/
api_op_DetachPolicy.go
150 lines (139 loc) · 5.28 KB
/
api_op_DetachPolicy.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
// Code generated by smithy-go-codegen DO NOT EDIT.
package organizations
import (
"context"
awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware"
"github.com/aws/aws-sdk-go-v2/aws/signer/v4"
"github.com/aws/smithy-go/middleware"
smithyhttp "github.com/aws/smithy-go/transport/http"
)
// Detaches a policy from a target root, organizational unit (OU), or account. If
// the policy being detached is a service control policy (SCP), the changes to
// permissions for AWS Identity and Access Management (IAM) users and roles in
// affected accounts are immediate. Every root, OU, and account must have at least
// one SCP attached. If you want to replace the default FullAWSAccess policy with
// an SCP that limits the permissions that can be delegated, you must attach the
// replacement SCP before you can remove the default SCP. This is the authorization
// strategy of an "allow list
// (https://docs.aws.amazon.com/organizations/latest/userguide/SCP_strategies.html#orgs_policies_allowlist)".
// If you instead attach a second SCP and leave the FullAWSAccess SCP still
// attached, and specify "Effect": "Deny" in the second SCP to override the
// "Effect": "Allow" in the FullAWSAccess policy (or any other attached SCP),
// you're using the authorization strategy of a "deny list
// (https://docs.aws.amazon.com/organizations/latest/userguide/SCP_strategies.html#orgs_policies_denylist)".
// This operation can be called only from the organization's management account.
func (c *Client) DetachPolicy(ctx context.Context, params *DetachPolicyInput, optFns ...func(*Options)) (*DetachPolicyOutput, error) {
if params == nil {
params = &DetachPolicyInput{}
}
result, metadata, err := c.invokeOperation(ctx, "DetachPolicy", params, optFns, addOperationDetachPolicyMiddlewares)
if err != nil {
return nil, err
}
out := result.(*DetachPolicyOutput)
out.ResultMetadata = metadata
return out, nil
}
type DetachPolicyInput struct {
// The unique identifier (ID) of the policy you want to detach. You can get the ID
// from the ListPolicies or ListPoliciesForTarget operations. The regex pattern
// (http://wikipedia.org/wiki/regex) for a policy ID string requires "p-" followed
// by from 8 to 128 lowercase or uppercase letters, digits, or the underscore
// character (_).
//
// This member is required.
PolicyId *string
// The unique identifier (ID) of the root, OU, or account that you want to detach
// the policy from. You can get the ID from the ListRoots,
// ListOrganizationalUnitsForParent, or ListAccounts operations. The regex pattern
// (http://wikipedia.org/wiki/regex) for a target ID string requires one of the
// following:
//
// * Root - A string that begins with "r-" followed by from 4 to 32
// lowercase letters or digits.
//
// * Account - A string that consists of exactly 12
// digits.
//
// * Organizational unit (OU) - A string that begins with "ou-" followed
// by from 4 to 32 lowercase letters or digits (the ID of the root that the OU is
// in). This string is followed by a second "-" dash and from 8 to 32 additional
// lowercase letters or digits.
//
// This member is required.
TargetId *string
}
type DetachPolicyOutput struct {
// Metadata pertaining to the operation's result.
ResultMetadata middleware.Metadata
}
func addOperationDetachPolicyMiddlewares(stack *middleware.Stack, options Options) (err error) {
err = stack.Serialize.Add(&awsAwsjson11_serializeOpDetachPolicy{}, middleware.After)
if err != nil {
return err
}
err = stack.Deserialize.Add(&awsAwsjson11_deserializeOpDetachPolicy{}, middleware.After)
if err != nil {
return err
}
if err = addSetLoggerMiddleware(stack, options); err != nil {
return err
}
if err = awsmiddleware.AddClientRequestIDMiddleware(stack); err != nil {
return err
}
if err = smithyhttp.AddComputeContentLengthMiddleware(stack); err != nil {
return err
}
if err = addResolveEndpointMiddleware(stack, options); err != nil {
return err
}
if err = v4.AddComputePayloadSHA256Middleware(stack); err != nil {
return err
}
if err = addRetryMiddlewares(stack, options); err != nil {
return err
}
if err = addHTTPSignerV4Middleware(stack, options); err != nil {
return err
}
if err = awsmiddleware.AddRawResponseToMetadata(stack); err != nil {
return err
}
if err = awsmiddleware.AddRecordResponseTiming(stack); err != nil {
return err
}
if err = addClientUserAgent(stack); err != nil {
return err
}
if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil {
return err
}
if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil {
return err
}
if err = addOpDetachPolicyValidationMiddleware(stack); err != nil {
return err
}
if err = stack.Initialize.Add(newServiceMetadataMiddleware_opDetachPolicy(options.Region), middleware.Before); err != nil {
return err
}
if err = addRequestIDRetrieverMiddleware(stack); err != nil {
return err
}
if err = addResponseErrorMiddleware(stack); err != nil {
return err
}
if err = addRequestResponseLogging(stack, options); err != nil {
return err
}
return nil
}
func newServiceMetadataMiddleware_opDetachPolicy(region string) *awsmiddleware.RegisterServiceMetadata {
return &awsmiddleware.RegisterServiceMetadata{
Region: region,
ServiceID: ServiceID,
SigningName: "organizations",
OperationName: "DetachPolicy",
}
}