aquasec.PermissionsSets
Explore with Pulumi AI
The aquasec.PermissionsSets
resource manages your Permission Set within Aqua.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as aquasec from "@pulumiverse/aquasec";
const myTerraformPermSet = new aquasec.PermissionsSets("myTerraformPermSet", {
actions: [
"acl_policies.read",
"acl_policies.write",
"image_profiles.read",
"image_profiles.write",
"network_policies.read",
"network_policies.write",
"runtime_policies.read",
"runtime_policies.write",
"response_policies.read",
"response_policies.write",
"image_assurance.read",
"image_assurance.write",
"dashboard.read",
"dashboard.write",
"risk_explorer.read",
"images.read",
"images.write",
"risks.host_images.read",
"risks.host_images.write",
"functions.read",
"functions.write",
"enforcers.read",
"enforcers.write",
"containers.read",
"services.read",
"services.write",
"infrastructure.read",
"infrastructure.write",
"risks.vulnerabilities.read",
"risks.vulnerabilities.write",
"risks.benchmark.read",
"risks.benchmark.write",
"audits.read",
"secrets.read",
"secrets.write",
"settings.read",
"settings.write",
"integrations.read",
"integrations.write",
"registries_integrations.read",
"registries_integrations.write",
"scan.read",
"gateways.read",
"gateways.write",
"consoles.read",
"web_hook.read",
"incidents.read",
],
description: "Test Permissions Sets created by Terraform",
isSuper: false,
uiAccess: true,
});
import pulumi
import pulumiverse_aquasec as aquasec
my_terraform_perm_set = aquasec.PermissionsSets("myTerraformPermSet",
actions=[
"acl_policies.read",
"acl_policies.write",
"image_profiles.read",
"image_profiles.write",
"network_policies.read",
"network_policies.write",
"runtime_policies.read",
"runtime_policies.write",
"response_policies.read",
"response_policies.write",
"image_assurance.read",
"image_assurance.write",
"dashboard.read",
"dashboard.write",
"risk_explorer.read",
"images.read",
"images.write",
"risks.host_images.read",
"risks.host_images.write",
"functions.read",
"functions.write",
"enforcers.read",
"enforcers.write",
"containers.read",
"services.read",
"services.write",
"infrastructure.read",
"infrastructure.write",
"risks.vulnerabilities.read",
"risks.vulnerabilities.write",
"risks.benchmark.read",
"risks.benchmark.write",
"audits.read",
"secrets.read",
"secrets.write",
"settings.read",
"settings.write",
"integrations.read",
"integrations.write",
"registries_integrations.read",
"registries_integrations.write",
"scan.read",
"gateways.read",
"gateways.write",
"consoles.read",
"web_hook.read",
"incidents.read",
],
description="Test Permissions Sets created by Terraform",
is_super=False,
ui_access=True)
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/pulumiverse/pulumi-aquasec/sdk/go/aquasec"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := aquasec.NewPermissionsSets(ctx, "myTerraformPermSet", &aquasec.PermissionsSetsArgs{
Actions: pulumi.StringArray{
pulumi.String("acl_policies.read"),
pulumi.String("acl_policies.write"),
pulumi.String("image_profiles.read"),
pulumi.String("image_profiles.write"),
pulumi.String("network_policies.read"),
pulumi.String("network_policies.write"),
pulumi.String("runtime_policies.read"),
pulumi.String("runtime_policies.write"),
pulumi.String("response_policies.read"),
pulumi.String("response_policies.write"),
pulumi.String("image_assurance.read"),
pulumi.String("image_assurance.write"),
pulumi.String("dashboard.read"),
pulumi.String("dashboard.write"),
pulumi.String("risk_explorer.read"),
pulumi.String("images.read"),
pulumi.String("images.write"),
pulumi.String("risks.host_images.read"),
pulumi.String("risks.host_images.write"),
pulumi.String("functions.read"),
pulumi.String("functions.write"),
pulumi.String("enforcers.read"),
pulumi.String("enforcers.write"),
pulumi.String("containers.read"),
pulumi.String("services.read"),
pulumi.String("services.write"),
pulumi.String("infrastructure.read"),
pulumi.String("infrastructure.write"),
pulumi.String("risks.vulnerabilities.read"),
pulumi.String("risks.vulnerabilities.write"),
pulumi.String("risks.benchmark.read"),
pulumi.String("risks.benchmark.write"),
pulumi.String("audits.read"),
pulumi.String("secrets.read"),
pulumi.String("secrets.write"),
pulumi.String("settings.read"),
pulumi.String("settings.write"),
pulumi.String("integrations.read"),
pulumi.String("integrations.write"),
pulumi.String("registries_integrations.read"),
pulumi.String("registries_integrations.write"),
pulumi.String("scan.read"),
pulumi.String("gateways.read"),
pulumi.String("gateways.write"),
pulumi.String("consoles.read"),
pulumi.String("web_hook.read"),
pulumi.String("incidents.read"),
},
Description: pulumi.String("Test Permissions Sets created by Terraform"),
IsSuper: pulumi.Bool(false),
UiAccess: pulumi.Bool(true),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Aquasec = Pulumiverse.Aquasec;
return await Deployment.RunAsync(() =>
{
var myTerraformPermSet = new Aquasec.PermissionsSets("myTerraformPermSet", new()
{
Actions = new[]
{
"acl_policies.read",
"acl_policies.write",
"image_profiles.read",
"image_profiles.write",
"network_policies.read",
"network_policies.write",
"runtime_policies.read",
"runtime_policies.write",
"response_policies.read",
"response_policies.write",
"image_assurance.read",
"image_assurance.write",
"dashboard.read",
"dashboard.write",
"risk_explorer.read",
"images.read",
"images.write",
"risks.host_images.read",
"risks.host_images.write",
"functions.read",
"functions.write",
"enforcers.read",
"enforcers.write",
"containers.read",
"services.read",
"services.write",
"infrastructure.read",
"infrastructure.write",
"risks.vulnerabilities.read",
"risks.vulnerabilities.write",
"risks.benchmark.read",
"risks.benchmark.write",
"audits.read",
"secrets.read",
"secrets.write",
"settings.read",
"settings.write",
"integrations.read",
"integrations.write",
"registries_integrations.read",
"registries_integrations.write",
"scan.read",
"gateways.read",
"gateways.write",
"consoles.read",
"web_hook.read",
"incidents.read",
},
Description = "Test Permissions Sets created by Terraform",
IsSuper = false,
UiAccess = true,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.aquasec.PermissionsSets;
import com.pulumi.aquasec.PermissionsSetsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var myTerraformPermSet = new PermissionsSets("myTerraformPermSet", PermissionsSetsArgs.builder()
.actions(
"acl_policies.read",
"acl_policies.write",
"image_profiles.read",
"image_profiles.write",
"network_policies.read",
"network_policies.write",
"runtime_policies.read",
"runtime_policies.write",
"response_policies.read",
"response_policies.write",
"image_assurance.read",
"image_assurance.write",
"dashboard.read",
"dashboard.write",
"risk_explorer.read",
"images.read",
"images.write",
"risks.host_images.read",
"risks.host_images.write",
"functions.read",
"functions.write",
"enforcers.read",
"enforcers.write",
"containers.read",
"services.read",
"services.write",
"infrastructure.read",
"infrastructure.write",
"risks.vulnerabilities.read",
"risks.vulnerabilities.write",
"risks.benchmark.read",
"risks.benchmark.write",
"audits.read",
"secrets.read",
"secrets.write",
"settings.read",
"settings.write",
"integrations.read",
"integrations.write",
"registries_integrations.read",
"registries_integrations.write",
"scan.read",
"gateways.read",
"gateways.write",
"consoles.read",
"web_hook.read",
"incidents.read")
.description("Test Permissions Sets created by Terraform")
.isSuper(false)
.uiAccess(true)
.build());
}
}
resources:
myTerraformPermSet:
type: aquasec:PermissionsSets
properties:
actions:
- acl_policies.read
- acl_policies.write
- image_profiles.read
- image_profiles.write
- network_policies.read
- network_policies.write
- runtime_policies.read
- runtime_policies.write
- response_policies.read
- response_policies.write
- image_assurance.read
- image_assurance.write
- dashboard.read
- dashboard.write
- risk_explorer.read
- images.read
- images.write
- risks.host_images.read
- risks.host_images.write
- functions.read
- functions.write
- enforcers.read
- enforcers.write
- containers.read
- services.read
- services.write
- infrastructure.read
- infrastructure.write
- risks.vulnerabilities.read
- risks.vulnerabilities.write
- risks.benchmark.read
- risks.benchmark.write
- audits.read
- secrets.read
- secrets.write
- settings.read
- settings.write
- integrations.read
- integrations.write
- registries_integrations.read
- registries_integrations.write
- scan.read
- gateways.read
- gateways.write
- consoles.read
- web_hook.read
- incidents.read
description: Test Permissions Sets created by Terraform
isSuper: false
uiAccess: true
Create PermissionsSets Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new PermissionsSets(name: string, args: PermissionsSetsArgs, opts?: CustomResourceOptions);
@overload
def PermissionsSets(resource_name: str,
args: PermissionsSetsArgs,
opts: Optional[ResourceOptions] = None)
@overload
def PermissionsSets(resource_name: str,
opts: Optional[ResourceOptions] = None,
actions: Optional[Sequence[str]] = None,
ui_access: Optional[bool] = None,
description: Optional[str] = None,
is_super: Optional[bool] = None,
name: Optional[str] = None)
func NewPermissionsSets(ctx *Context, name string, args PermissionsSetsArgs, opts ...ResourceOption) (*PermissionsSets, error)
public PermissionsSets(string name, PermissionsSetsArgs args, CustomResourceOptions? opts = null)
public PermissionsSets(String name, PermissionsSetsArgs args)
public PermissionsSets(String name, PermissionsSetsArgs args, CustomResourceOptions options)
type: aquasec:PermissionsSets
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args PermissionsSetsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args PermissionsSetsArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args PermissionsSetsArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args PermissionsSetsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args PermissionsSetsArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var permissionsSetsResource = new Aquasec.PermissionsSets("permissionsSetsResource", new()
{
Actions = new[]
{
"string",
},
UiAccess = false,
Description = "string",
IsSuper = false,
Name = "string",
});
example, err := aquasec.NewPermissionsSets(ctx, "permissionsSetsResource", &aquasec.PermissionsSetsArgs{
Actions: pulumi.StringArray{
pulumi.String("string"),
},
UiAccess: pulumi.Bool(false),
Description: pulumi.String("string"),
IsSuper: pulumi.Bool(false),
Name: pulumi.String("string"),
})
var permissionsSetsResource = new PermissionsSets("permissionsSetsResource", PermissionsSetsArgs.builder()
.actions("string")
.uiAccess(false)
.description("string")
.isSuper(false)
.name("string")
.build());
permissions_sets_resource = aquasec.PermissionsSets("permissionsSetsResource",
actions=["string"],
ui_access=False,
description="string",
is_super=False,
name="string")
const permissionsSetsResource = new aquasec.PermissionsSets("permissionsSetsResource", {
actions: ["string"],
uiAccess: false,
description: "string",
isSuper: false,
name: "string",
});
type: aquasec:PermissionsSets
properties:
actions:
- string
description: string
isSuper: false
name: string
uiAccess: false
PermissionsSets Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The PermissionsSets resource accepts the following input properties:
- Actions List<string>
- List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
- Ui
Access bool - Whether to allow UI access for users with this Permission Set.
- Description string
- Free text description for the Permission Set.
- Is
Super bool - Give the Permission Set full access, meaning all actions are allowed without restriction.
- Name string
- The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
- Actions []string
- List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
- Ui
Access bool - Whether to allow UI access for users with this Permission Set.
- Description string
- Free text description for the Permission Set.
- Is
Super bool - Give the Permission Set full access, meaning all actions are allowed without restriction.
- Name string
- The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
- actions List<String>
- List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
- ui
Access Boolean - Whether to allow UI access for users with this Permission Set.
- description String
- Free text description for the Permission Set.
- is
Super Boolean - Give the Permission Set full access, meaning all actions are allowed without restriction.
- name String
- The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
- actions string[]
- List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
- ui
Access boolean - Whether to allow UI access for users with this Permission Set.
- description string
- Free text description for the Permission Set.
- is
Super boolean - Give the Permission Set full access, meaning all actions are allowed without restriction.
- name string
- The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
- actions Sequence[str]
- List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
- ui_
access bool - Whether to allow UI access for users with this Permission Set.
- description str
- Free text description for the Permission Set.
- is_
super bool - Give the Permission Set full access, meaning all actions are allowed without restriction.
- name str
- The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
- actions List<String>
- List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
- ui
Access Boolean - Whether to allow UI access for users with this Permission Set.
- description String
- Free text description for the Permission Set.
- is
Super Boolean - Give the Permission Set full access, meaning all actions are allowed without restriction.
- name String
- The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
Outputs
All input properties are implicitly available as output properties. Additionally, the PermissionsSets resource produces the following output properties:
- str
- The name of the user who created the Permission Set.
- id str
- The provider-assigned unique ID for this managed resource.
- updated_
at str - The date of the last modification of the Role.
Look up Existing PermissionsSets Resource
Get an existing PermissionsSets resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: PermissionsSetsState, opts?: CustomResourceOptions): PermissionsSets
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
actions: Optional[Sequence[str]] = None,
author: Optional[str] = None,
description: Optional[str] = None,
is_super: Optional[bool] = None,
name: Optional[str] = None,
ui_access: Optional[bool] = None,
updated_at: Optional[str] = None) -> PermissionsSets
func GetPermissionsSets(ctx *Context, name string, id IDInput, state *PermissionsSetsState, opts ...ResourceOption) (*PermissionsSets, error)
public static PermissionsSets Get(string name, Input<string> id, PermissionsSetsState? state, CustomResourceOptions? opts = null)
public static PermissionsSets get(String name, Output<String> id, PermissionsSetsState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Actions List<string>
- List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
- string
- The name of the user who created the Permission Set.
- Description string
- Free text description for the Permission Set.
- Is
Super bool - Give the Permission Set full access, meaning all actions are allowed without restriction.
- Name string
- The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
- Ui
Access bool - Whether to allow UI access for users with this Permission Set.
- Updated
At string - The date of the last modification of the Role.
- Actions []string
- List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
- string
- The name of the user who created the Permission Set.
- Description string
- Free text description for the Permission Set.
- Is
Super bool - Give the Permission Set full access, meaning all actions are allowed without restriction.
- Name string
- The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
- Ui
Access bool - Whether to allow UI access for users with this Permission Set.
- Updated
At string - The date of the last modification of the Role.
- actions List<String>
- List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
- String
- The name of the user who created the Permission Set.
- description String
- Free text description for the Permission Set.
- is
Super Boolean - Give the Permission Set full access, meaning all actions are allowed without restriction.
- name String
- The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
- ui
Access Boolean - Whether to allow UI access for users with this Permission Set.
- updated
At String - The date of the last modification of the Role.
- actions string[]
- List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
- string
- The name of the user who created the Permission Set.
- description string
- Free text description for the Permission Set.
- is
Super boolean - Give the Permission Set full access, meaning all actions are allowed without restriction.
- name string
- The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
- ui
Access boolean - Whether to allow UI access for users with this Permission Set.
- updated
At string - The date of the last modification of the Role.
- actions Sequence[str]
- List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
- str
- The name of the user who created the Permission Set.
- description str
- Free text description for the Permission Set.
- is_
super bool - Give the Permission Set full access, meaning all actions are allowed without restriction.
- name str
- The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
- ui_
access bool - Whether to allow UI access for users with this Permission Set.
- updated_
at str - The date of the last modification of the Role.
- actions List<String>
- List of allowed actions for the Permission Set (not relevant if 'is_super' is true).
- String
- The name of the user who created the Permission Set.
- description String
- Free text description for the Permission Set.
- is
Super Boolean - Give the Permission Set full access, meaning all actions are allowed without restriction.
- name String
- The name of the Permission Set, comprised of alphanumeric characters and '-', '_', ' ', ':', '.', '@', '!', '^'.
- ui
Access Boolean - Whether to allow UI access for users with this Permission Set.
- updated
At String - The date of the last modification of the Role.
Package Details
- Repository
- aquasec pulumiverse/pulumi-aquasec
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
aquasec
Terraform Provider.