Microsoft Azure Container Service Management Client Library for Python
—
Quality
Pending
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Trusted access role bindings and role management for secure integration with other Azure services and custom applications. This feature allows AKS clusters to grant specific Azure services secure access to cluster resources without requiring custom credential management.
Create and manage role bindings that grant trusted Azure services access to AKS cluster resources.
def get(
resource_group_name: str,
resource_name: str,
trusted_access_role_binding_name: str,
**kwargs
) -> TrustedAccessRoleBinding:
"""
Get a trusted access role binding.
Parameters:
- resource_group_name (str): The name of the resource group
- resource_name (str): The name of the managed cluster
- trusted_access_role_binding_name (str): The name of the trusted access role binding
Returns:
TrustedAccessRoleBinding: The trusted access role binding
"""
def begin_create_or_update(
resource_group_name: str,
resource_name: str,
trusted_access_role_binding_name: str,
parameters: TrustedAccessRoleBinding,
**kwargs
) -> TrustedAccessRoleBinding:
"""
Create or update a trusted access role binding.
Parameters:
- resource_group_name (str): The name of the resource group
- resource_name (str): The name of the managed cluster
- trusted_access_role_binding_name (str): The name of the trusted access role binding
- parameters (TrustedAccessRoleBinding): The role binding specification
Returns:
TrustedAccessRoleBinding: The created or updated role binding
"""
def begin_delete(
resource_group_name: str,
resource_name: str,
trusted_access_role_binding_name: str,
**kwargs
) -> None:
"""
Delete a trusted access role binding.
Parameters:
- resource_group_name (str): The name of the resource group
- resource_name (str): The name of the managed cluster
- trusted_access_role_binding_name (str): The name of the trusted access role binding
"""
def list_trusted_access_role_bindings(
resource_group_name: str,
resource_name: str,
**kwargs
) -> ItemPaged[TrustedAccessRoleBinding]:
"""
List trusted access role bindings for a cluster.
Parameters:
- resource_group_name (str): The name of the resource group
- resource_name (str): The name of the managed cluster
Returns:
ItemPaged[TrustedAccessRoleBinding]: Paginated list of role bindings
"""Discover available trusted access roles that can be assigned to Azure services.
def list_trusted_access_roles(location: str, **kwargs) -> ItemPaged[TrustedAccessRole]:
"""
List available trusted access roles for a location.
Parameters:
- location (str): The Azure location
Returns:
ItemPaged[TrustedAccessRole]: Paginated list of available roles
"""class TrustedAccessRoleBinding:
"""
Trusted access role binding resource.
Attributes:
- provisioning_state (str): Provisioning state
- source_resource_id (str): Azure resource ID of the trusted service
- roles (List[str]): List of role names to assign
"""class TrustedAccessRole:
"""
Available trusted access role.
Attributes:
- name (str): Role name
- rules (List[TrustedAccessRoleRule]): Role rules and permissions
"""from azure.mgmt.containerservice import ContainerServiceClient
from azure.mgmt.containerservice.models import TrustedAccessRoleBinding
client = ContainerServiceClient(credential, subscription_id)
# List available trusted access roles
roles = client.trusted_access_roles.list("East US")
for role in roles:
print(f"Available role: {role.name}")
# Create a trusted access role binding
role_binding = TrustedAccessRoleBinding(
source_resource_id="/subscriptions/sub-id/resourceGroups/rg/providers/Microsoft.KeyVault/vaults/keyvault",
roles=["Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/reader"]
)
client.trusted_access_role_bindings.create_or_update_trusted_access_role_binding(
"my-rg", "my-cluster", "keyvault-binding", role_binding
)Install with Tessl CLI
npx tessl i tessl/pypi-azure-mgmt-containerservice