pub struct ServiceMethods<'a, C>where
C: 'a,{ /* private fields */ }Expand description
A builder providing access to all methods supported on service resources.
It is not used directly, but through the ServiceControl hub.
§Example
Instantiate a resource builder
extern crate hyper;
extern crate hyper_rustls;
extern crate google_servicecontrol2 as servicecontrol2;
use servicecontrol2::{ServiceControl, FieldMask, hyper_rustls, hyper_util, yup_oauth2};
let secret: yup_oauth2::ApplicationSecret = Default::default();
let connector = hyper_rustls::HttpsConnectorBuilder::new()
.with_native_roots()
.unwrap()
.https_only()
.enable_http2()
.build();
let executor = hyper_util::rt::TokioExecutor::new();
let auth = yup_oauth2::InstalledFlowAuthenticator::with_client(
secret,
yup_oauth2::InstalledFlowReturnMethod::HTTPRedirect,
yup_oauth2::client::CustomHyperClientBuilder::from(
hyper_util::client::legacy::Client::builder(executor).build(connector),
),
).build().await.unwrap();
let client = hyper_util::client::legacy::Client::builder(
hyper_util::rt::TokioExecutor::new()
)
.build(
hyper_rustls::HttpsConnectorBuilder::new()
.with_native_roots()
.unwrap()
.https_or_http()
.enable_http2()
.build()
);
let mut hub = ServiceControl::new(client, auth);
// Usually you wouldn't bind this to a variable, but keep calling *CallBuilders*
// like `check(...)` and `report(...)`
// to build up your call.
let rb = hub.services();Implementations§
Source§impl<'a, C> ServiceMethods<'a, C>
impl<'a, C> ServiceMethods<'a, C>
Sourcepub fn check(
&self,
request: CheckRequest,
service_name: &str,
) -> ServiceCheckCall<'a, C>
pub fn check( &self, request: CheckRequest, service_name: &str, ) -> ServiceCheckCall<'a, C>
Create a builder to help you perform the following task:
This method provides admission control for services that are integrated with Service Infrastructure. It checks whether an operation should be allowed based on the service configuration and relevant policies. It must be called before the operation is executed. For more information, see Admission Control. NOTE: The admission control has an expected policy propagation delay of 60s. The caller must not depend on the most recent policy changes. NOTE: The admission control has a hard limit of 1 referenced resources per call. If an operation refers to more than 1 resources, the caller must call the Check method multiple times. This method requires the servicemanagement.services.check permission on the specified service. For more information, see Service Control API Access Control.
§Arguments
request- No description provided.serviceName- The service name as specified in its service configuration. For example,"pubsub.googleapis.com". See google.api.Service for the definition of a service name.
Sourcepub fn report(
&self,
request: ReportRequest,
service_name: &str,
) -> ServiceReportCall<'a, C>
pub fn report( &self, request: ReportRequest, service_name: &str, ) -> ServiceReportCall<'a, C>
Create a builder to help you perform the following task:
This method provides telemetry reporting for services that are integrated with Service Infrastructure. It reports a list of operations that have occurred on a service. It must be called after the operations have been executed. For more information, see Telemetry Reporting. NOTE: The telemetry reporting has a hard limit of 100 operations and 1MB per Report call. This method requires the servicemanagement.services.report permission on the specified service. For more information, see Service Control API Access Control.
§Arguments
request- No description provided.serviceName- The service name as specified in its service configuration. For example,"pubsub.googleapis.com". See google.api.Service for the definition of a service name.