Documentation ¶
Index ¶
- Variables
- type IAMClientAWS
- func (i *IAMClientAWS) AddInternalPolicyToLambdaRolePolicies(ctx context.Context) (*iam.AttachRolePolicyOutput, error)
- func (i *IAMClientAWS) AttachExternalLambdaUserPolicy(ctx context.Context) error
- func (i *IAMClientAWS) CreateInternalLambdaRole(ctx context.Context) (*iam.CreateRoleOutput, error)
- func (i *IAMClientAWS) CreateLambdaUser(ctx context.Context, upt UserPolicyTemplate) error
- func (i *IAMClientAWS) CreateNewLambdaUserPolicy(ctx context.Context, upt UserPolicyTemplate) (*iam.CreatePolicyOutput, error)
- func (i *IAMClientAWS) CreateUserAccessKeys(ctx context.Context, userName string) (aws_aegis_auth.AuthAWS, error)
- func (i *IAMClientAWS) DoesUserExist(ctx context.Context, upt UserPolicyTemplate) bool
- func (i *IAMClientAWS) GetExternalPolicyARN() string
- func (i *IAMClientAWS) GetInternalPolicyARN() string
- func (i *IAMClientAWS) GetLambdaResourceARN() string
- type UserPolicyTemplate
Constants ¶
This section is empty.
Variables ¶
View Source
var ( EthereumSignerFunctionName = "ethereumSignerBLS" InternalLambdaUserAndPolicy = UserPolicyTemplate{ PolicyName: internalLambdaPolicyTemplateName, UserName: &iam.CreateUserInput{ UserName: aws.String(internalLambdaUserName), }, Policy: nil, } ExternalLambdaUserName = "externalLambdaUser" ExternalLambdaUserAndPolicy = UserPolicyTemplate{ PolicyName: externalLambdaPolicyTemplateName, UserName: &iam.CreateUserInput{ UserName: aws.String(ExternalLambdaUserName), }, Policy: nil, } )
View Source
var ( LambdaRoleName = "lambdaRole" LambdaRolePolicyDocument = `` /* 266-byte string literal not displayed */ )
Functions ¶
This section is empty.
Types ¶
type IAMClientAWS ¶
type IAMClientAWS struct { AccountNumber string `json:"accountNumber"` Region string `json:"region"` *iam.Client }
func InitIAMClient ¶
func InitIAMClient(ctx context.Context, auth aws_aegis_auth.AuthAWS) (IAMClientAWS, error)
func (*IAMClientAWS) AddInternalPolicyToLambdaRolePolicies ¶
func (i *IAMClientAWS) AddInternalPolicyToLambdaRolePolicies(ctx context.Context) (*iam.AttachRolePolicyOutput, error)
func (*IAMClientAWS) AttachExternalLambdaUserPolicy ¶
func (i *IAMClientAWS) AttachExternalLambdaUserPolicy(ctx context.Context) error
func (*IAMClientAWS) CreateInternalLambdaRole ¶
func (i *IAMClientAWS) CreateInternalLambdaRole(ctx context.Context) (*iam.CreateRoleOutput, error)
func (*IAMClientAWS) CreateLambdaUser ¶
func (i *IAMClientAWS) CreateLambdaUser(ctx context.Context, upt UserPolicyTemplate) error
func (*IAMClientAWS) CreateNewLambdaUserPolicy ¶
func (i *IAMClientAWS) CreateNewLambdaUserPolicy(ctx context.Context, upt UserPolicyTemplate) (*iam.CreatePolicyOutput, error)
func (*IAMClientAWS) CreateUserAccessKeys ¶
func (i *IAMClientAWS) CreateUserAccessKeys(ctx context.Context, userName string) (aws_aegis_auth.AuthAWS, error)
func (*IAMClientAWS) DoesUserExist ¶ added in v0.2.3
func (i *IAMClientAWS) DoesUserExist(ctx context.Context, upt UserPolicyTemplate) bool
func (*IAMClientAWS) GetExternalPolicyARN ¶
func (i *IAMClientAWS) GetExternalPolicyARN() string
func (*IAMClientAWS) GetInternalPolicyARN ¶
func (i *IAMClientAWS) GetInternalPolicyARN() string
func (*IAMClientAWS) GetLambdaResourceARN ¶
func (i *IAMClientAWS) GetLambdaResourceARN() string
GetLambdaResourceARN uses the value from aws_lambda.EthereumSignerFunctionName
type UserPolicyTemplate ¶
type UserPolicyTemplate struct { PolicyName string UserName *iam.CreateUserInput Policy *iam.CreatePolicyInput }
func (*UserPolicyTemplate) GetPolicyTemplateIAM ¶
func (p *UserPolicyTemplate) GetPolicyTemplateIAM(ctx context.Context, resource string) *iam.CreatePolicyInput
Click to show internal directories.
Click to hide internal directories.