aws_sdk_sts/operation/assume_root/_assume_root_output.rs
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126
// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
#[allow(missing_docs)] // documentation missing in model
#[non_exhaustive]
#[derive(::std::clone::Clone, ::std::cmp::PartialEq)]
pub struct AssumeRootOutput {
/// <p>The temporary security credentials, which include an access key ID, a secret access key, and a security token.</p><note>
/// <p>The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.</p>
/// </note>
pub credentials: ::std::option::Option<crate::types::Credentials>,
/// <p>The source identity specified by the principal that is calling the <code>AssumeRoot</code> operation.</p>
/// <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control actions taken with assumed roles</a> in the <i>IAM User Guide</i>.</p>
/// <p>The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-</p>
pub source_identity: ::std::option::Option<::std::string::String>,
_request_id: Option<String>,
}
impl AssumeRootOutput {
/// <p>The temporary security credentials, which include an access key ID, a secret access key, and a security token.</p><note>
/// <p>The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.</p>
/// </note>
pub fn credentials(&self) -> ::std::option::Option<&crate::types::Credentials> {
self.credentials.as_ref()
}
/// <p>The source identity specified by the principal that is calling the <code>AssumeRoot</code> operation.</p>
/// <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control actions taken with assumed roles</a> in the <i>IAM User Guide</i>.</p>
/// <p>The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-</p>
pub fn source_identity(&self) -> ::std::option::Option<&str> {
self.source_identity.as_deref()
}
}
impl ::std::fmt::Debug for AssumeRootOutput {
fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
let mut formatter = f.debug_struct("AssumeRootOutput");
formatter.field("credentials", &"*** Sensitive Data Redacted ***");
formatter.field("source_identity", &self.source_identity);
formatter.field("_request_id", &self._request_id);
formatter.finish()
}
}
impl ::aws_types::request_id::RequestId for AssumeRootOutput {
fn request_id(&self) -> Option<&str> {
self._request_id.as_deref()
}
}
impl AssumeRootOutput {
/// Creates a new builder-style object to manufacture [`AssumeRootOutput`](crate::operation::assume_root::AssumeRootOutput).
pub fn builder() -> crate::operation::assume_root::builders::AssumeRootOutputBuilder {
crate::operation::assume_root::builders::AssumeRootOutputBuilder::default()
}
}
/// A builder for [`AssumeRootOutput`](crate::operation::assume_root::AssumeRootOutput).
#[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default)]
#[non_exhaustive]
pub struct AssumeRootOutputBuilder {
pub(crate) credentials: ::std::option::Option<crate::types::Credentials>,
pub(crate) source_identity: ::std::option::Option<::std::string::String>,
_request_id: Option<String>,
}
impl AssumeRootOutputBuilder {
/// <p>The temporary security credentials, which include an access key ID, a secret access key, and a security token.</p><note>
/// <p>The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.</p>
/// </note>
pub fn credentials(mut self, input: crate::types::Credentials) -> Self {
self.credentials = ::std::option::Option::Some(input);
self
}
/// <p>The temporary security credentials, which include an access key ID, a secret access key, and a security token.</p><note>
/// <p>The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.</p>
/// </note>
pub fn set_credentials(mut self, input: ::std::option::Option<crate::types::Credentials>) -> Self {
self.credentials = input;
self
}
/// <p>The temporary security credentials, which include an access key ID, a secret access key, and a security token.</p><note>
/// <p>The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.</p>
/// </note>
pub fn get_credentials(&self) -> &::std::option::Option<crate::types::Credentials> {
&self.credentials
}
/// <p>The source identity specified by the principal that is calling the <code>AssumeRoot</code> operation.</p>
/// <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control actions taken with assumed roles</a> in the <i>IAM User Guide</i>.</p>
/// <p>The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-</p>
pub fn source_identity(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
self.source_identity = ::std::option::Option::Some(input.into());
self
}
/// <p>The source identity specified by the principal that is calling the <code>AssumeRoot</code> operation.</p>
/// <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control actions taken with assumed roles</a> in the <i>IAM User Guide</i>.</p>
/// <p>The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-</p>
pub fn set_source_identity(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
self.source_identity = input;
self
}
/// <p>The source identity specified by the principal that is calling the <code>AssumeRoot</code> operation.</p>
/// <p>You can use the <code>aws:SourceIdentity</code> condition key to control access based on the value of source identity. For more information about using source identity, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html">Monitor and control actions taken with assumed roles</a> in the <i>IAM User Guide</i>.</p>
/// <p>The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-</p>
pub fn get_source_identity(&self) -> &::std::option::Option<::std::string::String> {
&self.source_identity
}
pub(crate) fn _request_id(mut self, request_id: impl Into<String>) -> Self {
self._request_id = Some(request_id.into());
self
}
pub(crate) fn _set_request_id(&mut self, request_id: Option<String>) -> &mut Self {
self._request_id = request_id;
self
}
/// Consumes the builder and constructs a [`AssumeRootOutput`](crate::operation::assume_root::AssumeRootOutput).
pub fn build(self) -> crate::operation::assume_root::AssumeRootOutput {
crate::operation::assume_root::AssumeRootOutput {
credentials: self.credentials,
source_identity: self.source_identity,
_request_id: self._request_id,
}
}
}
impl ::std::fmt::Debug for AssumeRootOutputBuilder {
fn fmt(&self, f: &mut ::std::fmt::Formatter<'_>) -> ::std::fmt::Result {
let mut formatter = f.debug_struct("AssumeRootOutputBuilder");
formatter.field("credentials", &"*** Sensitive Data Redacted ***");
formatter.field("source_identity", &self.source_identity);
formatter.field("_request_id", &self._request_id);
formatter.finish()
}
}