@@ -59,8 +59,8 @@ class AzurePrincipal:
5959
6060
6161@define (eq = False , slots = False )
62- class AzureDenyAssignment (MicrosoftResource ):
63- kind : ClassVar [str ] = "azure_deny_assignment "
62+ class AzureAuthorizationDenyAssignment (MicrosoftResource ):
63+ kind : ClassVar [str ] = "azure_authorization_deny_assignment "
6464 api_spec : ClassVar [AzureResourceSpec ] = AzureResourceSpec (
6565 service = "authorization" ,
6666 version = "2022-04-01" ,
@@ -109,8 +109,8 @@ class AzureDenyAssignment(MicrosoftResource):
109109
110110
111111@define (eq = False , slots = False )
112- class AzureRoleAssignment (MicrosoftResource ):
113- kind : ClassVar [str ] = "azure_role_assignment "
112+ class AzureAuthorizationRoleAssignment (MicrosoftResource ):
113+ kind : ClassVar [str ] = "azure_authorization_role_assignment "
114114 api_spec : ClassVar [AzureResourceSpec ] = AzureResourceSpec (
115115 service = "authorization" ,
116116 version = "2022-04-01" ,
@@ -130,9 +130,16 @@ class AzureRoleAssignment(MicrosoftResource):
130130 "Resource" : "azure_resource" ,
131131 }
132132 reference_kinds : ClassVar [ModelReference ] = {
133- "successors" : {"default" : ["azure_role_definition" , * (p .kind for p in MicrosoftGraphPrincipalTypes )]},
133+ "successors" : {
134+ "default" : ["azure_authorization_role_definition" , * (p .kind for p in MicrosoftGraphPrincipalTypes )]
135+ },
134136 "predecessors" : {
135- "default" : ["azure_role_definition" , "azure_subscription" , "azure_resource_group" , "azure_resource" ]
137+ "default" : [
138+ "azure_authorization_role_definition" ,
139+ "azure_subscription" ,
140+ "azure_resource_group" ,
141+ "azure_resource" ,
142+ ]
136143 },
137144 }
138145 mapping : ClassVar [Dict [str , Bender ]] = {
@@ -171,7 +178,7 @@ class AzureRoleAssignment(MicrosoftResource):
171178 def connect_in_graph (self , builder : GraphBuilder , source : Json ) -> None :
172179 # role definition
173180 if rid := self .role_definition_id :
174- builder .add_edge (self , clazz = AzureRoleDefinition , id = rid )
181+ builder .add_edge (self , clazz = AzureAuthorizationRoleDefinition , id = rid )
175182
176183 # scope
177184 if scope := self .scope :
@@ -206,8 +213,8 @@ class AzurePermission:
206213
207214
208215@define (eq = False , slots = False )
209- class AzureRoleDefinition (MicrosoftResource , BaseRole ):
210- kind : ClassVar [str ] = "azure_role_definition "
216+ class AzureAuthorizationRoleDefinition (MicrosoftResource , BaseRole ):
217+ kind : ClassVar [str ] = "azure_authorization_role_definition "
211218 api_spec : ClassVar [AzureResourceSpec ] = AzureResourceSpec (
212219 service = "authorization" ,
213220 version = "2022-04-01" ,
@@ -242,8 +249,8 @@ class AzureRoleDefinition(MicrosoftResource, BaseRole):
242249
243250
244251@define (eq = False , slots = False )
245- class AzureManagementLock (MicrosoftResource ):
246- kind : ClassVar [str ] = "azure_management_lock "
252+ class AzureAuthorizationManagementLock (MicrosoftResource ):
253+ kind : ClassVar [str ] = "azure_authorization_management_lock "
247254 api_spec : ClassVar [AzureResourceSpec ] = AzureResourceSpec (
248255 service = "resources" ,
249256 version = "2020-05-01" ,
@@ -275,8 +282,8 @@ def connect_in_graph(self, builder: GraphBuilder, source: Json) -> None:
275282
276283
277284resources : List [Type [MicrosoftResource ]] = [
278- AzureDenyAssignment ,
279- AzureManagementLock ,
280- AzureRoleAssignment ,
281- AzureRoleDefinition ,
285+ AzureAuthorizationDenyAssignment ,
286+ AzureAuthorizationManagementLock ,
287+ AzureAuthorizationRoleAssignment ,
288+ AzureAuthorizationRoleDefinition ,
282289]
0 commit comments