CtrlK
BlogDocsLog inGet started
Tessl Logo

tessl/pypi-azure-mgmt-containerservice

Microsoft Azure Container Service Management Client Library for Python

Pending

Quality

Pending

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

Overview
Eval results
Files

trusted-access.mddocs/

Trusted Access

Trusted access role bindings and role management for secure integration with other Azure services and custom applications. This feature allows AKS clusters to grant specific Azure services secure access to cluster resources without requiring custom credential management.

Capabilities

Trusted Access Role Binding Management

Create and manage role bindings that grant trusted Azure services access to AKS cluster resources.

def get(
    resource_group_name: str,
    resource_name: str,
    trusted_access_role_binding_name: str,
    **kwargs
) -> TrustedAccessRoleBinding:
    """
    Get a trusted access role binding.

    Parameters:
    - resource_group_name (str): The name of the resource group
    - resource_name (str): The name of the managed cluster
    - trusted_access_role_binding_name (str): The name of the trusted access role binding
    
    Returns:
    TrustedAccessRoleBinding: The trusted access role binding
    """

def begin_create_or_update(
    resource_group_name: str,
    resource_name: str,
    trusted_access_role_binding_name: str,
    parameters: TrustedAccessRoleBinding,
    **kwargs
) -> TrustedAccessRoleBinding:
    """
    Create or update a trusted access role binding.

    Parameters:
    - resource_group_name (str): The name of the resource group
    - resource_name (str): The name of the managed cluster
    - trusted_access_role_binding_name (str): The name of the trusted access role binding
    - parameters (TrustedAccessRoleBinding): The role binding specification
    
    Returns:
    TrustedAccessRoleBinding: The created or updated role binding
    """

def begin_delete(
    resource_group_name: str,
    resource_name: str,
    trusted_access_role_binding_name: str,
    **kwargs
) -> None:
    """
    Delete a trusted access role binding.

    Parameters:
    - resource_group_name (str): The name of the resource group
    - resource_name (str): The name of the managed cluster
    - trusted_access_role_binding_name (str): The name of the trusted access role binding
    """

def list_trusted_access_role_bindings(
    resource_group_name: str,
    resource_name: str,
    **kwargs
) -> ItemPaged[TrustedAccessRoleBinding]:
    """
    List trusted access role bindings for a cluster.

    Parameters:
    - resource_group_name (str): The name of the resource group
    - resource_name (str): The name of the managed cluster
    
    Returns:
    ItemPaged[TrustedAccessRoleBinding]: Paginated list of role bindings
    """

Trusted Access Role Discovery

Discover available trusted access roles that can be assigned to Azure services.

def list_trusted_access_roles(location: str, **kwargs) -> ItemPaged[TrustedAccessRole]:
    """
    List available trusted access roles for a location.

    Parameters:
    - location (str): The Azure location
    
    Returns:
    ItemPaged[TrustedAccessRole]: Paginated list of available roles
    """

Types

TrustedAccessRoleBinding

class TrustedAccessRoleBinding:
    """
    Trusted access role binding resource.
    
    Attributes:
    - provisioning_state (str): Provisioning state
    - source_resource_id (str): Azure resource ID of the trusted service
    - roles (List[str]): List of role names to assign
    """

TrustedAccessRole

class TrustedAccessRole:
    """
    Available trusted access role.
    
    Attributes:
    - name (str): Role name
    - rules (List[TrustedAccessRoleRule]): Role rules and permissions
    """

Usage Example

from azure.mgmt.containerservice import ContainerServiceClient
from azure.mgmt.containerservice.models import TrustedAccessRoleBinding

client = ContainerServiceClient(credential, subscription_id)

# List available trusted access roles
roles = client.trusted_access_roles.list("East US")
for role in roles:
    print(f"Available role: {role.name}")

# Create a trusted access role binding
role_binding = TrustedAccessRoleBinding(
    source_resource_id="/subscriptions/sub-id/resourceGroups/rg/providers/Microsoft.KeyVault/vaults/keyvault",
    roles=["Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/reader"]
)

client.trusted_access_role_bindings.create_or_update_trusted_access_role_binding(
    "my-rg", "my-cluster", "keyvault-binding", role_binding
)

Install with Tessl CLI

npx tessl i tessl/pypi-azure-mgmt-containerservice

docs

agent-pools.md

index.md

machines.md

maintenance.md

managed-clusters.md

models.md

private-endpoints.md

snapshots.md

trusted-access.md

tile.json