1// Code generated by smithy-go-codegen DO NOT EDIT. 2 3package frauddetector 4 5import ( 6 "context" 7 awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware" 8 "github.com/aws/aws-sdk-go-v2/aws/signer/v4" 9 "github.com/aws/aws-sdk-go-v2/service/frauddetector/types" 10 "github.com/aws/smithy-go/middleware" 11 smithyhttp "github.com/aws/smithy-go/transport/http" 12) 13 14// Gets the encryption key if a Key Management Service (KMS) customer master key 15// (CMK) has been specified to be used to encrypt content in Amazon Fraud Detector. 16func (c *Client) GetKMSEncryptionKey(ctx context.Context, params *GetKMSEncryptionKeyInput, optFns ...func(*Options)) (*GetKMSEncryptionKeyOutput, error) { 17 if params == nil { 18 params = &GetKMSEncryptionKeyInput{} 19 } 20 21 result, metadata, err := c.invokeOperation(ctx, "GetKMSEncryptionKey", params, optFns, addOperationGetKMSEncryptionKeyMiddlewares) 22 if err != nil { 23 return nil, err 24 } 25 26 out := result.(*GetKMSEncryptionKeyOutput) 27 out.ResultMetadata = metadata 28 return out, nil 29} 30 31type GetKMSEncryptionKeyInput struct { 32} 33 34type GetKMSEncryptionKeyOutput struct { 35 36 // The KMS encryption key. 37 KmsKey *types.KMSKey 38 39 // Metadata pertaining to the operation's result. 40 ResultMetadata middleware.Metadata 41} 42 43func addOperationGetKMSEncryptionKeyMiddlewares(stack *middleware.Stack, options Options) (err error) { 44 err = stack.Serialize.Add(&awsAwsjson11_serializeOpGetKMSEncryptionKey{}, middleware.After) 45 if err != nil { 46 return err 47 } 48 err = stack.Deserialize.Add(&awsAwsjson11_deserializeOpGetKMSEncryptionKey{}, middleware.After) 49 if err != nil { 50 return err 51 } 52 if err = addSetLoggerMiddleware(stack, options); err != nil { 53 return err 54 } 55 if err = awsmiddleware.AddClientRequestIDMiddleware(stack); err != nil { 56 return err 57 } 58 if err = smithyhttp.AddComputeContentLengthMiddleware(stack); err != nil { 59 return err 60 } 61 if err = addResolveEndpointMiddleware(stack, options); err != nil { 62 return err 63 } 64 if err = v4.AddComputePayloadSHA256Middleware(stack); err != nil { 65 return err 66 } 67 if err = addRetryMiddlewares(stack, options); err != nil { 68 return err 69 } 70 if err = addHTTPSignerV4Middleware(stack, options); err != nil { 71 return err 72 } 73 if err = awsmiddleware.AddRawResponseToMetadata(stack); err != nil { 74 return err 75 } 76 if err = awsmiddleware.AddRecordResponseTiming(stack); err != nil { 77 return err 78 } 79 if err = addClientUserAgent(stack); err != nil { 80 return err 81 } 82 if err = smithyhttp.AddErrorCloseResponseBodyMiddleware(stack); err != nil { 83 return err 84 } 85 if err = smithyhttp.AddCloseResponseBodyMiddleware(stack); err != nil { 86 return err 87 } 88 if err = stack.Initialize.Add(newServiceMetadataMiddleware_opGetKMSEncryptionKey(options.Region), middleware.Before); err != nil { 89 return err 90 } 91 if err = addRequestIDRetrieverMiddleware(stack); err != nil { 92 return err 93 } 94 if err = addResponseErrorMiddleware(stack); err != nil { 95 return err 96 } 97 if err = addRequestResponseLogging(stack, options); err != nil { 98 return err 99 } 100 return nil 101} 102 103func newServiceMetadataMiddleware_opGetKMSEncryptionKey(region string) *awsmiddleware.RegisterServiceMetadata { 104 return &awsmiddleware.RegisterServiceMetadata{ 105 Region: region, 106 ServiceID: ServiceID, 107 SigningName: "frauddetector", 108 OperationName: "GetKMSEncryptionKey", 109 } 110} 111