Struct aws_sdk_iot::client::fluent_builders::TestAuthorization
source · pub struct TestAuthorization { /* private fields */ }
Expand description
Fluent builder constructing a request to TestAuthorization
.
Tests if a specified principal is authorized to perform an IoT action on a specified resource. Use this to test and debug the authorization behavior of devices that connect to the IoT device gateway.
Requires permission to access the TestAuthorization action.
Implementations§
source§impl TestAuthorization
impl TestAuthorization
sourcepub async fn customize(
self
) -> Result<CustomizableOperation<TestAuthorization, AwsResponseRetryClassifier>, SdkError<TestAuthorizationError>>
pub async fn customize(
self
) -> Result<CustomizableOperation<TestAuthorization, AwsResponseRetryClassifier>, SdkError<TestAuthorizationError>>
Consume this builder, creating a customizable operation that can be modified before being sent. The operation’s inner http::Request can be modified as well.
sourcepub async fn send(
self
) -> Result<TestAuthorizationOutput, SdkError<TestAuthorizationError>>
pub async fn send(
self
) -> Result<TestAuthorizationOutput, SdkError<TestAuthorizationError>>
Sends the request and returns the response.
If an error occurs, an SdkError
will be returned with additional details that
can be matched against.
By default, any retryable failures will be retried twice. Retry behavior is configurable with the RetryConfig, which can be set when configuring the client.
sourcepub fn principal(self, input: impl Into<String>) -> Self
pub fn principal(self, input: impl Into<String>) -> Self
The principal. Valid principals are CertificateArn (arn:aws:iot:region:accountId:cert/certificateId), thingGroupArn (arn:aws:iot:region:accountId:thinggroup/groupName) and CognitoId (region:id).
sourcepub fn set_principal(self, input: Option<String>) -> Self
pub fn set_principal(self, input: Option<String>) -> Self
The principal. Valid principals are CertificateArn (arn:aws:iot:region:accountId:cert/certificateId), thingGroupArn (arn:aws:iot:region:accountId:thinggroup/groupName) and CognitoId (region:id).
sourcepub fn cognito_identity_pool_id(self, input: impl Into<String>) -> Self
pub fn cognito_identity_pool_id(self, input: impl Into<String>) -> Self
The Cognito identity pool ID.
sourcepub fn set_cognito_identity_pool_id(self, input: Option<String>) -> Self
pub fn set_cognito_identity_pool_id(self, input: Option<String>) -> Self
The Cognito identity pool ID.
sourcepub fn auth_infos(self, input: AuthInfo) -> Self
pub fn auth_infos(self, input: AuthInfo) -> Self
Appends an item to authInfos
.
To override the contents of this collection use set_auth_infos
.
A list of authorization info objects. Simulating authorization will create a response for each authInfo
object in the list.
sourcepub fn set_auth_infos(self, input: Option<Vec<AuthInfo>>) -> Self
pub fn set_auth_infos(self, input: Option<Vec<AuthInfo>>) -> Self
A list of authorization info objects. Simulating authorization will create a response for each authInfo
object in the list.
sourcepub fn set_client_id(self, input: Option<String>) -> Self
pub fn set_client_id(self, input: Option<String>) -> Self
The MQTT client ID.
sourcepub fn policy_names_to_add(self, input: impl Into<String>) -> Self
pub fn policy_names_to_add(self, input: impl Into<String>) -> Self
Appends an item to policyNamesToAdd
.
To override the contents of this collection use set_policy_names_to_add
.
When testing custom authorization, the policies specified here are treated as if they are attached to the principal being authorized.
sourcepub fn set_policy_names_to_add(self, input: Option<Vec<String>>) -> Self
pub fn set_policy_names_to_add(self, input: Option<Vec<String>>) -> Self
When testing custom authorization, the policies specified here are treated as if they are attached to the principal being authorized.
sourcepub fn policy_names_to_skip(self, input: impl Into<String>) -> Self
pub fn policy_names_to_skip(self, input: impl Into<String>) -> Self
Appends an item to policyNamesToSkip
.
To override the contents of this collection use set_policy_names_to_skip
.
When testing custom authorization, the policies specified here are treated as if they are not attached to the principal being authorized.
sourcepub fn set_policy_names_to_skip(self, input: Option<Vec<String>>) -> Self
pub fn set_policy_names_to_skip(self, input: Option<Vec<String>>) -> Self
When testing custom authorization, the policies specified here are treated as if they are not attached to the principal being authorized.
Trait Implementations§
source§impl Clone for TestAuthorization
impl Clone for TestAuthorization
source§fn clone(&self) -> TestAuthorization
fn clone(&self) -> TestAuthorization
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read more