Documentation ¶
Index ¶
- Constants
- func AllDayConfig(ctx context.Context, cfg *awscfg.Config) (cfg12h *awscfg.Config, err error)
- func AllDayCredentials(ctx context.Context, cfg *awscfg.Config, accountId, roleName string) (creds aws.Credentials, err error)
- func AttachRolePolicy(ctx context.Context, cfg *awscfg.Config, roleName, policyARN string) error
- func AttachUserPolicy(ctx context.Context, cfg *awscfg.Config, username, policyARN string) error
- func DeleteAccessKey(ctx context.Context, cfg *awscfg.Config, username, accessKeyId string) error
- func DeleteAllAccessKeys(ctx context.Context, cfg *awscfg.Config, username string, age time.Duration) error
- func DeleteInstanceProfile(ctx context.Context, cfg *awscfg.Config, roleName string) (err error)
- func DeleteRole(ctx context.Context, cfg *awscfg.Config, roleName string) error
- func DeleteRolePolicy(ctx context.Context, cfg *awscfg.Config, roleName string) error
- func DeleteRoleWithConfirmation(ctx context.Context, cfg *awscfg.Config, roleName string, force bool) error
- func DeleteUser(ctx context.Context, cfg *awscfg.Config, username string) error
- func DetachRolePolicy(ctx context.Context, cfg *awscfg.Config, roleName, policyARN string) error
- func EnsureOpenIDConnectProvider(ctx context.Context, cfg *awscfg.Config, clients, thumbprints []string, ...) (string, error)
- func ListAttachedRolePolicies(ctx context.Context, cfg *awscfg.Config, roleName string) ([]string, error)
- func ListRolePolicies(ctx context.Context, cfg *awscfg.Config, roleName string) ([]string, error)
- func ListRoleTags(ctx context.Context, cfg *awscfg.Config, roleName string) (tagging.Map, error)
- func ListUserTags(ctx context.Context, cfg *awscfg.Config, userName string) (tagging.Map, error)
- func PutRolePolicy(ctx context.Context, cfg *awscfg.Config, roleName, policyName string, ...) error
- func TagRole(ctx context.Context, cfg *awscfg.Config, roleName string, tags tagging.Map) error
- func TagUser(ctx context.Context, cfg *awscfg.Config, userName string, tags tagging.Map) error
- func UntagUser(ctx context.Context, cfg *awscfg.Config, userName string, keys []string) error
- type AccessKey
- type AccessKeyMetadata
- type InstanceProfile
- type Policy
- func CreatePolicy(ctx context.Context, cfg *awscfg.Config, name string, doc *policies.Document) (*Policy, error)
- func CreatePolicyVersion(ctx context.Context, cfg *awscfg.Config, arn string, doc *policies.Document) (*Policy, error)
- func EnsurePolicy(ctx context.Context, cfg *awscfg.Config, name string, doc *policies.Document) (*Policy, error)
- func ListPolicies(ctx context.Context, cfg *awscfg.Config) ([]Policy, error)
- type PolicyVersion
- type Role
- func CreateRole(ctx context.Context, cfg *awscfg.Config, roleName string, ...) (*Role, error)
- func CreateServiceLinkedRole(ctx context.Context, cfg *awscfg.Config, serviceName string) (*Role, error)
- func EnsureRole(ctx context.Context, cfg *awscfg.Config, roleName string, ...) (*Role, error)
- func EnsureRoleWithPolicy(ctx context.Context, cfg *awscfg.Config, roleName string, ...) (*Role, error)
- func EnsureServiceLinkedRole(ctx context.Context, cfg *awscfg.Config, roleName, serviceName string) (*Role, error)
- func GetRole(ctx context.Context, cfg *awscfg.Config, roleName string) (*Role, error)
- func ListRoles(ctx context.Context, cfg *awscfg.Config) ([]*Role, error)
- type SAMLProvider
- type User
- func CreateUser(ctx context.Context, cfg *awscfg.Config, username string) (*User, error)
- func EnsureUser(ctx context.Context, cfg *awscfg.Config, username string) (*User, error)
- func EnsureUserWithPolicy(ctx context.Context, cfg *awscfg.Config, username string, ...) (*User, error)
- func GetUser(ctx context.Context, cfg *awscfg.Config, username string) (*User, error)
Constants ¶
View Source
const ( AccessKeyExpiry = 7 * 24 * time.Hour CreateAccessKeyTriesBeforeDeleteAll = 3 // must be lower than... CreateAccessKeyTriesTotal = 6 // ...this )
View Source
const ( DeleteConflict = "DeleteConflict" EntityAlreadyExists = awsiamusers.EntityAlreadyExists InvalidInput = "InvalidInput" LimitExceeded = "LimitExceeded" NoSuchEntity = awsiamusers.NoSuchEntity )
View Source
const ( GitHubActionsOAuthOIDCThumbprint = "ffffffffffffffffffffffffffffffffffffffff" // <https://github.com/aws-actions/configure-aws-credentials/issues/357> GitHubActionsOAuthOIDCURL = "https://token.actions.githubusercontent.com" )
View Source
const ( DuplicatePolicyException = "DuplicatePolicyException" SubstrateManaged = awsiamusers.SubstrateManaged )
Variables ¶
This section is empty.
Functions ¶
func AllDayConfig ¶
func AllDayCredentials ¶
func AttachRolePolicy ¶
func AttachUserPolicy ¶
func DeleteAccessKey ¶
func DeleteAllAccessKeys ¶
func DeleteInstanceProfile ¶
func DeleteRolePolicy ¶
func DeleteRoleWithConfirmation ¶
func DeleteRoleWithConfirmation( ctx context.Context, cfg *awscfg.Config, roleName string, force bool, ) error
DeleteRoleWithConfirmation is a higher-level way to delete a role that checks to see if the role even exists, confirms the deletion, and then deletes not only the role but also the instance profile and inline policies that must be detached and/or deleted first.
func DeleteUser ¶
func DetachRolePolicy ¶
func ListRolePolicies ¶
func ListRoleTags ¶
func ListUserTags ¶
func PutRolePolicy ¶
Types ¶
type InstanceProfile ¶
type InstanceProfile = types.InstanceProfile
func CreateInstanceProfile ¶
func EnsureInstanceProfile ¶
type PolicyVersion ¶
type PolicyVersion = types.PolicyVersion
type Role ¶
func CreateRole ¶
func CreateServiceLinkedRole ¶
func EnsureRole ¶
func EnsureRoleWithPolicy ¶
func EnsureServiceLinkedRole ¶
type SAMLProvider ¶
type SAMLProvider struct {
Arn string
}
Source Files ¶
Click to show internal directories.
Click to hide internal directories.