pulumi-azure-native 2.87.0a1739193742__py3-none-any.whl → 2.88.0a1739348902__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-azure-native might be problematic. Click here for more details.
- pulumi_azure_native/__init__.py +5 -0
- pulumi_azure_native/authorization/__init__.py +2 -0
- pulumi_azure_native/authorization/_enums.py +88 -0
- pulumi_azure_native/authorization/_inputs.py +1431 -43
- pulumi_azure_native/authorization/get_role_management_policy.py +247 -0
- pulumi_azure_native/authorization/outputs.py +312 -0
- pulumi_azure_native/authorization/role_management_policy.py +332 -0
- pulumi_azure_native/authorization/v20201001/__init__.py +4 -0
- pulumi_azure_native/authorization/v20201001/_enums.py +78 -0
- pulumi_azure_native/authorization/v20201001/_inputs.py +1134 -0
- pulumi_azure_native/authorization/v20201001/get_role_management_policy.py +241 -0
- pulumi_azure_native/authorization/v20201001/outputs.py +89 -0
- pulumi_azure_native/authorization/v20201001/role_management_policy.py +326 -0
- pulumi_azure_native/authorization/v20201001preview/__init__.py +4 -0
- pulumi_azure_native/authorization/v20201001preview/_enums.py +78 -0
- pulumi_azure_native/authorization/v20201001preview/_inputs.py +1134 -0
- pulumi_azure_native/authorization/v20201001preview/get_role_management_policy.py +241 -0
- pulumi_azure_native/authorization/v20201001preview/outputs.py +959 -0
- pulumi_azure_native/authorization/v20201001preview/role_management_policy.py +326 -0
- pulumi_azure_native/authorization/v20240201preview/__init__.py +4 -0
- pulumi_azure_native/authorization/v20240201preview/_enums.py +96 -0
- pulumi_azure_native/authorization/v20240201preview/_inputs.py +1390 -0
- pulumi_azure_native/authorization/v20240201preview/get_role_management_policy.py +241 -0
- pulumi_azure_native/authorization/v20240201preview/outputs.py +89 -0
- pulumi_azure_native/authorization/v20240201preview/role_management_policy.py +326 -0
- pulumi_azure_native/authorization/v20240901preview/__init__.py +4 -0
- pulumi_azure_native/authorization/v20240901preview/_enums.py +96 -0
- pulumi_azure_native/authorization/v20240901preview/_inputs.py +1410 -0
- pulumi_azure_native/authorization/v20240901preview/get_role_management_policy.py +241 -0
- pulumi_azure_native/authorization/v20240901preview/outputs.py +89 -0
- pulumi_azure_native/authorization/v20240901preview/role_management_policy.py +326 -0
- pulumi_azure_native/pulumi-plugin.json +1 -1
- {pulumi_azure_native-2.87.0a1739193742.dist-info → pulumi_azure_native-2.88.0a1739348902.dist-info}/METADATA +1 -1
- {pulumi_azure_native-2.87.0a1739193742.dist-info → pulumi_azure_native-2.88.0a1739348902.dist-info}/RECORD +36 -18
- {pulumi_azure_native-2.87.0a1739193742.dist-info → pulumi_azure_native-2.88.0a1739348902.dist-info}/WHEEL +0 -0
- {pulumi_azure_native-2.87.0a1739193742.dist-info → pulumi_azure_native-2.88.0a1739348902.dist-info}/top_level.txt +0 -0
pulumi_azure_native/__init__.py
CHANGED
|
@@ -2540,6 +2540,7 @@ _utilities.register(
|
|
|
2540
2540
|
"azure-native:authorization:ResourceManagementPrivateLink": "ResourceManagementPrivateLink",
|
|
2541
2541
|
"azure-native:authorization:RoleAssignment": "RoleAssignment",
|
|
2542
2542
|
"azure-native:authorization:RoleDefinition": "RoleDefinition",
|
|
2543
|
+
"azure-native:authorization:RoleManagementPolicy": "RoleManagementPolicy",
|
|
2543
2544
|
"azure-native:authorization:RoleManagementPolicyAssignment": "RoleManagementPolicyAssignment",
|
|
2544
2545
|
"azure-native:authorization:ScopeAccessReviewHistoryDefinitionById": "ScopeAccessReviewHistoryDefinitionById",
|
|
2545
2546
|
"azure-native:authorization:ScopeAccessReviewScheduleDefinitionById": "ScopeAccessReviewScheduleDefinitionById",
|
|
@@ -2620,6 +2621,7 @@ _utilities.register(
|
|
|
2620
2621
|
"mod": "authorization/v20201001",
|
|
2621
2622
|
"fqn": "pulumi_azure_native.authorization.v20201001",
|
|
2622
2623
|
"classes": {
|
|
2624
|
+
"azure-native:authorization/v20201001:RoleManagementPolicy": "RoleManagementPolicy",
|
|
2623
2625
|
"azure-native:authorization/v20201001:RoleManagementPolicyAssignment": "RoleManagementPolicyAssignment"
|
|
2624
2626
|
}
|
|
2625
2627
|
},
|
|
@@ -2628,6 +2630,7 @@ _utilities.register(
|
|
|
2628
2630
|
"mod": "authorization/v20201001preview",
|
|
2629
2631
|
"fqn": "pulumi_azure_native.authorization.v20201001preview",
|
|
2630
2632
|
"classes": {
|
|
2633
|
+
"azure-native:authorization/v20201001preview:RoleManagementPolicy": "RoleManagementPolicy",
|
|
2631
2634
|
"azure-native:authorization/v20201001preview:RoleManagementPolicyAssignment": "RoleManagementPolicyAssignment"
|
|
2632
2635
|
}
|
|
2633
2636
|
},
|
|
@@ -2717,6 +2720,7 @@ _utilities.register(
|
|
|
2717
2720
|
"mod": "authorization/v20240201preview",
|
|
2718
2721
|
"fqn": "pulumi_azure_native.authorization.v20240201preview",
|
|
2719
2722
|
"classes": {
|
|
2723
|
+
"azure-native:authorization/v20240201preview:RoleManagementPolicy": "RoleManagementPolicy",
|
|
2720
2724
|
"azure-native:authorization/v20240201preview:RoleManagementPolicyAssignment": "RoleManagementPolicyAssignment"
|
|
2721
2725
|
}
|
|
2722
2726
|
},
|
|
@@ -2749,6 +2753,7 @@ _utilities.register(
|
|
|
2749
2753
|
"mod": "authorization/v20240901preview",
|
|
2750
2754
|
"fqn": "pulumi_azure_native.authorization.v20240901preview",
|
|
2751
2755
|
"classes": {
|
|
2756
|
+
"azure-native:authorization/v20240901preview:RoleManagementPolicy": "RoleManagementPolicy",
|
|
2752
2757
|
"azure-native:authorization/v20240901preview:RoleManagementPolicyAssignment": "RoleManagementPolicyAssignment"
|
|
2753
2758
|
}
|
|
2754
2759
|
},
|
|
@@ -30,6 +30,7 @@ from .get_private_link_association import *
|
|
|
30
30
|
from .get_resource_management_private_link import *
|
|
31
31
|
from .get_role_assignment import *
|
|
32
32
|
from .get_role_definition import *
|
|
33
|
+
from .get_role_management_policy import *
|
|
33
34
|
from .get_role_management_policy_assignment import *
|
|
34
35
|
from .get_scope_access_review_history_definition_by_id import *
|
|
35
36
|
from .get_scope_access_review_schedule_definition_by_id import *
|
|
@@ -61,6 +62,7 @@ from .private_link_association import *
|
|
|
61
62
|
from .resource_management_private_link import *
|
|
62
63
|
from .role_assignment import *
|
|
63
64
|
from .role_definition import *
|
|
65
|
+
from .role_management_policy import *
|
|
64
66
|
from .role_management_policy_assignment import *
|
|
65
67
|
from .scope_access_review_history_definition_by_id import *
|
|
66
68
|
from .scope_access_review_schedule_definition_by_id import *
|
|
@@ -8,18 +8,27 @@ __all__ = [
|
|
|
8
8
|
'AccessReviewRecurrencePatternType',
|
|
9
9
|
'AccessReviewRecurrenceRangeType',
|
|
10
10
|
'AccessReviewResult',
|
|
11
|
+
'ApprovalMode',
|
|
11
12
|
'AssignmentScopeValidation',
|
|
12
13
|
'DefaultDecisionType',
|
|
14
|
+
'EnablementRules',
|
|
13
15
|
'EnforcementMode',
|
|
16
|
+
'ExcludedPrincipalTypes',
|
|
14
17
|
'ExemptionCategory',
|
|
15
18
|
'LockLevel',
|
|
19
|
+
'NotificationDeliveryMechanism',
|
|
20
|
+
'NotificationLevel',
|
|
16
21
|
'OverrideKind',
|
|
22
|
+
'PIMOnlyMode',
|
|
17
23
|
'ParameterType',
|
|
18
24
|
'PolicyType',
|
|
19
25
|
'PrincipalType',
|
|
20
26
|
'PublicNetworkAccessOptions',
|
|
27
|
+
'RecipientType',
|
|
21
28
|
'ResourceIdentityType',
|
|
29
|
+
'RoleManagementPolicyRuleType',
|
|
22
30
|
'SelectorKind',
|
|
31
|
+
'UserType',
|
|
23
32
|
]
|
|
24
33
|
|
|
25
34
|
|
|
@@ -51,6 +60,16 @@ class AccessReviewResult(str, Enum):
|
|
|
51
60
|
NOT_NOTIFIED = "NotNotified"
|
|
52
61
|
|
|
53
62
|
|
|
63
|
+
class ApprovalMode(str, Enum):
|
|
64
|
+
"""
|
|
65
|
+
The type of rule
|
|
66
|
+
"""
|
|
67
|
+
SINGLE_STAGE = "SingleStage"
|
|
68
|
+
SERIAL = "Serial"
|
|
69
|
+
PARALLEL = "Parallel"
|
|
70
|
+
NO_APPROVAL = "NoApproval"
|
|
71
|
+
|
|
72
|
+
|
|
54
73
|
class AssignmentScopeValidation(str, Enum):
|
|
55
74
|
"""
|
|
56
75
|
The option whether validate the exemption is at or under the assignment scope.
|
|
@@ -74,6 +93,15 @@ class DefaultDecisionType(str, Enum):
|
|
|
74
93
|
RECOMMENDATION = "Recommendation"
|
|
75
94
|
|
|
76
95
|
|
|
96
|
+
class EnablementRules(str, Enum):
|
|
97
|
+
"""
|
|
98
|
+
The type of enablement rule
|
|
99
|
+
"""
|
|
100
|
+
MULTI_FACTOR_AUTHENTICATION = "MultiFactorAuthentication"
|
|
101
|
+
JUSTIFICATION = "Justification"
|
|
102
|
+
TICKETING = "Ticketing"
|
|
103
|
+
|
|
104
|
+
|
|
77
105
|
class EnforcementMode(str, Enum):
|
|
78
106
|
"""
|
|
79
107
|
The policy assignment enforcement mode. Possible values are Default and DoNotEnforce.
|
|
@@ -88,6 +116,11 @@ class EnforcementMode(str, Enum):
|
|
|
88
116
|
"""
|
|
89
117
|
|
|
90
118
|
|
|
119
|
+
class ExcludedPrincipalTypes(str, Enum):
|
|
120
|
+
SERVICE_PRINCIPALS_AS_TARGET = "ServicePrincipalsAsTarget"
|
|
121
|
+
SERVICE_PRINCIPALS_AS_REQUESTOR = "ServicePrincipalsAsRequestor"
|
|
122
|
+
|
|
123
|
+
|
|
91
124
|
class ExemptionCategory(str, Enum):
|
|
92
125
|
"""
|
|
93
126
|
The policy exemption category. Possible values are Waiver and Mitigated.
|
|
@@ -111,6 +144,22 @@ class LockLevel(str, Enum):
|
|
|
111
144
|
READ_ONLY = "ReadOnly"
|
|
112
145
|
|
|
113
146
|
|
|
147
|
+
class NotificationDeliveryMechanism(str, Enum):
|
|
148
|
+
"""
|
|
149
|
+
The type of notification.
|
|
150
|
+
"""
|
|
151
|
+
EMAIL = "Email"
|
|
152
|
+
|
|
153
|
+
|
|
154
|
+
class NotificationLevel(str, Enum):
|
|
155
|
+
"""
|
|
156
|
+
The notification level.
|
|
157
|
+
"""
|
|
158
|
+
NONE = "None"
|
|
159
|
+
CRITICAL = "Critical"
|
|
160
|
+
ALL = "All"
|
|
161
|
+
|
|
162
|
+
|
|
114
163
|
class OverrideKind(str, Enum):
|
|
115
164
|
"""
|
|
116
165
|
The override kind.
|
|
@@ -121,6 +170,15 @@ class OverrideKind(str, Enum):
|
|
|
121
170
|
"""
|
|
122
171
|
|
|
123
172
|
|
|
173
|
+
class PIMOnlyMode(str, Enum):
|
|
174
|
+
"""
|
|
175
|
+
Determines whether the setting is enabled, disabled or report only.
|
|
176
|
+
"""
|
|
177
|
+
DISABLED = "Disabled"
|
|
178
|
+
ENABLED = "Enabled"
|
|
179
|
+
REPORT_ONLY = "ReportOnly"
|
|
180
|
+
|
|
181
|
+
|
|
124
182
|
class ParameterType(str, Enum):
|
|
125
183
|
"""
|
|
126
184
|
The data type of the parameter.
|
|
@@ -160,6 +218,15 @@ class PublicNetworkAccessOptions(str, Enum):
|
|
|
160
218
|
DISABLED = "Disabled"
|
|
161
219
|
|
|
162
220
|
|
|
221
|
+
class RecipientType(str, Enum):
|
|
222
|
+
"""
|
|
223
|
+
The recipient type.
|
|
224
|
+
"""
|
|
225
|
+
REQUESTOR = "Requestor"
|
|
226
|
+
APPROVER = "Approver"
|
|
227
|
+
ADMIN = "Admin"
|
|
228
|
+
|
|
229
|
+
|
|
163
230
|
class ResourceIdentityType(str, Enum):
|
|
164
231
|
"""
|
|
165
232
|
The identity type. This is the only required field when adding a system or user assigned identity to a resource.
|
|
@@ -178,6 +245,18 @@ class ResourceIdentityType(str, Enum):
|
|
|
178
245
|
"""
|
|
179
246
|
|
|
180
247
|
|
|
248
|
+
class RoleManagementPolicyRuleType(str, Enum):
|
|
249
|
+
"""
|
|
250
|
+
The type of rule
|
|
251
|
+
"""
|
|
252
|
+
ROLE_MANAGEMENT_POLICY_APPROVAL_RULE = "RoleManagementPolicyApprovalRule"
|
|
253
|
+
ROLE_MANAGEMENT_POLICY_AUTHENTICATION_CONTEXT_RULE = "RoleManagementPolicyAuthenticationContextRule"
|
|
254
|
+
ROLE_MANAGEMENT_POLICY_ENABLEMENT_RULE = "RoleManagementPolicyEnablementRule"
|
|
255
|
+
ROLE_MANAGEMENT_POLICY_EXPIRATION_RULE = "RoleManagementPolicyExpirationRule"
|
|
256
|
+
ROLE_MANAGEMENT_POLICY_NOTIFICATION_RULE = "RoleManagementPolicyNotificationRule"
|
|
257
|
+
ROLE_MANAGEMENT_POLICY_PIM_ONLY_MODE_RULE = "RoleManagementPolicyPimOnlyModeRule"
|
|
258
|
+
|
|
259
|
+
|
|
181
260
|
class SelectorKind(str, Enum):
|
|
182
261
|
"""
|
|
183
262
|
The selector kind.
|
|
@@ -198,3 +277,12 @@ class SelectorKind(str, Enum):
|
|
|
198
277
|
"""
|
|
199
278
|
The selector kind to filter policies by the policy definition reference ID.
|
|
200
279
|
"""
|
|
280
|
+
|
|
281
|
+
|
|
282
|
+
class UserType(str, Enum):
|
|
283
|
+
"""
|
|
284
|
+
The type of user.
|
|
285
|
+
"""
|
|
286
|
+
USER = "User"
|
|
287
|
+
GROUP = "Group"
|
|
288
|
+
SERVICE_PRINCIPAL = "ServicePrincipal"
|