1// Code generated by smithy-go-codegen DO NOT EDIT.
2
3package frauddetector
4
5import (
6	"context"
7	awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware"
8	"github.com/aws/aws-sdk-go-v2/aws/signer/v4"
9	"github.com/aws/aws-sdk-go-v2/service/frauddetector/types"
10	"github.com/aws/smithy-go/middleware"
11	smithyhttp "github.com/aws/smithy-go/transport/http"
12)
13
14// Gets the encryption key if a Key Management Service (KMS) customer master key
15// (CMK) has been specified to be used to encrypt content in Amazon Fraud Detector.
16func (c *Client) GetKMSEncryptionKey(ctx context.Context, params *GetKMSEncryptionKeyInput, optFns ...func(*Options)) (*GetKMSEncryptionKeyOutput, error) {
17	if params == nil {
18		params = &GetKMSEncryptionKeyInput{}
19	}
20
21	result, metadata, err := c.invokeOperation(ctx, "GetKMSEncryptionKey", params, optFns, addOperationGetKMSEncryptionKeyMiddlewares)
22	if err != nil {
23		return nil, err
24	}
25
26	out := result.(*GetKMSEncryptionKeyOutput)
27	out.ResultMetadata = metadata
28	return out, nil
29}
30
31type GetKMSEncryptionKeyInput struct {
32}
33
34type GetKMSEncryptionKeyOutput struct {
35
36	// The KMS encryption key.
37	KmsKey *types.KMSKey
38
39	// Metadata pertaining to the operation's result.
40	ResultMetadata middleware.Metadata
41}
42
43func addOperationGetKMSEncryptionKeyMiddlewares(stack *middleware.Stack, options Options) (err error) {
44	err = stack.Serialize.Add(&awsAwsjson11_serializeOpGetKMSEncryptionKey{}, middleware.After)
45	if err != nil {
46		return err
47	}
48	err = stack.Deserialize.Add(&awsAwsjson11_deserializeOpGetKMSEncryptionKey{}, middleware.After)
49	if err != nil {
50		return err
51	}
52	if err = addSetLoggerMiddleware(stack, options); err != nil {
53		return err
54	}
55	if err = awsmiddleware.AddClientRequestIDMiddleware(stack); err != nil {
56		return err
57	}
58	if err = smithyhttp.AddComputeContentLengthMiddleware(stack); err != nil {
59		return err
60	}
61	if err = addResolveEndpointMiddleware(stack, options); err != nil {
62		return err
63	}
64	if err = v4.AddComputePayloadSHA256Middleware(stack); err != nil {
65		return err
66	}
67	if err = addRetryMiddlewares(stack, options); err != nil {
68		return err
69	}
70	if err = addHTTPSignerV4Middleware(stack, options); err != nil {
71		return err
72	}
73	if err = awsmiddleware.AddRawResponseToMetadata(stack); err != nil {
74		return err
75	}
76	if err = awsmiddleware.AddRecordResponseTiming(stack); err != nil {
77		return err
78	}
79	if err = addClientUserAgent(stack); err != nil {
80		return err
81	}
82	if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil {
83		return err
84	}
85	if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil {
86		return err
87	}
88	if err = stack.Initialize.Add(newServiceMetadataMiddleware_opGetKMSEncryptionKey(options.Region), middleware.Before); err != nil {
89		return err
90	}
91	if err = addRequestIDRetrieverMiddleware(stack); err != nil {
92		return err
93	}
94	if err = addResponseErrorMiddleware(stack); err != nil {
95		return err
96	}
97	if err = addRequestResponseLogging(stack, options); err != nil {
98		return err
99	}
100	return nil
101}
102
103func newServiceMetadataMiddleware_opGetKMSEncryptionKey(region string) *awsmiddleware.RegisterServiceMetadata {
104	return &awsmiddleware.RegisterServiceMetadata{
105		Region:        region,
106		ServiceID:     ServiceID,
107		SigningName:   "frauddetector",
108		OperationName: "GetKMSEncryptionKey",
109	}
110}
111