Documentation
¶
Index ¶
- Variables
- func NewClient(session *session.Session, awsConfig *aws.Config, db *database.Database, ...) resource.ClientInterface
- type Client
- type Group
- type GroupPolicy
- type PasswordPolicy
- type Policy
- type PolicyVersion
- type ReportUser
- type Role
- type RolePolicy
- type RoleTag
- type User
- type UserAccessKey
- type UserAttachedPolicy
- type UserGroup
- type UserTag
- type VirtualMFADevice
Constants ¶
This section is empty.
Variables ¶
View Source
var GroupTables = []interface{}{ &Group{}, &GroupPolicy{}, }
View Source
var PasswordPolicyTables = []interface{}{ &PasswordPolicy{}, }
View Source
var PolicyTables = []interface{}{ &Policy{}, &PolicyVersion{}, }
View Source
var RoleTables = []interface{}{ &Role{}, &RoleTag{}, &RolePolicy{}, }
View Source
var UserTables = []interface{}{ &User{}, &UserAccessKey{}, &UserTag{}, &UserAttachedPolicy{}, &UserGroup{}, }
View Source
var VirtualMFADeviceTables = []interface{}{ &VirtualMFADevice{}, }
Functions ¶
Types ¶
type Client ¶
type Client struct {
// contains filtered or unexported fields
}
func (*Client) CollectResource ¶
type Group ¶
type GroupPolicy ¶ added in v0.8.2
type GroupPolicy struct {
ID uint `gorm:"primarykey"`
GroupID uint `neo:"ignore"`
AccountID string `gorm:"-"`
PolicyArn *string
PolicyName *string
}
func (GroupPolicy) TableName ¶ added in v0.8.2
func (GroupPolicy) TableName() string
type PasswordPolicy ¶ added in v0.3.6
type PasswordPolicy struct {
ID uint `gorm:"primarykey"`
AccountID string `neo:"unique"`
AllowUsersToChangePassword *bool
ExpirePasswords *bool
HardExpiry *bool
MaxPasswordAge *int64
MinimumPasswordLength *int64
PasswordReusePrevention *int64
RequireLowercaseCharacters *bool
RequireNumbers *bool
RequireSymbols *bool
RequireUppercaseCharacters *bool
}
func (PasswordPolicy) TableName ¶ added in v0.3.8
func (PasswordPolicy) TableName() string
type Policy ¶
type Policy struct {
ID uint `gorm:"primarykey"`
AccountID string `neo:"unique"`
Arn *string `neo:"unique"`
AttachmentCount *int64
CreateDate *time.Time
DefaultVersionId *string
Description *string
IsAttachable *bool
Path *string
PermissionsBoundaryUsageCount *int64
PolicyId *string `neo:"unique"`
PolicyName *string
UpdateDate *time.Time
PolicyVersions []*PolicyVersion `gorm:"constraint:OnDelete:CASCADE;"`
}
type PolicyVersion ¶ added in v0.8.11
type PolicyVersion struct {
ID uint `gorm:"primarykey`
PolicyID uint `neo:"ignore"`
AccountID string `gorm:"-"`
VersionID *string
CreateDate *time.Time
Document *string
IsDefaultVersion *bool
}
func (PolicyVersion) TableName ¶ added in v0.8.11
func (PolicyVersion) TableName() string
type ReportUser ¶ added in v0.3.7
type ReportUser struct {
User string `csv:"user"`
ARN string `csv:"arn"`
UserCreationTime time.Time `csv:"user_creation_time"`
PasswordEnabled string `csv:"password_enabled"`
PasswordLastUsed string `csv:"password_last_used"`
PasswordLastChanged string `csv:"password_last_changed"`
PasswordNextRotation string `csv:"password_next_rotation"`
MFAActive bool `csv:"mfa_active"`
AccessKey1Active bool `csv:"access_key_1_active"`
AccessKey2Active bool `csv:"access_key_2_active"`
AccessKey1LastRotated string `csv:"access_key_1_last_rotated"`
AccessKey2LastRotated string `csv:"access_key_2_last_rotated"`
}
type Role ¶
type Role struct {
ID uint `gorm:"primarykey"`
AccountID string `neo:"unique"`
Arn *string `neo:"unique"`
AssumeRolePolicyDocument *string
CreateDate *time.Time
Description *string
MaxSessionDuration *int64
Path *string
PermissionsBoundaryArn *string
PermissionsBoundaryType *string
RoleId *string `neo:"unique"`
LastUsedDate *time.Time
LastUsedRegion *string
RoleName *string
Tags []*RoleTag `gorm:"constraint:OnDelete:CASCADE;"`
Policies []*RolePolicy `gorm:"constraint:OnDelete:CASCADE;"`
}
type RolePolicy ¶ added in v0.8.2
type RolePolicy struct {
ID uint `gorm:"primarykey"`
RoleID uint `neo:"ignore"`
AccountID string `gorm:"-"`
PolicyArn *string
PolicyName *string
}
func (RolePolicy) TableName ¶ added in v0.8.2
func (RolePolicy) TableName() string
type RoleTag ¶
type User ¶
type User struct {
ID uint `gorm:"primarykey"`
AccountID string `neo:"unique"`
Arn *string `neo:"unique"`
PasswordEnabled *bool
PasswordLastUsed *time.Time
PasswordLastChanged *time.Time
PasswordNextRotation *time.Time
MFAActive *bool
CreateDate *time.Time
Path *string
PermissionsBoundaryArn *string
PermissionsBoundaryType *string
Tags []*UserTag `gorm:"constraint:OnDelete:CASCADE;"`
UserId *string
UserName *string `csv:"user"`
AccessKeys []*UserAccessKey `gorm:"constraint:OnDelete:CASCADE;"`
AttachedPolicies []*UserAttachedPolicy `gorm:"constraint:OnDelete:CASCADE;"`
Groups []*UserGroup `gorm:"constraint:OnDelete:CASCADE;"`
}
type UserAccessKey ¶ added in v0.3.7
type UserAccessKey struct {
ID uint `gorm:"primarykey"`
UserID uint `neo:"ignore"`
AccountID string `gorm:"-"`
AccessKeyId *string
CreateDate *time.Time
Status *string
LastUsed *time.Time
LastRotated *time.Time
LastUsedServiceName *string
}
func (UserAccessKey) TableName ¶ added in v0.4.1
func (UserAccessKey) TableName() string
type UserAttachedPolicy ¶ added in v0.7.6
type UserAttachedPolicy struct {
ID uint `gorm:"primarykey"`
UserID uint `neo:"ignore"`
AccountID string `gorm:"-"`
PolicyArn *string
PolicyName *string
}
func (UserAttachedPolicy) TableName ¶ added in v0.7.6
func (UserAttachedPolicy) TableName() string
type UserGroup ¶ added in v0.8.2
type UserTag ¶
type VirtualMFADevice ¶ added in v0.7.6
type VirtualMFADevice struct {
ID uint `gorm:"primarykey"`
AccountID string `neo:"unique"`
SerialNumber *string `neo:"unique"`
UserARN *string
EnableDate *time.Time
}
func (VirtualMFADevice) TableName ¶ added in v0.7.6
func (VirtualMFADevice) TableName() string
Click to show internal directories.
Click to hide internal directories.