1// Code generated by smithy-go-codegen DO NOT EDIT. 2 3package sts 4 5import ( 6 "context" 7 awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware" 8 "github.com/aws/aws-sdk-go-v2/aws/signer/v4" 9 "github.com/aws/smithy-go/middleware" 10 smithyhttp "github.com/aws/smithy-go/transport/http" 11) 12 13// Returns the account identifier for the specified access key ID. Access keys 14// consist of two parts: an access key ID (for example, AKIAIOSFODNN7EXAMPLE) and a 15// secret access key (for example, wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY). For 16// more information about access keys, see Managing Access Keys for IAM Users 17// (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html) 18// in the IAM User Guide. When you pass an access key ID to this operation, it 19// returns the ID of the AWS account to which the keys belong. Access key IDs 20// beginning with AKIA are long-term credentials for an IAM user or the AWS account 21// root user. Access key IDs beginning with ASIA are temporary credentials that are 22// created using STS operations. If the account in the response belongs to you, you 23// can sign in as the root user and review your root user access keys. Then, you 24// can pull a credentials report 25// (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html) 26// to learn which IAM user owns the keys. To learn who requested the temporary 27// credentials for an ASIA access key, view the STS events in your CloudTrail logs 28// (https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html) 29// in the IAM User Guide. This operation does not indicate the state of the access 30// key. The key might be active, inactive, or deleted. Active keys might not have 31// permissions to perform an operation. Providing a deleted access key might return 32// an error that the key doesn't exist. 33func (c *Client) GetAccessKeyInfo(ctx context.Context, params *GetAccessKeyInfoInput, optFns ...func(*Options)) (*GetAccessKeyInfoOutput, error) { 34 if params == nil { 35 params = &GetAccessKeyInfoInput{} 36 } 37 38 result, metadata, err := c.invokeOperation(ctx, "GetAccessKeyInfo", params, optFns, addOperationGetAccessKeyInfoMiddlewares) 39 if err != nil { 40 return nil, err 41 } 42 43 out := result.(*GetAccessKeyInfoOutput) 44 out.ResultMetadata = metadata 45 return out, nil 46} 47 48type GetAccessKeyInfoInput struct { 49 50 // The identifier of an access key. This parameter allows (through its regex 51 // pattern) a string of characters that can consist of any upper- or lowercase 52 // letter or digit. 53 // 54 // This member is required. 55 AccessKeyId *string 56} 57 58type GetAccessKeyInfoOutput struct { 59 60 // The number used to identify the AWS account. 61 Account *string 62 63 // Metadata pertaining to the operation's result. 64 ResultMetadata middleware.Metadata 65} 66 67func addOperationGetAccessKeyInfoMiddlewares(stack *middleware.Stack, options Options) (err error) { 68 err = stack.Serialize.Add(&awsAwsquery_serializeOpGetAccessKeyInfo{}, middleware.After) 69 if err != nil { 70 return err 71 } 72 err = stack.Deserialize.Add(&awsAwsquery_deserializeOpGetAccessKeyInfo{}, middleware.After) 73 if err != nil { 74 return err 75 } 76 if err = addSetLoggerMiddleware(stack, options); err != nil { 77 return err 78 } 79 if err = awsmiddleware.AddClientRequestIDMiddleware(stack); err != nil { 80 return err 81 } 82 if err = smithyhttp.AddComputeContentLengthMiddleware(stack); err != nil { 83 return err 84 } 85 if err = addResolveEndpointMiddleware(stack, options); err != nil { 86 return err 87 } 88 if err = v4.AddComputePayloadSHA256Middleware(stack); err != nil { 89 return err 90 } 91 if err = addRetryMiddlewares(stack, options); err != nil { 92 return err 93 } 94 if err = addHTTPSignerV4Middleware(stack, options); err != nil { 95 return err 96 } 97 if err = awsmiddleware.AddRawResponseToMetadata(stack); err != nil { 98 return err 99 } 100 if err = awsmiddleware.AddRecordResponseTiming(stack); err != nil { 101 return err 102 } 103 if err = addClientUserAgent(stack); err != nil { 104 return err 105 } 106 if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil { 107 return err 108 } 109 if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil { 110 return err 111 } 112 if err = addOpGetAccessKeyInfoValidationMiddleware(stack); err != nil { 113 return err 114 } 115 if err = stack.Initialize.Add(newServiceMetadataMiddleware_opGetAccessKeyInfo(options.Region), middleware.Before); err != nil { 116 return err 117 } 118 if err = addRequestIDRetrieverMiddleware(stack); err != nil { 119 return err 120 } 121 if err = addResponseErrorMiddleware(stack); err != nil { 122 return err 123 } 124 if err = addRequestResponseLogging(stack, options); err != nil { 125 return err 126 } 127 return nil 128} 129 130func newServiceMetadataMiddleware_opGetAccessKeyInfo(region string) *awsmiddleware.RegisterServiceMetadata { 131 return &awsmiddleware.RegisterServiceMetadata{ 132 Region: region, 133 ServiceID: ServiceID, 134 SigningName: "sts", 135 OperationName: "GetAccessKeyInfo", 136 } 137} 138