1. Packages
  2. Google Cloud Native
  3. API Docs
  4. gameservices
  5. gameservices/v1
  6. GameServerDeploymentIamPolicy

Google Cloud Native is in preview. Google Cloud Classic is fully supported.

Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi

google-native.gameservices/v1.GameServerDeploymentIamPolicy

Explore with Pulumi AI

google-native logo

Google Cloud Native is in preview. Google Cloud Classic is fully supported.

Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi

    Sets the access control policy on the specified resource. Replaces any existing policy. Can return NOT_FOUND, INVALID_ARGUMENT, and PERMISSION_DENIED errors. Note - this resource’s API doesn’t support deletion. When deleted, the resource will persist on Google Cloud even though it will be deleted from Pulumi state.

    Create GameServerDeploymentIamPolicy Resource

    new GameServerDeploymentIamPolicy(name: string, args: GameServerDeploymentIamPolicyArgs, opts?: CustomResourceOptions);
    @overload
    def GameServerDeploymentIamPolicy(resource_name: str,
                                      opts: Optional[ResourceOptions] = None,
                                      audit_configs: Optional[Sequence[AuditConfigArgs]] = None,
                                      bindings: Optional[Sequence[BindingArgs]] = None,
                                      etag: Optional[str] = None,
                                      game_server_deployment_id: Optional[str] = None,
                                      location: Optional[str] = None,
                                      project: Optional[str] = None,
                                      rules: Optional[Sequence[RuleArgs]] = None,
                                      update_mask: Optional[str] = None,
                                      version: Optional[int] = None)
    @overload
    def GameServerDeploymentIamPolicy(resource_name: str,
                                      args: GameServerDeploymentIamPolicyArgs,
                                      opts: Optional[ResourceOptions] = None)
    func NewGameServerDeploymentIamPolicy(ctx *Context, name string, args GameServerDeploymentIamPolicyArgs, opts ...ResourceOption) (*GameServerDeploymentIamPolicy, error)
    public GameServerDeploymentIamPolicy(string name, GameServerDeploymentIamPolicyArgs args, CustomResourceOptions? opts = null)
    public GameServerDeploymentIamPolicy(String name, GameServerDeploymentIamPolicyArgs args)
    public GameServerDeploymentIamPolicy(String name, GameServerDeploymentIamPolicyArgs args, CustomResourceOptions options)
    
    type: google-native:gameservices/v1:GameServerDeploymentIamPolicy
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    
    name string
    The unique name of the resource.
    args GameServerDeploymentIamPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args GameServerDeploymentIamPolicyArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args GameServerDeploymentIamPolicyArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args GameServerDeploymentIamPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args GameServerDeploymentIamPolicyArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    GameServerDeploymentIamPolicy Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The GameServerDeploymentIamPolicy resource accepts the following input properties:

    GameServerDeploymentId string
    AuditConfigs List<Pulumi.GoogleNative.GameServices.V1.Inputs.AuditConfig>

    Specifies cloud audit logging configuration for this policy.

    Bindings List<Pulumi.GoogleNative.GameServices.V1.Inputs.Binding>

    Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.

    Etag string

    etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.

    Location string
    Project string
    Rules List<Pulumi.GoogleNative.GameServices.V1.Inputs.Rule>

    If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.

    UpdateMask string

    OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"

    Version int

    Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    GameServerDeploymentId string
    AuditConfigs []AuditConfigArgs

    Specifies cloud audit logging configuration for this policy.

    Bindings []BindingArgs

    Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.

    Etag string

    etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.

    Location string
    Project string
    Rules []RuleArgs

    If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.

    UpdateMask string

    OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"

    Version int

    Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    gameServerDeploymentId String
    auditConfigs List<AuditConfig>

    Specifies cloud audit logging configuration for this policy.

    bindings List<Binding>

    Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.

    etag String

    etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.

    location String
    project String
    rules List<Rule>

    If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.

    updateMask String

    OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"

    version Integer

    Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    gameServerDeploymentId string
    auditConfigs AuditConfig[]

    Specifies cloud audit logging configuration for this policy.

    bindings Binding[]

    Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.

    etag string

    etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.

    location string
    project string
    rules Rule[]

    If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.

    updateMask string

    OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"

    version number

    Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    game_server_deployment_id str
    audit_configs Sequence[AuditConfigArgs]

    Specifies cloud audit logging configuration for this policy.

    bindings Sequence[BindingArgs]

    Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.

    etag str

    etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.

    location str
    project str
    rules Sequence[RuleArgs]

    If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.

    update_mask str

    OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"

    version int

    Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    gameServerDeploymentId String
    auditConfigs List<Property Map>

    Specifies cloud audit logging configuration for this policy.

    bindings List<Property Map>

    Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.

    etag String

    etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.

    location String
    project String
    rules List<Property Map>

    If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.

    updateMask String

    OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"

    version Number

    Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the GameServerDeploymentIamPolicy resource produces the following output properties:

    Id string

    The provider-assigned unique ID for this managed resource.

    Id string

    The provider-assigned unique ID for this managed resource.

    id String

    The provider-assigned unique ID for this managed resource.

    id string

    The provider-assigned unique ID for this managed resource.

    id str

    The provider-assigned unique ID for this managed resource.

    id String

    The provider-assigned unique ID for this managed resource.

    Supporting Types

    AuditConfig, AuditConfigArgs

    AuditLogConfigs List<Pulumi.GoogleNative.GameServices.V1.Inputs.AuditLogConfig>

    The configuration for logging of each type of permission.

    Service string

    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    AuditLogConfigs []AuditLogConfig

    The configuration for logging of each type of permission.

    Service string

    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    auditLogConfigs List<AuditLogConfig>

    The configuration for logging of each type of permission.

    service String

    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    auditLogConfigs AuditLogConfig[]

    The configuration for logging of each type of permission.

    service string

    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    audit_log_configs Sequence[AuditLogConfig]

    The configuration for logging of each type of permission.

    service str

    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    auditLogConfigs List<Property Map>

    The configuration for logging of each type of permission.

    service String

    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    AuditConfigResponse, AuditConfigResponseArgs

    AuditLogConfigs List<Pulumi.GoogleNative.GameServices.V1.Inputs.AuditLogConfigResponse>

    The configuration for logging of each type of permission.

    Service string

    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    AuditLogConfigs []AuditLogConfigResponse

    The configuration for logging of each type of permission.

    Service string

    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    auditLogConfigs List<AuditLogConfigResponse>

    The configuration for logging of each type of permission.

    service String

    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    auditLogConfigs AuditLogConfigResponse[]

    The configuration for logging of each type of permission.

    service string

    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    audit_log_configs Sequence[AuditLogConfigResponse]

    The configuration for logging of each type of permission.

    service str

    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    auditLogConfigs List<Property Map>

    The configuration for logging of each type of permission.

    service String

    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    AuditLogConfig, AuditLogConfigArgs

    ExemptedMembers List<string>

    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

    IgnoreChildExemptions bool
    LogType Pulumi.GoogleNative.GameServices.V1.AuditLogConfigLogType

    The log type that this config enables.

    ExemptedMembers []string

    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

    IgnoreChildExemptions bool
    LogType AuditLogConfigLogType

    The log type that this config enables.

    exemptedMembers List<String>

    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

    ignoreChildExemptions Boolean
    logType AuditLogConfigLogType

    The log type that this config enables.

    exemptedMembers string[]

    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

    ignoreChildExemptions boolean
    logType AuditLogConfigLogType

    The log type that this config enables.

    exempted_members Sequence[str]

    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

    ignore_child_exemptions bool
    log_type AuditLogConfigLogType

    The log type that this config enables.

    exemptedMembers List<String>

    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

    ignoreChildExemptions Boolean
    logType "LOG_TYPE_UNSPECIFIED" | "ADMIN_READ" | "DATA_WRITE" | "DATA_READ"

    The log type that this config enables.

    AuditLogConfigLogType, AuditLogConfigLogTypeArgs

    LogTypeUnspecified
    LOG_TYPE_UNSPECIFIED

    Default case. Should never be this.

    AdminRead
    ADMIN_READ

    Admin reads. Example: CloudIAM getIamPolicy

    DataWrite
    DATA_WRITE

    Data writes. Example: CloudSQL Users create

    DataRead
    DATA_READ

    Data reads. Example: CloudSQL Users list

    AuditLogConfigLogTypeLogTypeUnspecified
    LOG_TYPE_UNSPECIFIED

    Default case. Should never be this.

    AuditLogConfigLogTypeAdminRead
    ADMIN_READ

    Admin reads. Example: CloudIAM getIamPolicy

    AuditLogConfigLogTypeDataWrite
    DATA_WRITE

    Data writes. Example: CloudSQL Users create

    AuditLogConfigLogTypeDataRead
    DATA_READ

    Data reads. Example: CloudSQL Users list

    LogTypeUnspecified
    LOG_TYPE_UNSPECIFIED

    Default case. Should never be this.

    AdminRead
    ADMIN_READ

    Admin reads. Example: CloudIAM getIamPolicy

    DataWrite
    DATA_WRITE

    Data writes. Example: CloudSQL Users create

    DataRead
    DATA_READ

    Data reads. Example: CloudSQL Users list

    LogTypeUnspecified
    LOG_TYPE_UNSPECIFIED

    Default case. Should never be this.

    AdminRead
    ADMIN_READ

    Admin reads. Example: CloudIAM getIamPolicy

    DataWrite
    DATA_WRITE

    Data writes. Example: CloudSQL Users create

    DataRead
    DATA_READ

    Data reads. Example: CloudSQL Users list

    LOG_TYPE_UNSPECIFIED
    LOG_TYPE_UNSPECIFIED

    Default case. Should never be this.

    ADMIN_READ
    ADMIN_READ

    Admin reads. Example: CloudIAM getIamPolicy

    DATA_WRITE
    DATA_WRITE

    Data writes. Example: CloudSQL Users create

    DATA_READ
    DATA_READ

    Data reads. Example: CloudSQL Users list

    "LOG_TYPE_UNSPECIFIED"
    LOG_TYPE_UNSPECIFIED

    Default case. Should never be this.

    "ADMIN_READ"
    ADMIN_READ

    Admin reads. Example: CloudIAM getIamPolicy

    "DATA_WRITE"
    DATA_WRITE

    Data writes. Example: CloudSQL Users create

    "DATA_READ"
    DATA_READ

    Data reads. Example: CloudSQL Users list

    AuditLogConfigResponse, AuditLogConfigResponseArgs

    ExemptedMembers List<string>

    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

    IgnoreChildExemptions bool
    LogType string

    The log type that this config enables.

    ExemptedMembers []string

    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

    IgnoreChildExemptions bool
    LogType string

    The log type that this config enables.

    exemptedMembers List<String>

    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

    ignoreChildExemptions Boolean
    logType String

    The log type that this config enables.

    exemptedMembers string[]

    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

    ignoreChildExemptions boolean
    logType string

    The log type that this config enables.

    exempted_members Sequence[str]

    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

    ignore_child_exemptions bool
    log_type str

    The log type that this config enables.

    exemptedMembers List<String>

    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

    ignoreChildExemptions Boolean
    logType String

    The log type that this config enables.

    AuthorizationLoggingOptions, AuthorizationLoggingOptionsArgs

    PermissionType AuthorizationLoggingOptionsPermissionType

    The type of the permission that was checked.

    permissionType AuthorizationLoggingOptionsPermissionType

    The type of the permission that was checked.

    permissionType AuthorizationLoggingOptionsPermissionType

    The type of the permission that was checked.

    permission_type AuthorizationLoggingOptionsPermissionType

    The type of the permission that was checked.

    AuthorizationLoggingOptionsPermissionType, AuthorizationLoggingOptionsPermissionTypeArgs

    PermissionTypeUnspecified
    PERMISSION_TYPE_UNSPECIFIED

    Default. Should not be used.

    AdminRead
    ADMIN_READ

    A read of admin (meta) data.

    AdminWrite
    ADMIN_WRITE

    A write of admin (meta) data.

    DataRead
    DATA_READ

    A read of standard data.

    DataWrite
    DATA_WRITE

    A write of standard data.

    AuthorizationLoggingOptionsPermissionTypePermissionTypeUnspecified
    PERMISSION_TYPE_UNSPECIFIED

    Default. Should not be used.

    AuthorizationLoggingOptionsPermissionTypeAdminRead
    ADMIN_READ

    A read of admin (meta) data.

    AuthorizationLoggingOptionsPermissionTypeAdminWrite
    ADMIN_WRITE

    A write of admin (meta) data.

    AuthorizationLoggingOptionsPermissionTypeDataRead
    DATA_READ

    A read of standard data.

    AuthorizationLoggingOptionsPermissionTypeDataWrite
    DATA_WRITE

    A write of standard data.

    PermissionTypeUnspecified
    PERMISSION_TYPE_UNSPECIFIED

    Default. Should not be used.

    AdminRead
    ADMIN_READ

    A read of admin (meta) data.

    AdminWrite
    ADMIN_WRITE

    A write of admin (meta) data.

    DataRead
    DATA_READ

    A read of standard data.

    DataWrite
    DATA_WRITE

    A write of standard data.

    PermissionTypeUnspecified
    PERMISSION_TYPE_UNSPECIFIED

    Default. Should not be used.

    AdminRead
    ADMIN_READ

    A read of admin (meta) data.

    AdminWrite
    ADMIN_WRITE

    A write of admin (meta) data.

    DataRead
    DATA_READ

    A read of standard data.

    DataWrite
    DATA_WRITE

    A write of standard data.

    PERMISSION_TYPE_UNSPECIFIED
    PERMISSION_TYPE_UNSPECIFIED

    Default. Should not be used.

    ADMIN_READ
    ADMIN_READ

    A read of admin (meta) data.

    ADMIN_WRITE
    ADMIN_WRITE

    A write of admin (meta) data.

    DATA_READ
    DATA_READ

    A read of standard data.

    DATA_WRITE
    DATA_WRITE

    A write of standard data.

    "PERMISSION_TYPE_UNSPECIFIED"
    PERMISSION_TYPE_UNSPECIFIED

    Default. Should not be used.

    "ADMIN_READ"
    ADMIN_READ

    A read of admin (meta) data.

    "ADMIN_WRITE"
    ADMIN_WRITE

    A write of admin (meta) data.

    "DATA_READ"
    DATA_READ

    A read of standard data.

    "DATA_WRITE"
    DATA_WRITE

    A write of standard data.

    AuthorizationLoggingOptionsResponse, AuthorizationLoggingOptionsResponseArgs

    PermissionType string

    The type of the permission that was checked.

    PermissionType string

    The type of the permission that was checked.

    permissionType String

    The type of the permission that was checked.

    permissionType string

    The type of the permission that was checked.

    permission_type str

    The type of the permission that was checked.

    permissionType String

    The type of the permission that was checked.

    Binding, BindingArgs

    BindingId string
    Condition Pulumi.GoogleNative.GameServices.V1.Inputs.Expr

    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    Members List<string>

    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

    Role string

    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

    BindingId string
    Condition Expr

    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    Members []string

    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

    Role string

    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

    bindingId String
    condition Expr

    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    members List<String>

    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

    role String

    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

    bindingId string
    condition Expr

    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    members string[]

    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

    role string

    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

    binding_id str
    condition Expr

    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    members Sequence[str]

    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

    role str

    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

    bindingId String
    condition Property Map

    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    members List<String>

    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

    role String

    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

    BindingResponse, BindingResponseArgs

    BindingId string
    Condition Pulumi.GoogleNative.GameServices.V1.Inputs.ExprResponse

    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    Members List<string>

    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

    Role string

    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

    BindingId string
    Condition ExprResponse

    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    Members []string

    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

    Role string

    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

    bindingId String
    condition ExprResponse

    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    members List<String>

    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

    role String

    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

    bindingId string
    condition ExprResponse

    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    members string[]

    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

    role string

    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

    binding_id str
    condition ExprResponse

    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    members Sequence[str]

    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

    role str

    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

    bindingId String
    condition Property Map

    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    members List<String>

    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

    role String

    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

    CloudAuditOptions, CloudAuditOptionsArgs

    AuthorizationLoggingOptions AuthorizationLoggingOptions

    Information used by the Cloud Audit Logging pipeline.

    LogName CloudAuditOptionsLogName

    The log_name to populate in the Cloud Audit Record.

    authorizationLoggingOptions AuthorizationLoggingOptions

    Information used by the Cloud Audit Logging pipeline.

    logName CloudAuditOptionsLogName

    The log_name to populate in the Cloud Audit Record.

    authorizationLoggingOptions AuthorizationLoggingOptions

    Information used by the Cloud Audit Logging pipeline.

    logName CloudAuditOptionsLogName

    The log_name to populate in the Cloud Audit Record.

    authorization_logging_options AuthorizationLoggingOptions

    Information used by the Cloud Audit Logging pipeline.

    log_name CloudAuditOptionsLogName

    The log_name to populate in the Cloud Audit Record.

    authorizationLoggingOptions Property Map

    Information used by the Cloud Audit Logging pipeline.

    logName "UNSPECIFIED_LOG_NAME" | "ADMIN_ACTIVITY" | "DATA_ACCESS"

    The log_name to populate in the Cloud Audit Record.

    CloudAuditOptionsLogName, CloudAuditOptionsLogNameArgs

    UnspecifiedLogName
    UNSPECIFIED_LOG_NAME

    Default. Should not be used.

    AdminActivity
    ADMIN_ACTIVITY

    Corresponds to "cloudaudit.googleapis.com/activity"

    DataAccess
    DATA_ACCESS

    Corresponds to "cloudaudit.googleapis.com/data_access"

    CloudAuditOptionsLogNameUnspecifiedLogName
    UNSPECIFIED_LOG_NAME

    Default. Should not be used.

    CloudAuditOptionsLogNameAdminActivity
    ADMIN_ACTIVITY

    Corresponds to "cloudaudit.googleapis.com/activity"

    CloudAuditOptionsLogNameDataAccess
    DATA_ACCESS

    Corresponds to "cloudaudit.googleapis.com/data_access"

    UnspecifiedLogName
    UNSPECIFIED_LOG_NAME

    Default. Should not be used.

    AdminActivity
    ADMIN_ACTIVITY

    Corresponds to "cloudaudit.googleapis.com/activity"

    DataAccess
    DATA_ACCESS

    Corresponds to "cloudaudit.googleapis.com/data_access"

    UnspecifiedLogName
    UNSPECIFIED_LOG_NAME

    Default. Should not be used.

    AdminActivity
    ADMIN_ACTIVITY

    Corresponds to "cloudaudit.googleapis.com/activity"

    DataAccess
    DATA_ACCESS

    Corresponds to "cloudaudit.googleapis.com/data_access"

    UNSPECIFIED_LOG_NAME
    UNSPECIFIED_LOG_NAME

    Default. Should not be used.

    ADMIN_ACTIVITY
    ADMIN_ACTIVITY

    Corresponds to "cloudaudit.googleapis.com/activity"

    DATA_ACCESS
    DATA_ACCESS

    Corresponds to "cloudaudit.googleapis.com/data_access"

    "UNSPECIFIED_LOG_NAME"
    UNSPECIFIED_LOG_NAME

    Default. Should not be used.

    "ADMIN_ACTIVITY"
    ADMIN_ACTIVITY

    Corresponds to "cloudaudit.googleapis.com/activity"

    "DATA_ACCESS"
    DATA_ACCESS

    Corresponds to "cloudaudit.googleapis.com/data_access"

    CloudAuditOptionsResponse, CloudAuditOptionsResponseArgs

    AuthorizationLoggingOptions Pulumi.GoogleNative.GameServices.V1.Inputs.AuthorizationLoggingOptionsResponse

    Information used by the Cloud Audit Logging pipeline.

    LogName string

    The log_name to populate in the Cloud Audit Record.

    AuthorizationLoggingOptions AuthorizationLoggingOptionsResponse

    Information used by the Cloud Audit Logging pipeline.

    LogName string

    The log_name to populate in the Cloud Audit Record.

    authorizationLoggingOptions AuthorizationLoggingOptionsResponse

    Information used by the Cloud Audit Logging pipeline.

    logName String

    The log_name to populate in the Cloud Audit Record.

    authorizationLoggingOptions AuthorizationLoggingOptionsResponse

    Information used by the Cloud Audit Logging pipeline.

    logName string

    The log_name to populate in the Cloud Audit Record.

    authorization_logging_options AuthorizationLoggingOptionsResponse

    Information used by the Cloud Audit Logging pipeline.

    log_name str

    The log_name to populate in the Cloud Audit Record.

    authorizationLoggingOptions Property Map

    Information used by the Cloud Audit Logging pipeline.

    logName String

    The log_name to populate in the Cloud Audit Record.

    Condition, ConditionArgs

    Iam Pulumi.GoogleNative.GameServices.V1.ConditionIam

    Trusted attributes supplied by the IAM system.

    Op Pulumi.GoogleNative.GameServices.V1.ConditionOp

    An operator to apply the subject with.

    Svc string

    Trusted attributes discharged by the service.

    Sys Pulumi.GoogleNative.GameServices.V1.ConditionSys

    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

    Values List<string>

    The objects of the condition.

    Iam ConditionIam

    Trusted attributes supplied by the IAM system.

    Op ConditionOp

    An operator to apply the subject with.

    Svc string

    Trusted attributes discharged by the service.

    Sys ConditionSys

    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

    Values []string

    The objects of the condition.

    iam ConditionIam

    Trusted attributes supplied by the IAM system.

    op ConditionOp

    An operator to apply the subject with.

    svc String

    Trusted attributes discharged by the service.

    sys ConditionSys

    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

    values List<String>

    The objects of the condition.

    iam ConditionIam

    Trusted attributes supplied by the IAM system.

    op ConditionOp

    An operator to apply the subject with.

    svc string

    Trusted attributes discharged by the service.

    sys ConditionSys

    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

    values string[]

    The objects of the condition.

    iam ConditionIam

    Trusted attributes supplied by the IAM system.

    op ConditionOp

    An operator to apply the subject with.

    svc str

    Trusted attributes discharged by the service.

    sys ConditionSys

    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

    values Sequence[str]

    The objects of the condition.

    iam "NO_ATTR" | "AUTHORITY" | "ATTRIBUTION" | "SECURITY_REALM" | "APPROVER" | "JUSTIFICATION_TYPE" | "CREDENTIALS_TYPE" | "CREDS_ASSERTION"

    Trusted attributes supplied by the IAM system.

    op "NO_OP" | "EQUALS" | "NOT_EQUALS" | "IN" | "NOT_IN" | "DISCHARGED"

    An operator to apply the subject with.

    svc String

    Trusted attributes discharged by the service.

    sys "NO_ATTR" | "REGION" | "SERVICE" | "NAME" | "IP"

    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

    values List<String>

    The objects of the condition.

    ConditionIam, ConditionIamArgs

    NoAttr
    NO_ATTR

    Default non-attribute.

    Authority
    AUTHORITY

    Either principal or (if present) authority selector.

    Attribution
    ATTRIBUTION

    The principal (even if an authority selector is present), which must only be used for attribution, not authorization.

    SecurityRealm
    SECURITY_REALM

    Any of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    Approver
    APPROVER

    An approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).

    JustificationType
    JUSTIFICATION_TYPE

    What types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.

    CredentialsType
    CREDENTIALS_TYPE

    What type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    CredsAssertion
    CREDS_ASSERTION

    EXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    ConditionIamNoAttr
    NO_ATTR

    Default non-attribute.

    ConditionIamAuthority
    AUTHORITY

    Either principal or (if present) authority selector.

    ConditionIamAttribution
    ATTRIBUTION

    The principal (even if an authority selector is present), which must only be used for attribution, not authorization.

    ConditionIamSecurityRealm
    SECURITY_REALM

    Any of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    ConditionIamApprover
    APPROVER

    An approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).

    ConditionIamJustificationType
    JUSTIFICATION_TYPE

    What types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.

    ConditionIamCredentialsType
    CREDENTIALS_TYPE

    What type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    ConditionIamCredsAssertion
    CREDS_ASSERTION

    EXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    NoAttr
    NO_ATTR

    Default non-attribute.

    Authority
    AUTHORITY

    Either principal or (if present) authority selector.

    Attribution
    ATTRIBUTION

    The principal (even if an authority selector is present), which must only be used for attribution, not authorization.

    SecurityRealm
    SECURITY_REALM

    Any of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    Approver
    APPROVER

    An approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).

    JustificationType
    JUSTIFICATION_TYPE

    What types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.

    CredentialsType
    CREDENTIALS_TYPE

    What type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    CredsAssertion
    CREDS_ASSERTION

    EXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    NoAttr
    NO_ATTR

    Default non-attribute.

    Authority
    AUTHORITY

    Either principal or (if present) authority selector.

    Attribution
    ATTRIBUTION

    The principal (even if an authority selector is present), which must only be used for attribution, not authorization.

    SecurityRealm
    SECURITY_REALM

    Any of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    Approver
    APPROVER

    An approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).

    JustificationType
    JUSTIFICATION_TYPE

    What types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.

    CredentialsType
    CREDENTIALS_TYPE

    What type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    CredsAssertion
    CREDS_ASSERTION

    EXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    NO_ATTR
    NO_ATTR

    Default non-attribute.

    AUTHORITY
    AUTHORITY

    Either principal or (if present) authority selector.

    ATTRIBUTION
    ATTRIBUTION

    The principal (even if an authority selector is present), which must only be used for attribution, not authorization.

    SECURITY_REALM
    SECURITY_REALM

    Any of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    APPROVER
    APPROVER

    An approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).

    JUSTIFICATION_TYPE
    JUSTIFICATION_TYPE

    What types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.

    CREDENTIALS_TYPE
    CREDENTIALS_TYPE

    What type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    CREDS_ASSERTION
    CREDS_ASSERTION

    EXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    "NO_ATTR"
    NO_ATTR

    Default non-attribute.

    "AUTHORITY"
    AUTHORITY

    Either principal or (if present) authority selector.

    "ATTRIBUTION"
    ATTRIBUTION

    The principal (even if an authority selector is present), which must only be used for attribution, not authorization.

    "SECURITY_REALM"
    SECURITY_REALM

    Any of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    "APPROVER"
    APPROVER

    An approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).

    "JUSTIFICATION_TYPE"
    JUSTIFICATION_TYPE

    What types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.

    "CREDENTIALS_TYPE"
    CREDENTIALS_TYPE

    What type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    "CREDS_ASSERTION"
    CREDS_ASSERTION

    EXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    ConditionOp, ConditionOpArgs

    NoOp
    NO_OP

    Default no-op.

    EqualsValue
    EQUALS

    DEPRECATED. Use IN instead.

    NotEquals
    NOT_EQUALS

    DEPRECATED. Use NOT_IN instead.

    In
    IN

    The condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.

    NotIn
    NOT_IN

    The condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.

    Discharged
    DISCHARGED

    Subject is discharged

    ConditionOpNoOp
    NO_OP

    Default no-op.

    ConditionOpEquals
    EQUALS

    DEPRECATED. Use IN instead.

    ConditionOpNotEquals
    NOT_EQUALS

    DEPRECATED. Use NOT_IN instead.

    ConditionOpIn
    IN

    The condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.

    ConditionOpNotIn
    NOT_IN

    The condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.

    ConditionOpDischarged
    DISCHARGED

    Subject is discharged

    NoOp
    NO_OP

    Default no-op.

    Equals
    EQUALS

    DEPRECATED. Use IN instead.

    NotEquals
    NOT_EQUALS

    DEPRECATED. Use NOT_IN instead.

    In
    IN

    The condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.

    NotIn
    NOT_IN

    The condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.

    Discharged
    DISCHARGED

    Subject is discharged

    NoOp
    NO_OP

    Default no-op.

    Equals
    EQUALS

    DEPRECATED. Use IN instead.

    NotEquals
    NOT_EQUALS

    DEPRECATED. Use NOT_IN instead.

    In
    IN

    The condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.

    NotIn
    NOT_IN

    The condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.

    Discharged
    DISCHARGED

    Subject is discharged

    NO_OP
    NO_OP

    Default no-op.

    EQUALS
    EQUALS

    DEPRECATED. Use IN instead.

    NOT_EQUALS
    NOT_EQUALS

    DEPRECATED. Use NOT_IN instead.

    IN_
    IN

    The condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.

    NOT_IN
    NOT_IN

    The condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.

    DISCHARGED
    DISCHARGED

    Subject is discharged

    "NO_OP"
    NO_OP

    Default no-op.

    "EQUALS"
    EQUALS

    DEPRECATED. Use IN instead.

    "NOT_EQUALS"
    NOT_EQUALS

    DEPRECATED. Use NOT_IN instead.

    "IN"
    IN

    The condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.

    "NOT_IN"
    NOT_IN

    The condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.

    "DISCHARGED"
    DISCHARGED

    Subject is discharged

    ConditionResponse, ConditionResponseArgs

    Iam string

    Trusted attributes supplied by the IAM system.

    Op string

    An operator to apply the subject with.

    Svc string

    Trusted attributes discharged by the service.

    Sys string

    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

    Values List<string>

    The objects of the condition.

    Iam string

    Trusted attributes supplied by the IAM system.

    Op string

    An operator to apply the subject with.

    Svc string

    Trusted attributes discharged by the service.

    Sys string

    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

    Values []string

    The objects of the condition.

    iam String

    Trusted attributes supplied by the IAM system.

    op String

    An operator to apply the subject with.

    svc String

    Trusted attributes discharged by the service.

    sys String

    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

    values List<String>

    The objects of the condition.

    iam string

    Trusted attributes supplied by the IAM system.

    op string

    An operator to apply the subject with.

    svc string

    Trusted attributes discharged by the service.

    sys string

    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

    values string[]

    The objects of the condition.

    iam str

    Trusted attributes supplied by the IAM system.

    op str

    An operator to apply the subject with.

    svc str

    Trusted attributes discharged by the service.

    sys str

    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

    values Sequence[str]

    The objects of the condition.

    iam String

    Trusted attributes supplied by the IAM system.

    op String

    An operator to apply the subject with.

    svc String

    Trusted attributes discharged by the service.

    sys String

    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

    values List<String>

    The objects of the condition.

    ConditionSys, ConditionSysArgs

    NoAttr
    NO_ATTR

    Default non-attribute type

    Region
    REGION

    Region of the resource

    Service
    SERVICE

    Service name

    Name
    NAME

    Resource name

    Ip
    IP

    IP address of the caller

    ConditionSysNoAttr
    NO_ATTR

    Default non-attribute type

    ConditionSysRegion
    REGION

    Region of the resource

    ConditionSysService
    SERVICE

    Service name

    ConditionSysName
    NAME

    Resource name

    ConditionSysIp
    IP

    IP address of the caller

    NoAttr
    NO_ATTR

    Default non-attribute type

    Region
    REGION

    Region of the resource

    Service
    SERVICE

    Service name

    Name
    NAME

    Resource name

    Ip
    IP

    IP address of the caller

    NoAttr
    NO_ATTR

    Default non-attribute type

    Region
    REGION

    Region of the resource

    Service
    SERVICE

    Service name

    Name
    NAME

    Resource name

    Ip
    IP

    IP address of the caller

    NO_ATTR
    NO_ATTR

    Default non-attribute type

    REGION
    REGION

    Region of the resource

    SERVICE
    SERVICE

    Service name

    NAME
    NAME

    Resource name

    IP
    IP

    IP address of the caller

    "NO_ATTR"
    NO_ATTR

    Default non-attribute type

    "REGION"
    REGION

    Region of the resource

    "SERVICE"
    SERVICE

    Service name

    "NAME"
    NAME

    Resource name

    "IP"
    IP

    IP address of the caller

    CounterOptions, CounterOptionsArgs

    CustomFields List<Pulumi.GoogleNative.GameServices.V1.Inputs.CustomField>

    Custom fields.

    Field string

    The field value to attribute.

    Metric string

    The metric to update.

    CustomFields []CustomField

    Custom fields.

    Field string

    The field value to attribute.

    Metric string

    The metric to update.

    customFields List<CustomField>

    Custom fields.

    field String

    The field value to attribute.

    metric String

    The metric to update.

    customFields CustomField[]

    Custom fields.

    field string

    The field value to attribute.

    metric string

    The metric to update.

    custom_fields Sequence[CustomField]

    Custom fields.

    field str

    The field value to attribute.

    metric str

    The metric to update.

    customFields List<Property Map>

    Custom fields.

    field String

    The field value to attribute.

    metric String

    The metric to update.

    CounterOptionsResponse, CounterOptionsResponseArgs

    CustomFields List<Pulumi.GoogleNative.GameServices.V1.Inputs.CustomFieldResponse>

    Custom fields.

    Field string

    The field value to attribute.

    Metric string

    The metric to update.

    CustomFields []CustomFieldResponse

    Custom fields.

    Field string

    The field value to attribute.

    Metric string

    The metric to update.

    customFields List<CustomFieldResponse>

    Custom fields.

    field String

    The field value to attribute.

    metric String

    The metric to update.

    customFields CustomFieldResponse[]

    Custom fields.

    field string

    The field value to attribute.

    metric string

    The metric to update.

    custom_fields Sequence[CustomFieldResponse]

    Custom fields.

    field str

    The field value to attribute.

    metric str

    The metric to update.

    customFields List<Property Map>

    Custom fields.

    field String

    The field value to attribute.

    metric String

    The metric to update.

    CustomField, CustomFieldArgs

    Name string

    Name is the field name.

    Value string

    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

    Name string

    Name is the field name.

    Value string

    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

    name String

    Name is the field name.

    value String

    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

    name string

    Name is the field name.

    value string

    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

    name str

    Name is the field name.

    value str

    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

    name String

    Name is the field name.

    value String

    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

    CustomFieldResponse, CustomFieldResponseArgs

    Name string

    Name is the field name.

    Value string

    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

    Name string

    Name is the field name.

    Value string

    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

    name String

    Name is the field name.

    value String

    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

    name string

    Name is the field name.

    value string

    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

    name str

    Name is the field name.

    value str

    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

    name String

    Name is the field name.

    value String

    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

    DataAccessOptions, DataAccessOptionsArgs

    DataAccessOptionsLogMode, DataAccessOptionsLogModeArgs

    LogModeUnspecified
    LOG_MODE_UNSPECIFIED

    Client is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).

    LogFailClosed
    LOG_FAIL_CLOSED

    The application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.

    DataAccessOptionsLogModeLogModeUnspecified
    LOG_MODE_UNSPECIFIED

    Client is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).

    DataAccessOptionsLogModeLogFailClosed
    LOG_FAIL_CLOSED

    The application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.

    LogModeUnspecified
    LOG_MODE_UNSPECIFIED

    Client is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).

    LogFailClosed
    LOG_FAIL_CLOSED

    The application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.

    LogModeUnspecified
    LOG_MODE_UNSPECIFIED

    Client is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).

    LogFailClosed
    LOG_FAIL_CLOSED

    The application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.

    LOG_MODE_UNSPECIFIED
    LOG_MODE_UNSPECIFIED

    Client is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).

    LOG_FAIL_CLOSED
    LOG_FAIL_CLOSED

    The application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.

    "LOG_MODE_UNSPECIFIED"
    LOG_MODE_UNSPECIFIED

    Client is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).

    "LOG_FAIL_CLOSED"
    LOG_FAIL_CLOSED

    The application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.

    DataAccessOptionsResponse, DataAccessOptionsResponseArgs

    LogMode string
    LogMode string
    logMode String
    logMode string
    logMode String

    Expr, ExprArgs

    Description string

    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

    Expression string

    Textual representation of an expression in Common Expression Language syntax.

    Location string

    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

    Title string

    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

    Description string

    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

    Expression string

    Textual representation of an expression in Common Expression Language syntax.

    Location string

    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

    Title string

    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

    description String

    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

    expression String

    Textual representation of an expression in Common Expression Language syntax.

    location String

    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

    title String

    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

    description string

    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

    expression string

    Textual representation of an expression in Common Expression Language syntax.

    location string

    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

    title string

    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

    description str

    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

    expression str

    Textual representation of an expression in Common Expression Language syntax.

    location str

    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

    title str

    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

    description String

    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

    expression String

    Textual representation of an expression in Common Expression Language syntax.

    location String

    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

    title String

    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

    ExprResponse, ExprResponseArgs

    Description string

    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

    Expression string

    Textual representation of an expression in Common Expression Language syntax.

    Location string

    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

    Title string

    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

    Description string

    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

    Expression string

    Textual representation of an expression in Common Expression Language syntax.

    Location string

    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

    Title string

    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

    description String

    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

    expression String

    Textual representation of an expression in Common Expression Language syntax.

    location String

    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

    title String

    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

    description string

    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

    expression string

    Textual representation of an expression in Common Expression Language syntax.

    location string

    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

    title string

    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

    description str

    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

    expression str

    Textual representation of an expression in Common Expression Language syntax.

    location str

    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

    title str

    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

    description String

    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

    expression String

    Textual representation of an expression in Common Expression Language syntax.

    location String

    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

    title String

    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

    LogConfig, LogConfigArgs

    CloudAudit CloudAuditOptions

    Cloud audit options.

    Counter CounterOptions

    Counter options.

    DataAccess DataAccessOptions

    Data access options.

    cloudAudit CloudAuditOptions

    Cloud audit options.

    counter CounterOptions

    Counter options.

    dataAccess DataAccessOptions

    Data access options.

    cloudAudit CloudAuditOptions

    Cloud audit options.

    counter CounterOptions

    Counter options.

    dataAccess DataAccessOptions

    Data access options.

    cloud_audit CloudAuditOptions

    Cloud audit options.

    counter CounterOptions

    Counter options.

    data_access DataAccessOptions

    Data access options.

    cloudAudit Property Map

    Cloud audit options.

    counter Property Map

    Counter options.

    dataAccess Property Map

    Data access options.

    LogConfigResponse, LogConfigResponseArgs

    cloudAudit Property Map

    Cloud audit options.

    counter Property Map

    Counter options.

    dataAccess Property Map

    Data access options.

    Rule, RuleArgs

    Action Pulumi.GoogleNative.GameServices.V1.RuleAction

    Required

    Conditions List<Pulumi.GoogleNative.GameServices.V1.Inputs.Condition>

    Additional restrictions that must be met. All conditions must pass for the rule to match.

    Description string

    Human-readable description of the rule.

    In List<string>

    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

    LogConfig List<Pulumi.GoogleNative.GameServices.V1.Inputs.LogConfig>

    The config returned to callers of CheckPolicy for any entries that match the LOG action.

    NotIn List<string>

    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

    Permissions List<string>

    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

    Action RuleAction

    Required

    Conditions []Condition

    Additional restrictions that must be met. All conditions must pass for the rule to match.

    Description string

    Human-readable description of the rule.

    In []string

    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

    LogConfig []LogConfig

    The config returned to callers of CheckPolicy for any entries that match the LOG action.

    NotIn []string

    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

    Permissions []string

    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

    action RuleAction

    Required

    conditions List<Condition>

    Additional restrictions that must be met. All conditions must pass for the rule to match.

    description String

    Human-readable description of the rule.

    in List<String>

    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

    logConfig List<LogConfig>

    The config returned to callers of CheckPolicy for any entries that match the LOG action.

    notIn List<String>

    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

    permissions List<String>

    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

    action RuleAction

    Required

    conditions Condition[]

    Additional restrictions that must be met. All conditions must pass for the rule to match.

    description string

    Human-readable description of the rule.

    in string[]

    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

    logConfig LogConfig[]

    The config returned to callers of CheckPolicy for any entries that match the LOG action.

    notIn string[]

    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

    permissions string[]

    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

    action RuleAction

    Required

    conditions Sequence[Condition]

    Additional restrictions that must be met. All conditions must pass for the rule to match.

    description str

    Human-readable description of the rule.

    in_ Sequence[str]

    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

    log_config Sequence[LogConfig]

    The config returned to callers of CheckPolicy for any entries that match the LOG action.

    not_in Sequence[str]

    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

    permissions Sequence[str]

    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

    action "NO_ACTION" | "ALLOW" | "ALLOW_WITH_LOG" | "DENY" | "DENY_WITH_LOG" | "LOG"

    Required

    conditions List<Property Map>

    Additional restrictions that must be met. All conditions must pass for the rule to match.

    description String

    Human-readable description of the rule.

    in List<String>

    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

    logConfig List<Property Map>

    The config returned to callers of CheckPolicy for any entries that match the LOG action.

    notIn List<String>

    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

    permissions List<String>

    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

    RuleAction, RuleActionArgs

    NoAction
    NO_ACTION

    Default no action.

    Allow
    ALLOW

    Matching 'Entries' grant access.

    AllowWithLog
    ALLOW_WITH_LOG

    Matching 'Entries' grant access and the caller promises to log the request per the returned log_configs.

    Deny
    DENY

    Matching 'Entries' deny access.

    DenyWithLog
    DENY_WITH_LOG

    Matching 'Entries' deny access and the caller promises to log the request per the returned log_configs.

    Log
    LOG

    Matching 'Entries' tell IAM.Check callers to generate logs.

    RuleActionNoAction
    NO_ACTION

    Default no action.

    RuleActionAllow
    ALLOW

    Matching 'Entries' grant access.

    RuleActionAllowWithLog
    ALLOW_WITH_LOG

    Matching 'Entries' grant access and the caller promises to log the request per the returned log_configs.

    RuleActionDeny
    DENY

    Matching 'Entries' deny access.

    RuleActionDenyWithLog
    DENY_WITH_LOG

    Matching 'Entries' deny access and the caller promises to log the request per the returned log_configs.

    RuleActionLog
    LOG

    Matching 'Entries' tell IAM.Check callers to generate logs.

    NoAction
    NO_ACTION

    Default no action.

    Allow
    ALLOW

    Matching 'Entries' grant access.

    AllowWithLog
    ALLOW_WITH_LOG

    Matching 'Entries' grant access and the caller promises to log the request per the returned log_configs.

    Deny
    DENY

    Matching 'Entries' deny access.

    DenyWithLog
    DENY_WITH_LOG

    Matching 'Entries' deny access and the caller promises to log the request per the returned log_configs.

    Log
    LOG

    Matching 'Entries' tell IAM.Check callers to generate logs.

    NoAction
    NO_ACTION

    Default no action.

    Allow
    ALLOW

    Matching 'Entries' grant access.

    AllowWithLog
    ALLOW_WITH_LOG

    Matching 'Entries' grant access and the caller promises to log the request per the returned log_configs.

    Deny
    DENY

    Matching 'Entries' deny access.

    DenyWithLog
    DENY_WITH_LOG

    Matching 'Entries' deny access and the caller promises to log the request per the returned log_configs.

    Log
    LOG

    Matching 'Entries' tell IAM.Check callers to generate logs.

    NO_ACTION
    NO_ACTION

    Default no action.

    ALLOW
    ALLOW

    Matching 'Entries' grant access.

    ALLOW_WITH_LOG
    ALLOW_WITH_LOG

    Matching 'Entries' grant access and the caller promises to log the request per the returned log_configs.

    DENY
    DENY

    Matching 'Entries' deny access.

    DENY_WITH_LOG
    DENY_WITH_LOG

    Matching 'Entries' deny access and the caller promises to log the request per the returned log_configs.

    LOG
    LOG

    Matching 'Entries' tell IAM.Check callers to generate logs.

    "NO_ACTION"
    NO_ACTION

    Default no action.

    "ALLOW"
    ALLOW

    Matching 'Entries' grant access.

    "ALLOW_WITH_LOG"
    ALLOW_WITH_LOG

    Matching 'Entries' grant access and the caller promises to log the request per the returned log_configs.

    "DENY"
    DENY

    Matching 'Entries' deny access.

    "DENY_WITH_LOG"
    DENY_WITH_LOG

    Matching 'Entries' deny access and the caller promises to log the request per the returned log_configs.

    "LOG"
    LOG

    Matching 'Entries' tell IAM.Check callers to generate logs.

    RuleResponse, RuleResponseArgs

    Action string

    Required

    Conditions List<Pulumi.GoogleNative.GameServices.V1.Inputs.ConditionResponse>

    Additional restrictions that must be met. All conditions must pass for the rule to match.

    Description string

    Human-readable description of the rule.

    In List<string>

    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

    LogConfig List<Pulumi.GoogleNative.GameServices.V1.Inputs.LogConfigResponse>

    The config returned to callers of CheckPolicy for any entries that match the LOG action.

    NotIn List<string>

    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

    Permissions List<string>

    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

    Action string

    Required

    Conditions []ConditionResponse

    Additional restrictions that must be met. All conditions must pass for the rule to match.

    Description string

    Human-readable description of the rule.

    In []string

    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

    LogConfig []LogConfigResponse

    The config returned to callers of CheckPolicy for any entries that match the LOG action.

    NotIn []string

    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

    Permissions []string

    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

    action String

    Required

    conditions List<ConditionResponse>

    Additional restrictions that must be met. All conditions must pass for the rule to match.

    description String

    Human-readable description of the rule.

    in List<String>

    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

    logConfig List<LogConfigResponse>

    The config returned to callers of CheckPolicy for any entries that match the LOG action.

    notIn List<String>

    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

    permissions List<String>

    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

    action string

    Required

    conditions ConditionResponse[]

    Additional restrictions that must be met. All conditions must pass for the rule to match.

    description string

    Human-readable description of the rule.

    in string[]

    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

    logConfig LogConfigResponse[]

    The config returned to callers of CheckPolicy for any entries that match the LOG action.

    notIn string[]

    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

    permissions string[]

    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

    action str

    Required

    conditions Sequence[ConditionResponse]

    Additional restrictions that must be met. All conditions must pass for the rule to match.

    description str

    Human-readable description of the rule.

    in_ Sequence[str]

    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

    log_config Sequence[LogConfigResponse]

    The config returned to callers of CheckPolicy for any entries that match the LOG action.

    not_in Sequence[str]

    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

    permissions Sequence[str]

    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

    action String

    Required

    conditions List<Property Map>

    Additional restrictions that must be met. All conditions must pass for the rule to match.

    description String

    Human-readable description of the rule.

    in List<String>

    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

    logConfig List<Property Map>

    The config returned to callers of CheckPolicy for any entries that match the LOG action.

    notIn List<String>

    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

    permissions List<String>

    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

    Package Details

    Repository
    Google Cloud Native pulumi/pulumi-google-native
    License
    Apache-2.0
    google-native logo

    Google Cloud Native is in preview. Google Cloud Classic is fully supported.

    Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi