-
Notifications
You must be signed in to change notification settings - Fork 596
/
api_op_UpdateAccountPasswordPolicy.go
196 lines (175 loc) · 8.03 KB
/
api_op_UpdateAccountPasswordPolicy.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
// Code generated by smithy-go-codegen DO NOT EDIT.
package iam
import (
"context"
"fmt"
awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware"
"github.com/aws/aws-sdk-go-v2/aws/signer/v4"
"github.com/aws/smithy-go/middleware"
smithyhttp "github.com/aws/smithy-go/transport/http"
)
// Updates the password policy settings for the Amazon Web Services account. This
// operation does not support partial updates. No parameters are required, but if
// you do not specify a parameter, that parameter's value reverts to its default
// value. See the Request Parameters section for each parameter's default value.
// Also note that some parameters do not allow the default parameter to be
// explicitly set. Instead, to invoke the default value, do not include that
// parameter when you invoke the operation. For more information about using a
// password policy, see Managing an IAM password policy (https://docs.aws.amazon.com/IAM/latest/UserGuide/Using_ManagingPasswordPolicies.html)
// in the IAM User Guide.
func (c *Client) UpdateAccountPasswordPolicy(ctx context.Context, params *UpdateAccountPasswordPolicyInput, optFns ...func(*Options)) (*UpdateAccountPasswordPolicyOutput, error) {
if params == nil {
params = &UpdateAccountPasswordPolicyInput{}
}
result, metadata, err := c.invokeOperation(ctx, "UpdateAccountPasswordPolicy", params, optFns, c.addOperationUpdateAccountPasswordPolicyMiddlewares)
if err != nil {
return nil, err
}
out := result.(*UpdateAccountPasswordPolicyOutput)
out.ResultMetadata = metadata
return out, nil
}
type UpdateAccountPasswordPolicyInput struct {
// Allows all IAM users in your account to use the Amazon Web Services Management
// Console to change their own passwords. For more information, see Permitting IAM
// users to change their own passwords (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_passwords_enable-user-change.html)
// in the IAM User Guide. If you do not specify a value for this parameter, then
// the operation uses the default value of false . The result is that IAM users in
// the account do not automatically have permissions to change their own password.
AllowUsersToChangePassword bool
// Prevents IAM users who are accessing the account via the Amazon Web Services
// Management Console from setting a new console password after their password has
// expired. The IAM user cannot access the console until an administrator resets
// the password. If you do not specify a value for this parameter, then the
// operation uses the default value of false . The result is that IAM users can
// change their passwords after they expire and continue to sign in as the user. In
// the Amazon Web Services Management Console, the custom password policy option
// Allow users to change their own password gives IAM users permissions to
// iam:ChangePassword for only their user and to the iam:GetAccountPasswordPolicy
// action. This option does not attach a permissions policy to each user, rather
// the permissions are applied at the account-level for all users by IAM. IAM users
// with iam:ChangePassword permission and active access keys can reset their own
// expired console password using the CLI or API.
HardExpiry *bool
// The number of days that an IAM user password is valid. If you do not specify a
// value for this parameter, then the operation uses the default value of 0 . The
// result is that IAM user passwords never expire.
MaxPasswordAge *int32
// The minimum number of characters allowed in an IAM user password. If you do not
// specify a value for this parameter, then the operation uses the default value of
// 6 .
MinimumPasswordLength *int32
// Specifies the number of previous passwords that IAM users are prevented from
// reusing. If you do not specify a value for this parameter, then the operation
// uses the default value of 0 . The result is that IAM users are not prevented
// from reusing previous passwords.
PasswordReusePrevention *int32
// Specifies whether IAM user passwords must contain at least one lowercase
// character from the ISO basic Latin alphabet (a to z). If you do not specify a
// value for this parameter, then the operation uses the default value of false .
// The result is that passwords do not require at least one lowercase character.
RequireLowercaseCharacters bool
// Specifies whether IAM user passwords must contain at least one numeric
// character (0 to 9). If you do not specify a value for this parameter, then the
// operation uses the default value of false . The result is that passwords do not
// require at least one numeric character.
RequireNumbers bool
// Specifies whether IAM user passwords must contain at least one of the following
// non-alphanumeric characters: ! @ # $ % ^ & * ( ) _ + - = [ ] { } | ' If you do
// not specify a value for this parameter, then the operation uses the default
// value of false . The result is that passwords do not require at least one symbol
// character.
RequireSymbols bool
// Specifies whether IAM user passwords must contain at least one uppercase
// character from the ISO basic Latin alphabet (A to Z). If you do not specify a
// value for this parameter, then the operation uses the default value of false .
// The result is that passwords do not require at least one uppercase character.
RequireUppercaseCharacters bool
noSmithyDocumentSerde
}
type UpdateAccountPasswordPolicyOutput struct {
// Metadata pertaining to the operation's result.
ResultMetadata middleware.Metadata
noSmithyDocumentSerde
}
func (c *Client) addOperationUpdateAccountPasswordPolicyMiddlewares(stack *middleware.Stack, options Options) (err error) {
if err := stack.Serialize.Add(&setOperationInputMiddleware{}, middleware.After); err != nil {
return err
}
err = stack.Serialize.Add(&awsAwsquery_serializeOpUpdateAccountPasswordPolicy{}, middleware.After)
if err != nil {
return err
}
err = stack.Deserialize.Add(&awsAwsquery_deserializeOpUpdateAccountPasswordPolicy{}, middleware.After)
if err != nil {
return err
}
if err := addProtocolFinalizerMiddlewares(stack, options, "UpdateAccountPasswordPolicy"); err != nil {
return fmt.Errorf("add protocol finalizers: %v", err)
}
if err = addlegacyEndpointContextSetter(stack, options); err != nil {
return err
}
if err = addSetLoggerMiddleware(stack, options); err != nil {
return err
}
if err = awsmiddleware.AddClientRequestIDMiddleware(stack); err != nil {
return err
}
if err = smithyhttp.AddComputeContentLengthMiddleware(stack); err != nil {
return err
}
if err = addResolveEndpointMiddleware(stack, options); err != nil {
return err
}
if err = v4.AddComputePayloadSHA256Middleware(stack); err != nil {
return err
}
if err = addRetryMiddlewares(stack, options); err != nil {
return err
}
if err = awsmiddleware.AddRawResponseToMetadata(stack); err != nil {
return err
}
if err = awsmiddleware.AddRecordResponseTiming(stack); err != nil {
return err
}
if err = addClientUserAgent(stack, options); err != nil {
return err
}
if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil {
return err
}
if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil {
return err
}
if err = addSetLegacyContextSigningOptionsMiddleware(stack); err != nil {
return err
}
if err = stack.Initialize.Add(newServiceMetadataMiddleware_opUpdateAccountPasswordPolicy(options.Region), middleware.Before); err != nil {
return err
}
if err = awsmiddleware.AddRecursionDetection(stack); err != nil {
return err
}
if err = addRequestIDRetrieverMiddleware(stack); err != nil {
return err
}
if err = addResponseErrorMiddleware(stack); err != nil {
return err
}
if err = addRequestResponseLogging(stack, options); err != nil {
return err
}
if err = addDisableHTTPSMiddleware(stack, options); err != nil {
return err
}
return nil
}
func newServiceMetadataMiddleware_opUpdateAccountPasswordPolicy(region string) *awsmiddleware.RegisterServiceMetadata {
return &awsmiddleware.RegisterServiceMetadata{
Region: region,
ServiceID: ServiceID,
OperationName: "UpdateAccountPasswordPolicy",
}
}