diff --git a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/IAMClient.h b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/IAMClient.h
index 65c9fcfbd4fa7bee570d33723ddf5db3b9efff95..81a866e78b66857c33a018a0178d7ca92466a36b 100644
--- a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/IAMClient.h
+++ b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/IAMClient.h
@@ -108,6 +108,15 @@
#include Deletes the specified version from the specified managed policy. You
* cannot delete the default version from a policy using this operation. To delete
@@ -9649,6 +9745,19 @@ namespace Model
void DeleteLoginProfileAsyncHelper(const Model::DeleteLoginProfileRequest& request, const DeleteLoginProfileResponseReceivedHandler& handler, const std::shared_ptr The Amazon Resource Name (ARN) of the IAM policy you want to attach.
The Amazon Resource Name (ARN) of the IAM policy you want to attach.
@@ -131,7 +131,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline void SetPolicyArn(const Aws::String& value) { m_policyArnHasBeenSet = true; m_policyArn = value; } + inline void SetPolicyName(const Aws::String& value) { m_policyNameHasBeenSet = true; m_policyName = value; } /** *The Amazon Resource Name (ARN) of the IAM policy you want to attach.
@@ -139,7 +139,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline void SetPolicyArn(Aws::String&& value) { m_policyArnHasBeenSet = true; m_policyArn = std::move(value); } + inline void SetPolicyName(Aws::String&& value) { m_policyNameHasBeenSet = true; m_policyName = std::move(value); } /** *The Amazon Resource Name (ARN) of the IAM policy you want to attach.
@@ -147,7 +147,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline void SetPolicyArn(const char* value) { m_policyArnHasBeenSet = true; m_policyArn.assign(value); } + inline void SetPolicyName(const char* value) { m_policyNameHasBeenSet = true; m_policyName.assign(value); } /** *The Amazon Resource Name (ARN) of the IAM policy you want to attach.
@@ -155,7 +155,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline AttachGroupPolicyRequest& WithPolicyArn(const Aws::String& value) { SetPolicyArn(value); return *this;} + inline AttachGroupPolicyRequest& WithPolicyName(const Aws::String& value) { SetPolicyName(value); return *this;} /** *The Amazon Resource Name (ARN) of the IAM policy you want to attach.
@@ -163,7 +163,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline AttachGroupPolicyRequest& WithPolicyArn(Aws::String&& value) { SetPolicyArn(std::move(value)); return *this;} + inline AttachGroupPolicyRequest& WithPolicyName(Aws::String&& value) { SetPolicyName(std::move(value)); return *this;} /** *The Amazon Resource Name (ARN) of the IAM policy you want to attach.
@@ -171,15 +171,15 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline AttachGroupPolicyRequest& WithPolicyArn(const char* value) { SetPolicyArn(value); return *this;} + inline AttachGroupPolicyRequest& WithPolicyName(const char* value) { SetPolicyName(value); return *this;} private: Aws::String m_groupName; bool m_groupNameHasBeenSet; - Aws::String m_policyArn; - bool m_policyArnHasBeenSet; + Aws::String m_policyName; + bool m_policyNameHasBeenSet; }; } // namespace Model diff --git a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/AttachUserPolicyRequest.h b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/AttachUserPolicyRequest.h index 32e820f4beea556d34f00c688fe880c1fd19a886..2aac6f3aff07f90f1360d9538077ec99f7d489aa 100644 --- a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/AttachUserPolicyRequest.h +++ b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/AttachUserPolicyRequest.h @@ -115,7 +115,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline const Aws::String& GetPolicyArn() const{ return m_policyArn; } + inline const Aws::String& GetPolicyName() const{ return m_policyName; } /** *The Amazon Resource Name (ARN) of the IAM policy you want to attach.
@@ -123,7 +123,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline bool PolicyArnHasBeenSet() const { return m_policyArnHasBeenSet; } + inline bool PolicyNameHasBeenSet() const { return m_policyNameHasBeenSet; } /** *The Amazon Resource Name (ARN) of the IAM policy you want to attach.
@@ -131,7 +131,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline void SetPolicyArn(const Aws::String& value) { m_policyArnHasBeenSet = true; m_policyArn = value; } + inline void SetPolicyName(const Aws::String& value) { m_policyNameHasBeenSet = true; m_policyName = value; } /** *The Amazon Resource Name (ARN) of the IAM policy you want to attach.
@@ -139,7 +139,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline void SetPolicyArn(Aws::String&& value) { m_policyArnHasBeenSet = true; m_policyArn = std::move(value); } + inline void SetPolicyName(Aws::String&& value) { m_policyNameHasBeenSet = true; m_policyName = std::move(value); } /** *The Amazon Resource Name (ARN) of the IAM policy you want to attach.
@@ -147,7 +147,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline void SetPolicyArn(const char* value) { m_policyArnHasBeenSet = true; m_policyArn.assign(value); } + inline void SetPolicyName(const char* value) { m_policyNameHasBeenSet = true; m_policyName.assign(value); } /** *The Amazon Resource Name (ARN) of the IAM policy you want to attach.
@@ -155,7 +155,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline AttachUserPolicyRequest& WithPolicyArn(const Aws::String& value) { SetPolicyArn(value); return *this;} + inline AttachUserPolicyRequest& WithPolicyName(const Aws::String& value) { SetPolicyName(value); return *this;} /** *The Amazon Resource Name (ARN) of the IAM policy you want to attach.
@@ -163,7 +163,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline AttachUserPolicyRequest& WithPolicyArn(Aws::String&& value) { SetPolicyArn(std::move(value)); return *this;} + inline AttachUserPolicyRequest& WithPolicyName(Aws::String&& value) { SetPolicyName(std::move(value)); return *this;} /** *The Amazon Resource Name (ARN) of the IAM policy you want to attach.
@@ -171,15 +171,15 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline AttachUserPolicyRequest& WithPolicyArn(const char* value) { SetPolicyArn(value); return *this;} + inline AttachUserPolicyRequest& WithPolicyName(const char* value) { SetPolicyName(value); return *this;} private: Aws::String m_userName; bool m_userNameHasBeenSet; - Aws::String m_policyArn; - bool m_policyArnHasBeenSet; + Aws::String m_policyName; + bool m_policyNameHasBeenSet; }; } // namespace Model diff --git a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/AttachedPolicy.h b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/AttachedPolicy.h index 7f8a881bd530d2a2ab861c19f3e5dfd286b7c9e4..d0790f83c37d0764c1ff29c38eceac66be3c0c70 100644 --- a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/AttachedPolicy.h +++ b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/AttachedPolicy.h @@ -112,6 +112,110 @@ namespace Model inline AttachedPolicy& WithPolicyArn(const char* value) { SetPolicyArn(value); return *this;} + + inline bool GetIsDirectAttached() const{ return m_isDirectAttached; } + + inline bool IsDirectAttachedHasBeenSet() const { return m_isDirectAttachedHasBeenSet; } + + inline void SetIsDirectAttached(bool value) { m_isDirectAttachedHasBeenSet = true; m_isDirectAttached = value; } + + inline AttachedPolicy& WithIsDirectAttached(bool value) { SetIsDirectAttached(value); return *this;} + + + inline const Aws::String& GetPolicyId() const{ return m_policyId; } + + inline bool PolicyIdHasBeenSet() const { return m_policyIdHasBeenSet; } + + inline void SetPolicyId(const Aws::String& value) { m_policyIdHasBeenSet = true; m_policyId = value; } + + inline void SetPolicyId(Aws::String&& value) { m_policyIdHasBeenSet = true; m_policyId = std::move(value); } + + inline void SetPolicyId(const char* value) { m_policyIdHasBeenSet = true; m_policyId.assign(value); } + + inline AttachedPolicy& WithPolicyId(const Aws::String& value) { SetPolicyId(value); return *this;} + + inline AttachedPolicy& WithPolicyId(Aws::String&& value) { SetPolicyId(std::move(value)); return *this;} + + inline AttachedPolicy& WithPolicyId(const char* value) { SetPolicyId(value); return *this;} + + + inline const Aws::String& GetArn() const{ return m_arn; } + + inline bool ArnHasBeenSet() const { return m_arnHasBeenSet; } + + inline void SetArn(const Aws::String& value) { m_arnHasBeenSet = true; m_arn = value; } + + inline void SetArn(Aws::String&& value) { m_arnHasBeenSet = true; m_arn = std::move(value); } + + inline void SetArn(const char* value) { m_arnHasBeenSet = true; m_arn.assign(value); } + + inline AttachedPolicy& WithArn(const Aws::String& value) { SetArn(value); return *this;} + + inline AttachedPolicy& WithArn(Aws::String&& value) { SetArn(std::move(value)); return *this;} + + inline AttachedPolicy& WithArn(const char* value) { SetArn(value); return *this;} + + + inline const Aws::String& GetPath() const{ return m_path; } + + inline bool PathHasBeenSet() const { return m_pathHasBeenSet; } + + inline void SetPath(const Aws::String& value) { m_pathHasBeenSet = true; m_path = value; } + + inline void SetPath(Aws::String&& value) { m_pathHasBeenSet = true; m_path = std::move(value); } + + inline void SetPath(const char* value) { m_pathHasBeenSet = true; m_path.assign(value); } + + inline AttachedPolicy& WithPath(const Aws::String& value) { SetPath(value); return *this;} + + inline AttachedPolicy& WithPath(Aws::String&& value) { SetPath(std::move(value)); return *this;} + + inline AttachedPolicy& WithPath(const char* value) { SetPath(value); return *this;} + + + inline const Aws::String& GetDescription() const{ return m_description; } + + inline bool DescriptionHasBeenSet() const { return m_descriptionHasBeenSet; } + + inline void SetDescription(const Aws::String& value) { m_descriptionHasBeenSet = true; m_description = value; } + + inline void SetDescription(Aws::String&& value) { m_descriptionHasBeenSet = true; m_description = std::move(value); } + + inline void SetDescription(const char* value) { m_descriptionHasBeenSet = true; m_description.assign(value); } + + inline AttachedPolicy& WithDescription(const Aws::String& value) { SetDescription(value); return *this;} + + inline AttachedPolicy& WithDescription(Aws::String&& value) { SetDescription(std::move(value)); return *this;} + + inline AttachedPolicy& WithDescription(const char* value) { SetDescription(value); return *this;} + + + + inline const Aws::Utils::DateTime& GetCreateDate() const{ return m_createDate; } + + inline bool CreateDateHasBeenSet() const { return m_createDateHasBeenSet; } + + inline void SetCreateDate(const Aws::Utils::DateTime& value) { m_createDateHasBeenSet = true; m_createDate = value; } + + inline void SetCreateDate(Aws::Utils::DateTime&& value) { m_createDateHasBeenSet = true; m_createDate = std::move(value); } + + inline AttachedPolicy& WithCreateDate(const Aws::Utils::DateTime& value) { SetCreateDate(value); return *this;} + + inline AttachedPolicy& WithCreateDate(Aws::Utils::DateTime&& value) { SetCreateDate(std::move(value)); return *this;} + + + inline const Aws::Utils::DateTime& GetUpdateDate() const{ return m_updateDate; } + + inline bool UpdateDateHasBeenSet() const { return m_updateDateHasBeenSet; } + + inline void SetUpdateDate(const Aws::Utils::DateTime& value) { m_updateDateHasBeenSet = true; m_updateDate = value; } + + inline void SetUpdateDate(Aws::Utils::DateTime&& value) { m_updateDateHasBeenSet = true; m_updateDate = std::move(value); } + + inline AttachedPolicy& WithUpdateDate(const Aws::Utils::DateTime& value) { SetUpdateDate(value); return *this;} + + inline AttachedPolicy& WithUpdateDate(Aws::Utils::DateTime&& value) { SetUpdateDate(std::move(value)); return *this;} + private: Aws::String m_policyName; @@ -119,6 +223,28 @@ namespace Model Aws::String m_policyArn; bool m_policyArnHasBeenSet; + + bool m_isDirectAttached; + bool m_isDirectAttachedHasBeenSet; + + Aws::String m_policyId; + bool m_policyIdHasBeenSet; + + Aws::String m_arn; + bool m_arnHasBeenSet; + + Aws::String m_path; + bool m_pathHasBeenSet; + + Aws::String m_description; + bool m_descriptionHasBeenSet; + + Aws::Utils::DateTime m_createDate; + bool m_createDateHasBeenSet; + + Aws::Utils::DateTime m_updateDate; + bool m_updateDateHasBeenSet; + }; } // namespace Model diff --git a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/BatchAttachPoliciesToGroupRequest.h b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/BatchAttachPoliciesToGroupRequest.h new file mode 100644 index 0000000000000000000000000000000000000000..79085dc070e801fd2856f528a2463bdc3fc8521d --- /dev/null +++ b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/BatchAttachPoliciesToGroupRequest.h @@ -0,0 +1,81 @@ +/** + * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. + * SPDX-License-Identifier: Apache-2.0. + */ + +#pragma once +#includeContains the response to a successful GetUser request.
A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline const Account& GetAccount() const{ return m_account; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(const Account& value) { m_account = value; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(Account&& value) { m_account = std::move(value); } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchAttachPoliciesToGroupResult& WithAccount(const Account& value) { SetAccount(value); return *this;} + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchAttachPoliciesToGroupResult& WithAccount(Account&& value) { SetAccount(std::move(value)); return *this;} + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyAttached(const Aws::VectorA list of users.
+ */ + inline void SetPolicyAttached(Aws::VectorA list of users.
+ */ + inline BatchAttachPoliciesToGroupResult& WithPolicyAttached(const Aws::VectorA list of users.
+ */ + inline BatchAttachPoliciesToGroupResult& WithPolicyAttached(Aws::VectorA list of users.
+ */ + inline BatchAttachPoliciesToGroupResult& AddPolicyAttached(const BatchHandlePolicy& value) { m_policyAttached.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchAttachPoliciesToGroupResult& AddPolicyAttached(BatchHandlePolicy&& value) { m_policyAttached.push_back(std::move(value)); return *this; } + + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(Aws::VectorA list of users.
+ */ + inline BatchAttachPoliciesToGroupResult& WithPolicyError(const Aws::VectorA list of users.
+ */ + inline BatchAttachPoliciesToGroupResult& WithPolicyError(Aws::VectorA list of users.
+ */ + inline BatchAttachPoliciesToGroupResult& AddPolicyError(const BatchHandlePolicyError& value) { m_policyError.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchAttachPoliciesToGroupResult& AddPolicyError(BatchHandlePolicyError&& value) { m_policyError.push_back(std::move(value)); return *this; } + + private: + + private: + + Aws::VectorContains the response to a successful GetUser request.
A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline const Account& GetAccount() const{ return m_account; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(const Account& value) { m_account = value; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(Account&& value) { m_account = std::move(value); } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchAttachPoliciesToUserResult& WithAccount(const Account& value) { SetAccount(value); return *this;} + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchAttachPoliciesToUserResult& WithAccount(Account&& value) { SetAccount(std::move(value)); return *this;} + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyAttached(const Aws::VectorA list of users.
+ */ + inline void SetPolicyAttached(Aws::VectorA list of users.
+ */ + inline BatchAttachPoliciesToUserResult& WithPolicyAttached(const Aws::VectorA list of users.
+ */ + inline BatchAttachPoliciesToUserResult& WithPolicyAttached(Aws::VectorA list of users.
+ */ + inline BatchAttachPoliciesToUserResult& AddPolicyAttached(const BatchHandlePolicy& value) { m_policyAttached.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchAttachPoliciesToUserResult& AddPolicyAttached(BatchHandlePolicy&& value) { m_policyAttached.push_back(std::move(value)); return *this; } + + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(Aws::VectorA list of users.
+ */ + inline BatchAttachPoliciesToUserResult& WithPolicyError(const Aws::VectorA list of users.
+ */ + inline BatchAttachPoliciesToUserResult& WithPolicyError(Aws::VectorA list of users.
+ */ + inline BatchAttachPoliciesToUserResult& AddPolicyError(const BatchHandlePolicyError& value) { m_policyError.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchAttachPoliciesToUserResult& AddPolicyError(BatchHandlePolicyError&& value) { m_policyError.push_back(std::move(value)); return *this; } + + private: + + private: + + Aws::VectorContains the response to a successful GetUser request.
A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline const Account& GetAccount() const{ return m_account; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(const Account& value) { m_account = value; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(Account&& value) { m_account = std::move(value); } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchAttachPolicyToMultiGroupsResult& WithAccount(const Account& value) { SetAccount(value); return *this;} + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchAttachPolicyToMultiGroupsResult& WithAccount(Account&& value) { SetAccount(std::move(value)); return *this;} + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyAttached(const Aws::VectorA list of users.
+ */ + inline void SetPolicyAttached(Aws::VectorA list of users.
+ */ + inline BatchAttachPolicyToMultiGroupsResult& WithPolicyAttached(const Aws::VectorA list of users.
+ */ + inline BatchAttachPolicyToMultiGroupsResult& WithPolicyAttached(Aws::VectorA list of users.
+ */ + inline BatchAttachPolicyToMultiGroupsResult& AddPolicyAttached(const BatchHandlePolicy& value) { m_policyAttached.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchAttachPolicyToMultiGroupsResult& AddPolicyAttached(BatchHandlePolicy&& value) { m_policyAttached.push_back(std::move(value)); return *this; } + + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(Aws::VectorA list of users.
+ */ + inline BatchAttachPolicyToMultiGroupsResult& WithPolicyError(const Aws::VectorA list of users.
+ */ + inline BatchAttachPolicyToMultiGroupsResult& WithPolicyError(Aws::VectorA list of users.
+ */ + inline BatchAttachPolicyToMultiGroupsResult& AddPolicyError(const BatchHandlePolicyError& value) { m_policyError.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchAttachPolicyToMultiGroupsResult& AddPolicyError(BatchHandlePolicyError&& value) { m_policyError.push_back(std::move(value)); return *this; } + + private: + + private: + + Aws::VectorContains the response to a successful GetUser request.
A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline const Account& GetAccount() const{ return m_account; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(const Account& value) { m_account = value; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(Account&& value) { m_account = std::move(value); } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchAttachPolicyToMultiUsersResult& WithAccount(const Account& value) { SetAccount(value); return *this;} + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchAttachPolicyToMultiUsersResult& WithAccount(Account&& value) { SetAccount(std::move(value)); return *this;} + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyAttached(const Aws::VectorA list of users.
+ */ + inline void SetPolicyAttached(Aws::VectorA list of users.
+ */ + inline BatchAttachPolicyToMultiUsersResult& WithPolicyAttached(const Aws::VectorA list of users.
+ */ + inline BatchAttachPolicyToMultiUsersResult& WithPolicyAttached(Aws::VectorA list of users.
+ */ + inline BatchAttachPolicyToMultiUsersResult& AddPolicyAttached(const BatchHandlePolicy& value) { m_policyAttached.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchAttachPolicyToMultiUsersResult& AddPolicyAttached(BatchHandlePolicy&& value) { m_policyAttached.push_back(std::move(value)); return *this; } + + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(Aws::VectorA list of users.
+ */ + inline BatchAttachPolicyToMultiUsersResult& WithPolicyError(const Aws::VectorA list of users.
+ */ + inline BatchAttachPolicyToMultiUsersResult& WithPolicyError(Aws::VectorA list of users.
+ */ + inline BatchAttachPolicyToMultiUsersResult& AddPolicyError(const BatchHandlePolicyError& value) { m_policyError.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchAttachPolicyToMultiUsersResult& AddPolicyError(BatchHandlePolicyError&& value) { m_policyError.push_back(std::move(value)); return *this; } + + private: + + private: + + Aws::VectorThe name of the user to get information about.
This parameter is + * optional. If it is not included, it defaults to the user making the request. + * This parameter allows (through its regex pattern) a string of characters + * consisting of upper and lowercase alphanumeric characters with no spaces. You + * can also include any of the following characters: _+=,.@-
+ */ + inline const Aws::String& GetPolicyDocument() const{ return m_policyDocument; } + + /** + *The name of the user to get information about.
This parameter is + * optional. If it is not included, it defaults to the user making the request. + * This parameter allows (through its regex pattern) a string of characters + * consisting of upper and lowercase alphanumeric characters with no spaces. You + * can also include any of the following characters: _+=,.@-
+ */ + inline bool PolicyDocumentHasBeenSet() const { return m_policyDocumentHasBeenSet; } + + /** + *The name of the user to get information about.
This parameter is + * optional. If it is not included, it defaults to the user making the request. + * This parameter allows (through its regex pattern) a string of characters + * consisting of upper and lowercase alphanumeric characters with no spaces. You + * can also include any of the following characters: _+=,.@-
+ */ + inline void SetPolicyDocument(const Aws::String& value) { m_policyDocumentHasBeenSet = true; m_policyDocument = value; } + + /** + *The name of the user to get information about.
This parameter is + * optional. If it is not included, it defaults to the user making the request. + * This parameter allows (through its regex pattern) a string of characters + * consisting of upper and lowercase alphanumeric characters with no spaces. You + * can also include any of the following characters: _+=,.@-
+ */ + inline void SetPolicyDocument(Aws::String&& value) { m_policyDocumentHasBeenSet = true; m_policyDocument = std::move(value); } + + /** + *The name of the user to get information about.
This parameter is + * optional. If it is not included, it defaults to the user making the request. + * This parameter allows (through its regex pattern) a string of characters + * consisting of upper and lowercase alphanumeric characters with no spaces. You + * can also include any of the following characters: _+=,.@-
+ */ + inline void SetPolicyDocument(const char* value) { m_policyDocumentHasBeenSet = true; m_policyDocument.assign(value); } + + /** + *The name of the user to get information about.
This parameter is + * optional. If it is not included, it defaults to the user making the request. + * This parameter allows (through its regex pattern) a string of characters + * consisting of upper and lowercase alphanumeric characters with no spaces. You + * can also include any of the following characters: _+=,.@-
+ */ + inline BatchDeletePoliciesRequest& WithPolicyDocument(const Aws::String& value) { SetPolicyDocument(value); return *this;} + + /** + *The name of the user to get information about.
This parameter is + * optional. If it is not included, it defaults to the user making the request. + * This parameter allows (through its regex pattern) a string of characters + * consisting of upper and lowercase alphanumeric characters with no spaces. You + * can also include any of the following characters: _+=,.@-
+ */ + inline BatchDeletePoliciesRequest& WithPolicyDocument(Aws::String&& value) { SetPolicyDocument(std::move(value)); return *this;} + + /** + *The name of the user to get information about.
This parameter is + * optional. If it is not included, it defaults to the user making the request. + * This parameter allows (through its regex pattern) a string of characters + * consisting of upper and lowercase alphanumeric characters with no spaces. You + * can also include any of the following characters: _+=,.@-
+ */ + inline BatchDeletePoliciesRequest& WithPolicyDocument(const char* value) { SetPolicyDocument(value); return *this;} + + private: + + Aws::String m_policyDocument; + bool m_policyDocumentHasBeenSet; + }; + +} // namespace Model +} // namespace IAM +} // namespace Aws diff --git a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/BatchDeletePoliciesResult.h b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/BatchDeletePoliciesResult.h new file mode 100644 index 0000000000000000000000000000000000000000..b163fdd3a7df17ca9a49bf8cf2ad53ed9caec2ac --- /dev/null +++ b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/BatchDeletePoliciesResult.h @@ -0,0 +1,249 @@ +/** + * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. + * SPDX-License-Identifier: Apache-2.0. + */ + +#pragma once +#includeContains the response to a successful GetUser request.
A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline const Account& GetAccount() const{ return m_account; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(const Account& value) { m_account = value; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(Account&& value) { m_account = std::move(value); } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchDeletePoliciesResult& WithAccount(const Account& value) { SetAccount(value); return *this;} + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchDeletePoliciesResult& WithAccount(Account&& value) { SetAccount(std::move(value)); return *this;} + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyDeleted(const Aws::VectorA list of users.
+ */ + inline void SetPolicyDeleted(Aws::VectorA list of users.
+ */ + inline BatchDeletePoliciesResult& WithPolicyDeleted(const Aws::VectorA list of users.
+ */ + inline BatchDeletePoliciesResult& WithPolicyDeleted(Aws::VectorA list of users.
+ */ + inline BatchDeletePoliciesResult& AddPolicyDeleted(const BatchHandlePolicy& value) { m_policyDeleted.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchDeletePoliciesResult& AddPolicyDeleted(BatchHandlePolicy&& value) { m_policyDeleted.push_back(std::move(value)); return *this; } + + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(Aws::VectorA list of users.
+ */ + inline BatchDeletePoliciesResult& WithPolicyError(const Aws::VectorA list of users.
+ */ + inline BatchDeletePoliciesResult& WithPolicyError(Aws::VectorA list of users.
+ */ + inline BatchDeletePoliciesResult& AddPolicyError(const BatchHandlePolicyError& value) { m_policyError.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchDeletePoliciesResult& AddPolicyError(BatchHandlePolicyError&& value) { m_policyError.push_back(std::move(value)); return *this; } + + private: + + private: + + Aws::VectorContains the response to a successful GetUser request.
A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline const Account& GetAccount() const{ return m_account; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(const Account& value) { m_account = value; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(Account&& value) { m_account = std::move(value); } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchDetachPoliciesFromGroupResult& WithAccount(const Account& value) { SetAccount(value); return *this;} + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchDetachPoliciesFromGroupResult& WithAccount(Account&& value) { SetAccount(std::move(value)); return *this;} + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyDetached(const Aws::VectorA list of users.
+ */ + inline void SetPolicyDetached(Aws::VectorA list of users.
+ */ + inline BatchDetachPoliciesFromGroupResult& WithPolicyDetached(const Aws::VectorA list of users.
+ */ + inline BatchDetachPoliciesFromGroupResult& WithPolicyDetached(Aws::VectorA list of users.
+ */ + inline BatchDetachPoliciesFromGroupResult& AddPolicyDetached(const BatchHandlePolicy& value) { m_policyDetached.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchDetachPoliciesFromGroupResult& AddPolicyDetached(BatchHandlePolicy&& value) { m_policyDetached.push_back(std::move(value)); return *this; } + + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(Aws::VectorA list of users.
+ */ + inline BatchDetachPoliciesFromGroupResult& WithPolicyError(const Aws::VectorA list of users.
+ */ + inline BatchDetachPoliciesFromGroupResult& WithPolicyError(Aws::VectorA list of users.
+ */ + inline BatchDetachPoliciesFromGroupResult& AddPolicyError(const BatchHandlePolicyError& value) { m_policyError.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchDetachPoliciesFromGroupResult& AddPolicyError(BatchHandlePolicyError&& value) { m_policyError.push_back(std::move(value)); return *this; } + + private: + + private: + + Aws::VectorContains the response to a successful GetUser request.
A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline const Account& GetAccount() const{ return m_account; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(const Account& value) { m_account = value; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(Account&& value) { m_account = std::move(value); } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchDetachPoliciesFromUserResult& WithAccount(const Account& value) { SetAccount(value); return *this;} + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchDetachPoliciesFromUserResult& WithAccount(Account&& value) { SetAccount(std::move(value)); return *this;} + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyDetached(const Aws::VectorA list of users.
+ */ + inline void SetPolicyDetached(Aws::VectorA list of users.
+ */ + inline BatchDetachPoliciesFromUserResult& WithPolicyDetached(const Aws::VectorA list of users.
+ */ + inline BatchDetachPoliciesFromUserResult& WithPolicyDetached(Aws::VectorA list of users.
+ */ + inline BatchDetachPoliciesFromUserResult& AddPolicyDetached(const BatchHandlePolicy& value) { m_policyDetached.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchDetachPoliciesFromUserResult& AddPolicyDetached(BatchHandlePolicy&& value) { m_policyDetached.push_back(std::move(value)); return *this; } + + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(Aws::VectorA list of users.
+ */ + inline BatchDetachPoliciesFromUserResult& WithPolicyError(const Aws::VectorA list of users.
+ */ + inline BatchDetachPoliciesFromUserResult& WithPolicyError(Aws::VectorA list of users.
+ */ + inline BatchDetachPoliciesFromUserResult& AddPolicyError(const BatchHandlePolicyError& value) { m_policyError.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchDetachPoliciesFromUserResult& AddPolicyError(BatchHandlePolicyError&& value) { m_policyError.push_back(std::move(value)); return *this; } + + private: + + private: + + Aws::VectorContains the response to a successful GetUser request.
A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline const Account& GetAccount() const{ return m_account; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(const Account& value) { m_account = value; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(Account&& value) { m_account = std::move(value); } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchDetachPolicyFromMultiGroupsResult& WithAccount(const Account& value) { SetAccount(value); return *this;} + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchDetachPolicyFromMultiGroupsResult& WithAccount(Account&& value) { SetAccount(std::move(value)); return *this;} + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyDetached(const Aws::VectorA list of users.
+ */ + inline void SetPolicyDetached(Aws::VectorA list of users.
+ */ + inline BatchDetachPolicyFromMultiGroupsResult& WithPolicyDetached(const Aws::VectorA list of users.
+ */ + inline BatchDetachPolicyFromMultiGroupsResult& WithPolicyDetached(Aws::VectorA list of users.
+ */ + inline BatchDetachPolicyFromMultiGroupsResult& AddPolicyDetached(const BatchHandlePolicy& value) { m_policyDetached.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchDetachPolicyFromMultiGroupsResult& AddPolicyDetached(BatchHandlePolicy&& value) { m_policyDetached.push_back(std::move(value)); return *this; } + + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(Aws::VectorA list of users.
+ */ + inline BatchDetachPolicyFromMultiGroupsResult& WithPolicyError(const Aws::VectorA list of users.
+ */ + inline BatchDetachPolicyFromMultiGroupsResult& WithPolicyError(Aws::VectorA list of users.
+ */ + inline BatchDetachPolicyFromMultiGroupsResult& AddPolicyError(const BatchHandlePolicyError& value) { m_policyError.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchDetachPolicyFromMultiGroupsResult& AddPolicyError(BatchHandlePolicyError&& value) { m_policyError.push_back(std::move(value)); return *this; } + + private: + + private: + + Aws::VectorContains the response to a successful GetUser request.
A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline const Account& GetAccount() const{ return m_account; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(const Account& value) { m_account = value; } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline void SetAccount(Account&& value) { m_account = std::move(value); } + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchDetachPolicyFromMultiUsersResult& WithAccount(const Account& value) { SetAccount(value); return *this;} + + /** + *A structure containing details about the IAM user.
Due to + * a service issue, password last used data does not include password use from May + * 3, 2018 22:50 PDT to May 23, 2018 14:08 PDT. This affects last + * sign-in dates shown in the IAM console and password last used dates in the + * IAM + * credential report, and returned by this operation. If users signed in during + * the affected time, the password last used date that is returned is the date the + * user last signed in before May 3, 2018. For users that signed in after May 23, + * 2018 14:08 PDT, the returned password last used date is accurate.
You can + * use password last used information to identify unused credentials for deletion. + * For example, you might delete users who did not sign in to AWS in the last 90 + * days. In cases like this, we recommend that you adjust your evaluation window to + * include dates after May 23, 2018. Alternatively, if your users use access keys + * to access AWS programmatically you can refer to access key last used information + * because it is accurate for all dates.
+ */ + inline BatchDetachPolicyFromMultiUsersResult& WithAccount(Account&& value) { SetAccount(std::move(value)); return *this;} + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyDetached(const Aws::VectorA list of users.
+ */ + inline void SetPolicyDetached(Aws::VectorA list of users.
+ */ + inline BatchDetachPolicyFromMultiUsersResult& WithPolicyDetached(const Aws::VectorA list of users.
+ */ + inline BatchDetachPolicyFromMultiUsersResult& WithPolicyDetached(Aws::VectorA list of users.
+ */ + inline BatchDetachPolicyFromMultiUsersResult& AddPolicyDetached(const BatchHandlePolicy& value) { m_policyDetached.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchDetachPolicyFromMultiUsersResult& AddPolicyDetached(BatchHandlePolicy&& value) { m_policyDetached.push_back(std::move(value)); return *this; } + + + /** + *A list of users.
+ */ + inline const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(const Aws::VectorA list of users.
+ */ + inline void SetPolicyError(Aws::VectorA list of users.
+ */ + inline BatchDetachPolicyFromMultiUsersResult& WithPolicyError(const Aws::VectorA list of users.
+ */ + inline BatchDetachPolicyFromMultiUsersResult& WithPolicyError(Aws::VectorA list of users.
+ */ + inline BatchDetachPolicyFromMultiUsersResult& AddPolicyError(const BatchHandlePolicyError& value) { m_policyError.push_back(value); return *this; } + + /** + *A list of users.
+ */ + inline BatchDetachPolicyFromMultiUsersResult& AddPolicyError(BatchHandlePolicyError&& value) { m_policyError.push_back(std::move(value)); return *this; } + + private: + + private: + + Aws::VectorContains information about a managed policy.
This data type is used as + * a response element in the CreatePolicy, GetPolicy, and + * ListPolicies operations.
For more information about managed + * policies, refer to Managed + * policies and inline policies in the IAM User Guide.
The friendly name (not ARN) identifying the policy.
+ */ + inline const Aws::String& GetPolicyName() const{ return m_policyName; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline bool PolicyNameHasBeenSet() const { return m_policyNameHasBeenSet; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetPolicyName(const Aws::String& value) { m_policyNameHasBeenSet = true; m_policyName = value; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetPolicyName(Aws::String&& value) { m_policyNameHasBeenSet = true; m_policyName = std::move(value); } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetPolicyName(const char* value) { m_policyNameHasBeenSet = true; m_policyName.assign(value); } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicy& WithPolicyName(const Aws::String& value) { SetPolicyName(value); return *this;} + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicy& WithPolicyName(Aws::String&& value) { SetPolicyName(std::move(value)); return *this;} + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicy& WithPolicyName(const char* value) { SetPolicyName(value); return *this;} + + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline const Aws::String& GetUserName() const{ return m_userName; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline bool UserNameHasBeenSet() const { return m_userNameHasBeenSet; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetUserName(const Aws::String& value) { m_userNameHasBeenSet = true; m_userName = value; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetUserName(Aws::String&& value) { m_userNameHasBeenSet = true; m_userName = std::move(value); } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetUserName(const char* value) { m_userNameHasBeenSet = true; m_userName.assign(value); } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicy& WithUserName(const Aws::String& value) { SetUserName(value); return *this;} + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicy& WithUserName(Aws::String&& value) { SetUserName(std::move(value)); return *this;} + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicy& WithUserName(const char* value) { SetUserName(value); return *this;} + + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline const Aws::String& GetGroupName() const{ return m_groupName; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline bool GroupNameHasBeenSet() const { return m_groupNameHasBeenSet; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetGroupName(const Aws::String& value) { m_groupNameHasBeenSet = true; m_groupName = value; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetGroupName(Aws::String&& value) { m_groupNameHasBeenSet = true; m_groupName = std::move(value); } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetGroupName(const char* value) { m_groupNameHasBeenSet = true; m_groupName.assign(value); } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicy& WithGroupName(const Aws::String& value) { SetGroupName(value); return *this;} + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicy& WithGroupName(Aws::String&& value) { SetGroupName(std::move(value)); return *this;} + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicy& WithGroupName(const char* value) { SetGroupName(value); return *this;} + + private: + Aws::String m_policyName; + bool m_policyNameHasBeenSet; + + Aws::String m_userName; + bool m_userNameHasBeenSet; + + Aws::String m_groupName; + bool m_groupNameHasBeenSet; + }; + +} // namespace Model +} // namespace IAM +} // namespace Aws diff --git a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/BatchHandlePolicyError.h b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/BatchHandlePolicyError.h new file mode 100644 index 0000000000000000000000000000000000000000..e50b741ea0d31e990d8a21a1252e1f6d7e1b630d --- /dev/null +++ b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/BatchHandlePolicyError.h @@ -0,0 +1,226 @@ +/** + * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. + * SPDX-License-Identifier: Apache-2.0. + */ + +#pragma once +#includeContains information about a managed policy.
This data type is used as + * a response element in the CreatePolicy, GetPolicy, and + * ListPolicies operations.
For more information about managed + * policies, refer to Managed + * policies and inline policies in the IAM User Guide.
The friendly name (not ARN) identifying the policy.
+ */ + inline const Aws::String& GetPolicyName() const{ return m_policyName; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline bool PolicyNameHasBeenSet() const { return m_policyNameHasBeenSet; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetPolicyName(const Aws::String& value) { m_policyNameHasBeenSet = true; m_policyName = value; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetPolicyName(Aws::String&& value) { m_policyNameHasBeenSet = true; m_policyName = std::move(value); } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetPolicyName(const char* value) { m_policyNameHasBeenSet = true; m_policyName.assign(value); } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicyError& WithPolicyName(const Aws::String& value) { SetPolicyName(value); return *this;} + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicyError& WithPolicyName(Aws::String&& value) { SetPolicyName(std::move(value)); return *this;} + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicyError& WithPolicyName(const char* value) { SetPolicyName(value); return *this;} + + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline const Aws::String& GetUserName() const{ return m_userName; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline bool UserNameHasBeenSet() const { return m_userNameHasBeenSet; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetUserName(const Aws::String& value) { m_userNameHasBeenSet = true; m_userName = value; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetUserName(Aws::String&& value) { m_userNameHasBeenSet = true; m_userName = std::move(value); } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetUserName(const char* value) { m_userNameHasBeenSet = true; m_userName.assign(value); } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicyError& WithUserName(const Aws::String& value) { SetUserName(value); return *this;} + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicyError& WithUserName(Aws::String&& value) { SetUserName(std::move(value)); return *this;} + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicyError& WithUserName(const char* value) { SetUserName(value); return *this;} + + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline const Aws::String& GetGroupName() const{ return m_groupName; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline bool GroupNameHasBeenSet() const { return m_groupNameHasBeenSet; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetGroupName(const Aws::String& value) { m_groupNameHasBeenSet = true; m_groupName = value; } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetGroupName(Aws::String&& value) { m_groupNameHasBeenSet = true; m_groupName = std::move(value); } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline void SetGroupName(const char* value) { m_groupNameHasBeenSet = true; m_groupName.assign(value); } + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicyError& WithGroupName(const Aws::String& value) { SetGroupName(value); return *this;} + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicyError& WithGroupName(Aws::String&& value) { SetGroupName(std::move(value)); return *this;} + + /** + *The friendly name (not ARN) identifying the policy.
+ */ + inline BatchHandlePolicyError& WithGroupName(const char* value) { SetGroupName(value); return *this;} + + + inline const Aws::String& GetCode() const{ return m_code; } + + inline bool CodeHasBeenSet() const { return m_codeHasBeenSet; } + + inline void SetCode(const Aws::String& value) { m_codeHasBeenSet = true; m_code = value; } + + inline void SetCode(Aws::String&& value) { m_codeHasBeenSet = true; m_code = std::move(value); } + + inline void SetCode(const char* value) { m_codeHasBeenSet = true; m_code.assign(value); } + + inline BatchHandlePolicyError& WithCode(const Aws::String& value) { SetCode(value); return *this;} + + inline BatchHandlePolicyError& WithCode(Aws::String&& value) { SetCode(std::move(value)); return *this;} + + inline BatchHandlePolicyError& WithCode(const char* value) { SetCode(value); return *this;} + + + + inline const Aws::String& GetMessage() const{ return m_message; } + + inline bool MessageHasBeenSet() const { return m_messageHasBeenSet; } + + inline void SetMessage(const Aws::String& value) { m_messageHasBeenSet = true; m_message = value; } + + inline void SetMessage(Aws::String&& value) { m_messageHasBeenSet = true; m_message = std::move(value); } + + inline void SetMessage(const char* value) { m_messageHasBeenSet = true; m_message.assign(value); } + + inline BatchHandlePolicyError& WithMessage(const Aws::String& value) { SetMessage(value); return *this;} + + inline BatchHandlePolicyError& WithMessage(Aws::String&& value) { SetMessage(std::move(value)); return *this;} + + inline BatchHandlePolicyError& WithMessage(const char* value) { SetMessage(value); return *this;} + + private: + Aws::String m_policyName; + bool m_policyNameHasBeenSet; + + Aws::String m_userName; + bool m_userNameHasBeenSet; + + Aws::String m_groupName; + bool m_groupNameHasBeenSet; + + Aws::String m_message; + bool m_messageHasBeenSet; + + Aws::String m_code; + bool m_codeHasBeenSet; + }; + +} // namespace Model +} // namespace IAM +} // namespace Aws diff --git a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/CreatePolicyResult.h b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/CreatePolicyResult.h index 5b587e8d6f0eeb7a4d393e57c85efd4a40c2c137..44db689f9481f99b64432e2eba02ef89c2b849e6 100644 --- a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/CreatePolicyResult.h +++ b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/CreatePolicyResult.h @@ -7,6 +7,7 @@ #includeThe Amazon Resource Name (ARN) of the IAM policy you want to detach.
@@ -123,7 +123,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline bool PolicyArnHasBeenSet() const { return m_policyArnHasBeenSet; } + inline bool PolicyNameHasBeenSet() const { return m_policyNameHasBeenSet; } /** *The Amazon Resource Name (ARN) of the IAM policy you want to detach.
@@ -131,7 +131,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline void SetPolicyArn(const Aws::String& value) { m_policyArnHasBeenSet = true; m_policyArn = value; } + inline void SetPolicyName(const Aws::String& value) { m_policyNameHasBeenSet = true; m_policyName = value; } /** *The Amazon Resource Name (ARN) of the IAM policy you want to detach.
@@ -139,7 +139,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline void SetPolicyArn(Aws::String&& value) { m_policyArnHasBeenSet = true; m_policyArn = std::move(value); } + inline void SetPolicyName(Aws::String&& value) { m_policyNameHasBeenSet = true; m_policyName = std::move(value); } /** *The Amazon Resource Name (ARN) of the IAM policy you want to detach.
@@ -147,7 +147,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline void SetPolicyArn(const char* value) { m_policyArnHasBeenSet = true; m_policyArn.assign(value); } + inline void SetPolicyName(const char* value) { m_policyNameHasBeenSet = true; m_policyName.assign(value); } /** *The Amazon Resource Name (ARN) of the IAM policy you want to detach.
@@ -155,7 +155,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline DetachGroupPolicyRequest& WithPolicyArn(const Aws::String& value) { SetPolicyArn(value); return *this;} + inline DetachGroupPolicyRequest& WithPolicyName(const Aws::String& value) { SetPolicyName(value); return *this;} /** *The Amazon Resource Name (ARN) of the IAM policy you want to detach.
@@ -163,7 +163,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline DetachGroupPolicyRequest& WithPolicyArn(Aws::String&& value) { SetPolicyArn(std::move(value)); return *this;} + inline DetachGroupPolicyRequest& WithPolicyName(Aws::String&& value) { SetPolicyName(std::move(value)); return *this;} /** *The Amazon Resource Name (ARN) of the IAM policy you want to detach.
@@ -171,15 +171,15 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline DetachGroupPolicyRequest& WithPolicyArn(const char* value) { SetPolicyArn(value); return *this;} + inline DetachGroupPolicyRequest& WithPolicyName(const char* value) { SetPolicyName(value); return *this;} private: Aws::String m_groupName; bool m_groupNameHasBeenSet; - Aws::String m_policyArn; - bool m_policyArnHasBeenSet; + Aws::String m_policyName; + bool m_policyNameHasBeenSet; }; } // namespace Model diff --git a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/DetachUserPolicyRequest.h b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/DetachUserPolicyRequest.h index abb86f802283fbb91bbbb2351472f311c4872fc2..d38878069c2b431158adaf57811be31a86baf273 100644 --- a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/DetachUserPolicyRequest.h +++ b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/DetachUserPolicyRequest.h @@ -115,7 +115,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline const Aws::String& GetPolicyArn() const{ return m_policyArn; } + inline const Aws::String& GetPolicyName() const{ return m_policyName; } /** *The Amazon Resource Name (ARN) of the IAM policy you want to detach.
@@ -123,7 +123,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline bool PolicyArnHasBeenSet() const { return m_policyArnHasBeenSet; } + inline bool PolicyNameHasBeenSet() const { return m_policyNameHasBeenSet; } /** *The Amazon Resource Name (ARN) of the IAM policy you want to detach.
@@ -131,7 +131,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline void SetPolicyArn(const Aws::String& value) { m_policyArnHasBeenSet = true; m_policyArn = value; } + inline void SetPolicyName(const Aws::String& value) { m_policyNameHasBeenSet = true; m_policyName = value; } /** *The Amazon Resource Name (ARN) of the IAM policy you want to detach.
@@ -139,7 +139,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline void SetPolicyArn(Aws::String&& value) { m_policyArnHasBeenSet = true; m_policyArn = std::move(value); } + inline void SetPolicyName(Aws::String&& value) { m_policyNameHasBeenSet = true; m_policyName = std::move(value); } /** *The Amazon Resource Name (ARN) of the IAM policy you want to detach.
@@ -147,7 +147,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline void SetPolicyArn(const char* value) { m_policyArnHasBeenSet = true; m_policyArn.assign(value); } + inline void SetPolicyName(const char* value) { m_policyNameHasBeenSet = true; m_policyName.assign(value); } /** *The Amazon Resource Name (ARN) of the IAM policy you want to detach.
@@ -155,7 +155,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline DetachUserPolicyRequest& WithPolicyArn(const Aws::String& value) { SetPolicyArn(value); return *this;} + inline DetachUserPolicyRequest& WithPolicyName(const Aws::String& value) { SetPolicyName(value); return *this;} /** *The Amazon Resource Name (ARN) of the IAM policy you want to detach.
@@ -163,7 +163,7 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline DetachUserPolicyRequest& WithPolicyArn(Aws::String&& value) { SetPolicyArn(std::move(value)); return *this;} + inline DetachUserPolicyRequest& WithPolicyName(Aws::String&& value) { SetPolicyName(std::move(value)); return *this;} /** *The Amazon Resource Name (ARN) of the IAM policy you want to detach.
@@ -171,15 +171,15 @@ namespace Model * href="https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html">Amazon * Resource Names (ARNs) in the AWS General Reference. */ - inline DetachUserPolicyRequest& WithPolicyArn(const char* value) { SetPolicyArn(value); return *this;} + inline DetachUserPolicyRequest& WithPolicyName(const char* value) { SetPolicyName(value); return *this;} private: Aws::String m_userName; bool m_userNameHasBeenSet; - Aws::String m_policyArn; - bool m_policyArnHasBeenSet; + Aws::String m_policyName; + bool m_policyNameHasBeenSet; }; } // namespace Model diff --git a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/GetPolicyResult.h b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/GetPolicyResult.h index 041ddf5b2d3a39da1b813656c6b7d8a54bf17eb1..ed8fad8ce55e56440aed8dcbc185c13e6efebbbc 100644 --- a/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/GetPolicyResult.h +++ b/aws-sdk-cpp-1.8.183/aws-sdk-cpp-1.8.183/aws-cpp-sdk-iam/include/aws/iam/model/GetPolicyResult.h @@ -7,6 +7,7 @@ #include