1. Packages
  2. Aquasec
  3. API Docs
  4. PermissionsSets
Aquasec v0.8.29 published on Monday, Jul 22, 2024 by Pulumiverse

aquasec.PermissionsSets

Explore with Pulumi AI

aquasec logo
Aquasec v0.8.29 published on Monday, Jul 22, 2024 by Pulumiverse

    The aquasec.PermissionsSets resource manages your Permission Set within Aqua.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as aquasec from "@pulumiverse/aquasec";
    
    const myTerraformPermSet = new aquasec.PermissionsSets("myTerraformPermSet", {
        actions: [
            "acl_policies.read",
            "acl_policies.write",
            "image_profiles.read",
            "image_profiles.write",
            "network_policies.read",
            "network_policies.write",
            "runtime_policies.read",
            "runtime_policies.write",
            "response_policies.read",
            "response_policies.write",
            "image_assurance.read",
            "image_assurance.write",
            "dashboard.read",
            "dashboard.write",
            "risk_explorer.read",
            "images.read",
            "images.write",
            "risks.host_images.read",
            "risks.host_images.write",
            "functions.read",
            "functions.write",
            "enforcers.read",
            "enforcers.write",
            "containers.read",
            "services.read",
            "services.write",
            "infrastructure.read",
            "infrastructure.write",
            "risks.vulnerabilities.read",
            "risks.vulnerabilities.write",
            "risks.benchmark.read",
            "risks.benchmark.write",
            "audits.read",
            "secrets.read",
            "secrets.write",
            "settings.read",
            "settings.write",
            "integrations.read",
            "integrations.write",
            "registries_integrations.read",
            "registries_integrations.write",
            "scan.read",
            "gateways.read",
            "gateways.write",
            "consoles.read",
            "web_hook.read",
            "incidents.read",
        ],
        description: "Test Permissions Sets created by Terraform",
        isSuper: false,
        uiAccess: true,
    });
    
    import pulumi
    import pulumiverse_aquasec as aquasec
    
    my_terraform_perm_set = aquasec.PermissionsSets("myTerraformPermSet",
        actions=[
            "acl_policies.read",
            "acl_policies.write",
            "image_profiles.read",
            "image_profiles.write",
            "network_policies.read",
            "network_policies.write",
            "runtime_policies.read",
            "runtime_policies.write",
            "response_policies.read",
            "response_policies.write",
            "image_assurance.read",
            "image_assurance.write",
            "dashboard.read",
            "dashboard.write",
            "risk_explorer.read",
            "images.read",
            "images.write",
            "risks.host_images.read",
            "risks.host_images.write",
            "functions.read",
            "functions.write",
            "enforcers.read",
            "enforcers.write",
            "containers.read",
            "services.read",
            "services.write",
            "infrastructure.read",
            "infrastructure.write",
            "risks.vulnerabilities.read",
            "risks.vulnerabilities.write",
            "risks.benchmark.read",
            "risks.benchmark.write",
            "audits.read",
            "secrets.read",
            "secrets.write",
            "settings.read",
            "settings.write",
            "integrations.read",
            "integrations.write",
            "registries_integrations.read",
            "registries_integrations.write",
            "scan.read",
            "gateways.read",
            "gateways.write",
            "consoles.read",
            "web_hook.read",
            "incidents.read",
        ],
        description="Test Permissions Sets created by Terraform",
        is_super=False,
        ui_access=True)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/pulumiverse/pulumi-aquasec/sdk/go/aquasec"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := aquasec.NewPermissionsSets(ctx, "myTerraformPermSet", &aquasec.PermissionsSetsArgs{
    			Actions: pulumi.StringArray{
    				pulumi.String("acl_policies.read"),
    				pulumi.String("acl_policies.write"),
    				pulumi.String("image_profiles.read"),
    				pulumi.String("image_profiles.write"),
    				pulumi.String("network_policies.read"),
    				pulumi.String("network_policies.write"),
    				pulumi.String("runtime_policies.read"),
    				pulumi.String("runtime_policies.write"),
    				pulumi.String("response_policies.read"),
    				pulumi.String("response_policies.write"),
    				pulumi.String("image_assurance.read"),
    				pulumi.String("image_assurance.write"),
    				pulumi.String("dashboard.read"),
    				pulumi.String("dashboard.write"),
    				pulumi.String("risk_explorer.read"),
    				pulumi.String("images.read"),
    				pulumi.String("images.write"),
    				pulumi.String("risks.host_images.read"),
    				pulumi.String("risks.host_images.write"),
    				pulumi.String("functions.read"),
    				pulumi.String("functions.write"),
    				pulumi.String("enforcers.read"),
    				pulumi.String("enforcers.write"),
    				pulumi.String("containers.read"),
    				pulumi.String("services.read"),
    				pulumi.String("services.write"),
    				pulumi.String("infrastructure.read"),
    				pulumi.String("infrastructure.write"),
    				pulumi.String("risks.vulnerabilities.read"),
    				pulumi.String("risks.vulnerabilities.write"),
    				pulumi.String("risks.benchmark.read"),
    				pulumi.String("risks.benchmark.write"),
    				pulumi.String("audits.read"),
    				pulumi.String("secrets.read"),
    				pulumi.String("secrets.write"),
    				pulumi.String("settings.read"),
    				pulumi.String("settings.write"),
    				pulumi.String("integrations.read"),
    				pulumi.String("integrations.write"),
    				pulumi.String("registries_integrations.read"),
    				pulumi.String("registries_integrations.write"),
    				pulumi.String("scan.read"),
    				pulumi.String("gateways.read"),
    				pulumi.String("gateways.write"),
    				pulumi.String("consoles.read"),
    				pulumi.String("web_hook.read"),
    				pulumi.String("incidents.read"),
    			},
    			Description: pulumi.String("Test Permissions Sets created by Terraform"),
    			IsSuper:     pulumi.Bool(false),
    			UiAccess:    pulumi.Bool(true),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Aquasec = Pulumiverse.Aquasec;
    
    return await Deployment.RunAsync(() => 
    {
        var myTerraformPermSet = new Aquasec.PermissionsSets("myTerraformPermSet", new()
        {
            Actions = new[]
            {
                "acl_policies.read",
                "acl_policies.write",
                "image_profiles.read",
                "image_profiles.write",
                "network_policies.read",
                "network_policies.write",
                "runtime_policies.read",
                "runtime_policies.write",
                "response_policies.read",
                "response_policies.write",
                "image_assurance.read",
                "image_assurance.write",
                "dashboard.read",
                "dashboard.write",
                "risk_explorer.read",
                "images.read",
                "images.write",
                "risks.host_images.read",
                "risks.host_images.write",
                "functions.read",
                "functions.write",
                "enforcers.read",
                "enforcers.write",
                "containers.read",
                "services.read",
                "services.write",
                "infrastructure.read",
                "infrastructure.write",
                "risks.vulnerabilities.read",
                "risks.vulnerabilities.write",
                "risks.benchmark.read",
                "risks.benchmark.write",
                "audits.read",
                "secrets.read",
                "secrets.write",
                "settings.read",
                "settings.write",
                "integrations.read",
                "integrations.write",
                "registries_integrations.read",
                "registries_integrations.write",
                "scan.read",
                "gateways.read",
                "gateways.write",
                "consoles.read",
                "web_hook.read",
                "incidents.read",
            },
            Description = "Test Permissions Sets created by Terraform",
            IsSuper = false,
            UiAccess = true,
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.aquasec.PermissionsSets;
    import com.pulumi.aquasec.PermissionsSetsArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var myTerraformPermSet = new PermissionsSets("myTerraformPermSet", PermissionsSetsArgs.builder()
                .actions(            
                    "acl_policies.read",
                    "acl_policies.write",
                    "image_profiles.read",
                    "image_profiles.write",
                    "network_policies.read",
                    "network_policies.write",
                    "runtime_policies.read",
                    "runtime_policies.write",
                    "response_policies.read",
                    "response_policies.write",
                    "image_assurance.read",
                    "image_assurance.write",
                    "dashboard.read",
                    "dashboard.write",
                    "risk_explorer.read",
                    "images.read",
                    "images.write",
                    "risks.host_images.read",
                    "risks.host_images.write",
                    "functions.read",
                    "functions.write",
                    "enforcers.read",
                    "enforcers.write",
                    "containers.read",
                    "services.read",
                    "services.write",
                    "infrastructure.read",
                    "infrastructure.write",
                    "risks.vulnerabilities.read",
                    "risks.vulnerabilities.write",
                    "risks.benchmark.read",
                    "risks.benchmark.write",
                    "audits.read",
                    "secrets.read",
                    "secrets.write",
                    "settings.read",
                    "settings.write",
                    "integrations.read",
                    "integrations.write",
                    "registries_integrations.read",
                    "registries_integrations.write",
                    "scan.read",
                    "gateways.read",
                    "gateways.write",
                    "consoles.read",
                    "web_hook.read",
                    "incidents.read")
                .description("Test Permissions Sets created by Terraform")
                .isSuper(false)
                .uiAccess(true)
                .build());
    
        }
    }
    
    resources:
      myTerraformPermSet:
        type: aquasec:PermissionsSets
        properties:
          actions:
            - acl_policies.read
            - acl_policies.write
            - image_profiles.read
            - image_profiles.write
            - network_policies.read
            - network_policies.write
            - runtime_policies.read
            - runtime_policies.write
            - response_policies.read
            - response_policies.write
            - image_assurance.read
            - image_assurance.write
            - dashboard.read
            - dashboard.write
            - risk_explorer.read
            - images.read
            - images.write
            - risks.host_images.read
            - risks.host_images.write
            - functions.read
            - functions.write
            - enforcers.read
            - enforcers.write
            - containers.read
            - services.read
            - services.write
            - infrastructure.read
            - infrastructure.write
            - risks.vulnerabilities.read
            - risks.vulnerabilities.write
            - risks.benchmark.read
            - risks.benchmark.write
            - audits.read
            - secrets.read
            - secrets.write
            - settings.read
            - settings.write
            - integrations.read
            - integrations.write
            - registries_integrations.read
            - registries_integrations.write
            - scan.read
            - gateways.read
            - gateways.write
            - consoles.read
            - web_hook.read
            - incidents.read
          description: Test Permissions Sets created by Terraform
          isSuper: false
          uiAccess: true
    

    Create PermissionsSets Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new PermissionsSets(name: string, args: PermissionsSetsArgs, opts?: CustomResourceOptions);
    @overload
    def PermissionsSets(resource_name: str,
                        args: PermissionsSetsArgs,
                        opts: Optional[ResourceOptions] = None)
    
    @overload
    def PermissionsSets(resource_name: str,
                        opts: Optional[ResourceOptions] = None,
                        actions: Optional[Sequence[str]] = None,
                        ui_access: Optional[bool] = None,
                        description: Optional[str] = None,
                        is_super: Optional[bool] = None,
                        name: Optional[str] = None)
    func NewPermissionsSets(ctx *Context, name string, args PermissionsSetsArgs, opts ...ResourceOption) (*PermissionsSets, error)
    public PermissionsSets(string name, PermissionsSetsArgs args, CustomResourceOptions? opts = null)
    public PermissionsSets(String name, PermissionsSetsArgs args)
    public PermissionsSets(String name, PermissionsSetsArgs args, CustomResourceOptions options)
    
    type: aquasec:PermissionsSets
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args PermissionsSetsArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args PermissionsSetsArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args PermissionsSetsArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args PermissionsSetsArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args PermissionsSetsArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var permissionsSetsResource = new Aquasec.PermissionsSets("permissionsSetsResource", new()
    {
        Actions = new[]
        {
            "string",
        },
        UiAccess = false,
        Description = "string",
        IsSuper = false,
        Name = "string",
    });
    
    example, err := aquasec.NewPermissionsSets(ctx, "permissionsSetsResource", &aquasec.PermissionsSetsArgs{
    	Actions: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	UiAccess:    pulumi.Bool(false),
    	Description: pulumi.String("string"),
    	IsSuper:     pulumi.Bool(false),
    	Name:        pulumi.String("string"),
    })
    
    var permissionsSetsResource = new PermissionsSets("permissionsSetsResource", PermissionsSetsArgs.builder()
        .actions("string")
        .uiAccess(false)
        .description("string")
        .isSuper(false)
        .name("string")
        .build());
    
    permissions_sets_resource = aquasec.PermissionsSets("permissionsSetsResource",
        actions=["string"],
        ui_access=False,
        description="string",
        is_super=False,
        name="string")
    
    const permissionsSetsResource = new aquasec.PermissionsSets("permissionsSetsResource", {
        actions: ["string"],
        uiAccess: false,
        description: "string",
        isSuper: false,
        name: "string",
    });
    
    type: aquasec:PermissionsSets
    properties:
        actions:
            - string
        description: string
        isSuper: false
        name: string
        uiAccess: false
    

    PermissionsSets Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The PermissionsSets resource accepts the following input properties:

    Actions List<string>
    List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
    UiAccess bool
    Whether to allow UI access for users with this Permission Set.
    Description string
    Free text description for the Permission Set.
    IsSuper bool
    Give the Permission Set full access, meaning all actions are allowed without restriction.
    Name string
    The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
    Actions []string
    List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
    UiAccess bool
    Whether to allow UI access for users with this Permission Set.
    Description string
    Free text description for the Permission Set.
    IsSuper bool
    Give the Permission Set full access, meaning all actions are allowed without restriction.
    Name string
    The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
    actions List<String>
    List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
    uiAccess Boolean
    Whether to allow UI access for users with this Permission Set.
    description String
    Free text description for the Permission Set.
    isSuper Boolean
    Give the Permission Set full access, meaning all actions are allowed without restriction.
    name String
    The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
    actions string[]
    List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
    uiAccess boolean
    Whether to allow UI access for users with this Permission Set.
    description string
    Free text description for the Permission Set.
    isSuper boolean
    Give the Permission Set full access, meaning all actions are allowed without restriction.
    name string
    The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
    actions Sequence[str]
    List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
    ui_access bool
    Whether to allow UI access for users with this Permission Set.
    description str
    Free text description for the Permission Set.
    is_super bool
    Give the Permission Set full access, meaning all actions are allowed without restriction.
    name str
    The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
    actions List<String>
    List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
    uiAccess Boolean
    Whether to allow UI access for users with this Permission Set.
    description String
    Free text description for the Permission Set.
    isSuper Boolean
    Give the Permission Set full access, meaning all actions are allowed without restriction.
    name String
    The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the PermissionsSets resource produces the following output properties:

    Author string
    The name of the user who created the Permission Set.
    Id string
    The provider-assigned unique ID for this managed resource.
    UpdatedAt string
    The date of the last modification of the Role.
    Author string
    The name of the user who created the Permission Set.
    Id string
    The provider-assigned unique ID for this managed resource.
    UpdatedAt string
    The date of the last modification of the Role.
    author String
    The name of the user who created the Permission Set.
    id String
    The provider-assigned unique ID for this managed resource.
    updatedAt String
    The date of the last modification of the Role.
    author string
    The name of the user who created the Permission Set.
    id string
    The provider-assigned unique ID for this managed resource.
    updatedAt string
    The date of the last modification of the Role.
    author str
    The name of the user who created the Permission Set.
    id str
    The provider-assigned unique ID for this managed resource.
    updated_at str
    The date of the last modification of the Role.
    author String
    The name of the user who created the Permission Set.
    id String
    The provider-assigned unique ID for this managed resource.
    updatedAt String
    The date of the last modification of the Role.

    Look up Existing PermissionsSets Resource

    Get an existing PermissionsSets resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: PermissionsSetsState, opts?: CustomResourceOptions): PermissionsSets
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            actions: Optional[Sequence[str]] = None,
            author: Optional[str] = None,
            description: Optional[str] = None,
            is_super: Optional[bool] = None,
            name: Optional[str] = None,
            ui_access: Optional[bool] = None,
            updated_at: Optional[str] = None) -> PermissionsSets
    func GetPermissionsSets(ctx *Context, name string, id IDInput, state *PermissionsSetsState, opts ...ResourceOption) (*PermissionsSets, error)
    public static PermissionsSets Get(string name, Input<string> id, PermissionsSetsState? state, CustomResourceOptions? opts = null)
    public static PermissionsSets get(String name, Output<String> id, PermissionsSetsState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Actions List<string>
    List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
    Author string
    The name of the user who created the Permission Set.
    Description string
    Free text description for the Permission Set.
    IsSuper bool
    Give the Permission Set full access, meaning all actions are allowed without restriction.
    Name string
    The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
    UiAccess bool
    Whether to allow UI access for users with this Permission Set.
    UpdatedAt string
    The date of the last modification of the Role.
    Actions []string
    List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
    Author string
    The name of the user who created the Permission Set.
    Description string
    Free text description for the Permission Set.
    IsSuper bool
    Give the Permission Set full access, meaning all actions are allowed without restriction.
    Name string
    The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
    UiAccess bool
    Whether to allow UI access for users with this Permission Set.
    UpdatedAt string
    The date of the last modification of the Role.
    actions List<String>
    List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
    author String
    The name of the user who created the Permission Set.
    description String
    Free text description for the Permission Set.
    isSuper Boolean
    Give the Permission Set full access, meaning all actions are allowed without restriction.
    name String
    The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
    uiAccess Boolean
    Whether to allow UI access for users with this Permission Set.
    updatedAt String
    The date of the last modification of the Role.
    actions string[]
    List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
    author string
    The name of the user who created the Permission Set.
    description string
    Free text description for the Permission Set.
    isSuper boolean
    Give the Permission Set full access, meaning all actions are allowed without restriction.
    name string
    The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
    uiAccess boolean
    Whether to allow UI access for users with this Permission Set.
    updatedAt string
    The date of the last modification of the Role.
    actions Sequence[str]
    List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
    author str
    The name of the user who created the Permission Set.
    description str
    Free text description for the Permission Set.
    is_super bool
    Give the Permission Set full access, meaning all actions are allowed without restriction.
    name str
    The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
    ui_access bool
    Whether to allow UI access for users with this Permission Set.
    updated_at str
    The date of the last modification of the Role.
    actions List<String>
    List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
    author String
    The name of the user who created the Permission Set.
    description String
    Free text description for the Permission Set.
    isSuper Boolean
    Give the Permission Set full access, meaning all actions are allowed without restriction.
    name String
    The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
    uiAccess Boolean
    Whether to allow UI access for users with this Permission Set.
    updatedAt String
    The date of the last modification of the Role.

    Package Details

    Repository
    aquasec pulumiverse/pulumi-aquasec
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the aquasec Terraform Provider.
    aquasec logo
    Aquasec v0.8.29 published on Monday, Jul 22, 2024 by Pulumiverse