Struct aws_sdk_iot::input::CreateAuthorizerInput
source · [−]#[non_exhaustive]pub struct CreateAuthorizerInput { /* private fields */ }Implementations
sourceimpl CreateAuthorizerInput
impl CreateAuthorizerInput
sourcepub async fn make_operation(
&self,
_config: &Config
) -> Result<Operation<CreateAuthorizer, AwsResponseRetryClassifier>, BuildError>
pub async fn make_operation(
&self,
_config: &Config
) -> Result<Operation<CreateAuthorizer, AwsResponseRetryClassifier>, BuildError>
Consumes the builder and constructs an Operation<CreateAuthorizer>
sourcepub fn builder() -> Builder
pub fn builder() -> Builder
Creates a new builder-style object to manufacture CreateAuthorizerInput.
sourceimpl CreateAuthorizerInput
impl CreateAuthorizerInput
The authorizer name.
The ARN of the authorizer's Lambda function.
sourcepub fn token_key_name(&self) -> Option<&str>
pub fn token_key_name(&self) -> Option<&str>
The name of the token key used to extract the token from the HTTP headers.
sourcepub fn token_signing_public_keys(&self) -> Option<&HashMap<String, String>>
pub fn token_signing_public_keys(&self) -> Option<&HashMap<String, String>>
The public keys used to verify the digital signature returned by your custom authentication service.
sourcepub fn status(&self) -> Option<&AuthorizerStatus>
pub fn status(&self) -> Option<&AuthorizerStatus>
The status of the create authorizer request.
Metadata which can be used to manage the custom authorizer.
For URI Request parameters use format: ...key1=value1&key2=value2...
For the CLI command-line parameter use format: &&tags "key1=value1&key2=value2..."
For the cli-input-json file use format: "tags": "key1=value1&key2=value2..."
sourcepub fn signing_disabled(&self) -> Option<bool>
pub fn signing_disabled(&self) -> Option<bool>
Specifies whether IoT validates the token signature in an authorization request.
sourcepub fn enable_caching_for_http(&self) -> Option<bool>
pub fn enable_caching_for_http(&self) -> Option<bool>
When true, the result from the authorizer’s Lambda function is cached for clients that use persistent HTTP connections. The results are cached for the time specified by the Lambda function in refreshAfterInSeconds. This value does not affect authorization of clients that use MQTT connections.
The default value is false.
Trait Implementations
sourceimpl Clone for CreateAuthorizerInput
impl Clone for CreateAuthorizerInput
sourcefn clone(&self) -> CreateAuthorizerInput
fn clone(&self) -> CreateAuthorizerInput
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read more