All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.gcp.container.kotlin.inputs.AttachedClusterAuthorizationArgs.kt Maven / Gradle / Ivy

Go to download

Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.

There is a newer version: 8.12.0.0
Show newest version
@file:Suppress("NAME_SHADOWING", "DEPRECATION")

package com.pulumi.gcp.container.kotlin.inputs

import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.gcp.container.inputs.AttachedClusterAuthorizationArgs.builder
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import kotlin.String
import kotlin.Suppress
import kotlin.collections.List
import kotlin.jvm.JvmName

/**
 *
 * @property adminGroups Groups that can perform operations as a cluster admin. A managed
 * ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole
 * to the groups. Up to ten admin groups can be provided.
 * For more info on RBAC, see
 * https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
 * @property adminUsers Users that can perform operations as a cluster admin. A managed
 * ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole
 * to the users. Up to ten admin users can be provided.
 * For more info on RBAC, see
 * https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
 */
public data class AttachedClusterAuthorizationArgs(
    public val adminGroups: Output>? = null,
    public val adminUsers: Output>? = null,
) : ConvertibleToJava {
    override fun toJava(): com.pulumi.gcp.container.inputs.AttachedClusterAuthorizationArgs =
        com.pulumi.gcp.container.inputs.AttachedClusterAuthorizationArgs.builder()
            .adminGroups(adminGroups?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
            .adminUsers(adminUsers?.applyValue({ args0 -> args0.map({ args0 -> args0 }) })).build()
}

/**
 * Builder for [AttachedClusterAuthorizationArgs].
 */
@PulumiTagMarker
public class AttachedClusterAuthorizationArgsBuilder internal constructor() {
    private var adminGroups: Output>? = null

    private var adminUsers: Output>? = null

    /**
     * @param value Groups that can perform operations as a cluster admin. A managed
     * ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole
     * to the groups. Up to ten admin groups can be provided.
     * For more info on RBAC, see
     * https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
     */
    @JvmName("csygqaswdekcoqyl")
    public suspend fun adminGroups(`value`: Output>) {
        this.adminGroups = value
    }

    @JvmName("alaiewljhehyrxyi")
    public suspend fun adminGroups(vararg values: Output) {
        this.adminGroups = Output.all(values.asList())
    }

    /**
     * @param values Groups that can perform operations as a cluster admin. A managed
     * ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole
     * to the groups. Up to ten admin groups can be provided.
     * For more info on RBAC, see
     * https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
     */
    @JvmName("qafdeibjxsgfubys")
    public suspend fun adminGroups(values: List>) {
        this.adminGroups = Output.all(values)
    }

    /**
     * @param value Users that can perform operations as a cluster admin. A managed
     * ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole
     * to the users. Up to ten admin users can be provided.
     * For more info on RBAC, see
     * https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
     */
    @JvmName("umydvgalpnpbyytg")
    public suspend fun adminUsers(`value`: Output>) {
        this.adminUsers = value
    }

    @JvmName("ncggljsrxtqycqvk")
    public suspend fun adminUsers(vararg values: Output) {
        this.adminUsers = Output.all(values.asList())
    }

    /**
     * @param values Users that can perform operations as a cluster admin. A managed
     * ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole
     * to the users. Up to ten admin users can be provided.
     * For more info on RBAC, see
     * https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
     */
    @JvmName("lvwovbguumkfunag")
    public suspend fun adminUsers(values: List>) {
        this.adminUsers = Output.all(values)
    }

    /**
     * @param value Groups that can perform operations as a cluster admin. A managed
     * ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole
     * to the groups. Up to ten admin groups can be provided.
     * For more info on RBAC, see
     * https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
     */
    @JvmName("siuevdpymynyebtu")
    public suspend fun adminGroups(`value`: List?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.adminGroups = mapped
    }

    /**
     * @param values Groups that can perform operations as a cluster admin. A managed
     * ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole
     * to the groups. Up to ten admin groups can be provided.
     * For more info on RBAC, see
     * https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
     */
    @JvmName("jeurhiojbrfdpfss")
    public suspend fun adminGroups(vararg values: String) {
        val toBeMapped = values.toList()
        val mapped = toBeMapped.let({ args0 -> of(args0) })
        this.adminGroups = mapped
    }

    /**
     * @param value Users that can perform operations as a cluster admin. A managed
     * ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole
     * to the users. Up to ten admin users can be provided.
     * For more info on RBAC, see
     * https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
     */
    @JvmName("ikphbimfhcncmqpx")
    public suspend fun adminUsers(`value`: List?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.adminUsers = mapped
    }

    /**
     * @param values Users that can perform operations as a cluster admin. A managed
     * ClusterRoleBinding will be created to grant the `cluster-admin` ClusterRole
     * to the users. Up to ten admin users can be provided.
     * For more info on RBAC, see
     * https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
     */
    @JvmName("oejjxwybuicniwds")
    public suspend fun adminUsers(vararg values: String) {
        val toBeMapped = values.toList()
        val mapped = toBeMapped.let({ args0 -> of(args0) })
        this.adminUsers = mapped
    }

    internal fun build(): AttachedClusterAuthorizationArgs = AttachedClusterAuthorizationArgs(
        adminGroups = adminGroups,
        adminUsers = adminUsers,
    )
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy