Struct aws_sdk_verifiedpermissions::operation::is_authorized_with_token::IsAuthorizedWithTokenOutput
source · #[non_exhaustive]pub struct IsAuthorizedWithTokenOutput {
pub decision: Option<Decision>,
pub determining_policies: Option<Vec<DeterminingPolicyItem>>,
pub errors: Option<Vec<EvaluationErrorItem>>,
/* private fields */
}
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.decision: Option<Decision>
An authorization decision that indicates if the authorization request should be allowed or denied.
determining_policies: Option<Vec<DeterminingPolicyItem>>
The list of determining policies used to make the authorization decision. For example, if there are multiple matching policies, where at least one is a forbid policy, then because forbid always overrides permit the forbid policies are the determining policies. If all matching policies are permit policies, then those policies are the determining policies. When no policies match and the response is the default DENY, there are no determining policies.
errors: Option<Vec<EvaluationErrorItem>>
Errors that occurred while making an authorization decision. For example, a policy references an entity or entity attribute that does not exist in the slice.
Implementations§
source§impl IsAuthorizedWithTokenOutput
impl IsAuthorizedWithTokenOutput
sourcepub fn decision(&self) -> Option<&Decision>
pub fn decision(&self) -> Option<&Decision>
An authorization decision that indicates if the authorization request should be allowed or denied.
sourcepub fn determining_policies(&self) -> Option<&[DeterminingPolicyItem]>
pub fn determining_policies(&self) -> Option<&[DeterminingPolicyItem]>
The list of determining policies used to make the authorization decision. For example, if there are multiple matching policies, where at least one is a forbid policy, then because forbid always overrides permit the forbid policies are the determining policies. If all matching policies are permit policies, then those policies are the determining policies. When no policies match and the response is the default DENY, there are no determining policies.
sourcepub fn errors(&self) -> Option<&[EvaluationErrorItem]>
pub fn errors(&self) -> Option<&[EvaluationErrorItem]>
Errors that occurred while making an authorization decision. For example, a policy references an entity or entity attribute that does not exist in the slice.
source§impl IsAuthorizedWithTokenOutput
impl IsAuthorizedWithTokenOutput
sourcepub fn builder() -> IsAuthorizedWithTokenOutputBuilder
pub fn builder() -> IsAuthorizedWithTokenOutputBuilder
Creates a new builder-style object to manufacture IsAuthorizedWithTokenOutput
.
Trait Implementations§
source§impl Clone for IsAuthorizedWithTokenOutput
impl Clone for IsAuthorizedWithTokenOutput
source§fn clone(&self) -> IsAuthorizedWithTokenOutput
fn clone(&self) -> IsAuthorizedWithTokenOutput
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for IsAuthorizedWithTokenOutput
impl Debug for IsAuthorizedWithTokenOutput
source§impl PartialEq for IsAuthorizedWithTokenOutput
impl PartialEq for IsAuthorizedWithTokenOutput
source§fn eq(&self, other: &IsAuthorizedWithTokenOutput) -> bool
fn eq(&self, other: &IsAuthorizedWithTokenOutput) -> bool
self
and other
values to be equal, and is used
by ==
.source§impl RequestId for IsAuthorizedWithTokenOutput
impl RequestId for IsAuthorizedWithTokenOutput
source§fn request_id(&self) -> Option<&str>
fn request_id(&self) -> Option<&str>
None
if the service could not be reached.