Welcome to Pulumi Registry, your window into the cloud. Read the announcement.

Google Native

v0.9.0 published on Wednesday, Nov 24, 2021 by Pulumi

GameServerDeploymentIamPolicy

Sets the access control policy on the specified resource. Replaces any existing policy. Can return NOT_FOUND, INVALID_ARGUMENT, and PERMISSION_DENIED errors. Note - this resource’s API doesn’t support deletion. When deleted, the resource will persist on Google Cloud even though it will be deleted from Pulumi state.

Create a GameServerDeploymentIamPolicy Resource

new GameServerDeploymentIamPolicy(name: string, args: GameServerDeploymentIamPolicyArgs, opts?: CustomResourceOptions);
@overload
def GameServerDeploymentIamPolicy(resource_name: str,
                                  opts: Optional[ResourceOptions] = None,
                                  audit_configs: Optional[Sequence[AuditConfigArgs]] = None,
                                  bindings: Optional[Sequence[BindingArgs]] = None,
                                  etag: Optional[str] = None,
                                  game_server_deployment_id: Optional[str] = None,
                                  location: Optional[str] = None,
                                  project: Optional[str] = None,
                                  rules: Optional[Sequence[RuleArgs]] = None,
                                  update_mask: Optional[str] = None,
                                  version: Optional[int] = None)
@overload
def GameServerDeploymentIamPolicy(resource_name: str,
                                  args: GameServerDeploymentIamPolicyArgs,
                                  opts: Optional[ResourceOptions] = None)
func NewGameServerDeploymentIamPolicy(ctx *Context, name string, args GameServerDeploymentIamPolicyArgs, opts ...ResourceOption) (*GameServerDeploymentIamPolicy, error)
public GameServerDeploymentIamPolicy(string name, GameServerDeploymentIamPolicyArgs args, CustomResourceOptions? opts = null)
name string
The unique name of the resource.
args GameServerDeploymentIamPolicyArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name str
The unique name of the resource.
args GameServerDeploymentIamPolicyArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name string
The unique name of the resource.
args GameServerDeploymentIamPolicyArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name string
The unique name of the resource.
args GameServerDeploymentIamPolicyArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.

GameServerDeploymentIamPolicy Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

The GameServerDeploymentIamPolicy resource accepts the following input properties:

GameServerDeploymentId string
AuditConfigs List<Pulumi.GoogleNative.GameServices.V1.Inputs.AuditConfigArgs>
Specifies cloud audit logging configuration for this policy.
Bindings List<Pulumi.GoogleNative.GameServices.V1.Inputs.BindingArgs>
Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.
Etag string
etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.
Location string
Project string
Rules List<Pulumi.GoogleNative.GameServices.V1.Inputs.RuleArgs>
If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
UpdateMask string
OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
Version int
Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.
GameServerDeploymentId string
AuditConfigs []AuditConfigArgs
Specifies cloud audit logging configuration for this policy.
Bindings []BindingArgs
Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.
Etag string
etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.
Location string
Project string
Rules []RuleArgs
If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
UpdateMask string
OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
Version int
Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.
gameServerDeploymentId string
auditConfigs AuditConfigArgs[]
Specifies cloud audit logging configuration for this policy.
bindings BindingArgs[]
Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.
etag string
etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.
location string
project string
rules RuleArgs[]
If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
updateMask string
OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
version number
Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.
game_server_deployment_id str
audit_configs Sequence[AuditConfigArgs]
Specifies cloud audit logging configuration for this policy.
bindings Sequence[BindingArgs]
Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.
etag str
etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.
location str
project str
rules Sequence[RuleArgs]
If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
update_mask str
OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
version int
Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.

Outputs

All input properties are implicitly available as output properties. Additionally, the GameServerDeploymentIamPolicy resource produces the following output properties:

Id string
The provider-assigned unique ID for this managed resource.
Id string
The provider-assigned unique ID for this managed resource.
id string
The provider-assigned unique ID for this managed resource.
id str
The provider-assigned unique ID for this managed resource.

Supporting Types

AuditConfig

AuditLogConfigs List<Pulumi.GoogleNative.GameServices.V1.Inputs.AuditLogConfig>
The configuration for logging of each type of permission.
ExemptedMembers List<string>
Service string
Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
AuditLogConfigs []AuditLogConfig
The configuration for logging of each type of permission.
ExemptedMembers []string
Service string
Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
auditLogConfigs AuditLogConfig[]
The configuration for logging of each type of permission.
exemptedMembers string[]
service string
Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
audit_log_configs Sequence[AuditLogConfig]
The configuration for logging of each type of permission.
exempted_members Sequence[str]
service str
Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

AuditConfigResponse

AuditLogConfigs List<Pulumi.GoogleNative.GameServices.V1.Inputs.AuditLogConfigResponse>
The configuration for logging of each type of permission.
ExemptedMembers List<string>
Service string
Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
AuditLogConfigs []AuditLogConfigResponse
The configuration for logging of each type of permission.
ExemptedMembers []string
Service string
Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
auditLogConfigs AuditLogConfigResponse[]
The configuration for logging of each type of permission.
exemptedMembers string[]
service string
Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
audit_log_configs Sequence[AuditLogConfigResponse]
The configuration for logging of each type of permission.
exempted_members Sequence[str]
service str
Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

AuditLogConfig

ExemptedMembers List<string>
Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
IgnoreChildExemptions bool
LogType Pulumi.GoogleNative.GameServices.V1.AuditLogConfigLogType
The log type that this config enables.
ExemptedMembers []string
Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
IgnoreChildExemptions bool
LogType AuditLogConfigLogType
The log type that this config enables.
exemptedMembers string[]
Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
ignoreChildExemptions boolean
logType AuditLogConfigLogType
The log type that this config enables.
exempted_members Sequence[str]
Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
ignore_child_exemptions bool
log_type AuditLogConfigLogType
The log type that this config enables.

AuditLogConfigLogType

LogTypeUnspecified
LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
AdminRead
ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
DataWrite
DATA_WRITEData writes. Example: CloudSQL Users create
DataRead
DATA_READData reads. Example: CloudSQL Users list
AuditLogConfigLogTypeLogTypeUnspecified
LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
AuditLogConfigLogTypeAdminRead
ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
AuditLogConfigLogTypeDataWrite
DATA_WRITEData writes. Example: CloudSQL Users create
AuditLogConfigLogTypeDataRead
DATA_READData reads. Example: CloudSQL Users list
LogTypeUnspecified
LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
AdminRead
ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
DataWrite
DATA_WRITEData writes. Example: CloudSQL Users create
DataRead
DATA_READData reads. Example: CloudSQL Users list
LOG_TYPE_UNSPECIFIED
LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
ADMIN_READ
ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
DATA_WRITE
DATA_WRITEData writes. Example: CloudSQL Users create
DATA_READ
DATA_READData reads. Example: CloudSQL Users list

AuditLogConfigResponse

ExemptedMembers List<string>
Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
IgnoreChildExemptions bool
LogType string
The log type that this config enables.
ExemptedMembers []string
Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
IgnoreChildExemptions bool
LogType string
The log type that this config enables.
exemptedMembers string[]
Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
ignoreChildExemptions boolean
logType string
The log type that this config enables.
exempted_members Sequence[str]
Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
ignore_child_exemptions bool
log_type str
The log type that this config enables.

AuthorizationLoggingOptions

PermissionType AuthorizationLoggingOptionsPermissionType
The type of the permission that was checked.
permissionType AuthorizationLoggingOptionsPermissionType
The type of the permission that was checked.
permission_type AuthorizationLoggingOptionsPermissionType
The type of the permission that was checked.

AuthorizationLoggingOptionsPermissionType

PermissionTypeUnspecified
PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
AdminRead
ADMIN_READA read of admin (meta) data.
AdminWrite
ADMIN_WRITEA write of admin (meta) data.
DataRead
DATA_READA read of standard data.
DataWrite
DATA_WRITEA write of standard data.
AuthorizationLoggingOptionsPermissionTypePermissionTypeUnspecified
PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
AuthorizationLoggingOptionsPermissionTypeAdminRead
ADMIN_READA read of admin (meta) data.
AuthorizationLoggingOptionsPermissionTypeAdminWrite
ADMIN_WRITEA write of admin (meta) data.
AuthorizationLoggingOptionsPermissionTypeDataRead
DATA_READA read of standard data.
AuthorizationLoggingOptionsPermissionTypeDataWrite
DATA_WRITEA write of standard data.
PermissionTypeUnspecified
PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
AdminRead
ADMIN_READA read of admin (meta) data.
AdminWrite
ADMIN_WRITEA write of admin (meta) data.
DataRead
DATA_READA read of standard data.
DataWrite
DATA_WRITEA write of standard data.
PERMISSION_TYPE_UNSPECIFIED
PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
ADMIN_READ
ADMIN_READA read of admin (meta) data.
ADMIN_WRITE
ADMIN_WRITEA write of admin (meta) data.
DATA_READ
DATA_READA read of standard data.
DATA_WRITE
DATA_WRITEA write of standard data.

AuthorizationLoggingOptionsResponse

PermissionType string
The type of the permission that was checked.
PermissionType string
The type of the permission that was checked.
permissionType string
The type of the permission that was checked.
permission_type str
The type of the permission that was checked.

Binding

BindingId string
Condition Pulumi.GoogleNative.GameServices.V1.Inputs.Expr
The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
Members List<string>
Specifies the principals requesting access for a Cloud Platform resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com.
Role string
Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
BindingId string
Condition Expr
The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
Members []string
Specifies the principals requesting access for a Cloud Platform resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com.
Role string
Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
bindingId string
condition Expr
The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
members string[]
Specifies the principals requesting access for a Cloud Platform resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com.
role string
Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
binding_id str
condition Expr
The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
members Sequence[str]
Specifies the principals requesting access for a Cloud Platform resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com.
role str
Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

BindingResponse

BindingId string
Condition Pulumi.GoogleNative.GameServices.V1.Inputs.ExprResponse
The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
Members List<string>
Specifies the principals requesting access for a Cloud Platform resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com.
Role string
Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
BindingId string
Condition ExprResponse
The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
Members []string
Specifies the principals requesting access for a Cloud Platform resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com.
Role string
Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
bindingId string
condition ExprResponse
The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
members string[]
Specifies the principals requesting access for a Cloud Platform resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com.
role string
Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
binding_id str
condition ExprResponse
The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
members Sequence[str]
Specifies the principals requesting access for a Cloud Platform resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a service account. For example, my-other-app@appspot.gserviceaccount.com. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com.
role str
Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

CloudAuditOptions

AuthorizationLoggingOptions AuthorizationLoggingOptions
Information used by the Cloud Audit Logging pipeline.
LogName CloudAuditOptionsLogName
The log_name to populate in the Cloud Audit Record.
authorizationLoggingOptions AuthorizationLoggingOptions
Information used by the Cloud Audit Logging pipeline.
logName CloudAuditOptionsLogName
The log_name to populate in the Cloud Audit Record.
authorization_logging_options AuthorizationLoggingOptions
Information used by the Cloud Audit Logging pipeline.
log_name CloudAuditOptionsLogName
The log_name to populate in the Cloud Audit Record.

CloudAuditOptionsLogName

UnspecifiedLogName
UNSPECIFIED_LOG_NAMEDefault. Should not be used.
AdminActivity
ADMIN_ACTIVITYCorresponds to “cloudaudit.googleapis.com/activity”
DataAccess
DATA_ACCESSCorresponds to “cloudaudit.googleapis.com/data_access”
CloudAuditOptionsLogNameUnspecifiedLogName
UNSPECIFIED_LOG_NAMEDefault. Should not be used.
CloudAuditOptionsLogNameAdminActivity
ADMIN_ACTIVITYCorresponds to “cloudaudit.googleapis.com/activity”
CloudAuditOptionsLogNameDataAccess
DATA_ACCESSCorresponds to “cloudaudit.googleapis.com/data_access”
UnspecifiedLogName
UNSPECIFIED_LOG_NAMEDefault. Should not be used.
AdminActivity
ADMIN_ACTIVITYCorresponds to “cloudaudit.googleapis.com/activity”
DataAccess
DATA_ACCESSCorresponds to “cloudaudit.googleapis.com/data_access”
UNSPECIFIED_LOG_NAME
UNSPECIFIED_LOG_NAMEDefault. Should not be used.
ADMIN_ACTIVITY
ADMIN_ACTIVITYCorresponds to “cloudaudit.googleapis.com/activity”
DATA_ACCESS
DATA_ACCESSCorresponds to “cloudaudit.googleapis.com/data_access”

CloudAuditOptionsResponse

AuthorizationLoggingOptions Pulumi.GoogleNative.GameServices.V1.Inputs.AuthorizationLoggingOptionsResponse
Information used by the Cloud Audit Logging pipeline.
LogName string
The log_name to populate in the Cloud Audit Record.
AuthorizationLoggingOptions AuthorizationLoggingOptionsResponse
Information used by the Cloud Audit Logging pipeline.
LogName string
The log_name to populate in the Cloud Audit Record.
authorizationLoggingOptions AuthorizationLoggingOptionsResponse
Information used by the Cloud Audit Logging pipeline.
logName string
The log_name to populate in the Cloud Audit Record.
authorization_logging_options AuthorizationLoggingOptionsResponse
Information used by the Cloud Audit Logging pipeline.
log_name str
The log_name to populate in the Cloud Audit Record.

Condition

Iam Pulumi.GoogleNative.GameServices.V1.ConditionIam
Trusted attributes supplied by the IAM system.
Op Pulumi.GoogleNative.GameServices.V1.ConditionOp
An operator to apply the subject with.
Svc string
Trusted attributes discharged by the service.
Sys Pulumi.GoogleNative.GameServices.V1.ConditionSys
Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
Values List<string>
The objects of the condition.
Iam ConditionIam
Trusted attributes supplied by the IAM system.
Op ConditionOp
An operator to apply the subject with.
Svc string
Trusted attributes discharged by the service.
Sys ConditionSys
Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
Values []string
The objects of the condition.
iam ConditionIam
Trusted attributes supplied by the IAM system.
op ConditionOp
An operator to apply the subject with.
svc string
Trusted attributes discharged by the service.
sys ConditionSys
Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
values string[]
The objects of the condition.
iam ConditionIam
Trusted attributes supplied by the IAM system.
op ConditionOp
An operator to apply the subject with.
svc str
Trusted attributes discharged by the service.
sys ConditionSys
Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
values Sequence[str]
The objects of the condition.

ConditionIam

NoAttr
NO_ATTRDefault non-attribute.
Authority
AUTHORITYEither principal or (if present) authority selector.
Attribution
ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
SecurityRealm
SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates “any of the request’s realms match one of the given values; with NOT_IN, “none of the realms match any of the given values”. Note that a value can be: - ‘self’ (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - ‘self:metro’ (i.e., clients that are in the same metro) - ‘self:cloud-region’ (i.e., allow connections from clients that are in the same cloud region) - ‘self:prod-region’ (i.e., allow connections from clients that are in the same prod region) - ‘guardians’ (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - a realm (e.g., ‘campus-abc’) - a realm group (e.g., ‘realms-for-borg-cell-xx’, see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN).
Approver
APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
JustificationType
JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. “MANUAL_STRING”. It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
CredentialsType
CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN).
CredsAssertion
CREDS_ASSERTIONEXPERIMENTAL – DO NOT USE. The conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN).
ConditionIamNoAttr
NO_ATTRDefault non-attribute.
ConditionIamAuthority
AUTHORITYEither principal or (if present) authority selector.
ConditionIamAttribution
ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
ConditionIamSecurityRealm
SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates “any of the request’s realms match one of the given values; with NOT_IN, “none of the realms match any of the given values”. Note that a value can be: - ‘self’ (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - ‘self:metro’ (i.e., clients that are in the same metro) - ‘self:cloud-region’ (i.e., allow connections from clients that are in the same cloud region) - ‘self:prod-region’ (i.e., allow connections from clients that are in the same prod region) - ‘guardians’ (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - a realm (e.g., ‘campus-abc’) - a realm group (e.g., ‘realms-for-borg-cell-xx’, see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN).
ConditionIamApprover
APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
ConditionIamJustificationType
JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. “MANUAL_STRING”. It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
ConditionIamCredentialsType
CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN).
ConditionIamCredsAssertion
CREDS_ASSERTIONEXPERIMENTAL – DO NOT USE. The conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN).
NoAttr
NO_ATTRDefault non-attribute.
Authority
AUTHORITYEither principal or (if present) authority selector.
Attribution
ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
SecurityRealm
SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates “any of the request’s realms match one of the given values; with NOT_IN, “none of the realms match any of the given values”. Note that a value can be: - ‘self’ (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - ‘self:metro’ (i.e., clients that are in the same metro) - ‘self:cloud-region’ (i.e., allow connections from clients that are in the same cloud region) - ‘self:prod-region’ (i.e., allow connections from clients that are in the same prod region) - ‘guardians’ (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - a realm (e.g., ‘campus-abc’) - a realm group (e.g., ‘realms-for-borg-cell-xx’, see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN).
Approver
APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
JustificationType
JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. “MANUAL_STRING”. It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
CredentialsType
CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN).
CredsAssertion
CREDS_ASSERTIONEXPERIMENTAL – DO NOT USE. The conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN).
NO_ATTR
NO_ATTRDefault non-attribute.
AUTHORITY
AUTHORITYEither principal or (if present) authority selector.
ATTRIBUTION
ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
SECURITY_REALM
SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates “any of the request’s realms match one of the given values; with NOT_IN, “none of the realms match any of the given values”. Note that a value can be: - ‘self’ (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - ‘self:metro’ (i.e., clients that are in the same metro) - ‘self:cloud-region’ (i.e., allow connections from clients that are in the same cloud region) - ‘self:prod-region’ (i.e., allow connections from clients that are in the same prod region) - ‘guardians’ (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - a realm (e.g., ‘campus-abc’) - a realm group (e.g., ‘realms-for-borg-cell-xx’, see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN).
APPROVER
APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
JUSTIFICATION_TYPE
JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. “MANUAL_STRING”. It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
CREDENTIALS_TYPE
CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN).
CREDS_ASSERTION
CREDS_ASSERTIONEXPERIMENTAL – DO NOT USE. The conditions can only be used in a “positive” context (e.g., ALLOW/IN or DENY/NOT_IN).

ConditionOp

NoOp
NO_OPDefault no-op.
EqualsValue
EQUALSDEPRECATED. Use IN instead.
NotEquals
NOT_EQUALSDEPRECATED. Use NOT_IN instead.
In
INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
NotIn
NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
Discharged
DISCHARGEDSubject is discharged
ConditionOpNoOp
NO_OPDefault no-op.
ConditionOpEquals
EQUALSDEPRECATED. Use IN instead.
ConditionOpNotEquals
NOT_EQUALSDEPRECATED. Use NOT_IN instead.
ConditionOpIn
INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
ConditionOpNotIn
NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
ConditionOpDischarged
DISCHARGEDSubject is discharged
NoOp
NO_OPDefault no-op.
Equals
EQUALSDEPRECATED. Use IN instead.
NotEquals
NOT_EQUALSDEPRECATED. Use NOT_IN instead.
In
INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
NotIn
NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
Discharged
DISCHARGEDSubject is discharged
NO_OP
NO_OPDefault no-op.
EQUALS
EQUALSDEPRECATED. Use IN instead.
NOT_EQUALS
NOT_EQUALSDEPRECATED. Use NOT_IN instead.
IN_
INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
NOT_IN
NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
DISCHARGED
DISCHARGEDSubject is discharged

ConditionResponse

Iam string
Trusted attributes supplied by the IAM system.
Op string
An operator to apply the subject with.
Svc string
Trusted attributes discharged by the service.
Sys string
Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
Values List<string>
The objects of the condition.
Iam string
Trusted attributes supplied by the IAM system.
Op string
An operator to apply the subject with.
Svc string
Trusted attributes discharged by the service.
Sys string
Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
Values []string
The objects of the condition.
iam string
Trusted attributes supplied by the IAM system.
op string
An operator to apply the subject with.
svc string
Trusted attributes discharged by the service.
sys string
Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
values string[]
The objects of the condition.
iam str
Trusted attributes supplied by the IAM system.
op str
An operator to apply the subject with.
svc str
Trusted attributes discharged by the service.
sys str
Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
values Sequence[str]
The objects of the condition.

ConditionSys

NoAttr
NO_ATTRDefault non-attribute type
Region
REGIONRegion of the resource
Service
SERVICEService name
Name
NAMEResource name
Ip
IPIP address of the caller
ConditionSysNoAttr
NO_ATTRDefault non-attribute type
ConditionSysRegion
REGIONRegion of the resource
ConditionSysService
SERVICEService name
ConditionSysName
NAMEResource name
ConditionSysIp
IPIP address of the caller
NoAttr
NO_ATTRDefault non-attribute type
Region
REGIONRegion of the resource
Service
SERVICEService name
Name
NAMEResource name
Ip
IPIP address of the caller
NO_ATTR
NO_ATTRDefault non-attribute type
REGION
REGIONRegion of the resource
SERVICE
SERVICEService name
NAME
NAMEResource name
IP
IPIP address of the caller

CounterOptions

CustomFields List<Pulumi.GoogleNative.GameServices.V1.Inputs.CustomField>
Custom fields.
Field string
The field value to attribute.
Metric string
The metric to update.
CustomFields []CustomField
Custom fields.
Field string
The field value to attribute.
Metric string
The metric to update.
customFields CustomField[]
Custom fields.
field string
The field value to attribute.
metric string
The metric to update.
custom_fields Sequence[CustomField]
Custom fields.
field str
The field value to attribute.
metric str
The metric to update.

CounterOptionsResponse

CustomFields List<Pulumi.GoogleNative.GameServices.V1.Inputs.CustomFieldResponse>
Custom fields.
Field string
The field value to attribute.
Metric string
The metric to update.
CustomFields []CustomFieldResponse
Custom fields.
Field string
The field value to attribute.
Metric string
The metric to update.
customFields CustomFieldResponse[]
Custom fields.
field string
The field value to attribute.
metric string
The metric to update.
custom_fields Sequence[CustomFieldResponse]
Custom fields.
field str
The field value to attribute.
metric str
The metric to update.

CustomField

Name string
Name is the field name.
Value string
Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
Name string
Name is the field name.
Value string
Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
name string
Name is the field name.
value string
Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
name str
Name is the field name.
value str
Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

CustomFieldResponse

Name string
Name is the field name.
Value string
Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
Name string
Name is the field name.
Value string
Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
name string
Name is the field name.
value string
Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
name str
Name is the field name.
value str
Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

DataAccessOptions

DataAccessOptionsLogMode

LogModeUnspecified
LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
LogFailClosed
LOG_FAIL_CLOSEDThe application’s operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.
DataAccessOptionsLogModeLogModeUnspecified
LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
DataAccessOptionsLogModeLogFailClosed
LOG_FAIL_CLOSEDThe application’s operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.
LogModeUnspecified
LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
LogFailClosed
LOG_FAIL_CLOSEDThe application’s operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.
LOG_MODE_UNSPECIFIED
LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
LOG_FAIL_CLOSED
LOG_FAIL_CLOSEDThe application’s operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.

DataAccessOptionsResponse

LogMode string
LogMode string
logMode string

Expr

Description string
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
Expression string
Textual representation of an expression in Common Expression Language syntax.
Location string
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
Title string
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
Description string
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
Expression string
Textual representation of an expression in Common Expression Language syntax.
Location string
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
Title string
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
description string
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
expression string
Textual representation of an expression in Common Expression Language syntax.
location string
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
title string
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
description str
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
expression str
Textual representation of an expression in Common Expression Language syntax.
location str
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
title str
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

ExprResponse

Description string
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
Expression string
Textual representation of an expression in Common Expression Language syntax.
Location string
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
Title string
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
Description string
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
Expression string
Textual representation of an expression in Common Expression Language syntax.
Location string
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
Title string
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
description string
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
expression string
Textual representation of an expression in Common Expression Language syntax.
location string
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
title string
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
description str
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
expression str
Textual representation of an expression in Common Expression Language syntax.
location str
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
title str
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

LogConfig

CloudAudit CloudAuditOptions
Cloud audit options.
Counter CounterOptions
Counter options.
DataAccess DataAccessOptions
Data access options.
cloudAudit CloudAuditOptions
Cloud audit options.
counter CounterOptions
Counter options.
dataAccess DataAccessOptions
Data access options.
cloud_audit CloudAuditOptions
Cloud audit options.
counter CounterOptions
Counter options.
data_access DataAccessOptions
Data access options.

LogConfigResponse

Rule

Action Pulumi.GoogleNative.GameServices.V1.RuleAction
Required
Conditions List<Pulumi.GoogleNative.GameServices.V1.Inputs.Condition>
Additional restrictions that must be met. All conditions must pass for the rule to match.
Description string
Human-readable description of the rule.
In List<string>
If one or more ‘in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
LogConfig List<Pulumi.GoogleNative.GameServices.V1.Inputs.LogConfig>
The config returned to callers of CheckPolicy for any entries that match the LOG action.
NotIn List<string>
If one or more ‘not_in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
Permissions List<string>
A permission is a string of form ‘..’ (e.g., ‘storage.buckets.list’). A value of ‘’ matches all permissions, and a verb part of ‘’ (e.g., ‘storage.buckets.*') matches all verbs.
Action RuleAction
Required
Conditions []Condition
Additional restrictions that must be met. All conditions must pass for the rule to match.
Description string
Human-readable description of the rule.
In []string
If one or more ‘in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
LogConfig []LogConfig
The config returned to callers of CheckPolicy for any entries that match the LOG action.
NotIn []string
If one or more ‘not_in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
Permissions []string
A permission is a string of form ‘..’ (e.g., ‘storage.buckets.list’). A value of ‘’ matches all permissions, and a verb part of ‘’ (e.g., ‘storage.buckets.*') matches all verbs.
action RuleAction
Required
conditions Condition[]
Additional restrictions that must be met. All conditions must pass for the rule to match.
description string
Human-readable description of the rule.
in string[]
If one or more ‘in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
logConfig LogConfig[]
The config returned to callers of CheckPolicy for any entries that match the LOG action.
notIn string[]
If one or more ‘not_in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
permissions string[]
A permission is a string of form ‘..’ (e.g., ‘storage.buckets.list’). A value of ‘’ matches all permissions, and a verb part of ‘’ (e.g., ‘storage.buckets.*') matches all verbs.
action RuleAction
Required
conditions Sequence[Condition]
Additional restrictions that must be met. All conditions must pass for the rule to match.
description str
Human-readable description of the rule.
in_ Sequence[str]
If one or more ‘in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
log_config Sequence[LogConfig]
The config returned to callers of CheckPolicy for any entries that match the LOG action.
not_in Sequence[str]
If one or more ‘not_in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
permissions Sequence[str]
A permission is a string of form ‘..’ (e.g., ‘storage.buckets.list’). A value of ‘’ matches all permissions, and a verb part of ‘’ (e.g., ‘storage.buckets.*') matches all verbs.

RuleAction

NoAction
NO_ACTIONDefault no action.
Allow
ALLOWMatching ‘Entries’ grant access.
AllowWithLog
ALLOW_WITH_LOGMatching ‘Entries’ grant access and the caller promises to log the request per the returned log_configs.
Deny
DENYMatching ‘Entries’ deny access.
DenyWithLog
DENY_WITH_LOGMatching ‘Entries’ deny access and the caller promises to log the request per the returned log_configs.
Log
LOGMatching ‘Entries’ tell IAM.Check callers to generate logs.
RuleActionNoAction
NO_ACTIONDefault no action.
RuleActionAllow
ALLOWMatching ‘Entries’ grant access.
RuleActionAllowWithLog
ALLOW_WITH_LOGMatching ‘Entries’ grant access and the caller promises to log the request per the returned log_configs.
RuleActionDeny
DENYMatching ‘Entries’ deny access.
RuleActionDenyWithLog
DENY_WITH_LOGMatching ‘Entries’ deny access and the caller promises to log the request per the returned log_configs.
RuleActionLog
LOGMatching ‘Entries’ tell IAM.Check callers to generate logs.
NoAction
NO_ACTIONDefault no action.
Allow
ALLOWMatching ‘Entries’ grant access.
AllowWithLog
ALLOW_WITH_LOGMatching ‘Entries’ grant access and the caller promises to log the request per the returned log_configs.
Deny
DENYMatching ‘Entries’ deny access.
DenyWithLog
DENY_WITH_LOGMatching ‘Entries’ deny access and the caller promises to log the request per the returned log_configs.
Log
LOGMatching ‘Entries’ tell IAM.Check callers to generate logs.
NO_ACTION
NO_ACTIONDefault no action.
ALLOW
ALLOWMatching ‘Entries’ grant access.
ALLOW_WITH_LOG
ALLOW_WITH_LOGMatching ‘Entries’ grant access and the caller promises to log the request per the returned log_configs.
DENY
DENYMatching ‘Entries’ deny access.
DENY_WITH_LOG
DENY_WITH_LOGMatching ‘Entries’ deny access and the caller promises to log the request per the returned log_configs.
LOG
LOGMatching ‘Entries’ tell IAM.Check callers to generate logs.

RuleResponse

Action string
Required
Conditions List<Pulumi.GoogleNative.GameServices.V1.Inputs.ConditionResponse>
Additional restrictions that must be met. All conditions must pass for the rule to match.
Description string
Human-readable description of the rule.
In List<string>
If one or more ‘in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
LogConfig List<Pulumi.GoogleNative.GameServices.V1.Inputs.LogConfigResponse>
The config returned to callers of CheckPolicy for any entries that match the LOG action.
NotIn List<string>
If one or more ‘not_in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
Permissions List<string>
A permission is a string of form ‘..’ (e.g., ‘storage.buckets.list’). A value of ‘’ matches all permissions, and a verb part of ‘’ (e.g., ‘storage.buckets.*') matches all verbs.
Action string
Required
Conditions []ConditionResponse
Additional restrictions that must be met. All conditions must pass for the rule to match.
Description string
Human-readable description of the rule.
In []string
If one or more ‘in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
LogConfig []LogConfigResponse
The config returned to callers of CheckPolicy for any entries that match the LOG action.
NotIn []string
If one or more ‘not_in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
Permissions []string
A permission is a string of form ‘..’ (e.g., ‘storage.buckets.list’). A value of ‘’ matches all permissions, and a verb part of ‘’ (e.g., ‘storage.buckets.*') matches all verbs.
action string
Required
conditions ConditionResponse[]
Additional restrictions that must be met. All conditions must pass for the rule to match.
description string
Human-readable description of the rule.
in string[]
If one or more ‘in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
logConfig LogConfigResponse[]
The config returned to callers of CheckPolicy for any entries that match the LOG action.
notIn string[]
If one or more ‘not_in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
permissions string[]
A permission is a string of form ‘..’ (e.g., ‘storage.buckets.list’). A value of ‘’ matches all permissions, and a verb part of ‘’ (e.g., ‘storage.buckets.*') matches all verbs.
action str
Required
conditions Sequence[ConditionResponse]
Additional restrictions that must be met. All conditions must pass for the rule to match.
description str
Human-readable description of the rule.
in_ Sequence[str]
If one or more ‘in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
log_config Sequence[LogConfigResponse]
The config returned to callers of CheckPolicy for any entries that match the LOG action.
not_in Sequence[str]
If one or more ‘not_in’ clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
permissions Sequence[str]
A permission is a string of form ‘..’ (e.g., ‘storage.buckets.list’). A value of ‘’ matches all permissions, and a verb part of ‘’ (e.g., ‘storage.buckets.*') matches all verbs.

Package Details

Repository
https://github.com/pulumi/pulumi-google-native
License
Apache-2.0