google-native logo
Google Cloud Native v0.30.0, Apr 14 23

google-native.gameservices/v1.GameServerDeploymentIamPolicy

Explore with Pulumi AI

Sets the access control policy on the specified resource. Replaces any existing policy. Can return NOT_FOUND, INVALID_ARGUMENT, and PERMISSION_DENIED errors. Note - this resource’s API doesn’t support deletion. When deleted, the resource will persist on Google Cloud even though it will be deleted from Pulumi state.

Create GameServerDeploymentIamPolicy Resource

new GameServerDeploymentIamPolicy(name: string, args: GameServerDeploymentIamPolicyArgs, opts?: CustomResourceOptions);
@overload
def GameServerDeploymentIamPolicy(resource_name: str,
                                  opts: Optional[ResourceOptions] = None,
                                  audit_configs: Optional[Sequence[AuditConfigArgs]] = None,
                                  bindings: Optional[Sequence[BindingArgs]] = None,
                                  etag: Optional[str] = None,
                                  game_server_deployment_id: Optional[str] = None,
                                  location: Optional[str] = None,
                                  project: Optional[str] = None,
                                  rules: Optional[Sequence[RuleArgs]] = None,
                                  update_mask: Optional[str] = None,
                                  version: Optional[int] = None)
@overload
def GameServerDeploymentIamPolicy(resource_name: str,
                                  args: GameServerDeploymentIamPolicyArgs,
                                  opts: Optional[ResourceOptions] = None)
func NewGameServerDeploymentIamPolicy(ctx *Context, name string, args GameServerDeploymentIamPolicyArgs, opts ...ResourceOption) (*GameServerDeploymentIamPolicy, error)
public GameServerDeploymentIamPolicy(string name, GameServerDeploymentIamPolicyArgs args, CustomResourceOptions? opts = null)
public GameServerDeploymentIamPolicy(String name, GameServerDeploymentIamPolicyArgs args)
public GameServerDeploymentIamPolicy(String name, GameServerDeploymentIamPolicyArgs args, CustomResourceOptions options)
type: google-native:gameservices/v1:GameServerDeploymentIamPolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

name string
The unique name of the resource.
args GameServerDeploymentIamPolicyArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name str
The unique name of the resource.
args GameServerDeploymentIamPolicyArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name string
The unique name of the resource.
args GameServerDeploymentIamPolicyArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name string
The unique name of the resource.
args GameServerDeploymentIamPolicyArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name String
The unique name of the resource.
args GameServerDeploymentIamPolicyArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

GameServerDeploymentIamPolicy Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

The GameServerDeploymentIamPolicy resource accepts the following input properties:

GameServerDeploymentId string
AuditConfigs List<Pulumi.GoogleNative.GameServices.V1.Inputs.AuditConfigArgs>

Specifies cloud audit logging configuration for this policy.

Bindings List<Pulumi.GoogleNative.GameServices.V1.Inputs.BindingArgs>

Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.

Etag string

etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.

Location string
Project string
Rules List<Pulumi.GoogleNative.GameServices.V1.Inputs.RuleArgs>

If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.

UpdateMask string

OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"

Version int

Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.

GameServerDeploymentId string
AuditConfigs []AuditConfigArgs

Specifies cloud audit logging configuration for this policy.

Bindings []BindingArgs

Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.

Etag string

etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.

Location string
Project string
Rules []RuleArgs

If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.

UpdateMask string

OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"

Version int

Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.

gameServerDeploymentId String
auditConfigs List<AuditConfigArgs>

Specifies cloud audit logging configuration for this policy.

bindings List<BindingArgs>

Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.

etag String

etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.

location String
project String
rules List<RuleArgs>

If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.

updateMask String

OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"

version Integer

Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.

gameServerDeploymentId string
auditConfigs AuditConfigArgs[]

Specifies cloud audit logging configuration for this policy.

bindings BindingArgs[]

Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.

etag string

etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.

location string
project string
rules RuleArgs[]

If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.

updateMask string

OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"

version number

Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.

game_server_deployment_id str
audit_configs Sequence[AuditConfigArgs]

Specifies cloud audit logging configuration for this policy.

bindings Sequence[BindingArgs]

Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.

etag str

etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.

location str
project str
rules Sequence[RuleArgs]

If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.

update_mask str

OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"

version int

Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.

gameServerDeploymentId String
auditConfigs List<Property Map>

Specifies cloud audit logging configuration for this policy.

bindings List<Property Map>

Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.

etag String

etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.

location String
project String
rules List<Property Map>

If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.

updateMask String

OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"

version Number

Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.

Outputs

All input properties are implicitly available as output properties. Additionally, the GameServerDeploymentIamPolicy resource produces the following output properties:

Id string

The provider-assigned unique ID for this managed resource.

Id string

The provider-assigned unique ID for this managed resource.

id String

The provider-assigned unique ID for this managed resource.

id string

The provider-assigned unique ID for this managed resource.

id str

The provider-assigned unique ID for this managed resource.

id String

The provider-assigned unique ID for this managed resource.

Supporting Types

AuditConfig

AuditLogConfigs List<Pulumi.GoogleNative.GameServices.V1.Inputs.AuditLogConfig>

The configuration for logging of each type of permission.

Service string

Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

AuditLogConfigs []AuditLogConfig

The configuration for logging of each type of permission.

Service string

Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

auditLogConfigs List<AuditLogConfig>

The configuration for logging of each type of permission.

service String

Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

auditLogConfigs AuditLogConfig[]

The configuration for logging of each type of permission.

service string

Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

audit_log_configs Sequence[AuditLogConfig]

The configuration for logging of each type of permission.

service str

Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

auditLogConfigs List<Property Map>

The configuration for logging of each type of permission.

service String

Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

AuditConfigResponse

AuditLogConfigs List<Pulumi.GoogleNative.GameServices.V1.Inputs.AuditLogConfigResponse>

The configuration for logging of each type of permission.

Service string

Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

AuditLogConfigs []AuditLogConfigResponse

The configuration for logging of each type of permission.

Service string

Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

auditLogConfigs List<AuditLogConfigResponse>

The configuration for logging of each type of permission.

service String

Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

auditLogConfigs AuditLogConfigResponse[]

The configuration for logging of each type of permission.

service string

Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

audit_log_configs Sequence[AuditLogConfigResponse]

The configuration for logging of each type of permission.

service str

Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

auditLogConfigs List<Property Map>

The configuration for logging of each type of permission.

service String

Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

AuditLogConfig

ExemptedMembers List<string>

Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

IgnoreChildExemptions bool
LogType Pulumi.GoogleNative.GameServices.V1.AuditLogConfigLogType

The log type that this config enables.

ExemptedMembers []string

Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

IgnoreChildExemptions bool
LogType AuditLogConfigLogType

The log type that this config enables.

exemptedMembers List<String>

Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

ignoreChildExemptions Boolean
logType AuditLogConfigLogType

The log type that this config enables.

exemptedMembers string[]

Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

ignoreChildExemptions boolean
logType AuditLogConfigLogType

The log type that this config enables.

exempted_members Sequence[str]

Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

ignore_child_exemptions bool
log_type AuditLogConfigLogType

The log type that this config enables.

exemptedMembers List<String>

Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

ignoreChildExemptions Boolean
logType "LOG_TYPE_UNSPECIFIED" | "ADMIN_READ" | "DATA_WRITE" | "DATA_READ"

The log type that this config enables.

AuditLogConfigLogType

LogTypeUnspecified
LOG_TYPE_UNSPECIFIED

Default case. Should never be this.

AdminRead
ADMIN_READ

Admin reads. Example: CloudIAM getIamPolicy

DataWrite
DATA_WRITE

Data writes. Example: CloudSQL Users create

DataRead
DATA_READ

Data reads. Example: CloudSQL Users list

AuditLogConfigLogTypeLogTypeUnspecified
LOG_TYPE_UNSPECIFIED

Default case. Should never be this.

AuditLogConfigLogTypeAdminRead
ADMIN_READ

Admin reads. Example: CloudIAM getIamPolicy

AuditLogConfigLogTypeDataWrite
DATA_WRITE

Data writes. Example: CloudSQL Users create

AuditLogConfigLogTypeDataRead
DATA_READ

Data reads. Example: CloudSQL Users list

LogTypeUnspecified
LOG_TYPE_UNSPECIFIED

Default case. Should never be this.

AdminRead
ADMIN_READ

Admin reads. Example: CloudIAM getIamPolicy

DataWrite
DATA_WRITE

Data writes. Example: CloudSQL Users create

DataRead
DATA_READ

Data reads. Example: CloudSQL Users list

LogTypeUnspecified
LOG_TYPE_UNSPECIFIED

Default case. Should never be this.

AdminRead
ADMIN_READ

Admin reads. Example: CloudIAM getIamPolicy

DataWrite
DATA_WRITE

Data writes. Example: CloudSQL Users create

DataRead
DATA_READ

Data reads. Example: CloudSQL Users list

LOG_TYPE_UNSPECIFIED
LOG_TYPE_UNSPECIFIED

Default case. Should never be this.

ADMIN_READ
ADMIN_READ

Admin reads. Example: CloudIAM getIamPolicy

DATA_WRITE
DATA_WRITE

Data writes. Example: CloudSQL Users create

DATA_READ
DATA_READ

Data reads. Example: CloudSQL Users list

"LOG_TYPE_UNSPECIFIED"
LOG_TYPE_UNSPECIFIED

Default case. Should never be this.

"ADMIN_READ"
ADMIN_READ

Admin reads. Example: CloudIAM getIamPolicy

"DATA_WRITE"
DATA_WRITE

Data writes. Example: CloudSQL Users create

"DATA_READ"
DATA_READ

Data reads. Example: CloudSQL Users list

AuditLogConfigResponse

ExemptedMembers List<string>

Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

IgnoreChildExemptions bool
LogType string

The log type that this config enables.

ExemptedMembers []string

Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

IgnoreChildExemptions bool
LogType string

The log type that this config enables.

exemptedMembers List<String>

Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

ignoreChildExemptions Boolean
logType String

The log type that this config enables.

exemptedMembers string[]

Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

ignoreChildExemptions boolean
logType string

The log type that this config enables.

exempted_members Sequence[str]

Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

ignore_child_exemptions bool
log_type str

The log type that this config enables.

exemptedMembers List<String>

Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.

ignoreChildExemptions Boolean
logType String

The log type that this config enables.

AuthorizationLoggingOptions

PermissionType AuthorizationLoggingOptionsPermissionType

The type of the permission that was checked.

permissionType AuthorizationLoggingOptionsPermissionType

The type of the permission that was checked.

permissionType AuthorizationLoggingOptionsPermissionType

The type of the permission that was checked.

permission_type AuthorizationLoggingOptionsPermissionType

The type of the permission that was checked.

AuthorizationLoggingOptionsPermissionType

PermissionTypeUnspecified
PERMISSION_TYPE_UNSPECIFIED

Default. Should not be used.

AdminRead
ADMIN_READ

A read of admin (meta) data.

AdminWrite
ADMIN_WRITE

A write of admin (meta) data.

DataRead
DATA_READ

A read of standard data.

DataWrite
DATA_WRITE

A write of standard data.

AuthorizationLoggingOptionsPermissionTypePermissionTypeUnspecified
PERMISSION_TYPE_UNSPECIFIED

Default. Should not be used.

AuthorizationLoggingOptionsPermissionTypeAdminRead
ADMIN_READ

A read of admin (meta) data.

AuthorizationLoggingOptionsPermissionTypeAdminWrite
ADMIN_WRITE

A write of admin (meta) data.

AuthorizationLoggingOptionsPermissionTypeDataRead
DATA_READ

A read of standard data.

AuthorizationLoggingOptionsPermissionTypeDataWrite
DATA_WRITE

A write of standard data.

PermissionTypeUnspecified
PERMISSION_TYPE_UNSPECIFIED

Default. Should not be used.

AdminRead
ADMIN_READ

A read of admin (meta) data.

AdminWrite
ADMIN_WRITE

A write of admin (meta) data.

DataRead
DATA_READ

A read of standard data.

DataWrite
DATA_WRITE

A write of standard data.

PermissionTypeUnspecified
PERMISSION_TYPE_UNSPECIFIED

Default. Should not be used.

AdminRead
ADMIN_READ

A read of admin (meta) data.

AdminWrite
ADMIN_WRITE

A write of admin (meta) data.

DataRead
DATA_READ

A read of standard data.

DataWrite
DATA_WRITE

A write of standard data.

PERMISSION_TYPE_UNSPECIFIED
PERMISSION_TYPE_UNSPECIFIED

Default. Should not be used.

ADMIN_READ
ADMIN_READ

A read of admin (meta) data.

ADMIN_WRITE
ADMIN_WRITE

A write of admin (meta) data.

DATA_READ
DATA_READ

A read of standard data.

DATA_WRITE
DATA_WRITE

A write of standard data.

"PERMISSION_TYPE_UNSPECIFIED"
PERMISSION_TYPE_UNSPECIFIED

Default. Should not be used.

"ADMIN_READ"
ADMIN_READ

A read of admin (meta) data.

"ADMIN_WRITE"
ADMIN_WRITE

A write of admin (meta) data.

"DATA_READ"
DATA_READ

A read of standard data.

"DATA_WRITE"
DATA_WRITE

A write of standard data.

AuthorizationLoggingOptionsResponse

PermissionType string

The type of the permission that was checked.

PermissionType string

The type of the permission that was checked.

permissionType String

The type of the permission that was checked.

permissionType string

The type of the permission that was checked.

permission_type str

The type of the permission that was checked.

permissionType String

The type of the permission that was checked.

Binding

BindingId string
Condition Pulumi.GoogleNative.GameServices.V1.Inputs.Expr

The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

Members List<string>

Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

Role string

Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

BindingId string
Condition Expr

The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

Members []string

Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

Role string

Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

bindingId String
condition Expr

The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

members List<String>

Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

role String

Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

bindingId string
condition Expr

The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

members string[]

Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

role string

Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

binding_id str
condition Expr

The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

members Sequence[str]

Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

role str

Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

bindingId String
condition Property Map

The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

members List<String>

Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

role String

Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

BindingResponse

BindingId string
Condition Pulumi.GoogleNative.GameServices.V1.Inputs.ExprResponse

The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

Members List<string>

Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

Role string

Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

BindingId string
Condition ExprResponse

The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

Members []string

Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

Role string

Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

bindingId String
condition ExprResponse

The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

members List<String>

Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

role String

Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

bindingId string
condition ExprResponse

The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

members string[]

Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

role string

Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

binding_id str
condition ExprResponse

The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

members Sequence[str]

Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

role str

Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

bindingId String
condition Property Map

The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.

members List<String>

Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.

role String

Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

CloudAuditOptions

AuthorizationLoggingOptions AuthorizationLoggingOptions

Information used by the Cloud Audit Logging pipeline.

LogName CloudAuditOptionsLogName

The log_name to populate in the Cloud Audit Record.

authorizationLoggingOptions AuthorizationLoggingOptions

Information used by the Cloud Audit Logging pipeline.

logName CloudAuditOptionsLogName

The log_name to populate in the Cloud Audit Record.

authorizationLoggingOptions AuthorizationLoggingOptions

Information used by the Cloud Audit Logging pipeline.

logName CloudAuditOptionsLogName

The log_name to populate in the Cloud Audit Record.

authorization_logging_options AuthorizationLoggingOptions

Information used by the Cloud Audit Logging pipeline.

log_name CloudAuditOptionsLogName

The log_name to populate in the Cloud Audit Record.

authorizationLoggingOptions Property Map

Information used by the Cloud Audit Logging pipeline.

logName "UNSPECIFIED_LOG_NAME" | "ADMIN_ACTIVITY" | "DATA_ACCESS"

The log_name to populate in the Cloud Audit Record.

CloudAuditOptionsLogName

UnspecifiedLogName
UNSPECIFIED_LOG_NAME

Default. Should not be used.

AdminActivity
ADMIN_ACTIVITY

Corresponds to "cloudaudit.googleapis.com/activity"

DataAccess
DATA_ACCESS

Corresponds to "cloudaudit.googleapis.com/data_access"

CloudAuditOptionsLogNameUnspecifiedLogName
UNSPECIFIED_LOG_NAME

Default. Should not be used.

CloudAuditOptionsLogNameAdminActivity
ADMIN_ACTIVITY

Corresponds to "cloudaudit.googleapis.com/activity"

CloudAuditOptionsLogNameDataAccess
DATA_ACCESS

Corresponds to "cloudaudit.googleapis.com/data_access"

UnspecifiedLogName
UNSPECIFIED_LOG_NAME

Default. Should not be used.

AdminActivity
ADMIN_ACTIVITY

Corresponds to "cloudaudit.googleapis.com/activity"

DataAccess
DATA_ACCESS

Corresponds to "cloudaudit.googleapis.com/data_access"

UnspecifiedLogName
UNSPECIFIED_LOG_NAME

Default. Should not be used.

AdminActivity
ADMIN_ACTIVITY

Corresponds to "cloudaudit.googleapis.com/activity"

DataAccess
DATA_ACCESS

Corresponds to "cloudaudit.googleapis.com/data_access"

UNSPECIFIED_LOG_NAME
UNSPECIFIED_LOG_NAME

Default. Should not be used.

ADMIN_ACTIVITY
ADMIN_ACTIVITY

Corresponds to "cloudaudit.googleapis.com/activity"

DATA_ACCESS
DATA_ACCESS

Corresponds to "cloudaudit.googleapis.com/data_access"

"UNSPECIFIED_LOG_NAME"
UNSPECIFIED_LOG_NAME

Default. Should not be used.

"ADMIN_ACTIVITY"
ADMIN_ACTIVITY

Corresponds to "cloudaudit.googleapis.com/activity"

"DATA_ACCESS"
DATA_ACCESS

Corresponds to "cloudaudit.googleapis.com/data_access"

CloudAuditOptionsResponse

AuthorizationLoggingOptions Pulumi.GoogleNative.GameServices.V1.Inputs.AuthorizationLoggingOptionsResponse

Information used by the Cloud Audit Logging pipeline.

LogName string

The log_name to populate in the Cloud Audit Record.

AuthorizationLoggingOptions AuthorizationLoggingOptionsResponse

Information used by the Cloud Audit Logging pipeline.

LogName string

The log_name to populate in the Cloud Audit Record.

authorizationLoggingOptions AuthorizationLoggingOptionsResponse

Information used by the Cloud Audit Logging pipeline.

logName String

The log_name to populate in the Cloud Audit Record.

authorizationLoggingOptions AuthorizationLoggingOptionsResponse

Information used by the Cloud Audit Logging pipeline.

logName string

The log_name to populate in the Cloud Audit Record.

authorization_logging_options AuthorizationLoggingOptionsResponse

Information used by the Cloud Audit Logging pipeline.

log_name str

The log_name to populate in the Cloud Audit Record.

authorizationLoggingOptions Property Map

Information used by the Cloud Audit Logging pipeline.

logName String

The log_name to populate in the Cloud Audit Record.

Condition

Iam Pulumi.GoogleNative.GameServices.V1.ConditionIam

Trusted attributes supplied by the IAM system.

Op Pulumi.GoogleNative.GameServices.V1.ConditionOp

An operator to apply the subject with.

Svc string

Trusted attributes discharged by the service.

Sys Pulumi.GoogleNative.GameServices.V1.ConditionSys

Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

Values List<string>

The objects of the condition.

Iam ConditionIam

Trusted attributes supplied by the IAM system.

Op ConditionOp

An operator to apply the subject with.

Svc string

Trusted attributes discharged by the service.

Sys ConditionSys

Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

Values []string

The objects of the condition.

iam ConditionIam

Trusted attributes supplied by the IAM system.

op ConditionOp

An operator to apply the subject with.

svc String

Trusted attributes discharged by the service.

sys ConditionSys

Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

values List<String>

The objects of the condition.

iam ConditionIam

Trusted attributes supplied by the IAM system.

op ConditionOp

An operator to apply the subject with.

svc string

Trusted attributes discharged by the service.

sys ConditionSys

Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

values string[]

The objects of the condition.

iam ConditionIam

Trusted attributes supplied by the IAM system.

op ConditionOp

An operator to apply the subject with.

svc str

Trusted attributes discharged by the service.

sys ConditionSys

Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

values Sequence[str]

The objects of the condition.

iam "NO_ATTR" | "AUTHORITY" | "ATTRIBUTION" | "SECURITY_REALM" | "APPROVER" | "JUSTIFICATION_TYPE" | "CREDENTIALS_TYPE" | "CREDS_ASSERTION"

Trusted attributes supplied by the IAM system.

op "NO_OP" | "EQUALS" | "NOT_EQUALS" | "IN" | "NOT_IN" | "DISCHARGED"

An operator to apply the subject with.

svc String

Trusted attributes discharged by the service.

sys "NO_ATTR" | "REGION" | "SERVICE" | "NAME" | "IP"

Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

values List<String>

The objects of the condition.

ConditionIam

NoAttr
NO_ATTR

Default non-attribute.

Authority
AUTHORITY

Either principal or (if present) authority selector.

Attribution
ATTRIBUTION

The principal (even if an authority selector is present), which must only be used for attribution, not authorization.

SecurityRealm
SECURITY_REALM

Any of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

Approver
APPROVER

An approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).

JustificationType
JUSTIFICATION_TYPE

What types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.

CredentialsType
CREDENTIALS_TYPE

What type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

CredsAssertion
CREDS_ASSERTION

EXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

ConditionIamNoAttr
NO_ATTR

Default non-attribute.

ConditionIamAuthority
AUTHORITY

Either principal or (if present) authority selector.

ConditionIamAttribution
ATTRIBUTION

The principal (even if an authority selector is present), which must only be used for attribution, not authorization.

ConditionIamSecurityRealm
SECURITY_REALM

Any of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

ConditionIamApprover
APPROVER

An approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).

ConditionIamJustificationType
JUSTIFICATION_TYPE

What types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.

ConditionIamCredentialsType
CREDENTIALS_TYPE

What type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

ConditionIamCredsAssertion
CREDS_ASSERTION

EXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

NoAttr
NO_ATTR

Default non-attribute.

Authority
AUTHORITY

Either principal or (if present) authority selector.

Attribution
ATTRIBUTION

The principal (even if an authority selector is present), which must only be used for attribution, not authorization.

SecurityRealm
SECURITY_REALM

Any of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

Approver
APPROVER

An approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).

JustificationType
JUSTIFICATION_TYPE

What types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.

CredentialsType
CREDENTIALS_TYPE

What type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

CredsAssertion
CREDS_ASSERTION

EXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

NoAttr
NO_ATTR

Default non-attribute.

Authority
AUTHORITY

Either principal or (if present) authority selector.

Attribution
ATTRIBUTION

The principal (even if an authority selector is present), which must only be used for attribution, not authorization.

SecurityRealm
SECURITY_REALM

Any of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

Approver
APPROVER

An approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).

JustificationType
JUSTIFICATION_TYPE

What types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.

CredentialsType
CREDENTIALS_TYPE

What type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

CredsAssertion
CREDS_ASSERTION

EXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

NO_ATTR
NO_ATTR

Default non-attribute.

AUTHORITY
AUTHORITY

Either principal or (if present) authority selector.

ATTRIBUTION
ATTRIBUTION

The principal (even if an authority selector is present), which must only be used for attribution, not authorization.

SECURITY_REALM
SECURITY_REALM

Any of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

APPROVER
APPROVER

An approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).

JUSTIFICATION_TYPE
JUSTIFICATION_TYPE

What types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.

CREDENTIALS_TYPE
CREDENTIALS_TYPE

What type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

CREDS_ASSERTION
CREDS_ASSERTION

EXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

"NO_ATTR"
NO_ATTR

Default non-attribute.

"AUTHORITY"
AUTHORITY

Either principal or (if present) authority selector.

"ATTRIBUTION"
ATTRIBUTION

The principal (even if an authority selector is present), which must only be used for attribution, not authorization.

"SECURITY_REALM"
SECURITY_REALM

Any of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

"APPROVER"
APPROVER

An approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).

"JUSTIFICATION_TYPE"
JUSTIFICATION_TYPE

What types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.

"CREDENTIALS_TYPE"
CREDENTIALS_TYPE

What type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

"CREDS_ASSERTION"
CREDS_ASSERTION

EXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

ConditionOp

NoOp
NO_OP

Default no-op.

EqualsValue
EQUALS

DEPRECATED. Use IN instead.

NotEquals
NOT_EQUALS

DEPRECATED. Use NOT_IN instead.

In
IN

The condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.

NotIn
NOT_IN

The condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.

Discharged
DISCHARGED

Subject is discharged

ConditionOpNoOp
NO_OP

Default no-op.

ConditionOpEquals
EQUALS

DEPRECATED. Use IN instead.

ConditionOpNotEquals
NOT_EQUALS

DEPRECATED. Use NOT_IN instead.

ConditionOpIn
IN

The condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.

ConditionOpNotIn
NOT_IN

The condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.

ConditionOpDischarged
DISCHARGED

Subject is discharged

NoOp
NO_OP

Default no-op.

Equals
EQUALS

DEPRECATED. Use IN instead.

NotEquals
NOT_EQUALS

DEPRECATED. Use NOT_IN instead.

In
IN

The condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.

NotIn
NOT_IN

The condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.

Discharged
DISCHARGED

Subject is discharged

NoOp
NO_OP

Default no-op.

Equals
EQUALS

DEPRECATED. Use IN instead.

NotEquals
NOT_EQUALS

DEPRECATED. Use NOT_IN instead.

In
IN

The condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.

NotIn
NOT_IN

The condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.

Discharged
DISCHARGED

Subject is discharged

NO_OP
NO_OP

Default no-op.

EQUALS
EQUALS

DEPRECATED. Use IN instead.

NOT_EQUALS
NOT_EQUALS

DEPRECATED. Use NOT_IN instead.

IN_
IN

The condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.

NOT_IN
NOT_IN

The condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.

DISCHARGED
DISCHARGED

Subject is discharged

"NO_OP"
NO_OP

Default no-op.

"EQUALS"
EQUALS

DEPRECATED. Use IN instead.

"NOT_EQUALS"
NOT_EQUALS

DEPRECATED. Use NOT_IN instead.

"IN"
IN

The condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.

"NOT_IN"
NOT_IN

The condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.

"DISCHARGED"
DISCHARGED

Subject is discharged

ConditionResponse

Iam string

Trusted attributes supplied by the IAM system.

Op string

An operator to apply the subject with.

Svc string

Trusted attributes discharged by the service.

Sys string

Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

Values List<string>

The objects of the condition.

Iam string

Trusted attributes supplied by the IAM system.

Op string

An operator to apply the subject with.

Svc string

Trusted attributes discharged by the service.

Sys string

Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

Values []string

The objects of the condition.

iam String

Trusted attributes supplied by the IAM system.

op String

An operator to apply the subject with.

svc String

Trusted attributes discharged by the service.

sys String

Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

values List<String>

The objects of the condition.

iam string

Trusted attributes supplied by the IAM system.

op string

An operator to apply the subject with.

svc string

Trusted attributes discharged by the service.

sys string

Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

values string[]

The objects of the condition.

iam str

Trusted attributes supplied by the IAM system.

op str

An operator to apply the subject with.

svc str

Trusted attributes discharged by the service.

sys str

Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

values Sequence[str]

The objects of the condition.

iam String

Trusted attributes supplied by the IAM system.

op String

An operator to apply the subject with.

svc String

Trusted attributes discharged by the service.

sys String

Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.

values List<String>

The objects of the condition.

ConditionSys

NoAttr
NO_ATTR

Default non-attribute type

Region
REGION

Region of the resource

Service
SERVICE

Service name

Name
NAME

Resource name

Ip
IP

IP address of the caller

ConditionSysNoAttr
NO_ATTR

Default non-attribute type

ConditionSysRegion
REGION

Region of the resource

ConditionSysService
SERVICE

Service name

ConditionSysName
NAME

Resource name

ConditionSysIp
IP

IP address of the caller

NoAttr
NO_ATTR

Default non-attribute type

Region
REGION

Region of the resource

Service
SERVICE

Service name

Name
NAME

Resource name

Ip
IP

IP address of the caller

NoAttr
NO_ATTR

Default non-attribute type

Region
REGION

Region of the resource

Service
SERVICE

Service name

Name
NAME

Resource name

Ip
IP

IP address of the caller

NO_ATTR
NO_ATTR

Default non-attribute type

REGION
REGION

Region of the resource

SERVICE
SERVICE

Service name

NAME
NAME

Resource name

IP
IP

IP address of the caller

"NO_ATTR"
NO_ATTR

Default non-attribute type

"REGION"
REGION

Region of the resource

"SERVICE"
SERVICE

Service name

"NAME"
NAME

Resource name

"IP"
IP

IP address of the caller

CounterOptions

CustomFields List<Pulumi.GoogleNative.GameServices.V1.Inputs.CustomField>

Custom fields.

Field string

The field value to attribute.

Metric string

The metric to update.

CustomFields []CustomField

Custom fields.

Field string

The field value to attribute.

Metric string

The metric to update.

customFields List<CustomField>

Custom fields.

field String

The field value to attribute.

metric String

The metric to update.

customFields CustomField[]

Custom fields.

field string

The field value to attribute.

metric string

The metric to update.

custom_fields Sequence[CustomField]

Custom fields.

field str

The field value to attribute.

metric str

The metric to update.

customFields List<Property Map>

Custom fields.

field String

The field value to attribute.

metric String

The metric to update.

CounterOptionsResponse

CustomFields List<Pulumi.GoogleNative.GameServices.V1.Inputs.CustomFieldResponse>

Custom fields.

Field string

The field value to attribute.

Metric string

The metric to update.

CustomFields []CustomFieldResponse

Custom fields.

Field string

The field value to attribute.

Metric string

The metric to update.

customFields List<CustomFieldResponse>

Custom fields.

field String

The field value to attribute.

metric String

The metric to update.

customFields CustomFieldResponse[]

Custom fields.

field string

The field value to attribute.

metric string

The metric to update.

custom_fields Sequence[CustomFieldResponse]

Custom fields.

field str

The field value to attribute.

metric str

The metric to update.

customFields List<Property Map>

Custom fields.

field String

The field value to attribute.

metric String

The metric to update.

CustomField

Name string

Name is the field name.

Value string

Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

Name string

Name is the field name.

Value string

Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

name String

Name is the field name.

value String

Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

name string

Name is the field name.

value string

Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

name str

Name is the field name.

value str

Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

name String

Name is the field name.

value String

Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

CustomFieldResponse

Name string

Name is the field name.

Value string

Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

Name string

Name is the field name.

Value string

Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

name String

Name is the field name.

value String

Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

name string

Name is the field name.

value string

Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

name str

Name is the field name.

value str

Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

name String

Name is the field name.

value String

Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

DataAccessOptions

DataAccessOptionsLogMode

LogModeUnspecified
LOG_MODE_UNSPECIFIED

Client is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).

LogFailClosed
LOG_FAIL_CLOSED

The application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.

DataAccessOptionsLogModeLogModeUnspecified
LOG_MODE_UNSPECIFIED

Client is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).

DataAccessOptionsLogModeLogFailClosed
LOG_FAIL_CLOSED

The application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.

LogModeUnspecified
LOG_MODE_UNSPECIFIED

Client is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).

LogFailClosed
LOG_FAIL_CLOSED

The application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.

LogModeUnspecified
LOG_MODE_UNSPECIFIED

Client is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).

LogFailClosed
LOG_FAIL_CLOSED

The application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.

LOG_MODE_UNSPECIFIED
LOG_MODE_UNSPECIFIED

Client is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).

LOG_FAIL_CLOSED
LOG_FAIL_CLOSED

The application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.

"LOG_MODE_UNSPECIFIED"
LOG_MODE_UNSPECIFIED

Client is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).

"LOG_FAIL_CLOSED"
LOG_FAIL_CLOSED

The application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.

DataAccessOptionsResponse

LogMode string
LogMode string
logMode String
logMode string
logMode String

Expr

Description string

Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

Expression string

Textual representation of an expression in Common Expression Language syntax.

Location string

Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

Title string

Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

Description string

Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

Expression string

Textual representation of an expression in Common Expression Language syntax.

Location string

Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

Title string

Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

description String

Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

expression String

Textual representation of an expression in Common Expression Language syntax.

location String

Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

title String

Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

description string

Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

expression string

Textual representation of an expression in Common Expression Language syntax.

location string

Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

title string

Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

description str

Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

expression str

Textual representation of an expression in Common Expression Language syntax.

location str

Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

title str

Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

description String

Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

expression String

Textual representation of an expression in Common Expression Language syntax.

location String

Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

title String

Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

ExprResponse

Description string

Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

Expression string

Textual representation of an expression in Common Expression Language syntax.

Location string

Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

Title string

Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

Description string

Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

Expression string

Textual representation of an expression in Common Expression Language syntax.

Location string

Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

Title string

Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

description String

Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

expression String

Textual representation of an expression in Common Expression Language syntax.

location String

Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

title String

Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

description string

Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

expression string

Textual representation of an expression in Common Expression Language syntax.

location string

Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

title string

Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

description str

Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

expression str

Textual representation of an expression in Common Expression Language syntax.

location str

Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

title str

Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

description String

Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.

expression String

Textual representation of an expression in Common Expression Language syntax.

location String

Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.

title String

Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

LogConfig

CloudAudit CloudAuditOptions

Cloud audit options.

Counter CounterOptions

Counter options.

DataAccess DataAccessOptions

Data access options.

cloudAudit CloudAuditOptions

Cloud audit options.

counter CounterOptions

Counter options.

dataAccess DataAccessOptions

Data access options.

cloudAudit CloudAuditOptions

Cloud audit options.

counter CounterOptions

Counter options.

dataAccess DataAccessOptions

Data access options.

cloud_audit CloudAuditOptions

Cloud audit options.

counter CounterOptions

Counter options.

data_access DataAccessOptions

Data access options.

cloudAudit Property Map

Cloud audit options.

counter Property Map

Counter options.

dataAccess Property Map

Data access options.

LogConfigResponse

cloudAudit Property Map

Cloud audit options.

counter Property Map

Counter options.

dataAccess Property Map

Data access options.

Rule

Action Pulumi.GoogleNative.GameServices.V1.RuleAction

Required

Conditions List<Pulumi.GoogleNative.GameServices.V1.Inputs.Condition>

Additional restrictions that must be met. All conditions must pass for the rule to match.

Description string

Human-readable description of the rule.

In List<string>

If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

LogConfig List<Pulumi.GoogleNative.GameServices.V1.Inputs.LogConfig>

The config returned to callers of CheckPolicy for any entries that match the LOG action.

NotIn List<string>

If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

Permissions List<string>

A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

Action RuleAction

Required

Conditions []Condition

Additional restrictions that must be met. All conditions must pass for the rule to match.

Description string

Human-readable description of the rule.

In []string

If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

LogConfig []LogConfig

The config returned to callers of CheckPolicy for any entries that match the LOG action.

NotIn []string

If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

Permissions []string

A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

action RuleAction

Required

conditions List<Condition>

Additional restrictions that must be met. All conditions must pass for the rule to match.

description String

Human-readable description of the rule.

in List<String>

If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

logConfig List<LogConfig>

The config returned to callers of CheckPolicy for any entries that match the LOG action.

notIn List<String>

If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

permissions List<String>

A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

action RuleAction

Required

conditions Condition[]

Additional restrictions that must be met. All conditions must pass for the rule to match.

description string

Human-readable description of the rule.

in string[]

If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

logConfig LogConfig[]

The config returned to callers of CheckPolicy for any entries that match the LOG action.

notIn string[]

If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

permissions string[]

A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

action RuleAction

Required

conditions Sequence[Condition]

Additional restrictions that must be met. All conditions must pass for the rule to match.

description str

Human-readable description of the rule.

in_ Sequence[str]

If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

log_config Sequence[LogConfig]

The config returned to callers of CheckPolicy for any entries that match the LOG action.

not_in Sequence[str]

If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

permissions Sequence[str]

A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

action "NO_ACTION" | "ALLOW" | "ALLOW_WITH_LOG" | "DENY" | "DENY_WITH_LOG" | "LOG"

Required

conditions List<Property Map>

Additional restrictions that must be met. All conditions must pass for the rule to match.

description String

Human-readable description of the rule.

in List<String>

If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

logConfig List<Property Map>

The config returned to callers of CheckPolicy for any entries that match the LOG action.

notIn List<String>

If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

permissions List<String>

A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

RuleAction

NoAction
NO_ACTION

Default no action.

Allow
ALLOW

Matching 'Entries' grant access.

AllowWithLog
ALLOW_WITH_LOG

Matching 'Entries' grant access and the caller promises to log the request per the returned log_configs.

Deny
DENY

Matching 'Entries' deny access.

DenyWithLog
DENY_WITH_LOG

Matching 'Entries' deny access and the caller promises to log the request per the returned log_configs.

Log
LOG

Matching 'Entries' tell IAM.Check callers to generate logs.

RuleActionNoAction
NO_ACTION

Default no action.

RuleActionAllow
ALLOW

Matching 'Entries' grant access.

RuleActionAllowWithLog
ALLOW_WITH_LOG

Matching 'Entries' grant access and the caller promises to log the request per the returned log_configs.

RuleActionDeny
DENY

Matching 'Entries' deny access.

RuleActionDenyWithLog
DENY_WITH_LOG

Matching 'Entries' deny access and the caller promises to log the request per the returned log_configs.

RuleActionLog
LOG

Matching 'Entries' tell IAM.Check callers to generate logs.

NoAction
NO_ACTION

Default no action.

Allow
ALLOW

Matching 'Entries' grant access.

AllowWithLog
ALLOW_WITH_LOG

Matching 'Entries' grant access and the caller promises to log the request per the returned log_configs.

Deny
DENY

Matching 'Entries' deny access.

DenyWithLog
DENY_WITH_LOG

Matching 'Entries' deny access and the caller promises to log the request per the returned log_configs.

Log
LOG

Matching 'Entries' tell IAM.Check callers to generate logs.

NoAction
NO_ACTION

Default no action.

Allow
ALLOW

Matching 'Entries' grant access.

AllowWithLog
ALLOW_WITH_LOG

Matching 'Entries' grant access and the caller promises to log the request per the returned log_configs.

Deny
DENY

Matching 'Entries' deny access.

DenyWithLog
DENY_WITH_LOG

Matching 'Entries' deny access and the caller promises to log the request per the returned log_configs.

Log
LOG

Matching 'Entries' tell IAM.Check callers to generate logs.

NO_ACTION
NO_ACTION

Default no action.

ALLOW
ALLOW

Matching 'Entries' grant access.

ALLOW_WITH_LOG
ALLOW_WITH_LOG

Matching 'Entries' grant access and the caller promises to log the request per the returned log_configs.

DENY
DENY

Matching 'Entries' deny access.

DENY_WITH_LOG
DENY_WITH_LOG

Matching 'Entries' deny access and the caller promises to log the request per the returned log_configs.

LOG
LOG

Matching 'Entries' tell IAM.Check callers to generate logs.

"NO_ACTION"
NO_ACTION

Default no action.

"ALLOW"
ALLOW

Matching 'Entries' grant access.

"ALLOW_WITH_LOG"
ALLOW_WITH_LOG

Matching 'Entries' grant access and the caller promises to log the request per the returned log_configs.

"DENY"
DENY

Matching 'Entries' deny access.

"DENY_WITH_LOG"
DENY_WITH_LOG

Matching 'Entries' deny access and the caller promises to log the request per the returned log_configs.

"LOG"
LOG

Matching 'Entries' tell IAM.Check callers to generate logs.

RuleResponse

Action string

Required

Conditions List<Pulumi.GoogleNative.GameServices.V1.Inputs.ConditionResponse>

Additional restrictions that must be met. All conditions must pass for the rule to match.

Description string

Human-readable description of the rule.

In List<string>

If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

LogConfig List<Pulumi.GoogleNative.GameServices.V1.Inputs.LogConfigResponse>

The config returned to callers of CheckPolicy for any entries that match the LOG action.

NotIn List<string>

If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

Permissions List<string>

A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

Action string

Required

Conditions []ConditionResponse

Additional restrictions that must be met. All conditions must pass for the rule to match.

Description string

Human-readable description of the rule.

In []string

If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

LogConfig []LogConfigResponse

The config returned to callers of CheckPolicy for any entries that match the LOG action.

NotIn []string

If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

Permissions []string

A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

action String

Required

conditions List<ConditionResponse>

Additional restrictions that must be met. All conditions must pass for the rule to match.

description String

Human-readable description of the rule.

in List<String>

If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

logConfig List<LogConfigResponse>

The config returned to callers of CheckPolicy for any entries that match the LOG action.

notIn List<String>

If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

permissions List<String>

A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

action string

Required

conditions ConditionResponse[]

Additional restrictions that must be met. All conditions must pass for the rule to match.

description string

Human-readable description of the rule.

in string[]

If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

logConfig LogConfigResponse[]

The config returned to callers of CheckPolicy for any entries that match the LOG action.

notIn string[]

If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

permissions string[]

A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

action str

Required

conditions Sequence[ConditionResponse]

Additional restrictions that must be met. All conditions must pass for the rule to match.

description str

Human-readable description of the rule.

in_ Sequence[str]

If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

log_config Sequence[LogConfigResponse]

The config returned to callers of CheckPolicy for any entries that match the LOG action.

not_in Sequence[str]

If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

permissions Sequence[str]

A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

action String

Required

conditions List<Property Map>

Additional restrictions that must be met. All conditions must pass for the rule to match.

description String

Human-readable description of the rule.

in List<String>

If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.

logConfig List<Property Map>

The config returned to callers of CheckPolicy for any entries that match the LOG action.

notIn List<String>

If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).

permissions List<String>

A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

Package Details

Repository
Google Cloud Native pulumi/pulumi-google-native
License
Apache-2.0