1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156
// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
pub use crate::operation::test_authorization::_test_authorization_output::TestAuthorizationOutputBuilder;
pub use crate::operation::test_authorization::_test_authorization_input::TestAuthorizationInputBuilder;
/// Fluent builder constructing a request to `TestAuthorization`.
///
/// <p>Tests if a specified principal is authorized to perform an IoT action on a specified resource. Use this to test and debug the authorization behavior of devices that connect to the IoT device gateway.</p>
/// <p>Requires permission to access the <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awsiot.html#awsiot-actions-as-permissions">TestAuthorization</a> action.</p>
#[derive(std::clone::Clone, std::fmt::Debug)]
pub struct TestAuthorizationFluentBuilder {
handle: std::sync::Arc<crate::client::Handle>,
inner: crate::operation::test_authorization::builders::TestAuthorizationInputBuilder,
}
impl TestAuthorizationFluentBuilder {
/// Creates a new `TestAuthorization`.
pub(crate) fn new(handle: std::sync::Arc<crate::client::Handle>) -> Self {
Self {
handle,
inner: Default::default(),
}
}
/// Consume this builder, creating a customizable operation that can be modified before being
/// sent. The operation's inner [http::Request] can be modified as well.
pub async fn customize(
self,
) -> std::result::Result<
crate::client::customize::CustomizableOperation<
crate::operation::test_authorization::TestAuthorization,
aws_http::retry::AwsResponseRetryClassifier,
>,
aws_smithy_http::result::SdkError<
crate::operation::test_authorization::TestAuthorizationError,
>,
> {
let handle = self.handle.clone();
let operation = self
.inner
.build()
.map_err(aws_smithy_http::result::SdkError::construction_failure)?
.make_operation(&handle.conf)
.await
.map_err(aws_smithy_http::result::SdkError::construction_failure)?;
Ok(crate::client::customize::CustomizableOperation { handle, operation })
}
/// Sends the request and returns the response.
///
/// If an error occurs, an `SdkError` will be returned with additional details that
/// can be matched against.
///
/// By default, any retryable failures will be retried twice. Retry behavior
/// is configurable with the [RetryConfig](aws_smithy_types::retry::RetryConfig), which can be
/// set when configuring the client.
pub async fn send(
self,
) -> std::result::Result<
crate::operation::test_authorization::TestAuthorizationOutput,
aws_smithy_http::result::SdkError<
crate::operation::test_authorization::TestAuthorizationError,
>,
> {
let op = self
.inner
.build()
.map_err(aws_smithy_http::result::SdkError::construction_failure)?
.make_operation(&self.handle.conf)
.await
.map_err(aws_smithy_http::result::SdkError::construction_failure)?;
self.handle.client.call(op).await
}
/// <p>The principal. Valid principals are CertificateArn (arn:aws:iot:<i>region</i>:<i>accountId</i>:cert/<i>certificateId</i>), thingGroupArn (arn:aws:iot:<i>region</i>:<i>accountId</i>:thinggroup/<i>groupName</i>) and CognitoId (<i>region</i>:<i>id</i>).</p>
pub fn principal(mut self, input: impl Into<std::string::String>) -> Self {
self.inner = self.inner.principal(input.into());
self
}
/// <p>The principal. Valid principals are CertificateArn (arn:aws:iot:<i>region</i>:<i>accountId</i>:cert/<i>certificateId</i>), thingGroupArn (arn:aws:iot:<i>region</i>:<i>accountId</i>:thinggroup/<i>groupName</i>) and CognitoId (<i>region</i>:<i>id</i>).</p>
pub fn set_principal(mut self, input: std::option::Option<std::string::String>) -> Self {
self.inner = self.inner.set_principal(input);
self
}
/// <p>The Cognito identity pool ID.</p>
pub fn cognito_identity_pool_id(mut self, input: impl Into<std::string::String>) -> Self {
self.inner = self.inner.cognito_identity_pool_id(input.into());
self
}
/// <p>The Cognito identity pool ID.</p>
pub fn set_cognito_identity_pool_id(
mut self,
input: std::option::Option<std::string::String>,
) -> Self {
self.inner = self.inner.set_cognito_identity_pool_id(input);
self
}
/// Appends an item to `authInfos`.
///
/// To override the contents of this collection use [`set_auth_infos`](Self::set_auth_infos).
///
/// <p>A list of authorization info objects. Simulating authorization will create a response for each <code>authInfo</code> object in the list.</p>
pub fn auth_infos(mut self, input: crate::types::AuthInfo) -> Self {
self.inner = self.inner.auth_infos(input);
self
}
/// <p>A list of authorization info objects. Simulating authorization will create a response for each <code>authInfo</code> object in the list.</p>
pub fn set_auth_infos(
mut self,
input: std::option::Option<std::vec::Vec<crate::types::AuthInfo>>,
) -> Self {
self.inner = self.inner.set_auth_infos(input);
self
}
/// <p>The MQTT client ID.</p>
pub fn client_id(mut self, input: impl Into<std::string::String>) -> Self {
self.inner = self.inner.client_id(input.into());
self
}
/// <p>The MQTT client ID.</p>
pub fn set_client_id(mut self, input: std::option::Option<std::string::String>) -> Self {
self.inner = self.inner.set_client_id(input);
self
}
/// Appends an item to `policyNamesToAdd`.
///
/// To override the contents of this collection use [`set_policy_names_to_add`](Self::set_policy_names_to_add).
///
/// <p>When testing custom authorization, the policies specified here are treated as if they are attached to the principal being authorized.</p>
pub fn policy_names_to_add(mut self, input: impl Into<std::string::String>) -> Self {
self.inner = self.inner.policy_names_to_add(input.into());
self
}
/// <p>When testing custom authorization, the policies specified here are treated as if they are attached to the principal being authorized.</p>
pub fn set_policy_names_to_add(
mut self,
input: std::option::Option<std::vec::Vec<std::string::String>>,
) -> Self {
self.inner = self.inner.set_policy_names_to_add(input);
self
}
/// Appends an item to `policyNamesToSkip`.
///
/// To override the contents of this collection use [`set_policy_names_to_skip`](Self::set_policy_names_to_skip).
///
/// <p>When testing custom authorization, the policies specified here are treated as if they are not attached to the principal being authorized.</p>
pub fn policy_names_to_skip(mut self, input: impl Into<std::string::String>) -> Self {
self.inner = self.inner.policy_names_to_skip(input.into());
self
}
/// <p>When testing custom authorization, the policies specified here are treated as if they are not attached to the principal being authorized.</p>
pub fn set_policy_names_to_skip(
mut self,
input: std::option::Option<std::vec::Vec<std::string::String>>,
) -> Self {
self.inner = self.inner.set_policy_names_to_skip(input);
self
}
}