-
Notifications
You must be signed in to change notification settings - Fork 112
/
zz_iam_setup.go
executable file
·70 lines (65 loc) · 3.12 KB
/
zz_iam_setup.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
// SPDX-FileCopyrightText: 2023 The Crossplane Authors <https://crossplane.io>
//
// SPDX-License-Identifier: Apache-2.0
package controller
import (
ctrl "sigs.k8s.io/controller-runtime"
"github.com/crossplane/upjet/pkg/controller"
accesskey "github.com/upbound/provider-aws/internal/controller/iam/accesskey"
accountalias "github.com/upbound/provider-aws/internal/controller/iam/accountalias"
accountpasswordpolicy "github.com/upbound/provider-aws/internal/controller/iam/accountpasswordpolicy"
group "github.com/upbound/provider-aws/internal/controller/iam/group"
groupmembership "github.com/upbound/provider-aws/internal/controller/iam/groupmembership"
grouppolicyattachment "github.com/upbound/provider-aws/internal/controller/iam/grouppolicyattachment"
instanceprofile "github.com/upbound/provider-aws/internal/controller/iam/instanceprofile"
openidconnectprovider "github.com/upbound/provider-aws/internal/controller/iam/openidconnectprovider"
policy "github.com/upbound/provider-aws/internal/controller/iam/policy"
role "github.com/upbound/provider-aws/internal/controller/iam/role"
rolepolicy "github.com/upbound/provider-aws/internal/controller/iam/rolepolicy"
rolepolicyattachment "github.com/upbound/provider-aws/internal/controller/iam/rolepolicyattachment"
samlprovider "github.com/upbound/provider-aws/internal/controller/iam/samlprovider"
servercertificate "github.com/upbound/provider-aws/internal/controller/iam/servercertificate"
servicelinkedrole "github.com/upbound/provider-aws/internal/controller/iam/servicelinkedrole"
servicespecificcredential "github.com/upbound/provider-aws/internal/controller/iam/servicespecificcredential"
signingcertificate "github.com/upbound/provider-aws/internal/controller/iam/signingcertificate"
user "github.com/upbound/provider-aws/internal/controller/iam/user"
usergroupmembership "github.com/upbound/provider-aws/internal/controller/iam/usergroupmembership"
userloginprofile "github.com/upbound/provider-aws/internal/controller/iam/userloginprofile"
userpolicyattachment "github.com/upbound/provider-aws/internal/controller/iam/userpolicyattachment"
usersshkey "github.com/upbound/provider-aws/internal/controller/iam/usersshkey"
virtualmfadevice "github.com/upbound/provider-aws/internal/controller/iam/virtualmfadevice"
)
// Setup_iam creates all controllers with the supplied logger and adds them to
// the supplied manager.
func Setup_iam(mgr ctrl.Manager, o controller.Options) error {
for _, setup := range []func(ctrl.Manager, controller.Options) error{
accesskey.Setup,
accountalias.Setup,
accountpasswordpolicy.Setup,
group.Setup,
groupmembership.Setup,
grouppolicyattachment.Setup,
instanceprofile.Setup,
openidconnectprovider.Setup,
policy.Setup,
role.Setup,
rolepolicy.Setup,
rolepolicyattachment.Setup,
samlprovider.Setup,
servercertificate.Setup,
servicelinkedrole.Setup,
servicespecificcredential.Setup,
signingcertificate.Setup,
user.Setup,
usergroupmembership.Setup,
userloginprofile.Setup,
userpolicyattachment.Setup,
usersshkey.Setup,
virtualmfadevice.Setup,
} {
if err := setup(mgr, o); err != nil {
return err
}
}
return nil
}