sonarqube.Permissions
Explore with Pulumi AI
Provides a Sonarqube Permissions resource. This can be used to manage global and project permissions.
Example Usage
Example: Set global admin permissions for a group called “my-admins”
import * as pulumi from "@pulumi/pulumi";
import * as sonarqube from "@pulumi/sonarqube";
const myGlobalAdmins = new sonarqube.Permissions("myGlobalAdmins", {
groupName: "my-admins",
permissions: ["admin"],
});
import pulumi
import pulumi_sonarqube as sonarqube
my_global_admins = sonarqube.Permissions("myGlobalAdmins",
group_name="my-admins",
permissions=["admin"])
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/sonarqube/sonarqube"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := sonarqube.NewPermissions(ctx, "myGlobalAdmins", &sonarqube.PermissionsArgs{
GroupName: pulumi.String("my-admins"),
Permissions: pulumi.StringArray{
pulumi.String("admin"),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Sonarqube = Pulumi.Sonarqube;
return await Deployment.RunAsync(() =>
{
var myGlobalAdmins = new Sonarqube.Permissions("myGlobalAdmins", new()
{
GroupName = "my-admins",
Permissions = new[]
{
"admin",
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.sonarqube.Permissions;
import com.pulumi.sonarqube.PermissionsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var myGlobalAdmins = new Permissions("myGlobalAdmins", PermissionsArgs.builder()
.groupName("my-admins")
.permissions("admin")
.build());
}
}
resources:
myGlobalAdmins:
type: sonarqube:Permissions
properties:
groupName: my-admins
permissions:
- admin
Example: Set project admin permissions for a group called “my-project-admins”
import * as pulumi from "@pulumi/pulumi";
import * as sonarqube from "@pulumi/sonarqube";
const myProjectAdmins = new sonarqube.Permissions("myProjectAdmins", {
groupName: "my-project-admins",
permissions: ["admin"],
projectKey: "my-project",
});
import pulumi
import pulumi_sonarqube as sonarqube
my_project_admins = sonarqube.Permissions("myProjectAdmins",
group_name="my-project-admins",
permissions=["admin"],
project_key="my-project")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/sonarqube/sonarqube"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := sonarqube.NewPermissions(ctx, "myProjectAdmins", &sonarqube.PermissionsArgs{
GroupName: pulumi.String("my-project-admins"),
Permissions: pulumi.StringArray{
pulumi.String("admin"),
},
ProjectKey: pulumi.String("my-project"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Sonarqube = Pulumi.Sonarqube;
return await Deployment.RunAsync(() =>
{
var myProjectAdmins = new Sonarqube.Permissions("myProjectAdmins", new()
{
GroupName = "my-project-admins",
Permissions = new[]
{
"admin",
},
ProjectKey = "my-project",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.sonarqube.Permissions;
import com.pulumi.sonarqube.PermissionsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var myProjectAdmins = new Permissions("myProjectAdmins", PermissionsArgs.builder()
.groupName("my-project-admins")
.permissions("admin")
.projectKey("my-project")
.build());
}
}
resources:
myProjectAdmins:
type: sonarqube:Permissions
properties:
groupName: my-project-admins
permissions:
- admin
projectKey: my-project
Example: Set project admin permissions for a group called “my-project-admins on a permission template”
import * as pulumi from "@pulumi/pulumi";
import * as sonarqube from "@pulumi/sonarqube";
const internalAdmins = new sonarqube.Permissions("internalAdmins", {
groupName: "my-internal-admins",
templateId: sonarqube_permission_template.template.id,
permissions: ["admin"],
});
import pulumi
import pulumi_sonarqube as sonarqube
internal_admins = sonarqube.Permissions("internalAdmins",
group_name="my-internal-admins",
template_id=sonarqube_permission_template["template"]["id"],
permissions=["admin"])
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/sonarqube/sonarqube"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := sonarqube.NewPermissions(ctx, "internalAdmins", &sonarqube.PermissionsArgs{
GroupName: pulumi.String("my-internal-admins"),
TemplateId: pulumi.Any(sonarqube_permission_template.Template.Id),
Permissions: pulumi.StringArray{
pulumi.String("admin"),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Sonarqube = Pulumi.Sonarqube;
return await Deployment.RunAsync(() =>
{
var internalAdmins = new Sonarqube.Permissions("internalAdmins", new()
{
GroupName = "my-internal-admins",
TemplateId = sonarqube_permission_template.Template.Id,
Permissions = new[]
{
"admin",
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.sonarqube.Permissions;
import com.pulumi.sonarqube.PermissionsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var internalAdmins = new Permissions("internalAdmins", PermissionsArgs.builder()
.groupName("my-internal-admins")
.templateId(sonarqube_permission_template.template().id())
.permissions("admin")
.build());
}
}
resources:
internalAdmins:
type: sonarqube:Permissions
properties:
groupName: my-internal-admins
templateId: ${sonarqube_permission_template.template.id}
permissions:
- admin
Example: Set codeviewer & user permissions on project level for a user called “johndoe”
import * as pulumi from "@pulumi/pulumi";
import * as sonarqube from "@pulumi/sonarqube";
const johnProjectRead = new sonarqube.Permissions("johnProjectRead", {
loginName: "johndoe",
permissions: [
"codeviewer",
"user",
],
projectKey: "my-project",
});
import pulumi
import pulumi_sonarqube as sonarqube
john_project_read = sonarqube.Permissions("johnProjectRead",
login_name="johndoe",
permissions=[
"codeviewer",
"user",
],
project_key="my-project")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/sonarqube/sonarqube"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := sonarqube.NewPermissions(ctx, "johnProjectRead", &sonarqube.PermissionsArgs{
LoginName: pulumi.String("johndoe"),
Permissions: pulumi.StringArray{
pulumi.String("codeviewer"),
pulumi.String("user"),
},
ProjectKey: pulumi.String("my-project"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Sonarqube = Pulumi.Sonarqube;
return await Deployment.RunAsync(() =>
{
var johnProjectRead = new Sonarqube.Permissions("johnProjectRead", new()
{
LoginName = "johndoe",
Permissions = new[]
{
"codeviewer",
"user",
},
ProjectKey = "my-project",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.sonarqube.Permissions;
import com.pulumi.sonarqube.PermissionsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var johnProjectRead = new Permissions("johnProjectRead", PermissionsArgs.builder()
.loginName("johndoe")
.permissions(
"codeviewer",
"user")
.projectKey("my-project")
.build());
}
}
resources:
johnProjectRead:
type: sonarqube:Permissions
properties:
loginName: johndoe
permissions:
- codeviewer
- user
projectKey: my-project
Create Permissions Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Permissions(name: string, args: PermissionsArgs, opts?: CustomResourceOptions);
@overload
def Permissions(resource_name: str,
args: PermissionsArgs,
opts: Optional[ResourceOptions] = None)
@overload
def Permissions(resource_name: str,
opts: Optional[ResourceOptions] = None,
permissions: Optional[Sequence[str]] = None,
group_name: Optional[str] = None,
login_name: Optional[str] = None,
permissions_id: Optional[str] = None,
project_key: Optional[str] = None,
template_id: Optional[str] = None,
template_name: Optional[str] = None)
func NewPermissions(ctx *Context, name string, args PermissionsArgs, opts ...ResourceOption) (*Permissions, error)
public Permissions(string name, PermissionsArgs args, CustomResourceOptions? opts = null)
public Permissions(String name, PermissionsArgs args)
public Permissions(String name, PermissionsArgs args, CustomResourceOptions options)
type: sonarqube:Permissions
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args PermissionsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args PermissionsArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args PermissionsArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args PermissionsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args PermissionsArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var permissionsResource = new Sonarqube.Permissions("permissionsResource", new()
{
Permissions = new[]
{
"string",
},
GroupName = "string",
LoginName = "string",
PermissionsId = "string",
ProjectKey = "string",
TemplateId = "string",
TemplateName = "string",
});
example, err := sonarqube.NewPermissions(ctx, "permissionsResource", &sonarqube.PermissionsArgs{
Permissions: pulumi.StringArray{
pulumi.String("string"),
},
GroupName: pulumi.String("string"),
LoginName: pulumi.String("string"),
PermissionsId: pulumi.String("string"),
ProjectKey: pulumi.String("string"),
TemplateId: pulumi.String("string"),
TemplateName: pulumi.String("string"),
})
var permissionsResource = new Permissions("permissionsResource", PermissionsArgs.builder()
.permissions("string")
.groupName("string")
.loginName("string")
.permissionsId("string")
.projectKey("string")
.templateId("string")
.templateName("string")
.build());
permissions_resource = sonarqube.Permissions("permissionsResource",
permissions=["string"],
group_name="string",
login_name="string",
permissions_id="string",
project_key="string",
template_id="string",
template_name="string")
const permissionsResource = new sonarqube.Permissions("permissionsResource", {
permissions: ["string"],
groupName: "string",
loginName: "string",
permissionsId: "string",
projectKey: "string",
templateId: "string",
templateName: "string",
});
type: sonarqube:Permissions
properties:
groupName: string
loginName: string
permissions:
- string
permissionsId: string
projectKey: string
templateId: string
templateName: string
Permissions Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Permissions resource accepts the following input properties:
- Permissions List<string>
- A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are:
admin
,codeviewer
,issueadmin
,securityhotspotadmin
,scan
,user
. - Group
Name string - The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
login_name
- Login
Name string - The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
group_name
. - Permissions
Id string - The ID of this resource.
- Project
Key string - Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with
template_id & template_name
- Template
Id string - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_name
- Template
Name string - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_id
- Permissions []string
- A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are:
admin
,codeviewer
,issueadmin
,securityhotspotadmin
,scan
,user
. - Group
Name string - The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
login_name
- Login
Name string - The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
group_name
. - Permissions
Id string - The ID of this resource.
- Project
Key string - Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with
template_id & template_name
- Template
Id string - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_name
- Template
Name string - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_id
- permissions List<String>
- A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are:
admin
,codeviewer
,issueadmin
,securityhotspotadmin
,scan
,user
. - group
Name String - The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
login_name
- login
Name String - The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
group_name
. - permissions
Id String - The ID of this resource.
- project
Key String - Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with
template_id & template_name
- template
Id String - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_name
- template
Name String - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_id
- permissions string[]
- A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are:
admin
,codeviewer
,issueadmin
,securityhotspotadmin
,scan
,user
. - group
Name string - The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
login_name
- login
Name string - The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
group_name
. - permissions
Id string - The ID of this resource.
- project
Key string - Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with
template_id & template_name
- template
Id string - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_name
- template
Name string - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_id
- permissions Sequence[str]
- A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are:
admin
,codeviewer
,issueadmin
,securityhotspotadmin
,scan
,user
. - group_
name str - The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
login_name
- login_
name str - The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
group_name
. - permissions_
id str - The ID of this resource.
- project_
key str - Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with
template_id & template_name
- template_
id str - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_name
- template_
name str - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_id
- permissions List<String>
- A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are:
admin
,codeviewer
,issueadmin
,securityhotspotadmin
,scan
,user
. - group
Name String - The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
login_name
- login
Name String - The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
group_name
. - permissions
Id String - The ID of this resource.
- project
Key String - Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with
template_id & template_name
- template
Id String - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_name
- template
Name String - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_id
Outputs
All input properties are implicitly available as output properties. Additionally, the Permissions resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing Permissions Resource
Get an existing Permissions resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: PermissionsState, opts?: CustomResourceOptions): Permissions
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
group_name: Optional[str] = None,
login_name: Optional[str] = None,
permissions: Optional[Sequence[str]] = None,
permissions_id: Optional[str] = None,
project_key: Optional[str] = None,
template_id: Optional[str] = None,
template_name: Optional[str] = None) -> Permissions
func GetPermissions(ctx *Context, name string, id IDInput, state *PermissionsState, opts ...ResourceOption) (*Permissions, error)
public static Permissions Get(string name, Input<string> id, PermissionsState? state, CustomResourceOptions? opts = null)
public static Permissions get(String name, Output<String> id, PermissionsState state, CustomResourceOptions options)
resources: _: type: sonarqube:Permissions get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Group
Name string - The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
login_name
- Login
Name string - The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
group_name
. - Permissions List<string>
- A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are:
admin
,codeviewer
,issueadmin
,securityhotspotadmin
,scan
,user
. - Permissions
Id string - The ID of this resource.
- Project
Key string - Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with
template_id & template_name
- Template
Id string - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_name
- Template
Name string - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_id
- Group
Name string - The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
login_name
- Login
Name string - The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
group_name
. - Permissions []string
- A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are:
admin
,codeviewer
,issueadmin
,securityhotspotadmin
,scan
,user
. - Permissions
Id string - The ID of this resource.
- Project
Key string - Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with
template_id & template_name
- Template
Id string - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_name
- Template
Name string - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_id
- group
Name String - The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
login_name
- login
Name String - The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
group_name
. - permissions List<String>
- A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are:
admin
,codeviewer
,issueadmin
,securityhotspotadmin
,scan
,user
. - permissions
Id String - The ID of this resource.
- project
Key String - Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with
template_id & template_name
- template
Id String - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_name
- template
Name String - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_id
- group
Name string - The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
login_name
- login
Name string - The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
group_name
. - permissions string[]
- A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are:
admin
,codeviewer
,issueadmin
,securityhotspotadmin
,scan
,user
. - permissions
Id string - The ID of this resource.
- project
Key string - Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with
template_id & template_name
- template
Id string - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_name
- template
Name string - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_id
- group_
name str - The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
login_name
- login_
name str - The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
group_name
. - permissions Sequence[str]
- A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are:
admin
,codeviewer
,issueadmin
,securityhotspotadmin
,scan
,user
. - permissions_
id str - The ID of this resource.
- project_
key str - Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with
template_id & template_name
- template_
id str - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_name
- template_
name str - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_id
- group
Name String - The name of the Group that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
login_name
- login
Name String - The name of the user that should get the specified permissions. Changing this forces a new resource to be created. Cannot be used with
group_name
. - permissions List<String>
- A list of permissions that should be applied. Changing this forces a new resource to be created. Possible values are:
admin
,codeviewer
,issueadmin
,securityhotspotadmin
,scan
,user
. - permissions
Id String - The ID of this resource.
- project
Key String - Specify if you want to apply project level permissions. Changing this forces a new resource to be created. Cannot be used with
template_id & template_name
- template
Id String - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_name
- template
Name String - Specify if you want to apply the permissions to a permission template. Changing this forces a new resource to be created. Cannot be used with
project_key & template_id
Package Details
- Repository
- sonarqube jdamata/terraform-provider-sonarqube
- License
- Notes
- This Pulumi package is based on the
sonarqube
Terraform Provider.