Documentation ¶
Index ¶
- func ActiveAssignmentsStructLevelValidation(sl validator.StructLevel)
- func AzureRmConfigStructLevelValidation(sl validator.StructLevel)
- func CountUniqueActiveAssignments(activeAssignments []*ActiveAssignment) int
- type ActiveAssignment
- type AzureRmConfig
- func (c *AzureRmConfig) GetGroupActiveAssignments(subscriptionId string) []*ActiveAssignment
- func (c *AzureRmConfig) GetGroupEligibleAssignments(subscriptionId string) []*EligibleAssignment
- func (c *AzureRmConfig) GetUserActiveAssignments(subscriptionId string) []*ActiveAssignment
- func (c *AzureRmConfig) GetUserEligibleAssignments(subscriptionId string) []*EligibleAssignment
- func (c *AzureRmConfig) Validate() error
- type ConfigurationEmptyError
- type EligibleAssignment
- type Principal
- type RoleAssignmentCreate
- type RoleAssignmentDelete
- type RoleEligibilityScheduleCreate
- type RoleEligibilityScheduleDelete
- type RoleEligibilityScheduleUpdate
- type RoleManagementPolicyRule
- type RoleManagementPolicyRuleset
- type RoleManagementPolicyUpdate
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func ActiveAssignmentsStructLevelValidation ¶
func ActiveAssignmentsStructLevelValidation(sl validator.StructLevel)
func AzureRmConfigStructLevelValidation ¶
func AzureRmConfigStructLevelValidation(sl validator.StructLevel)
func CountUniqueActiveAssignments ¶
func CountUniqueActiveAssignments(activeAssignments []*ActiveAssignment) int
Types ¶
type ActiveAssignment ¶
type AzureRmConfig ¶
type AzureRmConfig struct { Groups []*Principal `validate:"dive"` // TODO: Make private RoleManagementPolicyRulesets []*RoleManagementPolicyRuleset `validate:"dive"` // TODO: Make private Users []*Principal `validate:"dive"` // TODO: Make private }
func (*AzureRmConfig) GetGroupActiveAssignments ¶
func (c *AzureRmConfig) GetGroupActiveAssignments(subscriptionId string) []*ActiveAssignment
func (*AzureRmConfig) GetGroupEligibleAssignments ¶
func (c *AzureRmConfig) GetGroupEligibleAssignments(subscriptionId string) []*EligibleAssignment
func (*AzureRmConfig) GetUserActiveAssignments ¶
func (c *AzureRmConfig) GetUserActiveAssignments(subscriptionId string) []*ActiveAssignment
func (*AzureRmConfig) GetUserEligibleAssignments ¶
func (c *AzureRmConfig) GetUserEligibleAssignments(subscriptionId string) []*EligibleAssignment
func (*AzureRmConfig) Validate ¶
func (c *AzureRmConfig) Validate() error
type ConfigurationEmptyError ¶
type ConfigurationEmptyError struct{}
func (*ConfigurationEmptyError) Error ¶
func (m *ConfigurationEmptyError) Error() string
type EligibleAssignment ¶
type Principal ¶
type Principal struct { Active *activeAssignments `yaml:"active"` Eligible *eligibleAssignments `yaml:"eligible"` Name string }
type RoleAssignmentCreate ¶
type RoleAssignmentDelete ¶
type RoleEligibilityScheduleCreate ¶
type RoleEligibilityScheduleCreate struct { EndDateTime *time.Time PrincipalName string PrincipalType armauthorization.PrincipalType RoleEligibilityScheduleRequest *armauthorization.RoleEligibilityScheduleRequest RoleEligibilityScheduleRequestName string RoleName string Scope string StartDateTime *time.Time }
type RoleEligibilityScheduleDelete ¶
type RoleEligibilityScheduleDelete struct { Cancel bool EndDateTime *time.Time PrincipalName string PrincipalType armauthorization.PrincipalType RoleEligibilityScheduleRequest *armauthorization.RoleEligibilityScheduleRequest RoleEligibilityScheduleRequestName string RoleName string Scope string StartDateTime *time.Time }
type RoleEligibilityScheduleUpdate ¶
type RoleEligibilityScheduleUpdate struct { EndDateTime *time.Time PrincipalName string PrincipalType armauthorization.PrincipalType RoleEligibilityScheduleRequest *armauthorization.RoleEligibilityScheduleRequest RoleEligibilityScheduleRequestName string RoleName string Scope string StartDateTime *time.Time }
type RoleManagementPolicyRule ¶
type RoleManagementPolicyRule struct { ID string `yaml:"id"` Patch interface{} `yaml:"patch"` }
type RoleManagementPolicyRuleset ¶
type RoleManagementPolicyRuleset struct { Name string `yaml:"name"` Rules []*RoleManagementPolicyRule `yaml:"rules"` }
Click to show internal directories.
Click to hide internal directories.