1. Packages
  2. Sonarqube Provider
  3. API Docs
  4. Permissions
sonarqube 0.16.14 published on Monday, Apr 14, 2025 by jdamata

sonarqube.Permissions

Explore with Pulumi AI

sonarqube logo
sonarqube 0.16.14 published on Monday, Apr 14, 2025 by jdamata

    Provides a Sonarqube Permissions resource. This can be used to manage global and project permissions.

    Example Usage

    Example: Set global admin permissions for a group called “my-admins”

    import * as pulumi from "@pulumi/pulumi";
    import * as sonarqube from "@pulumi/sonarqube";
    
    const myGlobalAdmins = new sonarqube.Permissions("myGlobalAdmins", {
        groupName: "my-admins",
        permissions: ["admin"],
    });
    
    import pulumi
    import pulumi_sonarqube as sonarqube
    
    my_global_admins = sonarqube.Permissions("myGlobalAdmins",
        group_name="my-admins",
        permissions=["admin"])
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/sonarqube/sonarqube"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := sonarqube.NewPermissions(ctx, "myGlobalAdmins", &sonarqube.PermissionsArgs{
    			GroupName: pulumi.String("my-admins"),
    			Permissions: pulumi.StringArray{
    				pulumi.String("admin"),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Sonarqube = Pulumi.Sonarqube;
    
    return await Deployment.RunAsync(() => 
    {
        var myGlobalAdmins = new Sonarqube.Permissions("myGlobalAdmins", new()
        {
            GroupName = "my-admins",
            Permissions = new[]
            {
                "admin",
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.sonarqube.Permissions;
    import com.pulumi.sonarqube.PermissionsArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var myGlobalAdmins = new Permissions("myGlobalAdmins", PermissionsArgs.builder()
                .groupName("my-admins")
                .permissions("admin")
                .build());
    
        }
    }
    
    resources:
      myGlobalAdmins:
        type: sonarqube:Permissions
        properties:
          groupName: my-admins
          permissions:
            - admin
    

    Example: Set project admin permissions for a group called “my-project-admins”

    import * as pulumi from "@pulumi/pulumi";
    import * as sonarqube from "@pulumi/sonarqube";
    
    const myProjectAdmins = new sonarqube.Permissions("myProjectAdmins", {
        groupName: "my-project-admins",
        permissions: ["admin"],
        projectKey: "my-project",
    });
    
    import pulumi
    import pulumi_sonarqube as sonarqube
    
    my_project_admins = sonarqube.Permissions("myProjectAdmins",
        group_name="my-project-admins",
        permissions=["admin"],
        project_key="my-project")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/sonarqube/sonarqube"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := sonarqube.NewPermissions(ctx, "myProjectAdmins", &sonarqube.PermissionsArgs{
    			GroupName: pulumi.String("my-project-admins"),
    			Permissions: pulumi.StringArray{
    				pulumi.String("admin"),
    			},
    			ProjectKey: pulumi.String("my-project"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Sonarqube = Pulumi.Sonarqube;
    
    return await Deployment.RunAsync(() => 
    {
        var myProjectAdmins = new Sonarqube.Permissions("myProjectAdmins", new()
        {
            GroupName = "my-project-admins",
            Permissions = new[]
            {
                "admin",
            },
            ProjectKey = "my-project",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.sonarqube.Permissions;
    import com.pulumi.sonarqube.PermissionsArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var myProjectAdmins = new Permissions("myProjectAdmins", PermissionsArgs.builder()
                .groupName("my-project-admins")
                .permissions("admin")
                .projectKey("my-project")
                .build());
    
        }
    }
    
    resources:
      myProjectAdmins:
        type: sonarqube:Permissions
        properties:
          groupName: my-project-admins
          permissions:
            - admin
          projectKey: my-project
    

    Example: Set project admin permissions for a group called “my-project-admins on a permission template”

    import * as pulumi from "@pulumi/pulumi";
    import * as sonarqube from "@pulumi/sonarqube";
    
    const internalAdmins = new sonarqube.Permissions("internalAdmins", {
        groupName: "my-internal-admins",
        templateId: sonarqube_permission_template.template.id,
        permissions: ["admin"],
    });
    
    import pulumi
    import pulumi_sonarqube as sonarqube
    
    internal_admins = sonarqube.Permissions("internalAdmins",
        group_name="my-internal-admins",
        template_id=sonarqube_permission_template["template"]["id"],
        permissions=["admin"])
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/sonarqube/sonarqube"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := sonarqube.NewPermissions(ctx, "internalAdmins", &sonarqube.PermissionsArgs{
    			GroupName:  pulumi.String("my-internal-admins"),
    			TemplateId: pulumi.Any(sonarqube_permission_template.Template.Id),
    			Permissions: pulumi.StringArray{
    				pulumi.String("admin"),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Sonarqube = Pulumi.Sonarqube;
    
    return await Deployment.RunAsync(() => 
    {
        var internalAdmins = new Sonarqube.Permissions("internalAdmins", new()
        {
            GroupName = "my-internal-admins",
            TemplateId = sonarqube_permission_template.Template.Id,
            Permissions = new[]
            {
                "admin",
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.sonarqube.Permissions;
    import com.pulumi.sonarqube.PermissionsArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var internalAdmins = new Permissions("internalAdmins", PermissionsArgs.builder()
                .groupName("my-internal-admins")
                .templateId(sonarqube_permission_template.template().id())
                .permissions("admin")
                .build());
    
        }
    }
    
    resources:
      internalAdmins:
        type: sonarqube:Permissions
        properties:
          groupName: my-internal-admins
          templateId: ${sonarqube_permission_template.template.id}
          permissions:
            - admin
    

    Example: Set codeviewer & user permissions on project level for a user called “johndoe”

    import * as pulumi from "@pulumi/pulumi";
    import * as sonarqube from "@pulumi/sonarqube";
    
    const johnProjectRead = new sonarqube.Permissions("johnProjectRead", {
        loginName: "johndoe",
        permissions: [
            "codeviewer",
            "user",
        ],
        projectKey: "my-project",
    });
    
    import pulumi
    import pulumi_sonarqube as sonarqube
    
    john_project_read = sonarqube.Permissions("johnProjectRead",
        login_name="johndoe",
        permissions=[
            "codeviewer",
            "user",
        ],
        project_key="my-project")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/sonarqube/sonarqube"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := sonarqube.NewPermissions(ctx, "johnProjectRead", &sonarqube.PermissionsArgs{
    			LoginName: pulumi.String("johndoe"),
    			Permissions: pulumi.StringArray{
    				pulumi.String("codeviewer"),
    				pulumi.String("user"),
    			},
    			ProjectKey: pulumi.String("my-project"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Sonarqube = Pulumi.Sonarqube;
    
    return await Deployment.RunAsync(() => 
    {
        var johnProjectRead = new Sonarqube.Permissions("johnProjectRead", new()
        {
            LoginName = "johndoe",
            Permissions = new[]
            {
                "codeviewer",
                "user",
            },
            ProjectKey = "my-project",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.sonarqube.Permissions;
    import com.pulumi.sonarqube.PermissionsArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var johnProjectRead = new Permissions("johnProjectRead", PermissionsArgs.builder()
                .loginName("johndoe")
                .permissions(            
                    "codeviewer",
                    "user")
                .projectKey("my-project")
                .build());
    
        }
    }
    
    resources:
      johnProjectRead:
        type: sonarqube:Permissions
        properties:
          loginName: johndoe
          permissions:
            - codeviewer
            - user
          projectKey: my-project
    

    Create Permissions Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new Permissions(name: string, args: PermissionsArgs, opts?: CustomResourceOptions);
    @overload
    def Permissions(resource_name: str,
                    args: PermissionsArgs,
                    opts: Optional[ResourceOptions] = None)
    
    @overload
    def Permissions(resource_name: str,
                    opts: Optional[ResourceOptions] = None,
                    permissions: Optional[Sequence[str]] = None,
                    group_name: Optional[str] = None,
                    login_name: Optional[str] = None,
                    permissions_id: Optional[str] = None,
                    project_key: Optional[str] = None,
                    template_id: Optional[str] = None,
                    template_name: Optional[str] = None)
    func NewPermissions(ctx *Context, name string, args PermissionsArgs, opts ...ResourceOption) (*Permissions, error)
    public Permissions(string name, PermissionsArgs args, CustomResourceOptions? opts = null)
    public Permissions(String name, PermissionsArgs args)
    public Permissions(String name, PermissionsArgs args, CustomResourceOptions options)
    
    type: sonarqube:Permissions
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args PermissionsArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args PermissionsArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args PermissionsArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args PermissionsArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args PermissionsArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var permissionsResource = new Sonarqube.Permissions("permissionsResource", new()
    {
        Permissions = new[]
        {
            "string",
        },
        GroupName = "string",
        LoginName = "string",
        PermissionsId = "string",
        ProjectKey = "string",
        TemplateId = "string",
        TemplateName = "string",
    });
    
    example, err := sonarqube.NewPermissions(ctx, "permissionsResource", &sonarqube.PermissionsArgs{
    	Permissions: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	GroupName:     pulumi.String("string"),
    	LoginName:     pulumi.String("string"),
    	PermissionsId: pulumi.String("string"),
    	ProjectKey:    pulumi.String("string"),
    	TemplateId:    pulumi.String("string"),
    	TemplateName:  pulumi.String("string"),
    })
    
    var permissionsResource = new Permissions("permissionsResource", PermissionsArgs.builder()
        .permissions("string")
        .groupName("string")
        .loginName("string")
        .permissionsId("string")
        .projectKey("string")
        .templateId("string")
        .templateName("string")
        .build());
    
    permissions_resource = sonarqube.Permissions("permissionsResource",
        permissions=["string"],
        group_name="string",
        login_name="string",
        permissions_id="string",
        project_key="string",
        template_id="string",
        template_name="string")
    
    const permissionsResource = new sonarqube.Permissions("permissionsResource", {
        permissions: ["string"],
        groupName: "string",
        loginName: "string",
        permissionsId: "string",
        projectKey: "string",
        templateId: "string",
        templateName: "string",
    });
    
    type: sonarqube:Permissions
    properties:
        groupName: string
        loginName: string
        permissions:
            - string
        permissionsId: string
        projectKey: string
        templateId: string
        templateName: string
    

    Permissions Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The Permissions resource accepts the following input properties:

    Permissions List<string>
    A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are: admin, codeviewer, issueadmin, securityhotspotadmin, scan, user.
    GroupName string
    The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with login_name
    LoginName string
    The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with group_name.
    PermissionsId string
    The ID of this resource.
    ProjectKey string
    Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with template_id & template_name
    TemplateId string
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_name
    TemplateName string
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_id
    Permissions []string
    A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are: admin, codeviewer, issueadmin, securityhotspotadmin, scan, user.
    GroupName string
    The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with login_name
    LoginName string
    The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with group_name.
    PermissionsId string
    The ID of this resource.
    ProjectKey string
    Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with template_id & template_name
    TemplateId string
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_name
    TemplateName string
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_id
    permissions List<String>
    A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are: admin, codeviewer, issueadmin, securityhotspotadmin, scan, user.
    groupName String
    The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with login_name
    loginName String
    The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with group_name.
    permissionsId String
    The ID of this resource.
    projectKey String
    Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with template_id & template_name
    templateId String
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_name
    templateName String
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_id
    permissions string[]
    A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are: admin, codeviewer, issueadmin, securityhotspotadmin, scan, user.
    groupName string
    The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with login_name
    loginName string
    The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with group_name.
    permissionsId string
    The ID of this resource.
    projectKey string
    Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with template_id & template_name
    templateId string
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_name
    templateName string
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_id
    permissions Sequence[str]
    A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are: admin, codeviewer, issueadmin, securityhotspotadmin, scan, user.
    group_name str
    The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with login_name
    login_name str
    The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with group_name.
    permissions_id str
    The ID of this resource.
    project_key str
    Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with template_id & template_name
    template_id str
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_name
    template_name str
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_id
    permissions List<String>
    A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are: admin, codeviewer, issueadmin, securityhotspotadmin, scan, user.
    groupName String
    The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with login_name
    loginName String
    The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with group_name.
    permissionsId String
    The ID of this resource.
    projectKey String
    Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with template_id & template_name
    templateId String
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_name
    templateName String
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_id

    Outputs

    All input properties are implicitly available as output properties. Additionally, the Permissions resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing Permissions Resource

    Get an existing Permissions resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: PermissionsState, opts?: CustomResourceOptions): Permissions
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            group_name: Optional[str] = None,
            login_name: Optional[str] = None,
            permissions: Optional[Sequence[str]] = None,
            permissions_id: Optional[str] = None,
            project_key: Optional[str] = None,
            template_id: Optional[str] = None,
            template_name: Optional[str] = None) -> Permissions
    func GetPermissions(ctx *Context, name string, id IDInput, state *PermissionsState, opts ...ResourceOption) (*Permissions, error)
    public static Permissions Get(string name, Input<string> id, PermissionsState? state, CustomResourceOptions? opts = null)
    public static Permissions get(String name, Output<String> id, PermissionsState state, CustomResourceOptions options)
    resources:  _:    type: sonarqube:Permissions    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    GroupName string
    The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with login_name
    LoginName string
    The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with group_name.
    Permissions List<string>
    A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are: admin, codeviewer, issueadmin, securityhotspotadmin, scan, user.
    PermissionsId string
    The ID of this resource.
    ProjectKey string
    Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with template_id & template_name
    TemplateId string
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_name
    TemplateName string
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_id
    GroupName string
    The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with login_name
    LoginName string
    The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with group_name.
    Permissions []string
    A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are: admin, codeviewer, issueadmin, securityhotspotadmin, scan, user.
    PermissionsId string
    The ID of this resource.
    ProjectKey string
    Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with template_id & template_name
    TemplateId string
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_name
    TemplateName string
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_id
    groupName String
    The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with login_name
    loginName String
    The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with group_name.
    permissions List<String>
    A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are: admin, codeviewer, issueadmin, securityhotspotadmin, scan, user.
    permissionsId String
    The ID of this resource.
    projectKey String
    Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with template_id & template_name
    templateId String
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_name
    templateName String
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_id
    groupName string
    The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with login_name
    loginName string
    The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with group_name.
    permissions string[]
    A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are: admin, codeviewer, issueadmin, securityhotspotadmin, scan, user.
    permissionsId string
    The ID of this resource.
    projectKey string
    Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with template_id & template_name
    templateId string
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_name
    templateName string
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_id
    group_name str
    The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with login_name
    login_name str
    The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with group_name.
    permissions Sequence[str]
    A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are: admin, codeviewer, issueadmin, securityhotspotadmin, scan, user.
    permissions_id str
    The ID of this resource.
    project_key str
    Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with template_id & template_name
    template_id str
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_name
    template_name str
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_id
    groupName String
    The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with login_name
    loginName String
    The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with group_name.
    permissions List<String>
    A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are: admin, codeviewer, issueadmin, securityhotspotadmin, scan, user.
    permissionsId String
    The ID of this resource.
    projectKey String
    Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with template_id & template_name
    templateId String
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_name
    templateName String
    Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with project_key & template_id

    Package Details

    Repository
    sonarqube jdamata/terraform-provider-sonarqube
    License
    Notes
    This Pulumi package is based on the sonarqube Terraform Provider.
    sonarqube logo
    sonarqube 0.16.14 published on Monday, Apr 14, 2025 by jdamata