Documentation ¶
Index ¶
- func NewGroupSource(config aws.Config, accountID string, region string, limit *sources.LimitBucket) *sources.GetListSource[*types.Group, *iam.Client, *iam.Options]
- func NewInstanceProfileSource(config aws.Config, accountID string, region string, limit *sources.LimitBucket) *sources.GetListSource[*types.InstanceProfile, *iam.Client, *iam.Options]
- func NewPolicySource(config aws.Config, accountID string, _ string, limit *sources.LimitBucket) *sources.GetListSource[*PolicyDetails, IAMClient, *iam.Options]
- func NewRoleSource(config aws.Config, accountID string, region string, limit *sources.LimitBucket) *sources.GetListSource[*RoleDetails, IAMClient, *iam.Options]
- func NewUserSource(config aws.Config, accountID string, region string, limit *sources.LimitBucket) *sources.GetListSource[*UserDetails, IAMClient, *iam.Options]
- type IAMClient
- type PolicyDetails
- type RoleDetails
- type UserDetails
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func NewGroupSource ¶
func NewInstanceProfileSource ¶
func NewInstanceProfileSource(config aws.Config, accountID string, region string, limit *sources.LimitBucket) *sources.GetListSource[*types.InstanceProfile, *iam.Client, *iam.Options]
func NewPolicySource ¶
func NewPolicySource(config aws.Config, accountID string, _ string, limit *sources.LimitBucket) *sources.GetListSource[*PolicyDetails, IAMClient, *iam.Options]
NewPolicySource Note that this policy source only support polices that are user-created due to the fact that the AWS-created ones are basically "global" in scope. In order to get this to work I'd have to change the way the source is implemented so that it was mart enough to handle different scopes. This has been added to the backlog: https://github.com/overmindtech/aws-source/issues/68
func NewRoleSource ¶
func NewRoleSource(config aws.Config, accountID string, region string, limit *sources.LimitBucket) *sources.GetListSource[*RoleDetails, IAMClient, *iam.Options]
func NewUserSource ¶
func NewUserSource(config aws.Config, accountID string, region string, limit *sources.LimitBucket) *sources.GetListSource[*UserDetails, IAMClient, *iam.Options]
Types ¶
type IAMClient ¶
type IAMClient interface { GetUser(ctx context.Context, params *iam.GetUserInput, optFns ...func(*iam.Options)) (*iam.GetUserOutput, error) GetRole(ctx context.Context, params *iam.GetRoleInput, optFns ...func(*iam.Options)) (*iam.GetRoleOutput, error) GetPolicy(ctx context.Context, params *iam.GetPolicyInput, optFns ...func(*iam.Options)) (*iam.GetPolicyOutput, error) GetRolePolicy(ctx context.Context, params *iam.GetRolePolicyInput, optFns ...func(*iam.Options)) (*iam.GetRolePolicyOutput, error) ListRoleTags(ctx context.Context, params *iam.ListRoleTagsInput, optFns ...func(*iam.Options)) (*iam.ListRoleTagsOutput, error) ListPolicyTags(ctx context.Context, params *iam.ListPolicyTagsInput, optFns ...func(*iam.Options)) (*iam.ListPolicyTagsOutput, error) iam.ListAttachedRolePoliciesAPIClient iam.ListEntitiesForPolicyAPIClient iam.ListPoliciesAPIClient iam.ListUsersAPIClient iam.ListGroupsForUserAPIClient iam.ListRolePoliciesAPIClient iam.ListRolesAPIClient iam.ListUserTagsAPIClient }
type PolicyDetails ¶
type PolicyDetails struct { Policy *types.Policy PolicyGroups []types.PolicyGroup PolicyRoles []types.PolicyRole PolicyUsers []types.PolicyUser }
type RoleDetails ¶
type RoleDetails struct { Role *types.Role EmbeddedPolicies []embeddedPolicy AttachedPolicies []types.AttachedPolicy }
Click to show internal directories.
Click to hide internal directories.