1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
#[allow(missing_docs)] // documentation missing in model
#[non_exhaustive]
#[derive(::std::clone::Clone, ::std::cmp::PartialEq)]
pub struct AssumeRootOutput {
/// <p>The temporary security credentials, which include an access key ID, a secret access key, and a security token.</p><note>
/// <p>The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.</p>
/// </note>
pub credentials: ::std::option::Option<crate::types::Credentials>,
/// <p>The source identity specified by the principal that is calling the <code>AssumeRoot</code> operation.</p>
/// <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control actions taken with assumed roles</a> in the <i>IAM User Guide</i>.</p>
/// <p>The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-</p>
pub source_identity: ::std::option::Option<::std::string::String>,
_request_id: Option<String>,
}
impl AssumeRootOutput {
/// <p>The temporary security credentials, which include an access key ID, a secret access key, and a security token.</p><note>
/// <p>The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.</p>
/// </note>
pub fn credentials(&self) -> ::std::option::Option<&crate::types::Credentials> {
self.credentials.as_ref()
}
/// <p>The source identity specified by the principal that is calling the <code>AssumeRoot</code> operation.</p>
/// <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control actions taken with assumed roles</a> in the <i>IAM User Guide</i>.</p>
/// <p>The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-</p>
pub fn source_identity(&self) -> ::std::option::Option<&str> {
self.source_identity.as_deref()
}
}
impl ::std::fmt::Debug for AssumeRootOutput {
fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
let mut formatter = f.debug_struct("AssumeRootOutput");
formatter.field("credentials", &"*** Sensitive Data Redacted ***");
formatter.field("source_identity", &self.source_identity);
formatter.field("_request_id", &self._request_id);
formatter.finish()
}
}
impl ::aws_types::request_id::RequestId for AssumeRootOutput {
fn request_id(&self) -> Option<&str> {
self._request_id.as_deref()
}
}
impl AssumeRootOutput {
/// Creates a new builder-style object to manufacture [`AssumeRootOutput`](crate::operation::assume_root::AssumeRootOutput).
pub fn builder() -> crate::operation::assume_root::builders::AssumeRootOutputBuilder {
crate::operation::assume_root::builders::AssumeRootOutputBuilder::default()
}
}
/// A builder for [`AssumeRootOutput`](crate::operation::assume_root::AssumeRootOutput).
#[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default)]
#[non_exhaustive]
pub struct AssumeRootOutputBuilder {
pub(crate) credentials: ::std::option::Option<crate::types::Credentials>,
pub(crate) source_identity: ::std::option::Option<::std::string::String>,
_request_id: Option<String>,
}
impl AssumeRootOutputBuilder {
/// <p>The temporary security credentials, which include an access key ID, a secret access key, and a security token.</p><note>
/// <p>The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.</p>
/// </note>
pub fn credentials(mut self, input: crate::types::Credentials) -> Self {
self.credentials = ::std::option::Option::Some(input);
self
}
/// <p>The temporary security credentials, which include an access key ID, a secret access key, and a security token.</p><note>
/// <p>The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.</p>
/// </note>
pub fn set_credentials(mut self, input: ::std::option::Option<crate::types::Credentials>) -> Self {
self.credentials = input;
self
}
/// <p>The temporary security credentials, which include an access key ID, a secret access key, and a security token.</p><note>
/// <p>The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.</p>
/// </note>
pub fn get_credentials(&self) -> &::std::option::Option<crate::types::Credentials> {
&self.credentials
}
/// <p>The source identity specified by the principal that is calling the <code>AssumeRoot</code> operation.</p>
/// <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control actions taken with assumed roles</a> in the <i>IAM User Guide</i>.</p>
/// <p>The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-</p>
pub fn source_identity(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
self.source_identity = ::std::option::Option::Some(input.into());
self
}
/// <p>The source identity specified by the principal that is calling the <code>AssumeRoot</code> operation.</p>
/// <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control actions taken with assumed roles</a> in the <i>IAM User Guide</i>.</p>
/// <p>The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-</p>
pub fn set_source_identity(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
self.source_identity = input;
self
}
/// <p>The source identity specified by the principal that is calling the <code>AssumeRoot</code> operation.</p>
/// <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control actions taken with assumed roles</a> in the <i>IAM User Guide</i>.</p>
/// <p>The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-</p>
pub fn get_source_identity(&self) -> &::std::option::Option<::std::string::String> {
&self.source_identity
}
pub(crate) fn _request_id(mut self, request_id: impl Into<String>) -> Self {
self._request_id = Some(request_id.into());
self
}
pub(crate) fn _set_request_id(&mut self, request_id: Option<String>) -> &mut Self {
self._request_id = request_id;
self
}
/// Consumes the builder and constructs a [`AssumeRootOutput`](crate::operation::assume_root::AssumeRootOutput).
pub fn build(self) -> crate::operation::assume_root::AssumeRootOutput {
crate::operation::assume_root::AssumeRootOutput {
credentials: self.credentials,
source_identity: self.source_identity,
_request_id: self._request_id,
}
}
}
impl ::std::fmt::Debug for AssumeRootOutputBuilder {
fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
let mut formatter = f.debug_struct("AssumeRootOutputBuilder");
formatter.field("credentials", &"*** Sensitive Data Redacted ***");
formatter.field("source_identity", &self.source_identity);
formatter.field("_request_id", &self._request_id);
formatter.finish()
}
}