diff --git a/clients/client-ec2/src/pagination/GetNetworkInsightsAccessScopeAnalysisFindingsPaginator.ts b/clients/client-ec2/src/pagination/GetNetworkInsightsAccessScopeAnalysisFindingsPaginator.ts new file mode 100644 index 000000000000..7896501f50db --- /dev/null +++ b/clients/client-ec2/src/pagination/GetNetworkInsightsAccessScopeAnalysisFindingsPaginator.ts @@ -0,0 +1,50 @@ +// smithy-typescript generated code +import { Paginator } from "@aws-sdk/types"; + +import { + GetNetworkInsightsAccessScopeAnalysisFindingsCommand, + GetNetworkInsightsAccessScopeAnalysisFindingsCommandInput, + GetNetworkInsightsAccessScopeAnalysisFindingsCommandOutput, +} from "../commands/GetNetworkInsightsAccessScopeAnalysisFindingsCommand"; +import { EC2Client } from "../EC2Client"; +import { EC2PaginationConfiguration } from "./Interfaces"; + +/** + * @internal + */ +const makePagedClientRequest = async ( + client: EC2Client, + input: GetNetworkInsightsAccessScopeAnalysisFindingsCommandInput, + ...args: any +): Promise => { + // @ts-ignore + return await client.send(new GetNetworkInsightsAccessScopeAnalysisFindingsCommand(input), ...args); +}; +/** + * @public + */ +export async function* paginateGetNetworkInsightsAccessScopeAnalysisFindings( + config: EC2PaginationConfiguration, + input: GetNetworkInsightsAccessScopeAnalysisFindingsCommandInput, + ...additionalArguments: any +): Paginator { + // ToDo: replace with actual type instead of typeof input.NextToken + let token: typeof input.NextToken | undefined = config.startingToken || undefined; + let hasNext = true; + let page: GetNetworkInsightsAccessScopeAnalysisFindingsCommandOutput; + while (hasNext) { + input.NextToken = token; + input["MaxResults"] = config.pageSize; + if (config.client instanceof EC2Client) { + page = await makePagedClientRequest(config.client, input, ...additionalArguments); + } else { + throw new Error("Invalid client, expected EC2 | EC2Client"); + } + yield page; + const prevToken = token; + token = page.NextToken; + hasNext = !!(token && (!config.stopOnSameToken || token !== prevToken)); + } + // @ts-ignore + return undefined; +} diff --git a/clients/client-ec2/src/pagination/index.ts b/clients/client-ec2/src/pagination/index.ts index cc0c03e71e17..13886bc9d201 100644 --- a/clients/client-ec2/src/pagination/index.ts +++ b/clients/client-ec2/src/pagination/index.ts @@ -131,6 +131,7 @@ export * from "./GetIpamPoolCidrsPaginator"; export * from "./GetIpamResourceCidrsPaginator"; export * from "./GetManagedPrefixListAssociationsPaginator"; export * from "./GetManagedPrefixListEntriesPaginator"; +export * from "./GetNetworkInsightsAccessScopeAnalysisFindingsPaginator"; export * from "./GetSpotPlacementScoresPaginator"; export * from "./GetTransitGatewayAttachmentPropagationsPaginator"; export * from "./GetTransitGatewayMulticastDomainAssociationsPaginator"; diff --git a/codegen/sdk-codegen/aws-models/ec2.json b/codegen/sdk-codegen/aws-models/ec2.json index db74f1858022..6d3e2bd1c9f4 100644 --- a/codegen/sdk-codegen/aws-models/ec2.json +++ b/codegen/sdk-codegen/aws-models/ec2.json @@ -48149,7 +48149,13 @@ "target": "com.amazonaws.ec2#GetNetworkInsightsAccessScopeAnalysisFindingsResult" }, "traits": { - "smithy.api#documentation": "

Gets the findings for the specified Network Access Scope analysis.

" + "smithy.api#documentation": "

Gets the findings for the specified Network Access Scope analysis.

", + "smithy.api#paginated": { + "inputToken": "NextToken", + "outputToken": "NextToken", + "items": "AnalysisFindings", + "pageSize": "MaxResults" + } } }, "com.amazonaws.ec2#GetNetworkInsightsAccessScopeAnalysisFindingsRequest": {