New Case Study:See how Anthropic automated 95% of dependency reviews with Socket.Learn More

@pulumiverse/aquasec

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@pulumiverse/aquasec - npm Package Compare versions

Comparing version

to
0.8.24

{
"name": "@pulumiverse/aquasec",
"version": "v0.8.22",
"version": "v0.8.24",
"description": "A Pulumi package for creating and managing Aquasec cloud resources.",

@@ -15,3 +15,3 @@ "keywords": [

"build": "tsc",
"install": "node scripts/install-pulumi-plugin.js resource aquasec v0.8.22"
"install": "node scripts/install-pulumi-plugin.js resource aquasec v0.8.24"
},

@@ -18,0 +18,0 @@ "dependencies": {

import * as pulumi from "@pulumi/pulumi";
/**
* The `aquasec.PermissionsSets` resource manages your Permission Set within Aqua.
*
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as aquasec from "@pulumiverse/aquasec";
*
* const myTerraformPermSet = new aquasec.PermissionsSets("myTerraformPermSet", {
* actions: [
* "acl_policies.read",
* "acl_policies.write",
* "image_profiles.read",
* "image_profiles.write",
* "network_policies.read",
* "network_policies.write",
* "runtime_policies.read",
* "runtime_policies.write",
* "response_policies.read",
* "response_policies.write",
* "image_assurance.read",
* "image_assurance.write",
* "dashboard.read",
* "dashboard.write",
* "risk_explorer.read",
* "images.read",
* "images.write",
* "risks.host_images.read",
* "risks.host_images.write",
* "functions.read",
* "functions.write",
* "enforcers.read",
* "enforcers.write",
* "containers.read",
* "services.read",
* "services.write",
* "infrastructure.read",
* "infrastructure.write",
* "risks.vulnerabilities.read",
* "risks.vulnerabilities.write",
* "risks.benchmark.read",
* "risks.benchmark.write",
* "audits.read",
* "secrets.read",
* "secrets.write",
* "settings.read",
* "settings.write",
* "integrations.read",
* "integrations.write",
* "registries_integrations.read",
* "registries_integrations.write",
* "scan.read",
* "gateways.read",
* "gateways.write",
* "consoles.read",
* "web_hook.read",
* "incidents.read",
* ],
* author: "system",
* description: "Test Permissions Sets created by Terraform",
* isSuper: false,
* uiAccess: true,
* });
* ```
*/

@@ -91,3 +28,3 @@ export declare class PermissionsSets extends pulumi.CustomResource {

*/
readonly author: pulumi.Output<string | undefined>;
readonly author: pulumi.Output<string>;
/**

@@ -164,6 +101,2 @@ * Free text description for the Permission Set.

/**
* The name of the user who created the Permission Set.
*/
author?: pulumi.Input<string>;
/**
* Free text description for the Permission Set.

@@ -170,0 +103,0 @@ */

@@ -10,65 +10,2 @@ "use strict";

* The `aquasec.PermissionsSets` resource manages your Permission Set within Aqua.
*
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as aquasec from "@pulumiverse/aquasec";
*
* const myTerraformPermSet = new aquasec.PermissionsSets("myTerraformPermSet", {
* actions: [
* "acl_policies.read",
* "acl_policies.write",
* "image_profiles.read",
* "image_profiles.write",
* "network_policies.read",
* "network_policies.write",
* "runtime_policies.read",
* "runtime_policies.write",
* "response_policies.read",
* "response_policies.write",
* "image_assurance.read",
* "image_assurance.write",
* "dashboard.read",
* "dashboard.write",
* "risk_explorer.read",
* "images.read",
* "images.write",
* "risks.host_images.read",
* "risks.host_images.write",
* "functions.read",
* "functions.write",
* "enforcers.read",
* "enforcers.write",
* "containers.read",
* "services.read",
* "services.write",
* "infrastructure.read",
* "infrastructure.write",
* "risks.vulnerabilities.read",
* "risks.vulnerabilities.write",
* "risks.benchmark.read",
* "risks.benchmark.write",
* "audits.read",
* "secrets.read",
* "secrets.write",
* "settings.read",
* "settings.write",
* "integrations.read",
* "integrations.write",
* "registries_integrations.read",
* "registries_integrations.write",
* "scan.read",
* "gateways.read",
* "gateways.write",
* "consoles.read",
* "web_hook.read",
* "incidents.read",
* ],
* author: "system",
* description: "Test Permissions Sets created by Terraform",
* isSuper: false,
* uiAccess: true,
* });
* ```
*/

@@ -120,3 +57,2 @@ class PermissionsSets extends pulumi.CustomResource {

resourceInputs["actions"] = args ? args.actions : undefined;
resourceInputs["author"] = args ? args.author : undefined;
resourceInputs["description"] = args ? args.description : undefined;

@@ -126,2 +62,3 @@ resourceInputs["isSuper"] = args ? args.isSuper : undefined;

resourceInputs["uiAccess"] = args ? args.uiAccess : undefined;
resourceInputs["author"] = undefined /*out*/;
resourceInputs["updatedAt"] = undefined /*out*/;

@@ -128,0 +65,0 @@ }

@@ -119,6 +119,2 @@ import * as pulumi from "@pulumi/pulumi";

scopes: pulumi.Input<pulumi.Input<string>[]>;
/**
* The date of the last modification of the role.
*/
updatedAt?: pulumi.Input<string>;
}

@@ -77,4 +77,4 @@ "use strict";

resourceInputs["scopes"] = args ? args.scopes : undefined;
resourceInputs["updatedAt"] = args ? args.updatedAt : undefined;
resourceInputs["author"] = undefined /*out*/;
resourceInputs["updatedAt"] = undefined /*out*/;
}

@@ -81,0 +81,0 @@ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet