1// Code generated by smithy-go-codegen DO NOT EDIT.
2
3package sts
4
5import (
6	"context"
7	awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware"
8	"github.com/aws/aws-sdk-go-v2/aws/signer/v4"
9	"github.com/aws/smithy-go/middleware"
10	smithyhttp "github.com/aws/smithy-go/transport/http"
11)
12
13// Returns the account identifier for the specified access key ID. Access keys
14// consist of two parts: an access key ID (for example, AKIAIOSFODNN7EXAMPLE) and a
15// secret access key (for example, wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY). For
16// more information about access keys, see Managing Access Keys for IAM Users
17// (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html)
18// in the IAM User Guide. When you pass an access key ID to this operation, it
19// returns the ID of the AWS account to which the keys belong. Access key IDs
20// beginning with AKIA are long-term credentials for an IAM user or the AWS account
21// root user. Access key IDs beginning with ASIA are temporary credentials that are
22// created using STS operations. If the account in the response belongs to you, you
23// can sign in as the root user and review your root user access keys. Then, you
24// can pull a credentials report
25// (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html)
26// to learn which IAM user owns the keys. To learn who requested the temporary
27// credentials for an ASIA access key, view the STS events in your CloudTrail logs
28// (https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html)
29// in the IAM User Guide. This operation does not indicate the state of the access
30// key. The key might be active, inactive, or deleted. Active keys might not have
31// permissions to perform an operation. Providing a deleted access key might return
32// an error that the key doesn't exist.
33func (c *Client) GetAccessKeyInfo(ctx context.Context, params *GetAccessKeyInfoInput, optFns ...func(*Options)) (*GetAccessKeyInfoOutput, error) {
34	if params == nil {
35		params = &GetAccessKeyInfoInput{}
36	}
37
38	result, metadata, err := c.invokeOperation(ctx, "GetAccessKeyInfo", params, optFns, addOperationGetAccessKeyInfoMiddlewares)
39	if err != nil {
40		return nil, err
41	}
42
43	out := result.(*GetAccessKeyInfoOutput)
44	out.ResultMetadata = metadata
45	return out, nil
46}
47
48type GetAccessKeyInfoInput struct {
49
50	// The identifier of an access key. This parameter allows (through its regex
51	// pattern) a string of characters that can consist of any upper- or lowercase
52	// letter or digit.
53	//
54	// This member is required.
55	AccessKeyId *string
56}
57
58type GetAccessKeyInfoOutput struct {
59
60	// The number used to identify the AWS account.
61	Account *string
62
63	// Metadata pertaining to the operation's result.
64	ResultMetadata middleware.Metadata
65}
66
67func addOperationGetAccessKeyInfoMiddlewares(stack *middleware.Stack, options Options) (err error) {
68	err = stack.Serialize.Add(&awsAwsquery_serializeOpGetAccessKeyInfo{}, middleware.After)
69	if err != nil {
70		return err
71	}
72	err = stack.Deserialize.Add(&awsAwsquery_deserializeOpGetAccessKeyInfo{}, middleware.After)
73	if err != nil {
74		return err
75	}
76	if err = addSetLoggerMiddleware(stack, options); err != nil {
77		return err
78	}
79	if err = awsmiddleware.AddClientRequestIDMiddleware(stack); err != nil {
80		return err
81	}
82	if err = smithyhttp.AddComputeContentLengthMiddleware(stack); err != nil {
83		return err
84	}
85	if err = addResolveEndpointMiddleware(stack, options); err != nil {
86		return err
87	}
88	if err = v4.AddComputePayloadSHA256Middleware(stack); err != nil {
89		return err
90	}
91	if err = addRetryMiddlewares(stack, options); err != nil {
92		return err
93	}
94	if err = addHTTPSignerV4Middleware(stack, options); err != nil {
95		return err
96	}
97	if err = awsmiddleware.AddRawResponseToMetadata(stack); err != nil {
98		return err
99	}
100	if err = awsmiddleware.AddRecordResponseTiming(stack); err != nil {
101		return err
102	}
103	if err = addClientUserAgent(stack); err != nil {
104		return err
105	}
106	if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil {
107		return err
108	}
109	if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil {
110		return err
111	}
112	if err = addOpGetAccessKeyInfoValidationMiddleware(stack); err != nil {
113		return err
114	}
115	if err = stack.Initialize.Add(newServiceMetadataMiddleware_opGetAccessKeyInfo(options.Region), middleware.Before); err != nil {
116		return err
117	}
118	if err = addRequestIDRetrieverMiddleware(stack); err != nil {
119		return err
120	}
121	if err = addResponseErrorMiddleware(stack); err != nil {
122		return err
123	}
124	if err = addRequestResponseLogging(stack, options); err != nil {
125		return err
126	}
127	return nil
128}
129
130func newServiceMetadataMiddleware_opGetAccessKeyInfo(region string) *awsmiddleware.RegisterServiceMetadata {
131	return &awsmiddleware.RegisterServiceMetadata{
132		Region:        region,
133		ServiceID:     ServiceID,
134		SigningName:   "sts",
135		OperationName: "GetAccessKeyInfo",
136	}
137}
138