harness.UserGroupPermissions
Explore with Pulumi AI
Resource for adding permissions to an existing Harness user group.
Create UserGroupPermissions Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new UserGroupPermissions(name: string, args: UserGroupPermissionsArgs, opts?: CustomResourceOptions);
@overload
def UserGroupPermissions(resource_name: str,
args: UserGroupPermissionsInitArgs,
opts: Optional[ResourceOptions] = None)
@overload
def UserGroupPermissions(resource_name: str,
opts: Optional[ResourceOptions] = None,
user_group_id: Optional[str] = None,
account_permissions: Optional[Sequence[str]] = None,
app_permissions: Optional[UserGroupPermissionsAppPermissionsArgs] = None)
func NewUserGroupPermissions(ctx *Context, name string, args UserGroupPermissionsArgs, opts ...ResourceOption) (*UserGroupPermissions, error)
public UserGroupPermissions(string name, UserGroupPermissionsArgs args, CustomResourceOptions? opts = null)
public UserGroupPermissions(String name, UserGroupPermissionsArgs args)
public UserGroupPermissions(String name, UserGroupPermissionsArgs args, CustomResourceOptions options)
type: harness:UserGroupPermissions
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args UserGroupPermissionsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args UserGroupPermissionsInitArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args UserGroupPermissionsArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args UserGroupPermissionsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args UserGroupPermissionsArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var userGroupPermissionsResource = new Harness.UserGroupPermissions("userGroupPermissionsResource", new()
{
UserGroupId = "string",
AccountPermissions = new[]
{
"string",
},
AppPermissions = new Harness.Inputs.UserGroupPermissionsAppPermissionsArgs
{
Alls = new[]
{
new Harness.Inputs.UserGroupPermissionsAppPermissionsAllArgs
{
Actions = new[]
{
"string",
},
AppIds = new[]
{
"string",
},
},
},
Deployments = new[]
{
new Harness.Inputs.UserGroupPermissionsAppPermissionsDeploymentArgs
{
Actions = new[]
{
"string",
},
AppIds = new[]
{
"string",
},
EnvIds = new[]
{
"string",
},
Filters = new[]
{
"string",
},
},
},
Environments = new[]
{
new Harness.Inputs.UserGroupPermissionsAppPermissionsEnvironmentArgs
{
Actions = new[]
{
"string",
},
AppIds = new[]
{
"string",
},
EnvIds = new[]
{
"string",
},
Filters = new[]
{
"string",
},
},
},
Pipelines = new[]
{
new Harness.Inputs.UserGroupPermissionsAppPermissionsPipelineArgs
{
Actions = new[]
{
"string",
},
AppIds = new[]
{
"string",
},
EnvIds = new[]
{
"string",
},
Filters = new[]
{
"string",
},
},
},
Provisioners = new[]
{
new Harness.Inputs.UserGroupPermissionsAppPermissionsProvisionerArgs
{
Actions = new[]
{
"string",
},
AppIds = new[]
{
"string",
},
ProvisionerIds = new[]
{
"string",
},
},
},
Services = new[]
{
new Harness.Inputs.UserGroupPermissionsAppPermissionsServiceArgs
{
Actions = new[]
{
"string",
},
AppIds = new[]
{
"string",
},
ServiceIds = new[]
{
"string",
},
},
},
Templates = new[]
{
new Harness.Inputs.UserGroupPermissionsAppPermissionsTemplateArgs
{
Actions = new[]
{
"string",
},
AppIds = new[]
{
"string",
},
TemplateIds = new[]
{
"string",
},
},
},
Workflows = new[]
{
new Harness.Inputs.UserGroupPermissionsAppPermissionsWorkflowArgs
{
Actions = new[]
{
"string",
},
AppIds = new[]
{
"string",
},
Filters = new[]
{
"string",
},
},
},
},
});
example, err := harness.NewUserGroupPermissions(ctx, "userGroupPermissionsResource", &harness.UserGroupPermissionsArgs{
UserGroupId: pulumi.String("string"),
AccountPermissions: pulumi.StringArray{
pulumi.String("string"),
},
AppPermissions: &harness.UserGroupPermissionsAppPermissionsArgs{
Alls: harness.UserGroupPermissionsAppPermissionsAllArray{
&harness.UserGroupPermissionsAppPermissionsAllArgs{
Actions: pulumi.StringArray{
pulumi.String("string"),
},
AppIds: pulumi.StringArray{
pulumi.String("string"),
},
},
},
Deployments: harness.UserGroupPermissionsAppPermissionsDeploymentArray{
&harness.UserGroupPermissionsAppPermissionsDeploymentArgs{
Actions: pulumi.StringArray{
pulumi.String("string"),
},
AppIds: pulumi.StringArray{
pulumi.String("string"),
},
EnvIds: pulumi.StringArray{
pulumi.String("string"),
},
Filters: pulumi.StringArray{
pulumi.String("string"),
},
},
},
Environments: harness.UserGroupPermissionsAppPermissionsEnvironmentArray{
&harness.UserGroupPermissionsAppPermissionsEnvironmentArgs{
Actions: pulumi.StringArray{
pulumi.String("string"),
},
AppIds: pulumi.StringArray{
pulumi.String("string"),
},
EnvIds: pulumi.StringArray{
pulumi.String("string"),
},
Filters: pulumi.StringArray{
pulumi.String("string"),
},
},
},
Pipelines: harness.UserGroupPermissionsAppPermissionsPipelineArray{
&harness.UserGroupPermissionsAppPermissionsPipelineArgs{
Actions: pulumi.StringArray{
pulumi.String("string"),
},
AppIds: pulumi.StringArray{
pulumi.String("string"),
},
EnvIds: pulumi.StringArray{
pulumi.String("string"),
},
Filters: pulumi.StringArray{
pulumi.String("string"),
},
},
},
Provisioners: harness.UserGroupPermissionsAppPermissionsProvisionerArray{
&harness.UserGroupPermissionsAppPermissionsProvisionerArgs{
Actions: pulumi.StringArray{
pulumi.String("string"),
},
AppIds: pulumi.StringArray{
pulumi.String("string"),
},
ProvisionerIds: pulumi.StringArray{
pulumi.String("string"),
},
},
},
Services: harness.UserGroupPermissionsAppPermissionsServiceArray{
&harness.UserGroupPermissionsAppPermissionsServiceArgs{
Actions: pulumi.StringArray{
pulumi.String("string"),
},
AppIds: pulumi.StringArray{
pulumi.String("string"),
},
ServiceIds: pulumi.StringArray{
pulumi.String("string"),
},
},
},
Templates: harness.UserGroupPermissionsAppPermissionsTemplateArray{
&harness.UserGroupPermissionsAppPermissionsTemplateArgs{
Actions: pulumi.StringArray{
pulumi.String("string"),
},
AppIds: pulumi.StringArray{
pulumi.String("string"),
},
TemplateIds: pulumi.StringArray{
pulumi.String("string"),
},
},
},
Workflows: harness.UserGroupPermissionsAppPermissionsWorkflowArray{
&harness.UserGroupPermissionsAppPermissionsWorkflowArgs{
Actions: pulumi.StringArray{
pulumi.String("string"),
},
AppIds: pulumi.StringArray{
pulumi.String("string"),
},
Filters: pulumi.StringArray{
pulumi.String("string"),
},
},
},
},
})
var userGroupPermissionsResource = new UserGroupPermissions("userGroupPermissionsResource", UserGroupPermissionsArgs.builder()
.userGroupId("string")
.accountPermissions("string")
.appPermissions(UserGroupPermissionsAppPermissionsArgs.builder()
.alls(UserGroupPermissionsAppPermissionsAllArgs.builder()
.actions("string")
.appIds("string")
.build())
.deployments(UserGroupPermissionsAppPermissionsDeploymentArgs.builder()
.actions("string")
.appIds("string")
.envIds("string")
.filters("string")
.build())
.environments(UserGroupPermissionsAppPermissionsEnvironmentArgs.builder()
.actions("string")
.appIds("string")
.envIds("string")
.filters("string")
.build())
.pipelines(UserGroupPermissionsAppPermissionsPipelineArgs.builder()
.actions("string")
.appIds("string")
.envIds("string")
.filters("string")
.build())
.provisioners(UserGroupPermissionsAppPermissionsProvisionerArgs.builder()
.actions("string")
.appIds("string")
.provisionerIds("string")
.build())
.services(UserGroupPermissionsAppPermissionsServiceArgs.builder()
.actions("string")
.appIds("string")
.serviceIds("string")
.build())
.templates(UserGroupPermissionsAppPermissionsTemplateArgs.builder()
.actions("string")
.appIds("string")
.templateIds("string")
.build())
.workflows(UserGroupPermissionsAppPermissionsWorkflowArgs.builder()
.actions("string")
.appIds("string")
.filters("string")
.build())
.build())
.build());
user_group_permissions_resource = harness.UserGroupPermissions("userGroupPermissionsResource",
user_group_id="string",
account_permissions=["string"],
app_permissions=harness.UserGroupPermissionsAppPermissionsArgs(
alls=[harness.UserGroupPermissionsAppPermissionsAllArgs(
actions=["string"],
app_ids=["string"],
)],
deployments=[harness.UserGroupPermissionsAppPermissionsDeploymentArgs(
actions=["string"],
app_ids=["string"],
env_ids=["string"],
filters=["string"],
)],
environments=[harness.UserGroupPermissionsAppPermissionsEnvironmentArgs(
actions=["string"],
app_ids=["string"],
env_ids=["string"],
filters=["string"],
)],
pipelines=[harness.UserGroupPermissionsAppPermissionsPipelineArgs(
actions=["string"],
app_ids=["string"],
env_ids=["string"],
filters=["string"],
)],
provisioners=[harness.UserGroupPermissionsAppPermissionsProvisionerArgs(
actions=["string"],
app_ids=["string"],
provisioner_ids=["string"],
)],
services=[harness.UserGroupPermissionsAppPermissionsServiceArgs(
actions=["string"],
app_ids=["string"],
service_ids=["string"],
)],
templates=[harness.UserGroupPermissionsAppPermissionsTemplateArgs(
actions=["string"],
app_ids=["string"],
template_ids=["string"],
)],
workflows=[harness.UserGroupPermissionsAppPermissionsWorkflowArgs(
actions=["string"],
app_ids=["string"],
filters=["string"],
)],
))
const userGroupPermissionsResource = new harness.UserGroupPermissions("userGroupPermissionsResource", {
userGroupId: "string",
accountPermissions: ["string"],
appPermissions: {
alls: [{
actions: ["string"],
appIds: ["string"],
}],
deployments: [{
actions: ["string"],
appIds: ["string"],
envIds: ["string"],
filters: ["string"],
}],
environments: [{
actions: ["string"],
appIds: ["string"],
envIds: ["string"],
filters: ["string"],
}],
pipelines: [{
actions: ["string"],
appIds: ["string"],
envIds: ["string"],
filters: ["string"],
}],
provisioners: [{
actions: ["string"],
appIds: ["string"],
provisionerIds: ["string"],
}],
services: [{
actions: ["string"],
appIds: ["string"],
serviceIds: ["string"],
}],
templates: [{
actions: ["string"],
appIds: ["string"],
templateIds: ["string"],
}],
workflows: [{
actions: ["string"],
appIds: ["string"],
filters: ["string"],
}],
},
});
type: harness:UserGroupPermissions
properties:
accountPermissions:
- string
appPermissions:
alls:
- actions:
- string
appIds:
- string
deployments:
- actions:
- string
appIds:
- string
envIds:
- string
filters:
- string
environments:
- actions:
- string
appIds:
- string
envIds:
- string
filters:
- string
pipelines:
- actions:
- string
appIds:
- string
envIds:
- string
filters:
- string
provisioners:
- actions:
- string
appIds:
- string
provisionerIds:
- string
services:
- actions:
- string
appIds:
- string
serviceIds:
- string
templates:
- actions:
- string
appIds:
- string
templateIds:
- string
workflows:
- actions:
- string
appIds:
- string
filters:
- string
userGroupId: string
UserGroupPermissions Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The UserGroupPermissions resource accepts the following input properties:
- User
Group stringId - Unique identifier of the user group.
- Account
Permissions List<string> - The account permissions of the user group. Valid options are ADMINISTEROTHERACCOUNTFUNCTIONS, CREATEANDDELETEAPPLICATION, CREATECUSTOMDASHBOARDS, MANAGEALERTNOTIFICATIONRULES, MANAGEAPIKEYS, MANAGEAPPLICATIONSTACKS, MANAGEAUTHENTICATIONSETTINGS, MANAGECLOUDPROVIDERS, MANAGECONFIGASCODE, MANAGECONNECTORS, MANAGECUSTOMDASHBOARDS, MANAGEDELEGATEPROFILES, MANAGEDELEGATES, MANAGEDEPLOYMENTFREEZES, MANAGEIPWHITELIST, MANAGEPIPELINEGOVERNANCESTANDARDS, MANAGERESTRICTEDACCESS, MANAGESECRETMANAGERS, MANAGESECRETS, MANAGESSHANDWINRM, MANAGETAGS, MANAGETEMPLATELIBRARY, MANAGEUSERANDUSERGROUPSANDAPIKEYS, MANAGEUSERSANDGROUPS, READUSERSANDGROUPS, VIEWAUDITS, VIEWUSERANDUSERGROUPSANDAPI_KEYS
- App
Permissions Lbrlabs.Pulumi Package. Harness. Inputs. User Group Permissions App Permissions - Application specific permissions
- User
Group stringId - Unique identifier of the user group.
- Account
Permissions []string - The account permissions of the user group. Valid options are ADMINISTEROTHERACCOUNTFUNCTIONS, CREATEANDDELETEAPPLICATION, CREATECUSTOMDASHBOARDS, MANAGEALERTNOTIFICATIONRULES, MANAGEAPIKEYS, MANAGEAPPLICATIONSTACKS, MANAGEAUTHENTICATIONSETTINGS, MANAGECLOUDPROVIDERS, MANAGECONFIGASCODE, MANAGECONNECTORS, MANAGECUSTOMDASHBOARDS, MANAGEDELEGATEPROFILES, MANAGEDELEGATES, MANAGEDEPLOYMENTFREEZES, MANAGEIPWHITELIST, MANAGEPIPELINEGOVERNANCESTANDARDS, MANAGERESTRICTEDACCESS, MANAGESECRETMANAGERS, MANAGESECRETS, MANAGESSHANDWINRM, MANAGETAGS, MANAGETEMPLATELIBRARY, MANAGEUSERANDUSERGROUPSANDAPIKEYS, MANAGEUSERSANDGROUPS, READUSERSANDGROUPS, VIEWAUDITS, VIEWUSERANDUSERGROUPSANDAPI_KEYS
- App
Permissions UserGroup Permissions App Permissions Args - Application specific permissions
- user
Group StringId - Unique identifier of the user group.
- account
Permissions List<String> - The account permissions of the user group. Valid options are ADMINISTEROTHERACCOUNTFUNCTIONS, CREATEANDDELETEAPPLICATION, CREATECUSTOMDASHBOARDS, MANAGEALERTNOTIFICATIONRULES, MANAGEAPIKEYS, MANAGEAPPLICATIONSTACKS, MANAGEAUTHENTICATIONSETTINGS, MANAGECLOUDPROVIDERS, MANAGECONFIGASCODE, MANAGECONNECTORS, MANAGECUSTOMDASHBOARDS, MANAGEDELEGATEPROFILES, MANAGEDELEGATES, MANAGEDEPLOYMENTFREEZES, MANAGEIPWHITELIST, MANAGEPIPELINEGOVERNANCESTANDARDS, MANAGERESTRICTEDACCESS, MANAGESECRETMANAGERS, MANAGESECRETS, MANAGESSHANDWINRM, MANAGETAGS, MANAGETEMPLATELIBRARY, MANAGEUSERANDUSERGROUPSANDAPIKEYS, MANAGEUSERSANDGROUPS, READUSERSANDGROUPS, VIEWAUDITS, VIEWUSERANDUSERGROUPSANDAPI_KEYS
- app
Permissions UserGroup Permissions App Permissions - Application specific permissions
- user
Group stringId - Unique identifier of the user group.
- account
Permissions string[] - The account permissions of the user group. Valid options are ADMINISTEROTHERACCOUNTFUNCTIONS, CREATEANDDELETEAPPLICATION, CREATECUSTOMDASHBOARDS, MANAGEALERTNOTIFICATIONRULES, MANAGEAPIKEYS, MANAGEAPPLICATIONSTACKS, MANAGEAUTHENTICATIONSETTINGS, MANAGECLOUDPROVIDERS, MANAGECONFIGASCODE, MANAGECONNECTORS, MANAGECUSTOMDASHBOARDS, MANAGEDELEGATEPROFILES, MANAGEDELEGATES, MANAGEDEPLOYMENTFREEZES, MANAGEIPWHITELIST, MANAGEPIPELINEGOVERNANCESTANDARDS, MANAGERESTRICTEDACCESS, MANAGESECRETMANAGERS, MANAGESECRETS, MANAGESSHANDWINRM, MANAGETAGS, MANAGETEMPLATELIBRARY, MANAGEUSERANDUSERGROUPSANDAPIKEYS, MANAGEUSERSANDGROUPS, READUSERSANDGROUPS, VIEWAUDITS, VIEWUSERANDUSERGROUPSANDAPI_KEYS
- app
Permissions UserGroup Permissions App Permissions - Application specific permissions
- user_
group_ strid - Unique identifier of the user group.
- account_
permissions Sequence[str] - The account permissions of the user group. Valid options are ADMINISTEROTHERACCOUNTFUNCTIONS, CREATEANDDELETEAPPLICATION, CREATECUSTOMDASHBOARDS, MANAGEALERTNOTIFICATIONRULES, MANAGEAPIKEYS, MANAGEAPPLICATIONSTACKS, MANAGEAUTHENTICATIONSETTINGS, MANAGECLOUDPROVIDERS, MANAGECONFIGASCODE, MANAGECONNECTORS, MANAGECUSTOMDASHBOARDS, MANAGEDELEGATEPROFILES, MANAGEDELEGATES, MANAGEDEPLOYMENTFREEZES, MANAGEIPWHITELIST, MANAGEPIPELINEGOVERNANCESTANDARDS, MANAGERESTRICTEDACCESS, MANAGESECRETMANAGERS, MANAGESECRETS, MANAGESSHANDWINRM, MANAGETAGS, MANAGETEMPLATELIBRARY, MANAGEUSERANDUSERGROUPSANDAPIKEYS, MANAGEUSERSANDGROUPS, READUSERSANDGROUPS, VIEWAUDITS, VIEWUSERANDUSERGROUPSANDAPI_KEYS
- app_
permissions UserGroup Permissions App Permissions Args - Application specific permissions
- user
Group StringId - Unique identifier of the user group.
- account
Permissions List<String> - The account permissions of the user group. Valid options are ADMINISTEROTHERACCOUNTFUNCTIONS, CREATEANDDELETEAPPLICATION, CREATECUSTOMDASHBOARDS, MANAGEALERTNOTIFICATIONRULES, MANAGEAPIKEYS, MANAGEAPPLICATIONSTACKS, MANAGEAUTHENTICATIONSETTINGS, MANAGECLOUDPROVIDERS, MANAGECONFIGASCODE, MANAGECONNECTORS, MANAGECUSTOMDASHBOARDS, MANAGEDELEGATEPROFILES, MANAGEDELEGATES, MANAGEDEPLOYMENTFREEZES, MANAGEIPWHITELIST, MANAGEPIPELINEGOVERNANCESTANDARDS, MANAGERESTRICTEDACCESS, MANAGESECRETMANAGERS, MANAGESECRETS, MANAGESSHANDWINRM, MANAGETAGS, MANAGETEMPLATELIBRARY, MANAGEUSERANDUSERGROUPSANDAPIKEYS, MANAGEUSERSANDGROUPS, READUSERSANDGROUPS, VIEWAUDITS, VIEWUSERANDUSERGROUPSANDAPI_KEYS
- app
Permissions Property Map - Application specific permissions
Outputs
All input properties are implicitly available as output properties. Additionally, the UserGroupPermissions resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing UserGroupPermissions Resource
Get an existing UserGroupPermissions resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: UserGroupPermissionsState, opts?: CustomResourceOptions): UserGroupPermissions
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
account_permissions: Optional[Sequence[str]] = None,
app_permissions: Optional[UserGroupPermissionsAppPermissionsArgs] = None,
user_group_id: Optional[str] = None) -> UserGroupPermissions
func GetUserGroupPermissions(ctx *Context, name string, id IDInput, state *UserGroupPermissionsState, opts ...ResourceOption) (*UserGroupPermissions, error)
public static UserGroupPermissions Get(string name, Input<string> id, UserGroupPermissionsState? state, CustomResourceOptions? opts = null)
public static UserGroupPermissions get(String name, Output<String> id, UserGroupPermissionsState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Account
Permissions List<string> - The account permissions of the user group. Valid options are ADMINISTEROTHERACCOUNTFUNCTIONS, CREATEANDDELETEAPPLICATION, CREATECUSTOMDASHBOARDS, MANAGEALERTNOTIFICATIONRULES, MANAGEAPIKEYS, MANAGEAPPLICATIONSTACKS, MANAGEAUTHENTICATIONSETTINGS, MANAGECLOUDPROVIDERS, MANAGECONFIGASCODE, MANAGECONNECTORS, MANAGECUSTOMDASHBOARDS, MANAGEDELEGATEPROFILES, MANAGEDELEGATES, MANAGEDEPLOYMENTFREEZES, MANAGEIPWHITELIST, MANAGEPIPELINEGOVERNANCESTANDARDS, MANAGERESTRICTEDACCESS, MANAGESECRETMANAGERS, MANAGESECRETS, MANAGESSHANDWINRM, MANAGETAGS, MANAGETEMPLATELIBRARY, MANAGEUSERANDUSERGROUPSANDAPIKEYS, MANAGEUSERSANDGROUPS, READUSERSANDGROUPS, VIEWAUDITS, VIEWUSERANDUSERGROUPSANDAPI_KEYS
- App
Permissions Lbrlabs.Pulumi Package. Harness. Inputs. User Group Permissions App Permissions - Application specific permissions
- User
Group stringId - Unique identifier of the user group.
- Account
Permissions []string - The account permissions of the user group. Valid options are ADMINISTEROTHERACCOUNTFUNCTIONS, CREATEANDDELETEAPPLICATION, CREATECUSTOMDASHBOARDS, MANAGEALERTNOTIFICATIONRULES, MANAGEAPIKEYS, MANAGEAPPLICATIONSTACKS, MANAGEAUTHENTICATIONSETTINGS, MANAGECLOUDPROVIDERS, MANAGECONFIGASCODE, MANAGECONNECTORS, MANAGECUSTOMDASHBOARDS, MANAGEDELEGATEPROFILES, MANAGEDELEGATES, MANAGEDEPLOYMENTFREEZES, MANAGEIPWHITELIST, MANAGEPIPELINEGOVERNANCESTANDARDS, MANAGERESTRICTEDACCESS, MANAGESECRETMANAGERS, MANAGESECRETS, MANAGESSHANDWINRM, MANAGETAGS, MANAGETEMPLATELIBRARY, MANAGEUSERANDUSERGROUPSANDAPIKEYS, MANAGEUSERSANDGROUPS, READUSERSANDGROUPS, VIEWAUDITS, VIEWUSERANDUSERGROUPSANDAPI_KEYS
- App
Permissions UserGroup Permissions App Permissions Args - Application specific permissions
- User
Group stringId - Unique identifier of the user group.
- account
Permissions List<String> - The account permissions of the user group. Valid options are ADMINISTEROTHERACCOUNTFUNCTIONS, CREATEANDDELETEAPPLICATION, CREATECUSTOMDASHBOARDS, MANAGEALERTNOTIFICATIONRULES, MANAGEAPIKEYS, MANAGEAPPLICATIONSTACKS, MANAGEAUTHENTICATIONSETTINGS, MANAGECLOUDPROVIDERS, MANAGECONFIGASCODE, MANAGECONNECTORS, MANAGECUSTOMDASHBOARDS, MANAGEDELEGATEPROFILES, MANAGEDELEGATES, MANAGEDEPLOYMENTFREEZES, MANAGEIPWHITELIST, MANAGEPIPELINEGOVERNANCESTANDARDS, MANAGERESTRICTEDACCESS, MANAGESECRETMANAGERS, MANAGESECRETS, MANAGESSHANDWINRM, MANAGETAGS, MANAGETEMPLATELIBRARY, MANAGEUSERANDUSERGROUPSANDAPIKEYS, MANAGEUSERSANDGROUPS, READUSERSANDGROUPS, VIEWAUDITS, VIEWUSERANDUSERGROUPSANDAPI_KEYS
- app
Permissions UserGroup Permissions App Permissions - Application specific permissions
- user
Group StringId - Unique identifier of the user group.
- account
Permissions string[] - The account permissions of the user group. Valid options are ADMINISTEROTHERACCOUNTFUNCTIONS, CREATEANDDELETEAPPLICATION, CREATECUSTOMDASHBOARDS, MANAGEALERTNOTIFICATIONRULES, MANAGEAPIKEYS, MANAGEAPPLICATIONSTACKS, MANAGEAUTHENTICATIONSETTINGS, MANAGECLOUDPROVIDERS, MANAGECONFIGASCODE, MANAGECONNECTORS, MANAGECUSTOMDASHBOARDS, MANAGEDELEGATEPROFILES, MANAGEDELEGATES, MANAGEDEPLOYMENTFREEZES, MANAGEIPWHITELIST, MANAGEPIPELINEGOVERNANCESTANDARDS, MANAGERESTRICTEDACCESS, MANAGESECRETMANAGERS, MANAGESECRETS, MANAGESSHANDWINRM, MANAGETAGS, MANAGETEMPLATELIBRARY, MANAGEUSERANDUSERGROUPSANDAPIKEYS, MANAGEUSERSANDGROUPS, READUSERSANDGROUPS, VIEWAUDITS, VIEWUSERANDUSERGROUPSANDAPI_KEYS
- app
Permissions UserGroup Permissions App Permissions - Application specific permissions
- user
Group stringId - Unique identifier of the user group.
- account_
permissions Sequence[str] - The account permissions of the user group. Valid options are ADMINISTEROTHERACCOUNTFUNCTIONS, CREATEANDDELETEAPPLICATION, CREATECUSTOMDASHBOARDS, MANAGEALERTNOTIFICATIONRULES, MANAGEAPIKEYS, MANAGEAPPLICATIONSTACKS, MANAGEAUTHENTICATIONSETTINGS, MANAGECLOUDPROVIDERS, MANAGECONFIGASCODE, MANAGECONNECTORS, MANAGECUSTOMDASHBOARDS, MANAGEDELEGATEPROFILES, MANAGEDELEGATES, MANAGEDEPLOYMENTFREEZES, MANAGEIPWHITELIST, MANAGEPIPELINEGOVERNANCESTANDARDS, MANAGERESTRICTEDACCESS, MANAGESECRETMANAGERS, MANAGESECRETS, MANAGESSHANDWINRM, MANAGETAGS, MANAGETEMPLATELIBRARY, MANAGEUSERANDUSERGROUPSANDAPIKEYS, MANAGEUSERSANDGROUPS, READUSERSANDGROUPS, VIEWAUDITS, VIEWUSERANDUSERGROUPSANDAPI_KEYS
- app_
permissions UserGroup Permissions App Permissions Args - Application specific permissions
- user_
group_ strid - Unique identifier of the user group.
- account
Permissions List<String> - The account permissions of the user group. Valid options are ADMINISTEROTHERACCOUNTFUNCTIONS, CREATEANDDELETEAPPLICATION, CREATECUSTOMDASHBOARDS, MANAGEALERTNOTIFICATIONRULES, MANAGEAPIKEYS, MANAGEAPPLICATIONSTACKS, MANAGEAUTHENTICATIONSETTINGS, MANAGECLOUDPROVIDERS, MANAGECONFIGASCODE, MANAGECONNECTORS, MANAGECUSTOMDASHBOARDS, MANAGEDELEGATEPROFILES, MANAGEDELEGATES, MANAGEDEPLOYMENTFREEZES, MANAGEIPWHITELIST, MANAGEPIPELINEGOVERNANCESTANDARDS, MANAGERESTRICTEDACCESS, MANAGESECRETMANAGERS, MANAGESECRETS, MANAGESSHANDWINRM, MANAGETAGS, MANAGETEMPLATELIBRARY, MANAGEUSERANDUSERGROUPSANDAPIKEYS, MANAGEUSERSANDGROUPS, READUSERSANDGROUPS, VIEWAUDITS, VIEWUSERANDUSERGROUPSANDAPI_KEYS
- app
Permissions Property Map - Application specific permissions
- user
Group StringId - Unique identifier of the user group.
Supporting Types
UserGroupPermissionsAppPermissions, UserGroupPermissionsAppPermissionsArgs
- Alls
List<Lbrlabs.
Pulumi Package. Harness. Inputs. User Group Permissions App Permissions All> - The permission to perform actions against all resources.
- Deployments
List<Lbrlabs.
Pulumi Package. Harness. Inputs. User Group Permissions App Permissions Deployment> - Permission configuration to perform actions against deployments.
- Environments
List<Lbrlabs.
Pulumi Package. Harness. Inputs. User Group Permissions App Permissions Environment> - Permission configuration to perform actions against workflows.
- Pipelines
List<Lbrlabs.
Pulumi Package. Harness. Inputs. User Group Permissions App Permissions Pipeline> - Permission configuration to perform actions against pipelines.
- Provisioners
List<Lbrlabs.
Pulumi Package. Harness. Inputs. User Group Permissions App Permissions Provisioner> - Permission configuration to perform actions against provisioners.
- Services
List<Lbrlabs.
Pulumi Package. Harness. Inputs. User Group Permissions App Permissions Service> - Permission configuration to perform actions against services.
- Templates
List<Lbrlabs.
Pulumi Package. Harness. Inputs. User Group Permissions App Permissions Template> - Permission configuration to perform actions against templates.
- Workflows
List<Lbrlabs.
Pulumi Package. Harness. Inputs. User Group Permissions App Permissions Workflow> - Permission configuration to perform actions against workflows.
- Alls
[]User
Group Permissions App Permissions All - The permission to perform actions against all resources.
- Deployments
[]User
Group Permissions App Permissions Deployment - Permission configuration to perform actions against deployments.
- Environments
[]User
Group Permissions App Permissions Environment - Permission configuration to perform actions against workflows.
- Pipelines
[]User
Group Permissions App Permissions Pipeline - Permission configuration to perform actions against pipelines.
- Provisioners
[]User
Group Permissions App Permissions Provisioner - Permission configuration to perform actions against provisioners.
- Services
[]User
Group Permissions App Permissions Service - Permission configuration to perform actions against services.
- Templates
[]User
Group Permissions App Permissions Template - Permission configuration to perform actions against templates.
- Workflows
[]User
Group Permissions App Permissions Workflow - Permission configuration to perform actions against workflows.
- alls
List<User
Group Permissions App Permissions All> - The permission to perform actions against all resources.
- deployments
List<User
Group Permissions App Permissions Deployment> - Permission configuration to perform actions against deployments.
- environments
List<User
Group Permissions App Permissions Environment> - Permission configuration to perform actions against workflows.
- pipelines
List<User
Group Permissions App Permissions Pipeline> - Permission configuration to perform actions against pipelines.
- provisioners
List<User
Group Permissions App Permissions Provisioner> - Permission configuration to perform actions against provisioners.
- services
List<User
Group Permissions App Permissions Service> - Permission configuration to perform actions against services.
- templates
List<User
Group Permissions App Permissions Template> - Permission configuration to perform actions against templates.
- workflows
List<User
Group Permissions App Permissions Workflow> - Permission configuration to perform actions against workflows.
- alls
User
Group Permissions App Permissions All[] - The permission to perform actions against all resources.
- deployments
User
Group Permissions App Permissions Deployment[] - Permission configuration to perform actions against deployments.
- environments
User
Group Permissions App Permissions Environment[] - Permission configuration to perform actions against workflows.
- pipelines
User
Group Permissions App Permissions Pipeline[] - Permission configuration to perform actions against pipelines.
- provisioners
User
Group Permissions App Permissions Provisioner[] - Permission configuration to perform actions against provisioners.
- services
User
Group Permissions App Permissions Service[] - Permission configuration to perform actions against services.
- templates
User
Group Permissions App Permissions Template[] - Permission configuration to perform actions against templates.
- workflows
User
Group Permissions App Permissions Workflow[] - Permission configuration to perform actions against workflows.
- alls
Sequence[User
Group Permissions App Permissions All] - The permission to perform actions against all resources.
- deployments
Sequence[User
Group Permissions App Permissions Deployment] - Permission configuration to perform actions against deployments.
- environments
Sequence[User
Group Permissions App Permissions Environment] - Permission configuration to perform actions against workflows.
- pipelines
Sequence[User
Group Permissions App Permissions Pipeline] - Permission configuration to perform actions against pipelines.
- provisioners
Sequence[User
Group Permissions App Permissions Provisioner] - Permission configuration to perform actions against provisioners.
- services
Sequence[User
Group Permissions App Permissions Service] - Permission configuration to perform actions against services.
- templates
Sequence[User
Group Permissions App Permissions Template] - Permission configuration to perform actions against templates.
- workflows
Sequence[User
Group Permissions App Permissions Workflow] - Permission configuration to perform actions against workflows.
- alls List<Property Map>
- The permission to perform actions against all resources.
- deployments List<Property Map>
- Permission configuration to perform actions against deployments.
- environments List<Property Map>
- Permission configuration to perform actions against workflows.
- pipelines List<Property Map>
- Permission configuration to perform actions against pipelines.
- provisioners List<Property Map>
- Permission configuration to perform actions against provisioners.
- services List<Property Map>
- Permission configuration to perform actions against services.
- templates List<Property Map>
- Permission configuration to perform actions against templates.
- workflows List<Property Map>
- Permission configuration to perform actions against workflows.
UserGroupPermissionsAppPermissionsAll, UserGroupPermissionsAppPermissionsAllArgs
UserGroupPermissionsAppPermissionsDeployment, UserGroupPermissionsAppPermissionsDeploymentArgs
UserGroupPermissionsAppPermissionsEnvironment, UserGroupPermissionsAppPermissionsEnvironmentArgs
UserGroupPermissionsAppPermissionsPipeline, UserGroupPermissionsAppPermissionsPipelineArgs
UserGroupPermissionsAppPermissionsProvisioner, UserGroupPermissionsAppPermissionsProvisionerArgs
- Actions List<string>
- App
Ids List<string> - Provisioner
Ids List<string>
- Actions []string
- App
Ids []string - Provisioner
Ids []string
- actions List<String>
- app
Ids List<String> - provisioner
Ids List<String>
- actions string[]
- app
Ids string[] - provisioner
Ids string[]
- actions Sequence[str]
- app_
ids Sequence[str] - provisioner_
ids Sequence[str]
- actions List<String>
- app
Ids List<String> - provisioner
Ids List<String>
UserGroupPermissionsAppPermissionsService, UserGroupPermissionsAppPermissionsServiceArgs
- Actions List<string>
- App
Ids List<string> - Service
Ids List<string>
- Actions []string
- App
Ids []string - Service
Ids []string
- actions List<String>
- app
Ids List<String> - service
Ids List<String>
- actions string[]
- app
Ids string[] - service
Ids string[]
- actions Sequence[str]
- app_
ids Sequence[str] - service_
ids Sequence[str]
- actions List<String>
- app
Ids List<String> - service
Ids List<String>
UserGroupPermissionsAppPermissionsTemplate, UserGroupPermissionsAppPermissionsTemplateArgs
- Actions List<string>
- App
Ids List<string> - Template
Ids List<string>
- Actions []string
- App
Ids []string - Template
Ids []string
- actions List<String>
- app
Ids List<String> - template
Ids List<String>
- actions string[]
- app
Ids string[] - template
Ids string[]
- actions Sequence[str]
- app_
ids Sequence[str] - template_
ids Sequence[str]
- actions List<String>
- app
Ids List<String> - template
Ids List<String>
UserGroupPermissionsAppPermissionsWorkflow, UserGroupPermissionsAppPermissionsWorkflowArgs
Package Details
- Repository
- harness lbrlabs/pulumi-harness
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
harness
Terraform Provider.