aws_sdk_accessanalyzer/client/check_no_new_access.rs
1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2impl super::Client {
3 /// Constructs a fluent builder for the [`CheckNoNewAccess`](crate::operation::check_no_new_access::builders::CheckNoNewAccessFluentBuilder) operation.
4 ///
5 /// - The fluent builder is configurable:
6 /// - [`new_policy_document(impl Into<String>)`](crate::operation::check_no_new_access::builders::CheckNoNewAccessFluentBuilder::new_policy_document) / [`set_new_policy_document(Option<String>)`](crate::operation::check_no_new_access::builders::CheckNoNewAccessFluentBuilder::set_new_policy_document):<br>required: **true**<br><p>The JSON policy document to use as the content for the updated policy.</p><br>
7 /// - [`existing_policy_document(impl Into<String>)`](crate::operation::check_no_new_access::builders::CheckNoNewAccessFluentBuilder::existing_policy_document) / [`set_existing_policy_document(Option<String>)`](crate::operation::check_no_new_access::builders::CheckNoNewAccessFluentBuilder::set_existing_policy_document):<br>required: **true**<br><p>The JSON policy document to use as the content for the existing policy.</p><br>
8 /// - [`policy_type(AccessCheckPolicyType)`](crate::operation::check_no_new_access::builders::CheckNoNewAccessFluentBuilder::policy_type) / [`set_policy_type(Option<AccessCheckPolicyType>)`](crate::operation::check_no_new_access::builders::CheckNoNewAccessFluentBuilder::set_policy_type):<br>required: **true**<br><p>The type of policy to compare. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p> <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy.</p><br>
9 /// - On success, responds with [`CheckNoNewAccessOutput`](crate::operation::check_no_new_access::CheckNoNewAccessOutput) with field(s):
10 /// - [`result(Option<CheckNoNewAccessResult>)`](crate::operation::check_no_new_access::CheckNoNewAccessOutput::result): <p>The result of the check for new access. If the result is <code>PASS</code>, no new access is allowed by the updated policy. If the result is <code>FAIL</code>, the updated policy might allow new access.</p>
11 /// - [`message(Option<String>)`](crate::operation::check_no_new_access::CheckNoNewAccessOutput::message): <p>The message indicating whether the updated policy allows new access.</p>
12 /// - [`reasons(Option<Vec::<ReasonSummary>>)`](crate::operation::check_no_new_access::CheckNoNewAccessOutput::reasons): <p>A description of the reasoning of the result.</p>
13 /// - On failure, responds with [`SdkError<CheckNoNewAccessError>`](crate::operation::check_no_new_access::CheckNoNewAccessError)
14 pub fn check_no_new_access(&self) -> crate::operation::check_no_new_access::builders::CheckNoNewAccessFluentBuilder {
15 crate::operation::check_no_new_access::builders::CheckNoNewAccessFluentBuilder::new(self.handle.clone())
16 }
17}