pub struct CreateAuthorizerFluentBuilder { /* private fields */ }
Expand description
Fluent builder constructing a request to CreateAuthorizer
.
Creates an authorizer.
Requires permission to access the CreateAuthorizer action.
Implementations§
source§impl CreateAuthorizerFluentBuilder
impl CreateAuthorizerFluentBuilder
sourcepub fn as_input(&self) -> &CreateAuthorizerInputBuilder
pub fn as_input(&self) -> &CreateAuthorizerInputBuilder
Access the CreateAuthorizer as a reference.
sourcepub async fn send(
self
) -> Result<CreateAuthorizerOutput, SdkError<CreateAuthorizerError, HttpResponse>>
pub async fn send( self ) -> Result<CreateAuthorizerOutput, SdkError<CreateAuthorizerError, HttpResponse>>
Sends the request and returns the response.
If an error occurs, an SdkError
will be returned with additional details that
can be matched against.
By default, any retryable failures will be retried twice. Retry behavior is configurable with the RetryConfig, which can be set when configuring the client.
sourcepub fn customize(
self
) -> CustomizableOperation<CreateAuthorizerOutput, CreateAuthorizerError, Self>
pub fn customize( self ) -> CustomizableOperation<CreateAuthorizerOutput, CreateAuthorizerError, Self>
Consumes this builder, creating a customizable operation that can be modified before being sent.
The authorizer name.
The authorizer name.
The authorizer name.
The ARN of the authorizer's Lambda function.
The ARN of the authorizer's Lambda function.
The ARN of the authorizer's Lambda function.
sourcepub fn token_key_name(self, input: impl Into<String>) -> Self
pub fn token_key_name(self, input: impl Into<String>) -> Self
The name of the token key used to extract the token from the HTTP headers.
sourcepub fn set_token_key_name(self, input: Option<String>) -> Self
pub fn set_token_key_name(self, input: Option<String>) -> Self
The name of the token key used to extract the token from the HTTP headers.
sourcepub fn get_token_key_name(&self) -> &Option<String>
pub fn get_token_key_name(&self) -> &Option<String>
The name of the token key used to extract the token from the HTTP headers.
sourcepub fn token_signing_public_keys(
self,
k: impl Into<String>,
v: impl Into<String>
) -> Self
pub fn token_signing_public_keys( self, k: impl Into<String>, v: impl Into<String> ) -> Self
Adds a key-value pair to tokenSigningPublicKeys
.
To override the contents of this collection use set_token_signing_public_keys
.
The public keys used to verify the digital signature returned by your custom authentication service.
sourcepub fn set_token_signing_public_keys(
self,
input: Option<HashMap<String, String>>
) -> Self
pub fn set_token_signing_public_keys( self, input: Option<HashMap<String, String>> ) -> Self
The public keys used to verify the digital signature returned by your custom authentication service.
sourcepub fn get_token_signing_public_keys(&self) -> &Option<HashMap<String, String>>
pub fn get_token_signing_public_keys(&self) -> &Option<HashMap<String, String>>
The public keys used to verify the digital signature returned by your custom authentication service.
sourcepub fn status(self, input: AuthorizerStatus) -> Self
pub fn status(self, input: AuthorizerStatus) -> Self
The status of the create authorizer request.
sourcepub fn set_status(self, input: Option<AuthorizerStatus>) -> Self
pub fn set_status(self, input: Option<AuthorizerStatus>) -> Self
The status of the create authorizer request.
sourcepub fn get_status(&self) -> &Option<AuthorizerStatus>
pub fn get_status(&self) -> &Option<AuthorizerStatus>
The status of the create authorizer request.
Appends an item to tags
.
To override the contents of this collection use set_tags
.
Metadata which can be used to manage the custom authorizer.
For URI Request parameters use format: ...key1=value1&key2=value2...
For the CLI command-line parameter use format: &&tags "key1=value1&key2=value2..."
For the cli-input-json file use format: "tags": "key1=value1&key2=value2..."
Metadata which can be used to manage the custom authorizer.
For URI Request parameters use format: ...key1=value1&key2=value2...
For the CLI command-line parameter use format: &&tags "key1=value1&key2=value2..."
For the cli-input-json file use format: "tags": "key1=value1&key2=value2..."
Metadata which can be used to manage the custom authorizer.
For URI Request parameters use format: ...key1=value1&key2=value2...
For the CLI command-line parameter use format: &&tags "key1=value1&key2=value2..."
For the cli-input-json file use format: "tags": "key1=value1&key2=value2..."
sourcepub fn signing_disabled(self, input: bool) -> Self
pub fn signing_disabled(self, input: bool) -> Self
Specifies whether IoT validates the token signature in an authorization request.
sourcepub fn set_signing_disabled(self, input: Option<bool>) -> Self
pub fn set_signing_disabled(self, input: Option<bool>) -> Self
Specifies whether IoT validates the token signature in an authorization request.
sourcepub fn get_signing_disabled(&self) -> &Option<bool>
pub fn get_signing_disabled(&self) -> &Option<bool>
Specifies whether IoT validates the token signature in an authorization request.
sourcepub fn enable_caching_for_http(self, input: bool) -> Self
pub fn enable_caching_for_http(self, input: bool) -> Self
When true
, the result from the authorizer’s Lambda function is cached for clients that use persistent HTTP connections. The results are cached for the time specified by the Lambda function in refreshAfterInSeconds
. This value does not affect authorization of clients that use MQTT connections.
The default value is false
.
sourcepub fn set_enable_caching_for_http(self, input: Option<bool>) -> Self
pub fn set_enable_caching_for_http(self, input: Option<bool>) -> Self
When true
, the result from the authorizer’s Lambda function is cached for clients that use persistent HTTP connections. The results are cached for the time specified by the Lambda function in refreshAfterInSeconds
. This value does not affect authorization of clients that use MQTT connections.
The default value is false
.
sourcepub fn get_enable_caching_for_http(&self) -> &Option<bool>
pub fn get_enable_caching_for_http(&self) -> &Option<bool>
When true
, the result from the authorizer’s Lambda function is cached for clients that use persistent HTTP connections. The results are cached for the time specified by the Lambda function in refreshAfterInSeconds
. This value does not affect authorization of clients that use MQTT connections.
The default value is false
.
Trait Implementations§
source§impl Clone for CreateAuthorizerFluentBuilder
impl Clone for CreateAuthorizerFluentBuilder
source§fn clone(&self) -> CreateAuthorizerFluentBuilder
fn clone(&self) -> CreateAuthorizerFluentBuilder
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read more