Source File
api.go
Belonging Package
github.com/aws/aws-sdk-go/service/sts
package sts
import (
)
const opAssumeRole = "AssumeRole"
func ( *STS) ( *AssumeRoleInput) ( *request.Request, *AssumeRoleOutput) {
:= &request.Operation{
Name: opAssumeRole,
HTTPMethod: "POST",
HTTPPath: "/",
}
if == nil {
= &AssumeRoleInput{}
}
= &AssumeRoleOutput{}
= .newRequest(, , )
return
}
func ( *STS) ( *AssumeRoleInput) (*AssumeRoleOutput, error) {
, := .AssumeRoleRequest()
return , .Send()
}
func ( *STS) ( aws.Context, *AssumeRoleInput, ...request.Option) (*AssumeRoleOutput, error) {
, := .AssumeRoleRequest()
.SetContext()
.ApplyOptions(...)
return , .Send()
}
const opAssumeRoleWithSAML = "AssumeRoleWithSAML"
func ( *STS) ( *AssumeRoleWithSAMLInput) ( *request.Request, *AssumeRoleWithSAMLOutput) {
:= &request.Operation{
Name: opAssumeRoleWithSAML,
HTTPMethod: "POST",
HTTPPath: "/",
}
if == nil {
= &AssumeRoleWithSAMLInput{}
}
= &AssumeRoleWithSAMLOutput{}
= .newRequest(, , )
.Config.Credentials = credentials.AnonymousCredentials
return
}
func ( *STS) ( *AssumeRoleWithSAMLInput) (*AssumeRoleWithSAMLOutput, error) {
, := .AssumeRoleWithSAMLRequest()
return , .Send()
}
func ( *STS) ( aws.Context, *AssumeRoleWithSAMLInput, ...request.Option) (*AssumeRoleWithSAMLOutput, error) {
, := .AssumeRoleWithSAMLRequest()
.SetContext()
.ApplyOptions(...)
return , .Send()
}
const opAssumeRoleWithWebIdentity = "AssumeRoleWithWebIdentity"
func ( *STS) ( *AssumeRoleWithWebIdentityInput) ( *request.Request, *AssumeRoleWithWebIdentityOutput) {
:= &request.Operation{
Name: opAssumeRoleWithWebIdentity,
HTTPMethod: "POST",
HTTPPath: "/",
}
if == nil {
= &AssumeRoleWithWebIdentityInput{}
}
= &AssumeRoleWithWebIdentityOutput{}
= .newRequest(, , )
.Config.Credentials = credentials.AnonymousCredentials
return
}
func ( *STS) ( *AssumeRoleWithWebIdentityInput) (*AssumeRoleWithWebIdentityOutput, error) {
, := .AssumeRoleWithWebIdentityRequest()
return , .Send()
}
func ( *STS) ( aws.Context, *AssumeRoleWithWebIdentityInput, ...request.Option) (*AssumeRoleWithWebIdentityOutput, error) {
, := .AssumeRoleWithWebIdentityRequest()
.SetContext()
.ApplyOptions(...)
return , .Send()
}
const opDecodeAuthorizationMessage = "DecodeAuthorizationMessage"
func ( *STS) ( *DecodeAuthorizationMessageInput) ( *request.Request, *DecodeAuthorizationMessageOutput) {
:= &request.Operation{
Name: opDecodeAuthorizationMessage,
HTTPMethod: "POST",
HTTPPath: "/",
}
if == nil {
= &DecodeAuthorizationMessageInput{}
}
= &DecodeAuthorizationMessageOutput{}
= .newRequest(, , )
return
}
func ( *STS) ( *DecodeAuthorizationMessageInput) (*DecodeAuthorizationMessageOutput, error) {
, := .DecodeAuthorizationMessageRequest()
return , .Send()
}
func ( *STS) ( aws.Context, *DecodeAuthorizationMessageInput, ...request.Option) (*DecodeAuthorizationMessageOutput, error) {
, := .DecodeAuthorizationMessageRequest()
.SetContext()
.ApplyOptions(...)
return , .Send()
}
const opGetAccessKeyInfo = "GetAccessKeyInfo"
func ( *STS) ( *GetAccessKeyInfoInput) ( *request.Request, *GetAccessKeyInfoOutput) {
:= &request.Operation{
Name: opGetAccessKeyInfo,
HTTPMethod: "POST",
HTTPPath: "/",
}
if == nil {
= &GetAccessKeyInfoInput{}
}
= &GetAccessKeyInfoOutput{}
= .newRequest(, , )
return
}
func ( *STS) ( *GetAccessKeyInfoInput) (*GetAccessKeyInfoOutput, error) {
, := .GetAccessKeyInfoRequest()
return , .Send()
}
func ( *STS) ( aws.Context, *GetAccessKeyInfoInput, ...request.Option) (*GetAccessKeyInfoOutput, error) {
, := .GetAccessKeyInfoRequest()
.SetContext()
.ApplyOptions(...)
return , .Send()
}
const opGetCallerIdentity = "GetCallerIdentity"
func ( *STS) ( *GetCallerIdentityInput) ( *request.Request, *GetCallerIdentityOutput) {
:= &request.Operation{
Name: opGetCallerIdentity,
HTTPMethod: "POST",
HTTPPath: "/",
}
if == nil {
= &GetCallerIdentityInput{}
}
= &GetCallerIdentityOutput{}
= .newRequest(, , )
return
}
func ( *STS) ( *GetCallerIdentityInput) (*GetCallerIdentityOutput, error) {
, := .GetCallerIdentityRequest()
return , .Send()
}
func ( *STS) ( aws.Context, *GetCallerIdentityInput, ...request.Option) (*GetCallerIdentityOutput, error) {
, := .GetCallerIdentityRequest()
.SetContext()
.ApplyOptions(...)
return , .Send()
}
const opGetFederationToken = "GetFederationToken"
func ( *STS) ( *GetFederationTokenInput) ( *request.Request, *GetFederationTokenOutput) {
:= &request.Operation{
Name: opGetFederationToken,
HTTPMethod: "POST",
HTTPPath: "/",
}
if == nil {
= &GetFederationTokenInput{}
}
= &GetFederationTokenOutput{}
= .newRequest(, , )
return
}
func ( *STS) ( *GetFederationTokenInput) (*GetFederationTokenOutput, error) {
, := .GetFederationTokenRequest()
return , .Send()
}
func ( *STS) ( aws.Context, *GetFederationTokenInput, ...request.Option) (*GetFederationTokenOutput, error) {
, := .GetFederationTokenRequest()
.SetContext()
.ApplyOptions(...)
return , .Send()
}
const opGetSessionToken = "GetSessionToken"
func ( *STS) ( *GetSessionTokenInput) ( *request.Request, *GetSessionTokenOutput) {
:= &request.Operation{
Name: opGetSessionToken,
HTTPMethod: "POST",
HTTPPath: "/",
}
if == nil {
= &GetSessionTokenInput{}
}
= &GetSessionTokenOutput{}
= .newRequest(, , )
return
}
func ( *STS) ( *GetSessionTokenInput) (*GetSessionTokenOutput, error) {
, := .GetSessionTokenRequest()
return , .Send()
}
func ( *STS) ( aws.Context, *GetSessionTokenInput, ...request.Option) (*GetSessionTokenOutput, error) {
, := .GetSessionTokenRequest()
.SetContext()
.ApplyOptions(...)
return , .Send()
}
type AssumeRoleInput struct {
_ struct{} `type:"structure"`
DurationSeconds *int64 `min:"900" type:"integer"`
ExternalId *string `min:"2" type:"string"`
PolicyArns []*PolicyDescriptorType `type:"list"`
RoleSessionName *string `min:"2" type:"string" required:"true"`
SerialNumber *string `min:"9" type:"string"`
TransitiveTagKeys []*string `type:"list"`
}
func ( AssumeRoleInput) () string {
return awsutil.Prettify()
}
func ( AssumeRoleInput) () string {
return .String()
}
func ( *AssumeRoleInput) () error {
:= request.ErrInvalidParams{Context: "AssumeRoleInput"}
if .DurationSeconds != nil && *.DurationSeconds < 900 {
.Add(request.NewErrParamMinValue("DurationSeconds", 900))
}
if .ExternalId != nil && len(*.ExternalId) < 2 {
.Add(request.NewErrParamMinLen("ExternalId", 2))
}
if .Policy != nil && len(*.Policy) < 1 {
.Add(request.NewErrParamMinLen("Policy", 1))
}
if .RoleArn == nil {
.Add(request.NewErrParamRequired("RoleArn"))
}
if .RoleArn != nil && len(*.RoleArn) < 20 {
.Add(request.NewErrParamMinLen("RoleArn", 20))
}
if .RoleSessionName == nil {
.Add(request.NewErrParamRequired("RoleSessionName"))
}
if .RoleSessionName != nil && len(*.RoleSessionName) < 2 {
.Add(request.NewErrParamMinLen("RoleSessionName", 2))
}
if .SerialNumber != nil && len(*.SerialNumber) < 9 {
.Add(request.NewErrParamMinLen("SerialNumber", 9))
}
if .TokenCode != nil && len(*.TokenCode) < 6 {
.Add(request.NewErrParamMinLen("TokenCode", 6))
}
if .PolicyArns != nil {
for , := range .PolicyArns {
if == nil {
continue
}
if := .Validate(); != nil {
.AddNested(fmt.Sprintf("%s[%v]", "PolicyArns", ), .(request.ErrInvalidParams))
}
}
}
if .Tags != nil {
for , := range .Tags {
if == nil {
continue
}
if := .Validate(); != nil {
.AddNested(fmt.Sprintf("%s[%v]", "Tags", ), .(request.ErrInvalidParams))
}
}
}
if .Len() > 0 {
return
}
return nil
}
func ( *AssumeRoleInput) ( int64) *AssumeRoleInput {
.DurationSeconds = &
return
}
func ( *AssumeRoleInput) ( string) *AssumeRoleInput {
.ExternalId = &
return
}
func ( *AssumeRoleInput) ( string) *AssumeRoleInput {
.Policy = &
return
}
func ( *AssumeRoleInput) ( []*PolicyDescriptorType) *AssumeRoleInput {
.PolicyArns =
return
}
func ( *AssumeRoleInput) ( string) *AssumeRoleInput {
.RoleArn = &
return
}
func ( *AssumeRoleInput) ( string) *AssumeRoleInput {
.RoleSessionName = &
return
}
func ( *AssumeRoleInput) ( string) *AssumeRoleInput {
.SerialNumber = &
return
}
func ( *AssumeRoleInput) ( []*Tag) *AssumeRoleInput {
.Tags =
return
}
func ( *AssumeRoleInput) ( string) *AssumeRoleInput {
.TokenCode = &
return
}
func ( *AssumeRoleInput) ( []*string) *AssumeRoleInput {
.TransitiveTagKeys =
return
}
type AssumeRoleOutput struct {
_ struct{} `type:"structure"`
AssumedRoleUser *AssumedRoleUser `type:"structure"`
Credentials *Credentials `type:"structure"`
PackedPolicySize *int64 `type:"integer"`
}
func ( AssumeRoleOutput) () string {
return awsutil.Prettify()
}
func ( AssumeRoleOutput) () string {
return .String()
}
func ( *AssumeRoleOutput) ( *AssumedRoleUser) *AssumeRoleOutput {
.AssumedRoleUser =
return
}
func ( *AssumeRoleOutput) ( *Credentials) *AssumeRoleOutput {
.Credentials =
return
}
func ( *AssumeRoleOutput) ( int64) *AssumeRoleOutput {
.PackedPolicySize = &
return
}
type AssumeRoleWithSAMLInput struct {
_ struct{} `type:"structure"`
DurationSeconds *int64 `min:"900" type:"integer"`
PolicyArns []*PolicyDescriptorType `type:"list"`
PrincipalArn *string `min:"20" type:"string" required:"true"`
SAMLAssertion *string `min:"4" type:"string" required:"true" sensitive:"true"`
}
func ( AssumeRoleWithSAMLInput) () string {
return awsutil.Prettify()
}
func ( AssumeRoleWithSAMLInput) () string {
return .String()
}
func ( *AssumeRoleWithSAMLInput) () error {
:= request.ErrInvalidParams{Context: "AssumeRoleWithSAMLInput"}
if .DurationSeconds != nil && *.DurationSeconds < 900 {
.Add(request.NewErrParamMinValue("DurationSeconds", 900))
}
if .Policy != nil && len(*.Policy) < 1 {
.Add(request.NewErrParamMinLen("Policy", 1))
}
if .PrincipalArn == nil {
.Add(request.NewErrParamRequired("PrincipalArn"))
}
if .PrincipalArn != nil && len(*.PrincipalArn) < 20 {
.Add(request.NewErrParamMinLen("PrincipalArn", 20))
}
if .RoleArn == nil {
.Add(request.NewErrParamRequired("RoleArn"))
}
if .RoleArn != nil && len(*.RoleArn) < 20 {
.Add(request.NewErrParamMinLen("RoleArn", 20))
}
if .SAMLAssertion == nil {
.Add(request.NewErrParamRequired("SAMLAssertion"))
}
if .SAMLAssertion != nil && len(*.SAMLAssertion) < 4 {
.Add(request.NewErrParamMinLen("SAMLAssertion", 4))
}
if .PolicyArns != nil {
for , := range .PolicyArns {
if == nil {
continue
}
if := .Validate(); != nil {
.AddNested(fmt.Sprintf("%s[%v]", "PolicyArns", ), .(request.ErrInvalidParams))
}
}
}
if .Len() > 0 {
return
}
return nil
}
func ( *AssumeRoleWithSAMLInput) ( int64) *AssumeRoleWithSAMLInput {
.DurationSeconds = &
return
}
func ( *AssumeRoleWithSAMLInput) ( string) *AssumeRoleWithSAMLInput {
.Policy = &
return
}
func ( *AssumeRoleWithSAMLInput) ( []*PolicyDescriptorType) *AssumeRoleWithSAMLInput {
.PolicyArns =
return
}
func ( *AssumeRoleWithSAMLInput) ( string) *AssumeRoleWithSAMLInput {
.PrincipalArn = &
return
}
func ( *AssumeRoleWithSAMLInput) ( string) *AssumeRoleWithSAMLInput {
.RoleArn = &
return
}
func ( *AssumeRoleWithSAMLInput) ( string) *AssumeRoleWithSAMLInput {
.SAMLAssertion = &
return
}
type AssumeRoleWithSAMLOutput struct {
_ struct{} `type:"structure"`
AssumedRoleUser *AssumedRoleUser `type:"structure"`
Credentials *Credentials `type:"structure"`
NameQualifier *string `type:"string"`
PackedPolicySize *int64 `type:"integer"`
SubjectType *string `type:"string"`
}
func ( AssumeRoleWithSAMLOutput) () string {
return awsutil.Prettify()
}
func ( AssumeRoleWithSAMLOutput) () string {
return .String()
}
func ( *AssumeRoleWithSAMLOutput) ( *AssumedRoleUser) *AssumeRoleWithSAMLOutput {
.AssumedRoleUser =
return
}
func ( *AssumeRoleWithSAMLOutput) ( string) *AssumeRoleWithSAMLOutput {
.Audience = &
return
}
func ( *AssumeRoleWithSAMLOutput) ( *Credentials) *AssumeRoleWithSAMLOutput {
.Credentials =
return
}
func ( *AssumeRoleWithSAMLOutput) ( string) *AssumeRoleWithSAMLOutput {
.Issuer = &
return
}
func ( *AssumeRoleWithSAMLOutput) ( string) *AssumeRoleWithSAMLOutput {
.NameQualifier = &
return
}
func ( *AssumeRoleWithSAMLOutput) ( int64) *AssumeRoleWithSAMLOutput {
.PackedPolicySize = &
return
}
func ( *AssumeRoleWithSAMLOutput) ( string) *AssumeRoleWithSAMLOutput {
.Subject = &
return
}
func ( *AssumeRoleWithSAMLOutput) ( string) *AssumeRoleWithSAMLOutput {
.SubjectType = &
return
}
type AssumeRoleWithWebIdentityInput struct {
_ struct{} `type:"structure"`
DurationSeconds *int64 `min:"900" type:"integer"`
PolicyArns []*PolicyDescriptorType `type:"list"`
ProviderId *string `min:"4" type:"string"`
RoleSessionName *string `min:"2" type:"string" required:"true"`
WebIdentityToken *string `min:"4" type:"string" required:"true" sensitive:"true"`
}
func ( AssumeRoleWithWebIdentityInput) () string {
return awsutil.Prettify()
}
func ( AssumeRoleWithWebIdentityInput) () string {
return .String()
}
func ( *AssumeRoleWithWebIdentityInput) () error {
:= request.ErrInvalidParams{Context: "AssumeRoleWithWebIdentityInput"}
if .DurationSeconds != nil && *.DurationSeconds < 900 {
.Add(request.NewErrParamMinValue("DurationSeconds", 900))
}
if .Policy != nil && len(*.Policy) < 1 {
.Add(request.NewErrParamMinLen("Policy", 1))
}
if .ProviderId != nil && len(*.ProviderId) < 4 {
.Add(request.NewErrParamMinLen("ProviderId", 4))
}
if .RoleArn == nil {
.Add(request.NewErrParamRequired("RoleArn"))
}
if .RoleArn != nil && len(*.RoleArn) < 20 {
.Add(request.NewErrParamMinLen("RoleArn", 20))
}
if .RoleSessionName == nil {
.Add(request.NewErrParamRequired("RoleSessionName"))
}
if .RoleSessionName != nil && len(*.RoleSessionName) < 2 {
.Add(request.NewErrParamMinLen("RoleSessionName", 2))
}
if .WebIdentityToken == nil {
.Add(request.NewErrParamRequired("WebIdentityToken"))
}
if .WebIdentityToken != nil && len(*.WebIdentityToken) < 4 {
.Add(request.NewErrParamMinLen("WebIdentityToken", 4))
}
if .PolicyArns != nil {
for , := range .PolicyArns {
if == nil {
continue
}
if := .Validate(); != nil {
.AddNested(fmt.Sprintf("%s[%v]", "PolicyArns", ), .(request.ErrInvalidParams))
}
}
}
if .Len() > 0 {
return
}
return nil
}
func ( *AssumeRoleWithWebIdentityInput) ( int64) *AssumeRoleWithWebIdentityInput {
.DurationSeconds = &
return
}
func ( *AssumeRoleWithWebIdentityInput) ( string) *AssumeRoleWithWebIdentityInput {
.Policy = &
return
}
func ( *AssumeRoleWithWebIdentityInput) ( []*PolicyDescriptorType) *AssumeRoleWithWebIdentityInput {
.PolicyArns =
return
}
func ( *AssumeRoleWithWebIdentityInput) ( string) *AssumeRoleWithWebIdentityInput {
.ProviderId = &
return
}
func ( *AssumeRoleWithWebIdentityInput) ( string) *AssumeRoleWithWebIdentityInput {
.RoleArn = &
return
}
func ( *AssumeRoleWithWebIdentityInput) ( string) *AssumeRoleWithWebIdentityInput {
.RoleSessionName = &
return
}
func ( *AssumeRoleWithWebIdentityInput) ( string) *AssumeRoleWithWebIdentityInput {
.WebIdentityToken = &
return
}
type AssumeRoleWithWebIdentityOutput struct {
_ struct{} `type:"structure"`
AssumedRoleUser *AssumedRoleUser `type:"structure"`
Credentials *Credentials `type:"structure"`
PackedPolicySize *int64 `type:"integer"`
SubjectFromWebIdentityToken *string `min:"6" type:"string"`
}
func ( AssumeRoleWithWebIdentityOutput) () string {
return awsutil.Prettify()
}
func ( AssumeRoleWithWebIdentityOutput) () string {
return .String()
}
func ( *AssumeRoleWithWebIdentityOutput) ( *AssumedRoleUser) *AssumeRoleWithWebIdentityOutput {
.AssumedRoleUser =
return
}
func ( *AssumeRoleWithWebIdentityOutput) ( string) *AssumeRoleWithWebIdentityOutput {
.Audience = &
return
}
func ( *AssumeRoleWithWebIdentityOutput) ( *Credentials) *AssumeRoleWithWebIdentityOutput {
.Credentials =
return
}
func ( *AssumeRoleWithWebIdentityOutput) ( int64) *AssumeRoleWithWebIdentityOutput {
.PackedPolicySize = &
return
}
func ( *AssumeRoleWithWebIdentityOutput) ( string) *AssumeRoleWithWebIdentityOutput {
.Provider = &
return
}
func ( *AssumeRoleWithWebIdentityOutput) ( string) *AssumeRoleWithWebIdentityOutput {
.SubjectFromWebIdentityToken = &
return
}
type AssumedRoleUser struct {
_ struct{} `type:"structure"`
AssumedRoleId *string `min:"2" type:"string" required:"true"`
}
func ( AssumedRoleUser) () string {
return awsutil.Prettify()
}
func ( AssumedRoleUser) () string {
return .String()
}
func ( *AssumedRoleUser) ( string) *AssumedRoleUser {
.Arn = &
return
}
func ( *AssumedRoleUser) ( string) *AssumedRoleUser {
.AssumedRoleId = &
return
}
type Credentials struct {
_ struct{} `type:"structure"`
AccessKeyId *string `min:"16" type:"string" required:"true"`
Expiration *time.Time `type:"timestamp" required:"true"`
SecretAccessKey *string `type:"string" required:"true"`
SessionToken *string `type:"string" required:"true"`
}
func ( Credentials) () string {
return awsutil.Prettify()
}
func ( Credentials) () string {
return .String()
}
func ( *Credentials) ( string) *Credentials {
.AccessKeyId = &
return
}
func ( *Credentials) ( time.Time) *Credentials {
.Expiration = &
return
}
func ( *Credentials) ( string) *Credentials {
.SecretAccessKey = &
return
}
func ( *Credentials) ( string) *Credentials {
.SessionToken = &
return
}
type DecodeAuthorizationMessageInput struct {
_ struct{} `type:"structure"`
EncodedMessage *string `min:"1" type:"string" required:"true"`
}
func ( DecodeAuthorizationMessageInput) () string {
return awsutil.Prettify()
}
func ( DecodeAuthorizationMessageInput) () string {
return .String()
}
func ( *DecodeAuthorizationMessageInput) () error {
:= request.ErrInvalidParams{Context: "DecodeAuthorizationMessageInput"}
if .EncodedMessage == nil {
.Add(request.NewErrParamRequired("EncodedMessage"))
}
if .EncodedMessage != nil && len(*.EncodedMessage) < 1 {
.Add(request.NewErrParamMinLen("EncodedMessage", 1))
}
if .Len() > 0 {
return
}
return nil
}
func ( *DecodeAuthorizationMessageInput) ( string) *DecodeAuthorizationMessageInput {
.EncodedMessage = &
return
}
type DecodeAuthorizationMessageOutput struct {
_ struct{} `type:"structure"`
DecodedMessage *string `type:"string"`
}
func ( DecodeAuthorizationMessageOutput) () string {
return awsutil.Prettify()
}
func ( DecodeAuthorizationMessageOutput) () string {
return .String()
}
func ( *DecodeAuthorizationMessageOutput) ( string) *DecodeAuthorizationMessageOutput {
.DecodedMessage = &
return
}
type FederatedUser struct {
_ struct{} `type:"structure"`
FederatedUserId *string `min:"2" type:"string" required:"true"`
}
func ( FederatedUser) () string {
return awsutil.Prettify()
}
func ( FederatedUser) () string {
return .String()
}
func ( *FederatedUser) ( string) *FederatedUser {
.Arn = &
return
}
func ( *FederatedUser) ( string) *FederatedUser {
.FederatedUserId = &
return
}
type GetAccessKeyInfoInput struct {
_ struct{} `type:"structure"`
AccessKeyId *string `min:"16" type:"string" required:"true"`
}
func ( GetAccessKeyInfoInput) () string {
return awsutil.Prettify()
}
func ( GetAccessKeyInfoInput) () string {
return .String()
}
func ( *GetAccessKeyInfoInput) () error {
:= request.ErrInvalidParams{Context: "GetAccessKeyInfoInput"}
if .AccessKeyId == nil {
.Add(request.NewErrParamRequired("AccessKeyId"))
}
if .AccessKeyId != nil && len(*.AccessKeyId) < 16 {
.Add(request.NewErrParamMinLen("AccessKeyId", 16))
}
if .Len() > 0 {
return
}
return nil
}
func ( *GetAccessKeyInfoInput) ( string) *GetAccessKeyInfoInput {
.AccessKeyId = &
return
}
type GetAccessKeyInfoOutput struct {
_ struct{} `type:"structure"`
func ( GetAccessKeyInfoOutput) () string {
return awsutil.Prettify()
}
func ( GetAccessKeyInfoOutput) () string {
return .String()
}
func ( *GetAccessKeyInfoOutput) ( string) *GetAccessKeyInfoOutput {
.Account = &
return
}
type GetCallerIdentityInput struct {
_ struct{} `type:"structure"`
}
func ( GetCallerIdentityInput) () string {
return awsutil.Prettify()
}
func ( GetCallerIdentityInput) () string {
return .String()
}
type GetCallerIdentityOutput struct {
_ struct{} `type:"structure"`
func ( GetCallerIdentityOutput) () string {
return awsutil.Prettify()
}
func ( GetCallerIdentityOutput) () string {
return .String()
}
func ( *GetCallerIdentityOutput) ( string) *GetCallerIdentityOutput {
.Account = &
return
}
func ( *GetCallerIdentityOutput) ( string) *GetCallerIdentityOutput {
.Arn = &
return
}
func ( *GetCallerIdentityOutput) ( string) *GetCallerIdentityOutput {
.UserId = &
return
}
type GetFederationTokenInput struct {
_ struct{} `type:"structure"`
DurationSeconds *int64 `min:"900" type:"integer"`
PolicyArns []*PolicyDescriptorType `type:"list"`
func ( GetFederationTokenInput) () string {
return awsutil.Prettify()
}
func ( GetFederationTokenInput) () string {
return .String()
}
func ( *GetFederationTokenInput) () error {
:= request.ErrInvalidParams{Context: "GetFederationTokenInput"}
if .DurationSeconds != nil && *.DurationSeconds < 900 {
.Add(request.NewErrParamMinValue("DurationSeconds", 900))
}
if .Name == nil {
.Add(request.NewErrParamRequired("Name"))
}
if .Name != nil && len(*.Name) < 2 {
.Add(request.NewErrParamMinLen("Name", 2))
}
if .Policy != nil && len(*.Policy) < 1 {
.Add(request.NewErrParamMinLen("Policy", 1))
}
if .PolicyArns != nil {
for , := range .PolicyArns {
if == nil {
continue
}
if := .Validate(); != nil {
.AddNested(fmt.Sprintf("%s[%v]", "PolicyArns", ), .(request.ErrInvalidParams))
}
}
}
if .Tags != nil {
for , := range .Tags {
if == nil {
continue
}
if := .Validate(); != nil {
.AddNested(fmt.Sprintf("%s[%v]", "Tags", ), .(request.ErrInvalidParams))
}
}
}
if .Len() > 0 {
return
}
return nil
}
func ( *GetFederationTokenInput) ( int64) *GetFederationTokenInput {
.DurationSeconds = &
return
}
func ( *GetFederationTokenInput) ( string) *GetFederationTokenInput {
.Name = &
return
}
func ( *GetFederationTokenInput) ( string) *GetFederationTokenInput {
.Policy = &
return
}
func ( *GetFederationTokenInput) ( []*PolicyDescriptorType) *GetFederationTokenInput {
.PolicyArns =
return
}
func ( *GetFederationTokenInput) ( []*Tag) *GetFederationTokenInput {
.Tags =
return
}
type GetFederationTokenOutput struct {
_ struct{} `type:"structure"`
Credentials *Credentials `type:"structure"`
FederatedUser *FederatedUser `type:"structure"`
PackedPolicySize *int64 `type:"integer"`
}
func ( GetFederationTokenOutput) () string {
return awsutil.Prettify()
}
func ( GetFederationTokenOutput) () string {
return .String()
}
func ( *GetFederationTokenOutput) ( *Credentials) *GetFederationTokenOutput {
.Credentials =
return
}
func ( *GetFederationTokenOutput) ( *FederatedUser) *GetFederationTokenOutput {
.FederatedUser =
return
}
func ( *GetFederationTokenOutput) ( int64) *GetFederationTokenOutput {
.PackedPolicySize = &
return
}
type GetSessionTokenInput struct {
_ struct{} `type:"structure"`
DurationSeconds *int64 `min:"900" type:"integer"`
SerialNumber *string `min:"9" type:"string"`
func ( GetSessionTokenInput) () string {
return awsutil.Prettify()
}
func ( GetSessionTokenInput) () string {
return .String()
}
func ( *GetSessionTokenInput) () error {
:= request.ErrInvalidParams{Context: "GetSessionTokenInput"}
if .DurationSeconds != nil && *.DurationSeconds < 900 {
.Add(request.NewErrParamMinValue("DurationSeconds", 900))
}
if .SerialNumber != nil && len(*.SerialNumber) < 9 {
.Add(request.NewErrParamMinLen("SerialNumber", 9))
}
if .TokenCode != nil && len(*.TokenCode) < 6 {
.Add(request.NewErrParamMinLen("TokenCode", 6))
}
if .Len() > 0 {
return
}
return nil
}
func ( *GetSessionTokenInput) ( int64) *GetSessionTokenInput {
.DurationSeconds = &
return
}
func ( *GetSessionTokenInput) ( string) *GetSessionTokenInput {
.SerialNumber = &
return
}
func ( *GetSessionTokenInput) ( string) *GetSessionTokenInput {
.TokenCode = &
return
}
type GetSessionTokenOutput struct {
_ struct{} `type:"structure"`
Credentials *Credentials `type:"structure"`
}
func ( GetSessionTokenOutput) () string {
return awsutil.Prettify()
}
func ( GetSessionTokenOutput) () string {
return .String()
}
func ( *GetSessionTokenOutput) ( *Credentials) *GetSessionTokenOutput {
.Credentials =
return
}
type PolicyDescriptorType struct {
_ struct{} `type:"structure"`
func ( PolicyDescriptorType) () string {
return awsutil.Prettify()
}
func ( PolicyDescriptorType) () string {
return .String()
}
func ( *PolicyDescriptorType) () error {
:= request.ErrInvalidParams{Context: "PolicyDescriptorType"}
if .Arn != nil && len(*.Arn) < 20 {
.Add(request.NewErrParamMinLen("Arn", 20))
}
if .Len() > 0 {
return
}
return nil
}
func ( *PolicyDescriptorType) ( string) *PolicyDescriptorType {
.Arn = &
return
}
type Tag struct {
_ struct{} `type:"structure"`
func ( *Tag) () error {
:= request.ErrInvalidParams{Context: "Tag"}
if .Key == nil {
.Add(request.NewErrParamRequired("Key"))
}
if .Key != nil && len(*.Key) < 1 {
.Add(request.NewErrParamMinLen("Key", 1))
}
if .Value == nil {
.Add(request.NewErrParamRequired("Value"))
}
if .Len() > 0 {
return
}
return nil
}
![]() |
The pages are generated with Golds v0.3.2-preview. (GOOS=darwin GOARCH=amd64) Golds is a Go 101 project developed by Tapir Liu. PR and bug reports are welcome and can be submitted to the issue list. Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |