#[non_exhaustive]pub struct AssumeRoleOutput {
pub credentials: Option<Credentials>,
pub assumed_role_user: Option<AssumedRoleUser>,
pub packed_policy_size: Option<i32>,
pub source_identity: Option<String>,
/* private fields */
}
Expand description
Contains the response to a successful AssumeRole
request, including temporary Amazon Web Services credentials that can be used to make Amazon Web Services requests.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.credentials: Option<Credentials>
The temporary security credentials, which include an access key ID, a secret access key, and a security (or session) token.
The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.
assumed_role_user: Option<AssumedRoleUser>
The Amazon Resource Name (ARN) and the assumed role ID, which are identifiers that you can use to refer to the resulting temporary security credentials. For example, you can reference these credentials as a principal in a resource-based policy by using the ARN or assumed role ID. The ARN and ID include the RoleSessionName
that you specified when you called AssumeRole
.
packed_policy_size: Option<i32>
A percentage value that indicates the packed size of the session policies and session tags combined passed in the request. The request fails if the packed size is greater than 100 percent, which means the policies and tags exceeded the allowed space.
source_identity: Option<String>
The source identity specified by the principal that is calling the AssumeRole
operation.
You can require users to specify a source identity when they assume a role. You do this by using the sts:SourceIdentity
condition key in a role trust policy. You can use source identity information in CloudTrail logs to determine who took actions with a role. You can use the aws:SourceIdentity
condition key to further control access to Amazon Web Services resources based on the value of source identity. For more information about using source identity, see Monitor and control actions taken with assumed roles in the IAM User Guide.
The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-
Implementations§
Source§impl AssumeRoleOutput
impl AssumeRoleOutput
Sourcepub fn credentials(&self) -> Option<&Credentials>
pub fn credentials(&self) -> Option<&Credentials>
The temporary security credentials, which include an access key ID, a secret access key, and a security (or session) token.
The size of the security token that STS API operations return is not fixed. We strongly recommend that you make no assumptions about the maximum size.
Sourcepub fn assumed_role_user(&self) -> Option<&AssumedRoleUser>
pub fn assumed_role_user(&self) -> Option<&AssumedRoleUser>
The Amazon Resource Name (ARN) and the assumed role ID, which are identifiers that you can use to refer to the resulting temporary security credentials. For example, you can reference these credentials as a principal in a resource-based policy by using the ARN or assumed role ID. The ARN and ID include the RoleSessionName
that you specified when you called AssumeRole
.
Sourcepub fn packed_policy_size(&self) -> Option<i32>
pub fn packed_policy_size(&self) -> Option<i32>
A percentage value that indicates the packed size of the session policies and session tags combined passed in the request. The request fails if the packed size is greater than 100 percent, which means the policies and tags exceeded the allowed space.
Sourcepub fn source_identity(&self) -> Option<&str>
pub fn source_identity(&self) -> Option<&str>
The source identity specified by the principal that is calling the AssumeRole
operation.
You can require users to specify a source identity when they assume a role. You do this by using the sts:SourceIdentity
condition key in a role trust policy. You can use source identity information in CloudTrail logs to determine who took actions with a role. You can use the aws:SourceIdentity
condition key to further control access to Amazon Web Services resources based on the value of source identity. For more information about using source identity, see Monitor and control actions taken with assumed roles in the IAM User Guide.
The regex used to validate this parameter is a string of characters consisting of upper- and lower-case alphanumeric characters with no spaces. You can also include underscores or any of the following characters: =,.@-
Source§impl AssumeRoleOutput
impl AssumeRoleOutput
Sourcepub fn builder() -> AssumeRoleOutputBuilder
pub fn builder() -> AssumeRoleOutputBuilder
Creates a new builder-style object to manufacture AssumeRoleOutput
.
Trait Implementations§
Source§impl Clone for AssumeRoleOutput
impl Clone for AssumeRoleOutput
Source§fn clone(&self) -> AssumeRoleOutput
fn clone(&self) -> AssumeRoleOutput
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreSource§impl Debug for AssumeRoleOutput
impl Debug for AssumeRoleOutput
Source§impl PartialEq for AssumeRoleOutput
impl PartialEq for AssumeRoleOutput
Source§impl RequestId for AssumeRoleOutput
impl RequestId for AssumeRoleOutput
Source§fn request_id(&self) -> Option<&str>
fn request_id(&self) -> Option<&str>
None
if the service could not be reached.impl StructuralPartialEq for AssumeRoleOutput
Auto Trait Implementations§
impl Freeze for AssumeRoleOutput
impl RefUnwindSafe for AssumeRoleOutput
impl Send for AssumeRoleOutput
impl Sync for AssumeRoleOutput
impl Unpin for AssumeRoleOutput
impl UnwindSafe for AssumeRoleOutput
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§unsafe fn clone_to_uninit(&self, dst: *mut T)
unsafe fn clone_to_uninit(&self, dst: *mut T)
clone_to_uninit
)