessment Key - Unique key for the assessment type"]
#[doc = "* `assignment_key`: The security governance assignment key - the assessment key of the required governance assignment"]
#[doc = "* `governance_assignment`: GovernanceAssignment over a subscription scope"]
pub fn create_or_update(
&self,
scope: impl Into<String>,
assessment_name: impl Into<String>,
assignment_key: impl Into<String>,
governance_assignment: impl Into<models::GovernanceAssignment>,
) -> create_or_update::Builder {
create_or_update::Builder {
client: self.0.clone(),
scope: scope.into(),
assessment_name: assessment_name.into(),
assignment_key: assignment_key.into(),
governance_assignment: governance_assignment.into(),
}
}
#[doc = "Delete a GovernanceAssignment over a given scope"]
#[doc = ""]
#[doc = "Arguments:"]
#[doc = "* `scope`: Scope of the query, can be subscription (/subscriptions/0b06d9ea-afe6-4779-bd59-30e5c2d9d13f) or management group (/providers/Microsoft.Management/managementGroups/mgName)."]
#[doc = "* `assessment_name`: The Assessment Key - Unique key for the assessment type"]
#[doc = "* `assignment_key`: The security governance assignment key - the assessment key of the required governance assignment"]
pub fn delete(
&self,
scope: impl Into<String>,
assessment_name: impl Into<String>,
assignment_key: impl Into<String>,
) -> delete::Builder {
delete::Builder {
client: self.0.clone(),
scope: scope.into(),
assessment_name: assessment_name.into(),
assignment_key: assignment_key.into(),
}
}
}
pub mod list {
use super::models;
type Response = models::GovernanceAssignmentsList;
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) scope: String,
pub(crate) assessment_name: String,
}
impl Builder {
pub fn into_stream(self) -> azure_core::Pageable<Response, azure_core::error::Error> {
let make_request = move |continuation: Option<String>| {
let this = self.clone();
async move {
let mut url = azure_core::Url::parse(&format!(
"{}/{}/providers/Microsoft.Security/assessments/{}/governanceAssignments",
this.client.endpoint(),
&this.scope,
&this.assessment_name
))?;
let rsp = match continuation {
Some(value) => {
url.set_path("");
url = url.join(&value)?;
let mut req = azure_core::Request::new(url, azure_core::Method::Get);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
let has_api_version_already =
req.url_mut().query_pairs().any(|(k, _)| k == azure_core::query_param::API_VERSION);
if !has_api_version_already {
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
}
let req_body = azure_core::EMPTY_BODY;
req.set_body(req_body);
this.client.send(&mut req).await?
}
None => {
let mut req = azure_core::Request::new(url, azure_core::Method::Get);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
let req_body = azure_core::EMPTY_BODY;
req.set_body(req_body);
this.client.send(&mut req).await?
}
};
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Ok => {
let rsp_body = rsp_stream.collect().await?;
let rsp_value: models::GovernanceAssignmentsList = serde_json::from_slice(&rsp_body)?;
Ok(rsp_value)
}
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
};
azure_core::Pageable::new(make_request)
}
}
}
pub mod get {
use super::models;
type Response = models::GovernanceAssignment;
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) scope: String,
pub(crate) assessment_name: String,
pub(crate) assignment_key: String,
}
impl Builder {
pub fn into_future(self) -> futures::future::BoxFuture<'static, azure_core::Result<Response>> {
Box::pin({
let this = self.clone();
async move {
let url = azure_core::Url::parse(&format!(
"{}/{}/providers/Microsoft.Security/assessments/{}/governanceAssignments/{}",
this.client.endpoint(),
&this.scope,
&this.assessment_name,
&this.assignment_key
))?;
let mut req = azure_core::Request::new(url, azure_core::Method::Get);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
let req_body = azure_core::EMPTY_BODY;
req.set_body(req_body);
let rsp = this.client.send(&mut req).await?;
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Ok => {
let rsp_body = rsp_stream.collect().await?;
let rsp_value: models::GovernanceAssignment = serde_json::from_slice(&rsp_body)?;
Ok(rsp_value)
}
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
})
}
}
}
pub mod create_or_update {
use super::models;
#[derive(Debug)]
pub enum Response {
Ok200(models::GovernanceAssignment),
Created201(models::GovernanceAssignment),
}
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) scope: String,
pub(crate) assessment_name: String,
pub(crate) assignment_key: String,
pub(crate) governance_assignment: models::GovernanceAssignment,
}
impl Builder {
pub fn into_future(self) -> futures::future::BoxFuture<'static, azure_core::Result<Response>> {
Box::pin({
let this = self.clone();
async move {
let url = azure_core::Url::parse(&format!(
"{}/{}/providers/Microsoft.Security/assessments/{}/governanceAssignments/{}",
this.client.endpoint(),
&this.scope,
&this.assessment_name,
&this.assignment_key
))?;
let mut req = azure_core::Request::new(url, azure_core::Method::Put);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
req.insert_header("content-type", "application/json");
let req_body = azure_core::to_json(&this.governance_assignment)?;
req.set_body(req_body);
let rsp = this.client.send(&mut req).await?;
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Ok => {
let rsp_body = rsp_stream.collect().await?;
let rsp_value: models::GovernanceAssignment = serde_json::from_slice(&rsp_body)?;
Ok(Response::Ok200(rsp_value))
}
azure_core::StatusCode::Created => {
let rsp_body = rsp_stream.collect().await?;
let rsp_value: models::GovernanceAssignment = serde_json::from_slice(&rsp_body)?;
Ok(Response::Created201(rsp_value))
}
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
})
}
}
}
pub mod delete {
use super::models;
#[derive(Debug)]
pub enum Response {
Ok200,
NoContent204,
}
#[derive(Clone)]
pub struct Builder {
pub(crate) client: super::super::Client,
pub(crate) scope: String,
pub(crate) assessment_name: String,
pub(crate) assignment_key: String,
}
impl Builder {
pub fn into_future(self) -> futures::future::BoxFuture<'static, azure_core::Result<Response>> {
Box::pin({
let this = self.clone();
async move {
let url = azure_core::Url::parse(&format!(
"{}/{}/providers/Microsoft.Security/assessments/{}/governanceAssignments/{}",
this.client.endpoint(),
&this.scope,
&this.assessment_name,
&this.assignment_key
))?;
let mut req = azure_core::Request::new(url, azure_core::Method::Delete);
let credential = this.client.token_credential();
let token_response = credential.get_token(&this.client.scopes().join(" ")).await?;
req.insert_header(
azure_core::headers::AUTHORIZATION,
format!("Bearer {}", token_response.token.secret()),
);
req.url_mut()
.query_pairs_mut()
.append_pair(azure_core::query_param::API_VERSION, "2022-01-01-preview");
let req_body = azure_core::EMPTY_BODY;
req.set_body(req_body);
let rsp = this.client.send(&mut req).await?;
let (rsp_status, rsp_headers, rsp_stream) = rsp.deconstruct();
match rsp_status {
azure_core::StatusCode::Ok => Ok(Response::Ok200),
azure_core::StatusCode::NoContent => Ok(Response::NoContent204),
status_code => Err(azure_core::error::Error::from(azure_core::error::ErrorKind::HttpResponse {
status: status_code,
error_code: None,
})),
}
}
})
}
}
}
}