/
api_op_GetAutomatedDiscoveryConfiguration.go
159 lines (141 loc) · 5.43 KB
/
api_op_GetAutomatedDiscoveryConfiguration.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
// Code generated by smithy-go-codegen DO NOT EDIT.
package macie2
import (
"context"
"fmt"
awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware"
"github.com/aws/aws-sdk-go-v2/service/macie2/types"
"github.com/aws/smithy-go/middleware"
smithyhttp "github.com/aws/smithy-go/transport/http"
"time"
)
// Retrieves the configuration settings and status of automated sensitive data
// discovery for an account.
func (c *Client) GetAutomatedDiscoveryConfiguration(ctx context.Context, params *GetAutomatedDiscoveryConfigurationInput, optFns ...func(*Options)) (*GetAutomatedDiscoveryConfigurationOutput, error) {
if params == nil {
params = &GetAutomatedDiscoveryConfigurationInput{}
}
result, metadata, err := c.invokeOperation(ctx, "GetAutomatedDiscoveryConfiguration", params, optFns, c.addOperationGetAutomatedDiscoveryConfigurationMiddlewares)
if err != nil {
return nil, err
}
out := result.(*GetAutomatedDiscoveryConfigurationOutput)
out.ResultMetadata = metadata
return out, nil
}
type GetAutomatedDiscoveryConfigurationInput struct {
noSmithyDocumentSerde
}
type GetAutomatedDiscoveryConfigurationOutput struct {
// The unique identifier for the classification scope that's used when performing
// automated sensitive data discovery for the account. The classification scope
// specifies S3 buckets to exclude from automated sensitive data discovery.
ClassificationScopeId *string
// The date and time, in UTC and extended ISO 8601 format, when automated
// sensitive data discovery was most recently disabled for the account. This value
// is null if automated sensitive data discovery wasn't enabled and subsequently
// disabled for the account.
DisabledAt *time.Time
// The date and time, in UTC and extended ISO 8601 format, when automated
// sensitive data discovery was initially enabled for the account. This value is
// null if automated sensitive data discovery has never been enabled for the
// account.
FirstEnabledAt *time.Time
// The date and time, in UTC and extended ISO 8601 format, when automated
// sensitive data discovery was most recently enabled or disabled for the account.
LastUpdatedAt *time.Time
// The unique identifier for the sensitivity inspection template that's used when
// performing automated sensitive data discovery for the account. The template
// specifies which allow lists, custom data identifiers, and managed data
// identifiers to use when analyzing data.
SensitivityInspectionTemplateId *string
// The current status of the automated sensitive data discovery configuration for
// the account. Possible values are: ENABLED, use the specified settings to perform
// automated sensitive data discovery activities for the account; and, DISABLED,
// don't perform automated sensitive data discovery activities for the account.
Status types.AutomatedDiscoveryStatus
// Metadata pertaining to the operation's result.
ResultMetadata middleware.Metadata
noSmithyDocumentSerde
}
func (c *Client) addOperationGetAutomatedDiscoveryConfigurationMiddlewares(stack *middleware.Stack, options Options) (err error) {
if err := stack.Serialize.Add(&setOperationInputMiddleware{}, middleware.After); err != nil {
return err
}
err = stack.Serialize.Add(&awsRestjson1_serializeOpGetAutomatedDiscoveryConfiguration{}, middleware.After)
if err != nil {
return err
}
err = stack.Deserialize.Add(&awsRestjson1_deserializeOpGetAutomatedDiscoveryConfiguration{}, middleware.After)
if err != nil {
return err
}
if err := addProtocolFinalizerMiddlewares(stack, options, "GetAutomatedDiscoveryConfiguration"); err != nil {
return fmt.Errorf("add protocol finalizers: %v", err)
}
if err = addlegacyEndpointContextSetter(stack, options); err != nil {
return err
}
if err = addSetLoggerMiddleware(stack, options); err != nil {
return err
}
if err = addClientRequestID(stack); err != nil {
return err
}
if err = addComputeContentLength(stack); err != nil {
return err
}
if err = addResolveEndpointMiddleware(stack, options); err != nil {
return err
}
if err = addComputePayloadSHA256(stack); err != nil {
return err
}
if err = addRetry(stack, options); err != nil {
return err
}
if err = addRawResponseToMetadata(stack); err != nil {
return err
}
if err = addRecordResponseTiming(stack); err != nil {
return err
}
if err = addClientUserAgent(stack, options); err != nil {
return err
}
if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil {
return err
}
if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil {
return err
}
if err = addSetLegacyContextSigningOptionsMiddleware(stack); err != nil {
return err
}
if err = stack.Initialize.Add(newServiceMetadataMiddleware_opGetAutomatedDiscoveryConfiguration(options.Region), middleware.Before); err != nil {
return err
}
if err = addRecursionDetection(stack); err != nil {
return err
}
if err = addRequestIDRetrieverMiddleware(stack); err != nil {
return err
}
if err = addResponseErrorMiddleware(stack); err != nil {
return err
}
if err = addRequestResponseLogging(stack, options); err != nil {
return err
}
if err = addDisableHTTPSMiddleware(stack, options); err != nil {
return err
}
return nil
}
func newServiceMetadataMiddleware_opGetAutomatedDiscoveryConfiguration(region string) *awsmiddleware.RegisterServiceMetadata {
return &awsmiddleware.RegisterServiceMetadata{
Region: region,
ServiceID: ServiceID,
OperationName: "GetAutomatedDiscoveryConfiguration",
}
}