Struct aws_sdk_accessanalyzer::operation::validate_policy::builders::ValidatePolicyFluentBuilder
source · pub struct ValidatePolicyFluentBuilder { /* private fields */ }
Expand description
Fluent builder constructing a request to ValidatePolicy
.
Requests the validation of a policy and returns a list of findings. The findings help you identify issues and provide actionable recommendations to resolve the issue and enable you to author functional policies that meet security best practices.
Implementations§
source§impl ValidatePolicyFluentBuilder
impl ValidatePolicyFluentBuilder
sourcepub fn as_input(&self) -> &ValidatePolicyInputBuilder
pub fn as_input(&self) -> &ValidatePolicyInputBuilder
Access the ValidatePolicy as a reference.
sourcepub async fn send(
self
) -> Result<ValidatePolicyOutput, SdkError<ValidatePolicyError, HttpResponse>>
pub async fn send( self ) -> Result<ValidatePolicyOutput, SdkError<ValidatePolicyError, HttpResponse>>
Sends the request and returns the response.
If an error occurs, an SdkError
will be returned with additional details that
can be matched against.
By default, any retryable failures will be retried twice. Retry behavior is configurable with the RetryConfig, which can be set when configuring the client.
sourcepub fn customize(
self
) -> CustomizableOperation<ValidatePolicyOutput, ValidatePolicyError, Self>
pub fn customize( self ) -> CustomizableOperation<ValidatePolicyOutput, ValidatePolicyError, Self>
Consumes this builder, creating a customizable operation that can be modified before being sent.
sourcepub fn into_paginator(self) -> ValidatePolicyPaginator
pub fn into_paginator(self) -> ValidatePolicyPaginator
Create a paginator for this request
Paginators are used by calling send().await
which returns a PaginationStream
.
sourcepub fn set_locale(self, input: Option<Locale>) -> Self
pub fn set_locale(self, input: Option<Locale>) -> Self
The locale to use for localizing the findings.
sourcepub fn get_locale(&self) -> &Option<Locale>
pub fn get_locale(&self) -> &Option<Locale>
The locale to use for localizing the findings.
sourcepub fn max_results(self, input: i32) -> Self
pub fn max_results(self, input: i32) -> Self
The maximum number of results to return in the response.
sourcepub fn set_max_results(self, input: Option<i32>) -> Self
pub fn set_max_results(self, input: Option<i32>) -> Self
The maximum number of results to return in the response.
sourcepub fn get_max_results(&self) -> &Option<i32>
pub fn get_max_results(&self) -> &Option<i32>
The maximum number of results to return in the response.
sourcepub fn next_token(self, input: impl Into<String>) -> Self
pub fn next_token(self, input: impl Into<String>) -> Self
A token used for pagination of results returned.
sourcepub fn set_next_token(self, input: Option<String>) -> Self
pub fn set_next_token(self, input: Option<String>) -> Self
A token used for pagination of results returned.
sourcepub fn get_next_token(&self) -> &Option<String>
pub fn get_next_token(&self) -> &Option<String>
A token used for pagination of results returned.
sourcepub fn policy_document(self, input: impl Into<String>) -> Self
pub fn policy_document(self, input: impl Into<String>) -> Self
The JSON policy document to use as the content for the policy.
sourcepub fn set_policy_document(self, input: Option<String>) -> Self
pub fn set_policy_document(self, input: Option<String>) -> Self
The JSON policy document to use as the content for the policy.
sourcepub fn get_policy_document(&self) -> &Option<String>
pub fn get_policy_document(&self) -> &Option<String>
The JSON policy document to use as the content for the policy.
sourcepub fn policy_type(self, input: PolicyType) -> Self
pub fn policy_type(self, input: PolicyType) -> Self
The type of policy to validate. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.
Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy.
Service control policies (SCPs) are a type of organization policy attached to an Amazon Web Services organization, organizational unit (OU), or an account.
sourcepub fn set_policy_type(self, input: Option<PolicyType>) -> Self
pub fn set_policy_type(self, input: Option<PolicyType>) -> Self
The type of policy to validate. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.
Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy.
Service control policies (SCPs) are a type of organization policy attached to an Amazon Web Services organization, organizational unit (OU), or an account.
sourcepub fn get_policy_type(&self) -> &Option<PolicyType>
pub fn get_policy_type(&self) -> &Option<PolicyType>
The type of policy to validate. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.
Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy.
Service control policies (SCPs) are a type of organization policy attached to an Amazon Web Services organization, organizational unit (OU), or an account.
sourcepub fn validate_policy_resource_type(
self,
input: ValidatePolicyResourceType
) -> Self
pub fn validate_policy_resource_type( self, input: ValidatePolicyResourceType ) -> Self
The type of resource to attach to your resource policy. Specify a value for the policy validation resource type only if the policy type is RESOURCE_POLICY
. For example, to validate a resource policy to attach to an Amazon S3 bucket, you can choose AWS::S3::Bucket
for the policy validation resource type.
For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource policies.
sourcepub fn set_validate_policy_resource_type(
self,
input: Option<ValidatePolicyResourceType>
) -> Self
pub fn set_validate_policy_resource_type( self, input: Option<ValidatePolicyResourceType> ) -> Self
The type of resource to attach to your resource policy. Specify a value for the policy validation resource type only if the policy type is RESOURCE_POLICY
. For example, to validate a resource policy to attach to an Amazon S3 bucket, you can choose AWS::S3::Bucket
for the policy validation resource type.
For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource policies.
sourcepub fn get_validate_policy_resource_type(
&self
) -> &Option<ValidatePolicyResourceType>
pub fn get_validate_policy_resource_type( &self ) -> &Option<ValidatePolicyResourceType>
The type of resource to attach to your resource policy. Specify a value for the policy validation resource type only if the policy type is RESOURCE_POLICY
. For example, to validate a resource policy to attach to an Amazon S3 bucket, you can choose AWS::S3::Bucket
for the policy validation resource type.
For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource policies.
Trait Implementations§
source§impl Clone for ValidatePolicyFluentBuilder
impl Clone for ValidatePolicyFluentBuilder
source§fn clone(&self) -> ValidatePolicyFluentBuilder
fn clone(&self) -> ValidatePolicyFluentBuilder
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreAuto Trait Implementations§
impl Freeze for ValidatePolicyFluentBuilder
impl !RefUnwindSafe for ValidatePolicyFluentBuilder
impl Send for ValidatePolicyFluentBuilder
impl Sync for ValidatePolicyFluentBuilder
impl Unpin for ValidatePolicyFluentBuilder
impl !UnwindSafe for ValidatePolicyFluentBuilder
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> Instrument for T
impl<T> Instrument for T
source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoEither for T
impl<T> IntoEither for T
source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moresource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more