/
assumerolepolicy_helpers.go
61 lines (50 loc) · 1.46 KB
/
assumerolepolicy_helpers.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
package v1beta1
import (
"github.com/redradrat/cloud-objects/aws/iam"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
)
func (arp *AssumeRolePolicy) RuntimeObject() runtime.Object {
return arp
}
func (arp *AssumeRolePolicy) Metadata() metav1.ObjectMeta {
return arp.ObjectMeta
}
func (arps *AssumeRolePolicyStatement) MarshalPolicyDocument() iam.PolicyDocument {
policyDocument := iam.PolicyDocument{}
var policyStatement []iam.StatementEntry
for _, entry := range *arps {
policyStatement = append(policyStatement, iam.StatementEntry{
Sid: entry.Sid,
Effect: entry.Effect.String(),
Principal: entry.Principal,
Action: entry.Actions,
Resource: entry.Resources,
Condition: entry.Conditions.Normalize(),
})
}
policyDocument = iam.PolicyDocument{
Version: PolicyVersion,
Statement: policyStatement,
}
return policyDocument
}
func (arp *AssumeRolePolicy) Marshal() iam.PolicyDocument {
policyDocument := iam.PolicyDocument{}
var policyStatement []iam.StatementEntry
for _, entry := range arp.Spec.Statement {
policyStatement = append(policyStatement, iam.StatementEntry{
Sid: entry.Sid,
Effect: entry.Effect.String(),
Principal: entry.Principal,
Action: entry.Actions,
Resource: entry.Resources,
Condition: entry.Conditions.Normalize(),
})
}
policyDocument = iam.PolicyDocument{
Version: PolicyVersion,
Statement: policyStatement,
}
return policyDocument
}