1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
use anyhow::Result;

use crate::Client;

pub struct SettingsEnforcedTls {
    pub client: Client,
}

impl SettingsEnforcedTls {
    #[doc(hidden)]
    pub fn new(client: Client) -> Self {
        SettingsEnforcedTls { client }
    }

    /**
    * Retrieve current Enforced TLS settings.
    *
    * This function performs a `GET` to the `/user/settings/enforced_tls` endpoint.
    *
    * **This endpoint allows you to retrieve your current Enforced TLS settings.**
    *
    * The Enforced TLS settings specify whether or not the recipient is required to support TLS or have a valid certificate.
    *
    * If either `require_tls` or `require_valid_cert` is set to `true`, the recipient must support TLS 1.1 or higher or have a valid certificate. If these conditions are not met, Twilio SendGrid will drop the message and send a block event with “TLS required but not supported” as the description.
    *
    * **Parameters:**
    *
    * * `on_behalf_of: &str` -- The license key provided with your New Relic account.
    */
    pub async fn get_user(&self) -> Result<crate::types::EnforcedTlsRequestResponse> {
        let url = "/user/settings/enforced_tls".to_string();
        self.client.get(&url, None).await
    }

    /**
    * Update Enforced TLS settings.
    *
    * This function performs a `PATCH` to the `/user/settings/enforced_tls` endpoint.
    *
    * **This endpoint allows you to update your Enforced TLS settings.**
    *
    * To require TLS from recipients, set `require_tls` to `true`. If either `require_tls` or `require_valid_cert` is set to `true`, the recipient must support TLS 1.1 or higher or have a valid certificate. If these conditions are not met, Twilio SendGrid will drop the message and send a block event with “TLS required but not supported” as the description.
    *
    * > Twilio SendGrid supports TLS 1.1 and higher and does not support older versions of TLS due to security vulnerabilities.
    *
    * **Parameters:**
    *
    * * `on_behalf_of: &str` -- The license key provided with your New Relic account.
    */
    pub async fn patch_user(
        &self,
        body: &crate::types::EnforcedTlsRequestResponse,
    ) -> Result<crate::types::EnforcedTlsRequestResponse> {
        let url = "/user/settings/enforced_tls".to_string();
        self.client
            .patch(&url, Some(reqwest::Body::from(serde_json::to_vec(body)?)))
            .await
    }
}