#[non_exhaustive]pub struct ValidatePolicyInput {
pub locale: Option<Locale>,
pub max_results: Option<i32>,
pub next_token: Option<String>,
pub policy_document: Option<String>,
pub policy_type: Option<PolicyType>,
pub validate_policy_resource_type: Option<ValidatePolicyResourceType>,
}
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.locale: Option<Locale>
The locale to use for localizing the findings.
max_results: Option<i32>
The maximum number of results to return in the response.
next_token: Option<String>
A token used for pagination of results returned.
policy_document: Option<String>
The JSON policy document to use as the content for the policy.
policy_type: Option<PolicyType>
The type of policy to validate. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.
Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy.
Service control policies (SCPs) are a type of organization policy attached to an Amazon Web Services organization, organizational unit (OU), or an account.
validate_policy_resource_type: Option<ValidatePolicyResourceType>
The type of resource to attach to your resource policy. Specify a value for the policy validation resource type only if the policy type is RESOURCE_POLICY
. For example, to validate a resource policy to attach to an Amazon S3 bucket, you can choose AWS::S3::Bucket
for the policy validation resource type.
For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource policies.
Implementations§
source§impl ValidatePolicyInput
impl ValidatePolicyInput
sourcepub fn max_results(&self) -> Option<i32>
pub fn max_results(&self) -> Option<i32>
The maximum number of results to return in the response.
sourcepub fn next_token(&self) -> Option<&str>
pub fn next_token(&self) -> Option<&str>
A token used for pagination of results returned.
sourcepub fn policy_document(&self) -> Option<&str>
pub fn policy_document(&self) -> Option<&str>
The JSON policy document to use as the content for the policy.
sourcepub fn policy_type(&self) -> Option<&PolicyType>
pub fn policy_type(&self) -> Option<&PolicyType>
The type of policy to validate. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.
Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy.
Service control policies (SCPs) are a type of organization policy attached to an Amazon Web Services organization, organizational unit (OU), or an account.
sourcepub fn validate_policy_resource_type(
&self
) -> Option<&ValidatePolicyResourceType>
pub fn validate_policy_resource_type( &self ) -> Option<&ValidatePolicyResourceType>
The type of resource to attach to your resource policy. Specify a value for the policy validation resource type only if the policy type is RESOURCE_POLICY
. For example, to validate a resource policy to attach to an Amazon S3 bucket, you can choose AWS::S3::Bucket
for the policy validation resource type.
For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource policies.
source§impl ValidatePolicyInput
impl ValidatePolicyInput
sourcepub fn builder() -> ValidatePolicyInputBuilder
pub fn builder() -> ValidatePolicyInputBuilder
Creates a new builder-style object to manufacture ValidatePolicyInput
.
Trait Implementations§
source§impl Clone for ValidatePolicyInput
impl Clone for ValidatePolicyInput
source§fn clone(&self) -> ValidatePolicyInput
fn clone(&self) -> ValidatePolicyInput
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for ValidatePolicyInput
impl Debug for ValidatePolicyInput
source§impl PartialEq for ValidatePolicyInput
impl PartialEq for ValidatePolicyInput
source§fn eq(&self, other: &ValidatePolicyInput) -> bool
fn eq(&self, other: &ValidatePolicyInput) -> bool
self
and other
values to be equal, and is used
by ==
.impl StructuralPartialEq for ValidatePolicyInput
Auto Trait Implementations§
impl Freeze for ValidatePolicyInput
impl RefUnwindSafe for ValidatePolicyInput
impl Send for ValidatePolicyInput
impl Sync for ValidatePolicyInput
impl Unpin for ValidatePolicyInput
impl UnwindSafe for ValidatePolicyInput
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> Instrument for T
impl<T> Instrument for T
source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoEither for T
impl<T> IntoEither for T
source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moresource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more