/
CreateVerifiedAccessTrustProviderCommand.ts
180 lines (169 loc) · 8.62 KB
/
CreateVerifiedAccessTrustProviderCommand.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
// smithy-typescript generated code
import { EndpointParameterInstructions, getEndpointPlugin } from "@aws-sdk/middleware-endpoint";
import { getSerdePlugin } from "@aws-sdk/middleware-serde";
import { HttpRequest as __HttpRequest, HttpResponse as __HttpResponse } from "@aws-sdk/protocol-http";
import { Command as $Command } from "@aws-sdk/smithy-client";
import {
FinalizeHandlerArguments,
Handler,
HandlerExecutionContext,
HttpHandlerOptions as __HttpHandlerOptions,
MetadataBearer as __MetadataBearer,
MiddlewareStack,
SerdeContext as __SerdeContext,
} from "@aws-sdk/types";
import { EC2ClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../EC2Client";
import {
CreateVerifiedAccessTrustProviderRequest,
CreateVerifiedAccessTrustProviderRequestFilterSensitiveLog,
CreateVerifiedAccessTrustProviderResult,
CreateVerifiedAccessTrustProviderResultFilterSensitiveLog,
} from "../models/models_2";
import {
de_CreateVerifiedAccessTrustProviderCommand,
se_CreateVerifiedAccessTrustProviderCommand,
} from "../protocols/Aws_ec2";
/**
* @public
*
* The input for {@link CreateVerifiedAccessTrustProviderCommand}.
*/
export interface CreateVerifiedAccessTrustProviderCommandInput extends CreateVerifiedAccessTrustProviderRequest {}
/**
* @public
*
* The output of {@link CreateVerifiedAccessTrustProviderCommand}.
*/
export interface CreateVerifiedAccessTrustProviderCommandOutput
extends CreateVerifiedAccessTrustProviderResult,
__MetadataBearer {}
/**
* @public
* <p>A trust provider is a third-party entity that creates, maintains, and manages identity
* information for users and devices. When an application request is made, the identity
* information sent by the trust provider is evaluated by Verified Access before allowing or
* denying the application request.</p>
* @example
* Use a bare-bones client and the command you need to make an API call.
* ```javascript
* import { EC2Client, CreateVerifiedAccessTrustProviderCommand } from "@aws-sdk/client-ec2"; // ES Modules import
* // const { EC2Client, CreateVerifiedAccessTrustProviderCommand } = require("@aws-sdk/client-ec2"); // CommonJS import
* const client = new EC2Client(config);
* const input = { // CreateVerifiedAccessTrustProviderRequest
* TrustProviderType: "user" || "device", // required
* UserTrustProviderType: "iam-identity-center" || "oidc",
* DeviceTrustProviderType: "jamf" || "crowdstrike",
* OidcOptions: { // CreateVerifiedAccessTrustProviderOidcOptions
* Issuer: "STRING_VALUE",
* AuthorizationEndpoint: "STRING_VALUE",
* TokenEndpoint: "STRING_VALUE",
* UserInfoEndpoint: "STRING_VALUE",
* ClientId: "STRING_VALUE",
* ClientSecret: "STRING_VALUE",
* Scope: "STRING_VALUE",
* },
* DeviceOptions: { // CreateVerifiedAccessTrustProviderDeviceOptions
* TenantId: "STRING_VALUE",
* },
* PolicyReferenceName: "STRING_VALUE", // required
* Description: "STRING_VALUE",
* TagSpecifications: [ // TagSpecificationList
* { // TagSpecification
* ResourceType: "capacity-reservation" || "client-vpn-endpoint" || "customer-gateway" || "carrier-gateway" || "coip-pool" || "dedicated-host" || "dhcp-options" || "egress-only-internet-gateway" || "elastic-ip" || "elastic-gpu" || "export-image-task" || "export-instance-task" || "fleet" || "fpga-image" || "host-reservation" || "image" || "import-image-task" || "import-snapshot-task" || "instance" || "instance-event-window" || "internet-gateway" || "ipam" || "ipam-pool" || "ipam-scope" || "ipv4pool-ec2" || "ipv6pool-ec2" || "key-pair" || "launch-template" || "local-gateway" || "local-gateway-route-table" || "local-gateway-virtual-interface" || "local-gateway-virtual-interface-group" || "local-gateway-route-table-vpc-association" || "local-gateway-route-table-virtual-interface-group-association" || "natgateway" || "network-acl" || "network-interface" || "network-insights-analysis" || "network-insights-path" || "network-insights-access-scope" || "network-insights-access-scope-analysis" || "placement-group" || "prefix-list" || "replace-root-volume-task" || "reserved-instances" || "route-table" || "security-group" || "security-group-rule" || "snapshot" || "spot-fleet-request" || "spot-instances-request" || "subnet" || "subnet-cidr-reservation" || "traffic-mirror-filter" || "traffic-mirror-session" || "traffic-mirror-target" || "transit-gateway" || "transit-gateway-attachment" || "transit-gateway-connect-peer" || "transit-gateway-multicast-domain" || "transit-gateway-policy-table" || "transit-gateway-route-table" || "transit-gateway-route-table-announcement" || "volume" || "vpc" || "vpc-endpoint" || "vpc-endpoint-connection" || "vpc-endpoint-service" || "vpc-endpoint-service-permission" || "vpc-peering-connection" || "vpn-connection" || "vpn-gateway" || "vpc-flow-log" || "capacity-reservation-fleet" || "traffic-mirror-filter-rule" || "vpc-endpoint-connection-device-type" || "verified-access-instance" || "verified-access-group" || "verified-access-endpoint" || "verified-access-policy" || "verified-access-trust-provider" || "vpn-connection-device-type" || "vpc-block-public-access-exclusion" || "ipam-resource-discovery" || "ipam-resource-discovery-association",
* Tags: [ // TagList
* { // Tag
* Key: "STRING_VALUE",
* Value: "STRING_VALUE",
* },
* ],
* },
* ],
* ClientToken: "STRING_VALUE",
* DryRun: true || false,
* };
* const command = new CreateVerifiedAccessTrustProviderCommand(input);
* const response = await client.send(command);
* ```
*
* @param CreateVerifiedAccessTrustProviderCommandInput - {@link CreateVerifiedAccessTrustProviderCommandInput}
* @returns {@link CreateVerifiedAccessTrustProviderCommandOutput}
* @see {@link CreateVerifiedAccessTrustProviderCommandInput} for command's `input` shape.
* @see {@link CreateVerifiedAccessTrustProviderCommandOutput} for command's `response` shape.
* @see {@link EC2ClientResolvedConfig | config} for EC2Client's `config` shape.
*
*
*/
export class CreateVerifiedAccessTrustProviderCommand extends $Command<
CreateVerifiedAccessTrustProviderCommandInput,
CreateVerifiedAccessTrustProviderCommandOutput,
EC2ClientResolvedConfig
> {
// Start section: command_properties
// End section: command_properties
public static getEndpointParameterInstructions(): EndpointParameterInstructions {
return {
UseFIPS: { type: "builtInParams", name: "useFipsEndpoint" },
Endpoint: { type: "builtInParams", name: "endpoint" },
Region: { type: "builtInParams", name: "region" },
UseDualStack: { type: "builtInParams", name: "useDualstackEndpoint" },
};
}
/**
* @public
*/
constructor(readonly input: CreateVerifiedAccessTrustProviderCommandInput) {
// Start section: command_constructor
super();
// End section: command_constructor
}
/**
* @internal
*/
resolveMiddleware(
clientStack: MiddlewareStack<ServiceInputTypes, ServiceOutputTypes>,
configuration: EC2ClientResolvedConfig,
options?: __HttpHandlerOptions
): Handler<CreateVerifiedAccessTrustProviderCommandInput, CreateVerifiedAccessTrustProviderCommandOutput> {
this.middlewareStack.use(getSerdePlugin(configuration, this.serialize, this.deserialize));
this.middlewareStack.use(
getEndpointPlugin(configuration, CreateVerifiedAccessTrustProviderCommand.getEndpointParameterInstructions())
);
const stack = clientStack.concat(this.middlewareStack);
const { logger } = configuration;
const clientName = "EC2Client";
const commandName = "CreateVerifiedAccessTrustProviderCommand";
const handlerExecutionContext: HandlerExecutionContext = {
logger,
clientName,
commandName,
inputFilterSensitiveLog: CreateVerifiedAccessTrustProviderRequestFilterSensitiveLog,
outputFilterSensitiveLog: CreateVerifiedAccessTrustProviderResultFilterSensitiveLog,
};
const { requestHandler } = configuration;
return stack.resolve(
(request: FinalizeHandlerArguments<any>) =>
requestHandler.handle(request.request as __HttpRequest, options || {}),
handlerExecutionContext
);
}
/**
* @internal
*/
private serialize(
input: CreateVerifiedAccessTrustProviderCommandInput,
context: __SerdeContext
): Promise<__HttpRequest> {
return se_CreateVerifiedAccessTrustProviderCommand(input, context);
}
/**
* @internal
*/
private deserialize(
output: __HttpResponse,
context: __SerdeContext
): Promise<CreateVerifiedAccessTrustProviderCommandOutput> {
return de_CreateVerifiedAccessTrustProviderCommand(output, context);
}
// Start section: command_body_extra
// End section: command_body_extra
}