Enum scratchstack_aspen::PolicySource
source · pub enum PolicySource {
EntityInline {
entity_arn: String,
entity_id: String,
policy_name: String,
},
EntityAttachedPolicy {
policy_arn: String,
policy_id: String,
version: String,
},
GroupInline {
group_arn: String,
group_id: String,
policy_name: String,
},
GroupAttachedPolicy {
group_arn: String,
group_id: String,
policy_arn: String,
policy_id: String,
version: String,
},
Resource {
resource_arn: String,
policy_name: Option<String>,
},
PermissionBoundary {
policy_arn: String,
policy_id: String,
version: String,
},
OrgServiceControl {
policy_arn: String,
policy_name: String,
applied_arn: String,
},
Session,
}
Expand description
The source of a policy.
Variants§
EntityInline
Fields
An inline policy directly attached to an IAM entity (user, role).
EntityAttachedPolicy
Fields
A managed policy that is attached to an IAM entity (user, role).
GroupInline
Fields
An inline policy directly attached to an IAM group that an IAM user ia a member of.
GroupAttachedPolicy
Fields
A managed policy that is attached to an IAM group that an IAM user is a member of.
Resource
Fields
A policy attached to a resource being accessed.
PermissionBoundary
Fields
A permissions boundary attached to an IAM entity (user, role).
OrgServiceControl
Fields
An service control policy attached to an account or organizational unit.
Session
A policy embedded in an assumed role session.
Implementations§
source§impl PolicySource
impl PolicySource
sourcepub fn is_boundary(&self) -> bool
pub fn is_boundary(&self) -> bool
Indicates whether the policy is being used permissions boundary.
Permissions boundaries are used to limit the permissions in effect. Allow effects in a permissions boundary do not grant permissions, but must be combined with an allow effect in a non-permissions boundary policy to be effective. Absence of an allow effect in a permissions boundary is the same as a deny effect.
sourcepub fn new_entity_inline<S1, S2, S3>(
entity_arn: S1,
entity_id: S2,
policy_name: S3
) -> Selfwhere
S1: Into<String>,
S2: Into<String>,
S3: Into<String>,
pub fn new_entity_inline<S1, S2, S3>(
entity_arn: S1,
entity_id: S2,
policy_name: S3
) -> Selfwhere
S1: Into<String>,
S2: Into<String>,
S3: Into<String>,
Create a new PolicySource::EntityInline object.
sourcepub fn new_entity_attached_policy<S1, S2, S3>(
policy_arn: S1,
policy_id: S2,
version: S3
) -> Selfwhere
S1: Into<String>,
S2: Into<String>,
S3: Into<String>,
pub fn new_entity_attached_policy<S1, S2, S3>(
policy_arn: S1,
policy_id: S2,
version: S3
) -> Selfwhere
S1: Into<String>,
S2: Into<String>,
S3: Into<String>,
Create a new PolicySource::EntityAttachedPolicy object.
sourcepub fn new_group_inline<S1, S2, S3>(
group_arn: S1,
group_id: S2,
policy_name: S3
) -> Selfwhere
S1: Into<String>,
S2: Into<String>,
S3: Into<String>,
pub fn new_group_inline<S1, S2, S3>(
group_arn: S1,
group_id: S2,
policy_name: S3
) -> Selfwhere
S1: Into<String>,
S2: Into<String>,
S3: Into<String>,
Create a new PolicySource::GroupInline object.
sourcepub fn new_group_attached_policy<S1, S2, S3, S4, S5>(
group_arn: S1,
group_id: S2,
policy_arn: S3,
policy_id: S4,
version: S5
) -> Selfwhere
S1: Into<String>,
S2: Into<String>,
S3: Into<String>,
S4: Into<String>,
S5: Into<String>,
pub fn new_group_attached_policy<S1, S2, S3, S4, S5>(
group_arn: S1,
group_id: S2,
policy_arn: S3,
policy_id: S4,
version: S5
) -> Selfwhere
S1: Into<String>,
S2: Into<String>,
S3: Into<String>,
S4: Into<String>,
S5: Into<String>,
Create a new PolicySource::GroupAttachedPolicy object.
sourcepub fn new_resource<S1, S2>(resource_arn: S1, policy_name: Option<S2>) -> Selfwhere
S1: Into<String>,
S2: Into<String>,
pub fn new_resource<S1, S2>(resource_arn: S1, policy_name: Option<S2>) -> Selfwhere
S1: Into<String>,
S2: Into<String>,
Create a new PolicySource::Resource object.
sourcepub fn new_permission_boundary<S1, S2, S3>(
policy_arn: S1,
policy_id: S2,
version: S3
) -> Selfwhere
S1: Into<String>,
S2: Into<String>,
S3: Into<String>,
pub fn new_permission_boundary<S1, S2, S3>(
policy_arn: S1,
policy_id: S2,
version: S3
) -> Selfwhere
S1: Into<String>,
S2: Into<String>,
S3: Into<String>,
Create a new PolicySource::PermissionBoundary object.
sourcepub fn new_org_service_control<S1, S2, S3>(
policy_arn: S1,
policy_name: S2,
applied_arn: S3
) -> Selfwhere
S1: Into<String>,
S2: Into<String>,
S3: Into<String>,
pub fn new_org_service_control<S1, S2, S3>(
policy_arn: S1,
policy_name: S2,
applied_arn: S3
) -> Selfwhere
S1: Into<String>,
S2: Into<String>,
S3: Into<String>,
Create a new PolicySource::OrgServiceControl object.
sourcepub fn new_session() -> Self
pub fn new_session() -> Self
Create a new PolicySource::Session object.
Trait Implementations§
source§impl Clone for PolicySource
impl Clone for PolicySource
source§fn clone(&self) -> PolicySource
fn clone(&self) -> PolicySource
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for PolicySource
impl Debug for PolicySource
source§impl Hash for PolicySource
impl Hash for PolicySource
source§impl PartialEq<PolicySource> for PolicySource
impl PartialEq<PolicySource> for PolicySource
source§fn eq(&self, other: &PolicySource) -> bool
fn eq(&self, other: &PolicySource) -> bool
self
and other
values to be equal, and is used
by ==
.