@pulumiverse/aquasec
Advanced tools
{ | ||
"name": "@pulumiverse/aquasec", | ||
"version": "v0.8.22", | ||
"version": "v0.8.24", | ||
"description": "A Pulumi package for creating and managing Aquasec cloud resources.", | ||
@@ -15,3 +15,3 @@ "keywords": [ | ||
"build": "tsc", | ||
"install": "node scripts/install-pulumi-plugin.js resource aquasec v0.8.22" | ||
"install": "node scripts/install-pulumi-plugin.js resource aquasec v0.8.24" | ||
}, | ||
@@ -18,0 +18,0 @@ "dependencies": { |
import * as pulumi from "@pulumi/pulumi"; | ||
/** | ||
* The `aquasec.PermissionsSets` resource manages your Permission Set within Aqua. | ||
* | ||
* ## Example Usage | ||
* | ||
* ```typescript | ||
* import * as pulumi from "@pulumi/pulumi"; | ||
* import * as aquasec from "@pulumiverse/aquasec"; | ||
* | ||
* const myTerraformPermSet = new aquasec.PermissionsSets("myTerraformPermSet", { | ||
* actions: [ | ||
* "acl_policies.read", | ||
* "acl_policies.write", | ||
* "image_profiles.read", | ||
* "image_profiles.write", | ||
* "network_policies.read", | ||
* "network_policies.write", | ||
* "runtime_policies.read", | ||
* "runtime_policies.write", | ||
* "response_policies.read", | ||
* "response_policies.write", | ||
* "image_assurance.read", | ||
* "image_assurance.write", | ||
* "dashboard.read", | ||
* "dashboard.write", | ||
* "risk_explorer.read", | ||
* "images.read", | ||
* "images.write", | ||
* "risks.host_images.read", | ||
* "risks.host_images.write", | ||
* "functions.read", | ||
* "functions.write", | ||
* "enforcers.read", | ||
* "enforcers.write", | ||
* "containers.read", | ||
* "services.read", | ||
* "services.write", | ||
* "infrastructure.read", | ||
* "infrastructure.write", | ||
* "risks.vulnerabilities.read", | ||
* "risks.vulnerabilities.write", | ||
* "risks.benchmark.read", | ||
* "risks.benchmark.write", | ||
* "audits.read", | ||
* "secrets.read", | ||
* "secrets.write", | ||
* "settings.read", | ||
* "settings.write", | ||
* "integrations.read", | ||
* "integrations.write", | ||
* "registries_integrations.read", | ||
* "registries_integrations.write", | ||
* "scan.read", | ||
* "gateways.read", | ||
* "gateways.write", | ||
* "consoles.read", | ||
* "web_hook.read", | ||
* "incidents.read", | ||
* ], | ||
* author: "system", | ||
* description: "Test Permissions Sets created by Terraform", | ||
* isSuper: false, | ||
* uiAccess: true, | ||
* }); | ||
* ``` | ||
*/ | ||
@@ -91,3 +28,3 @@ export declare class PermissionsSets extends pulumi.CustomResource { | ||
*/ | ||
readonly author: pulumi.Output<string | undefined>; | ||
readonly author: pulumi.Output<string>; | ||
/** | ||
@@ -164,6 +101,2 @@ * Free text description for the Permission Set. | ||
/** | ||
* The name of the user who created the Permission Set. | ||
*/ | ||
author?: pulumi.Input<string>; | ||
/** | ||
* Free text description for the Permission Set. | ||
@@ -170,0 +103,0 @@ */ |
@@ -10,65 +10,2 @@ "use strict"; | ||
* The `aquasec.PermissionsSets` resource manages your Permission Set within Aqua. | ||
* | ||
* ## Example Usage | ||
* | ||
* ```typescript | ||
* import * as pulumi from "@pulumi/pulumi"; | ||
* import * as aquasec from "@pulumiverse/aquasec"; | ||
* | ||
* const myTerraformPermSet = new aquasec.PermissionsSets("myTerraformPermSet", { | ||
* actions: [ | ||
* "acl_policies.read", | ||
* "acl_policies.write", | ||
* "image_profiles.read", | ||
* "image_profiles.write", | ||
* "network_policies.read", | ||
* "network_policies.write", | ||
* "runtime_policies.read", | ||
* "runtime_policies.write", | ||
* "response_policies.read", | ||
* "response_policies.write", | ||
* "image_assurance.read", | ||
* "image_assurance.write", | ||
* "dashboard.read", | ||
* "dashboard.write", | ||
* "risk_explorer.read", | ||
* "images.read", | ||
* "images.write", | ||
* "risks.host_images.read", | ||
* "risks.host_images.write", | ||
* "functions.read", | ||
* "functions.write", | ||
* "enforcers.read", | ||
* "enforcers.write", | ||
* "containers.read", | ||
* "services.read", | ||
* "services.write", | ||
* "infrastructure.read", | ||
* "infrastructure.write", | ||
* "risks.vulnerabilities.read", | ||
* "risks.vulnerabilities.write", | ||
* "risks.benchmark.read", | ||
* "risks.benchmark.write", | ||
* "audits.read", | ||
* "secrets.read", | ||
* "secrets.write", | ||
* "settings.read", | ||
* "settings.write", | ||
* "integrations.read", | ||
* "integrations.write", | ||
* "registries_integrations.read", | ||
* "registries_integrations.write", | ||
* "scan.read", | ||
* "gateways.read", | ||
* "gateways.write", | ||
* "consoles.read", | ||
* "web_hook.read", | ||
* "incidents.read", | ||
* ], | ||
* author: "system", | ||
* description: "Test Permissions Sets created by Terraform", | ||
* isSuper: false, | ||
* uiAccess: true, | ||
* }); | ||
* ``` | ||
*/ | ||
@@ -120,3 +57,2 @@ class PermissionsSets extends pulumi.CustomResource { | ||
resourceInputs["actions"] = args ? args.actions : undefined; | ||
resourceInputs["author"] = args ? args.author : undefined; | ||
resourceInputs["description"] = args ? args.description : undefined; | ||
@@ -126,2 +62,3 @@ resourceInputs["isSuper"] = args ? args.isSuper : undefined; | ||
resourceInputs["uiAccess"] = args ? args.uiAccess : undefined; | ||
resourceInputs["author"] = undefined /*out*/; | ||
resourceInputs["updatedAt"] = undefined /*out*/; | ||
@@ -128,0 +65,0 @@ } |
@@ -119,6 +119,2 @@ import * as pulumi from "@pulumi/pulumi"; | ||
scopes: pulumi.Input<pulumi.Input<string>[]>; | ||
/** | ||
* The date of the last modification of the role. | ||
*/ | ||
updatedAt?: pulumi.Input<string>; | ||
} |
@@ -77,4 +77,4 @@ "use strict"; | ||
resourceInputs["scopes"] = args ? args.scopes : undefined; | ||
resourceInputs["updatedAt"] = args ? args.updatedAt : undefined; | ||
resourceInputs["author"] = undefined /*out*/; | ||
resourceInputs["updatedAt"] = undefined /*out*/; | ||
} | ||
@@ -81,0 +81,0 @@ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts); |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Install scripts
Supply chain riskInstall scripts are run when the package is installed. The majority of malware in npm is hidden in install scripts.
Found 1 instance in 1 package
Manifest confusion
Supply chain riskThis package has inconsistent metadata. This could be malicious or caused by an error when publishing the package.
Found 1 instance in 1 package
Install scripts
Supply chain riskInstall scripts are run when the package is installed. The majority of malware in npm is hidden in install scripts.
Found 1 instance in 1 package
Manifest confusion
Supply chain riskThis package has inconsistent metadata. This could be malicious or caused by an error when publishing the package.
Found 1 instance in 1 package
890984
-0.48%17402
-0.76%