-
Notifications
You must be signed in to change notification settings - Fork 596
/
api_op_SetSecurityTokenServicePreferences.go
138 lines (128 loc) · 5.35 KB
/
api_op_SetSecurityTokenServicePreferences.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
// Code generated by smithy-go-codegen DO NOT EDIT.
package iam
import (
"context"
awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware"
"github.com/aws/aws-sdk-go-v2/aws/signer/v4"
"github.com/aws/aws-sdk-go-v2/service/iam/types"
"github.com/aws/smithy-go/middleware"
smithyhttp "github.com/aws/smithy-go/transport/http"
)
// Sets the specified version of the global endpoint token as the token version
// used for the AWS account. By default, AWS Security Token Service (STS) is
// available as a global service, and all STS requests go to a single endpoint at
// https://sts.amazonaws.com. AWS recommends using Regional STS endpoints to reduce
// latency, build in redundancy, and increase session token availability. For
// information about Regional endpoints for STS, see AWS AWS Security Token Service
// endpoints and quotas (https://docs.aws.amazon.com/general/latest/gr/sts.html) in
// the AWS General Reference. If you make an STS call to the global endpoint, the
// resulting session tokens might be valid in some Regions but not others. It
// depends on the version that is set in this operation. Version 1 tokens are valid
// only in AWS Regions that are available by default. These tokens do not work in
// manually enabled Regions, such as Asia Pacific (Hong Kong). Version 2 tokens are
// valid in all Regions. However, version 2 tokens are longer and might affect
// systems where you temporarily store tokens. For information, see Activating and
// deactivating STS in an AWS region
// (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html)
// in the IAM User Guide. To view the current session token version, see the
// GlobalEndpointTokenVersion entry in the response of the GetAccountSummary
// operation.
func (c *Client) SetSecurityTokenServicePreferences(ctx context.Context, params *SetSecurityTokenServicePreferencesInput, optFns ...func(*Options)) (*SetSecurityTokenServicePreferencesOutput, error) {
if params == nil {
params = &SetSecurityTokenServicePreferencesInput{}
}
result, metadata, err := c.invokeOperation(ctx, "SetSecurityTokenServicePreferences", params, optFns, addOperationSetSecurityTokenServicePreferencesMiddlewares)
if err != nil {
return nil, err
}
out := result.(*SetSecurityTokenServicePreferencesOutput)
out.ResultMetadata = metadata
return out, nil
}
type SetSecurityTokenServicePreferencesInput struct {
// The version of the global endpoint token. Version 1 tokens are valid only in AWS
// Regions that are available by default. These tokens do not work in manually
// enabled Regions, such as Asia Pacific (Hong Kong). Version 2 tokens are valid in
// all Regions. However, version 2 tokens are longer and might affect systems where
// you temporarily store tokens. For information, see Activating and deactivating
// STS in an AWS region
// (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_enable-regions.html)
// in the IAM User Guide.
//
// This member is required.
GlobalEndpointTokenVersion types.GlobalEndpointTokenVersion
}
type SetSecurityTokenServicePreferencesOutput struct {
// Metadata pertaining to the operation's result.
ResultMetadata middleware.Metadata
}
func addOperationSetSecurityTokenServicePreferencesMiddlewares(stack *middleware.Stack, options Options) (err error) {
err = stack.Serialize.Add(&awsAwsquery_serializeOpSetSecurityTokenServicePreferences{}, middleware.After)
if err != nil {
return err
}
err = stack.Deserialize.Add(&awsAwsquery_deserializeOpSetSecurityTokenServicePreferences{}, middleware.After)
if err != nil {
return err
}
if err = addSetLoggerMiddleware(stack, options); err != nil {
return err
}
if err = awsmiddleware.AddClientRequestIDMiddleware(stack); err != nil {
return err
}
if err = smithyhttp.AddComputeContentLengthMiddleware(stack); err != nil {
return err
}
if err = addResolveEndpointMiddleware(stack, options); err != nil {
return err
}
if err = v4.AddComputePayloadSHA256Middleware(stack); err != nil {
return err
}
if err = addRetryMiddlewares(stack, options); err != nil {
return err
}
if err = addHTTPSignerV4Middleware(stack, options); err != nil {
return err
}
if err = awsmiddleware.AddRawResponseToMetadata(stack); err != nil {
return err
}
if err = awsmiddleware.AddRecordResponseTiming(stack); err != nil {
return err
}
if err = addClientUserAgent(stack); err != nil {
return err
}
if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil {
return err
}
if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil {
return err
}
if err = addOpSetSecurityTokenServicePreferencesValidationMiddleware(stack); err != nil {
return err
}
if err = stack.Initialize.Add(newServiceMetadataMiddleware_opSetSecurityTokenServicePreferences(options.Region), middleware.Before); err != nil {
return err
}
if err = addRequestIDRetrieverMiddleware(stack); err != nil {
return err
}
if err = addResponseErrorMiddleware(stack); err != nil {
return err
}
if err = addRequestResponseLogging(stack, options); err != nil {
return err
}
return nil
}
func newServiceMetadataMiddleware_opSetSecurityTokenServicePreferences(region string) *awsmiddleware.RegisterServiceMetadata {
return &awsmiddleware.RegisterServiceMetadata{
Region: region,
ServiceID: ServiceID,
SigningName: "iam",
OperationName: "SetSecurityTokenServicePreferences",
}
}