Documentation
¶
Index ¶
- Constants
- func GetClient(context *endly.Context) (*iam.IAM, error)
- func New() endly.Service
- type DropRoleInput
- type GetGroupInfoInput
- type GetGroupInfoOutput
- type GetRoleInfoInput
- type GetRoleInfoOutput
- type GetUserInfoInput
- type GetUserInfoOutput
- type GroupEventInfo
- type InfoStatement
- type Policy
- type PolicyDocument
- type PolicyEvenInfo
- type PolicyInfo
- type Principal
- type RecreateRoleInput
- type RoleEventInfo
- type SetupRolePolicyInput
- type Statement
- type UserEventInfo
Constants ¶
View Source
const (
//ServiceID aws iam service id.
ServiceID = "aws/iam"
)
Variables ¶
This section is empty.
Functions ¶
Types ¶
type DropRoleInput ¶
type DropRoleInput iam.DeleteRoleInput
DropRoleInput deattaches all role polices and deletes role
type GetGroupInfoInput ¶
type GetGroupInfoInput iam.GetGroupInput
type GetGroupInfoOutput ¶
type GetRoleInfoInput ¶
type GetRoleInfoInput iam.GetRoleInput
type GetRoleInfoOutput ¶
func (*GetRoleInfoOutput) Messages ¶
func (o *GetRoleInfoOutput) Messages() []*msg.Message
type GetUserInfoInput ¶
type GetUserInfoInput iam.GetUserInput
type GetUserInfoOutput ¶
type GetUserInfoOutput struct {
User *iam.User
Attached []*Policy
Defined []*Policy
Groups []*GetGroupInfoOutput
}
func (*GetUserInfoOutput) Messages ¶
func (o *GetUserInfoOutput) Messages() []*msg.Message
type GroupEventInfo ¶
type GroupEventInfo struct {
Group *string
Arn *string
Users []string `yaml:"users,omitempty"`
Defined []*PolicyEvenInfo `yaml:"defined,omitempty"`
Attached []*PolicyEvenInfo `yaml:"attached,omitempty"`
}
func NewGroupEventInfo ¶
func NewGroupEventInfo(output *GetGroupInfoOutput, includeUsers bool) *GroupEventInfo
func (*GroupEventInfo) Messages ¶
func (e *GroupEventInfo) Messages() []*msg.Message
type InfoStatement ¶
type InfoStatement struct {
SID *string `yaml:"sid,omitempty" json:",omitempty"`
Effect string
Action interface{}
Resource interface{} `yaml:"resource,omitempty" json:",omitempty"`
Condition interface{} `yaml:"condition,omitempty" json:",omitempty"`
Principal interface{} `yaml:"principal,omitempty" json:",omitempty"`
}
type Policy ¶
type Policy struct {
PolicyName *string
PolicyArn *string
Document *string
PolicyDocument *PolicyDocument
}
Policy represent policy
func (*Policy) PolicyInfo ¶
func (p *Policy) PolicyInfo() []*InfoStatement
type PolicyDocument ¶
PolicyDocument represent policy document
type PolicyEvenInfo ¶
type PolicyEvenInfo struct {
Policy *string `yaml:"policy,omitempty"`
Arn *string `yaml:"arn,omitempty"`
Document []*InfoStatement `yaml:"document,omitempty"`
}
type PolicyInfo ¶
type PolicyInfo struct {
Statement []*InfoStatement
}
type RecreateRoleInput ¶
type RecreateRoleInput iam.CreateRoleInput
RecreateRoleInput drops role if exist to create a new one
type RoleEventInfo ¶
type RoleEventInfo struct {
Role string
Arn string
Defined []*PolicyEvenInfo `yaml:"defined,omitempty"`
Attached []*PolicyEvenInfo `yaml:"attached,omitempty"`
}
func NewRoleEventInfo ¶
func NewRoleEventInfo(output *GetRoleInfoOutput) *RoleEventInfo
func (*RoleEventInfo) Messages ¶
func (e *RoleEventInfo) Messages() []*msg.Message
type SetupRolePolicyInput ¶
type SetupRolePolicyInput struct {
iam.CreateRoleInput `yaml:",inline" json:",inline"`
DefaultPolicyDocument *string
Attach []*iam.AttachRolePolicyInput
Define []*iam.PutRolePolicyInput
}
SetupRolePolicyInput represents setup role policy input
func (*SetupRolePolicyInput) Init ¶ added in v0.44.0
func (i *SetupRolePolicyInput) Init() error
Validate checks if input is valid
func (*SetupRolePolicyInput) Validate ¶
func (i *SetupRolePolicyInput) Validate() error
Validate checks if input is valid
type Statement ¶
type Statement struct {
Sid *string
Effect string
Action toolbox.AnyJSONType `json:",omitempty"`
Resource toolbox.AnyJSONType `json:",omitempty"`
Principal toolbox.AnyJSONType `json:",omitempty"`
Condition toolbox.AnyJSONType `json:",omitempty"`
}
Statement represents policy document statement
type UserEventInfo ¶
type UserEventInfo struct {
User *string
Arn *string
Defined []*PolicyEvenInfo `yaml:"defined,omitempty"`
Attached []*PolicyEvenInfo `yaml:"attached,omitempty"`
Groups []*GroupEventInfo `yaml:"groups,omitempty"`
}
func NewUserEventInfo ¶
func NewUserEventInfo(output *GetUserInfoOutput) *UserEventInfo
func (*UserEventInfo) Messages ¶
func (e *UserEventInfo) Messages() []*msg.Message
Click to show internal directories.
Click to hide internal directories.