alicloud.resourcemanager.ControlPolicyAttachment
Explore with Pulumi AI
Provides a Resource Manager Control Policy Attachment resource.
For information about Resource Manager Control Policy Attachment and how to use it, see What is Control Policy Attachment.
NOTE: Available since v1.120.0.
Example Usage
Basic Usage
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AliCloud = Pulumi.AliCloud;
return await Deployment.RunAsync(() =>
{
var config = new Config();
var name = config.Get("name") ?? "tf-example";
var exampleControlPolicy = new AliCloud.ResourceManager.ControlPolicy("exampleControlPolicy", new()
{
ControlPolicyName = name,
Description = name,
EffectScope = "RAM",
PolicyDocument = @" {
""Version"": ""1"",
""Statement"": [
{
""Effect"": ""Deny"",
""Action"": [
""ram:UpdateRole"",
""ram:DeleteRole"",
""ram:AttachPolicyToRole"",
""ram:DetachPolicyFromRole""
],
""Resource"": ""acs:ram:*:*:role/ResourceDirectoryAccountAccessRole""
}
]
}
",
});
var exampleFolder = new AliCloud.ResourceManager.Folder("exampleFolder", new()
{
FolderName = name,
});
var exampleControlPolicyAttachment = new AliCloud.ResourceManager.ControlPolicyAttachment("exampleControlPolicyAttachment", new()
{
PolicyId = exampleControlPolicy.Id,
TargetId = exampleFolder.Id,
});
});
package main
import (
"github.com/pulumi/pulumi-alicloud/sdk/v3/go/alicloud/resourcemanager"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi/config"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
cfg := config.New(ctx, "")
name := "tf-example"
if param := cfg.Get("name"); param != "" {
name = param
}
exampleControlPolicy, err := resourcemanager.NewControlPolicy(ctx, "exampleControlPolicy", &resourcemanager.ControlPolicyArgs{
ControlPolicyName: pulumi.String(name),
Description: pulumi.String(name),
EffectScope: pulumi.String("RAM"),
PolicyDocument: pulumi.String(` {
"Version": "1",
"Statement": [
{
"Effect": "Deny",
"Action": [
"ram:UpdateRole",
"ram:DeleteRole",
"ram:AttachPolicyToRole",
"ram:DetachPolicyFromRole"
],
"Resource": "acs:ram:*:*:role/ResourceDirectoryAccountAccessRole"
}
]
}
`),
})
if err != nil {
return err
}
exampleFolder, err := resourcemanager.NewFolder(ctx, "exampleFolder", &resourcemanager.FolderArgs{
FolderName: pulumi.String(name),
})
if err != nil {
return err
}
_, err = resourcemanager.NewControlPolicyAttachment(ctx, "exampleControlPolicyAttachment", &resourcemanager.ControlPolicyAttachmentArgs{
PolicyId: exampleControlPolicy.ID(),
TargetId: exampleFolder.ID(),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.alicloud.resourcemanager.ControlPolicy;
import com.pulumi.alicloud.resourcemanager.ControlPolicyArgs;
import com.pulumi.alicloud.resourcemanager.Folder;
import com.pulumi.alicloud.resourcemanager.FolderArgs;
import com.pulumi.alicloud.resourcemanager.ControlPolicyAttachment;
import com.pulumi.alicloud.resourcemanager.ControlPolicyAttachmentArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var config = ctx.config();
final var name = config.get("name").orElse("tf-example");
var exampleControlPolicy = new ControlPolicy("exampleControlPolicy", ControlPolicyArgs.builder()
.controlPolicyName(name)
.description(name)
.effectScope("RAM")
.policyDocument("""
{
"Version": "1",
"Statement": [
{
"Effect": "Deny",
"Action": [
"ram:UpdateRole",
"ram:DeleteRole",
"ram:AttachPolicyToRole",
"ram:DetachPolicyFromRole"
],
"Resource": "acs:ram:*:*:role/ResourceDirectoryAccountAccessRole"
}
]
}
""")
.build());
var exampleFolder = new Folder("exampleFolder", FolderArgs.builder()
.folderName(name)
.build());
var exampleControlPolicyAttachment = new ControlPolicyAttachment("exampleControlPolicyAttachment", ControlPolicyAttachmentArgs.builder()
.policyId(exampleControlPolicy.id())
.targetId(exampleFolder.id())
.build());
}
}
import pulumi
import pulumi_alicloud as alicloud
config = pulumi.Config()
name = config.get("name")
if name is None:
name = "tf-example"
example_control_policy = alicloud.resourcemanager.ControlPolicy("exampleControlPolicy",
control_policy_name=name,
description=name,
effect_scope="RAM",
policy_document=""" {
"Version": "1",
"Statement": [
{
"Effect": "Deny",
"Action": [
"ram:UpdateRole",
"ram:DeleteRole",
"ram:AttachPolicyToRole",
"ram:DetachPolicyFromRole"
],
"Resource": "acs:ram:*:*:role/ResourceDirectoryAccountAccessRole"
}
]
}
""")
example_folder = alicloud.resourcemanager.Folder("exampleFolder", folder_name=name)
example_control_policy_attachment = alicloud.resourcemanager.ControlPolicyAttachment("exampleControlPolicyAttachment",
policy_id=example_control_policy.id,
target_id=example_folder.id)
import * as pulumi from "@pulumi/pulumi";
import * as alicloud from "@pulumi/alicloud";
const config = new pulumi.Config();
const name = config.get("name") || "tf-example";
const exampleControlPolicy = new alicloud.resourcemanager.ControlPolicy("exampleControlPolicy", {
controlPolicyName: name,
description: name,
effectScope: "RAM",
policyDocument: ` {
"Version": "1",
"Statement": [
{
"Effect": "Deny",
"Action": [
"ram:UpdateRole",
"ram:DeleteRole",
"ram:AttachPolicyToRole",
"ram:DetachPolicyFromRole"
],
"Resource": "acs:ram:*:*:role/ResourceDirectoryAccountAccessRole"
}
]
}
`,
});
const exampleFolder = new alicloud.resourcemanager.Folder("exampleFolder", {folderName: name});
const exampleControlPolicyAttachment = new alicloud.resourcemanager.ControlPolicyAttachment("exampleControlPolicyAttachment", {
policyId: exampleControlPolicy.id,
targetId: exampleFolder.id,
});
configuration:
name:
type: string
default: tf-example
resources:
exampleControlPolicy:
type: alicloud:resourcemanager:ControlPolicy
properties:
controlPolicyName: ${name}
description: ${name}
effectScope: RAM
policyDocument: |2
{
"Version": "1",
"Statement": [
{
"Effect": "Deny",
"Action": [
"ram:UpdateRole",
"ram:DeleteRole",
"ram:AttachPolicyToRole",
"ram:DetachPolicyFromRole"
],
"Resource": "acs:ram:*:*:role/ResourceDirectoryAccountAccessRole"
}
]
}
exampleFolder:
type: alicloud:resourcemanager:Folder
properties:
folderName: ${name}
exampleControlPolicyAttachment:
type: alicloud:resourcemanager:ControlPolicyAttachment
properties:
policyId: ${exampleControlPolicy.id}
targetId: ${exampleFolder.id}
Create ControlPolicyAttachment Resource
new ControlPolicyAttachment(name: string, args: ControlPolicyAttachmentArgs, opts?: CustomResourceOptions);
@overload
def ControlPolicyAttachment(resource_name: str,
opts: Optional[ResourceOptions] = None,
policy_id: Optional[str] = None,
target_id: Optional[str] = None)
@overload
def ControlPolicyAttachment(resource_name: str,
args: ControlPolicyAttachmentArgs,
opts: Optional[ResourceOptions] = None)
func NewControlPolicyAttachment(ctx *Context, name string, args ControlPolicyAttachmentArgs, opts ...ResourceOption) (*ControlPolicyAttachment, error)
public ControlPolicyAttachment(string name, ControlPolicyAttachmentArgs args, CustomResourceOptions? opts = null)
public ControlPolicyAttachment(String name, ControlPolicyAttachmentArgs args)
public ControlPolicyAttachment(String name, ControlPolicyAttachmentArgs args, CustomResourceOptions options)
type: alicloud:resourcemanager:ControlPolicyAttachment
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ControlPolicyAttachmentArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ControlPolicyAttachmentArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ControlPolicyAttachmentArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ControlPolicyAttachmentArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ControlPolicyAttachmentArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
ControlPolicyAttachment Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The ControlPolicyAttachment resource accepts the following input properties:
Outputs
All input properties are implicitly available as output properties. Additionally, the ControlPolicyAttachment resource produces the following output properties:
- Id string
The provider-assigned unique ID for this managed resource.
- Id string
The provider-assigned unique ID for this managed resource.
- id String
The provider-assigned unique ID for this managed resource.
- id string
The provider-assigned unique ID for this managed resource.
- id str
The provider-assigned unique ID for this managed resource.
- id String
The provider-assigned unique ID for this managed resource.
Look up Existing ControlPolicyAttachment Resource
Get an existing ControlPolicyAttachment resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ControlPolicyAttachmentState, opts?: CustomResourceOptions): ControlPolicyAttachment
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
policy_id: Optional[str] = None,
target_id: Optional[str] = None) -> ControlPolicyAttachment
func GetControlPolicyAttachment(ctx *Context, name string, id IDInput, state *ControlPolicyAttachmentState, opts ...ResourceOption) (*ControlPolicyAttachment, error)
public static ControlPolicyAttachment Get(string name, Input<string> id, ControlPolicyAttachmentState? state, CustomResourceOptions? opts = null)
public static ControlPolicyAttachment get(String name, Output<String> id, ControlPolicyAttachmentState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
Import
Resource Manager Control Policy Attachment can be imported using the id, e.g.
$ pulumi import alicloud:resourcemanager/controlPolicyAttachment:ControlPolicyAttachment example <policy_id>:<target_id>
Package Details
- Repository
- Alibaba Cloud pulumi/pulumi-alicloud
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
alicloud
Terraform Provider.