1. Packages
  2. Google Cloud Native
  3. API Docs
  4. gameservices
  5. gameservices/v1beta
  6. GameServerDeploymentIamPolicy

Google Cloud Native is in preview. Google Cloud Classic is fully supported.

Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi

google-native.gameservices/v1beta.GameServerDeploymentIamPolicy

Explore with Pulumi AI

google-native logo

Google Cloud Native is in preview. Google Cloud Classic is fully supported.

Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi

    Sets the access control policy on the specified resource. Replaces any existing policy. Can return NOT_FOUND, INVALID_ARGUMENT, and PERMISSION_DENIED errors. Note - this resource’s API doesn’t support deletion. When deleted, the resource will persist on Google Cloud even though it will be deleted from Pulumi state.

    Create GameServerDeploymentIamPolicy Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new GameServerDeploymentIamPolicy(name: string, args: GameServerDeploymentIamPolicyArgs, opts?: CustomResourceOptions);
    @overload
    def GameServerDeploymentIamPolicy(resource_name: str,
                                      args: GameServerDeploymentIamPolicyArgs,
                                      opts: Optional[ResourceOptions] = None)
    
    @overload
    def GameServerDeploymentIamPolicy(resource_name: str,
                                      opts: Optional[ResourceOptions] = None,
                                      game_server_deployment_id: Optional[str] = None,
                                      audit_configs: Optional[Sequence[AuditConfigArgs]] = None,
                                      bindings: Optional[Sequence[BindingArgs]] = None,
                                      etag: Optional[str] = None,
                                      location: Optional[str] = None,
                                      project: Optional[str] = None,
                                      rules: Optional[Sequence[RuleArgs]] = None,
                                      update_mask: Optional[str] = None,
                                      version: Optional[int] = None)
    func NewGameServerDeploymentIamPolicy(ctx *Context, name string, args GameServerDeploymentIamPolicyArgs, opts ...ResourceOption) (*GameServerDeploymentIamPolicy, error)
    public GameServerDeploymentIamPolicy(string name, GameServerDeploymentIamPolicyArgs args, CustomResourceOptions? opts = null)
    public GameServerDeploymentIamPolicy(String name, GameServerDeploymentIamPolicyArgs args)
    public GameServerDeploymentIamPolicy(String name, GameServerDeploymentIamPolicyArgs args, CustomResourceOptions options)
    
    type: google-native:gameservices/v1beta:GameServerDeploymentIamPolicy
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args GameServerDeploymentIamPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args GameServerDeploymentIamPolicyArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args GameServerDeploymentIamPolicyArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args GameServerDeploymentIamPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args GameServerDeploymentIamPolicyArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Example

    The following reference example uses placeholder values for all input properties.

    var google_nativeGameServerDeploymentIamPolicyResource = new GoogleNative.GameServices.V1Beta.GameServerDeploymentIamPolicy("google-nativeGameServerDeploymentIamPolicyResource", new()
    {
        GameServerDeploymentId = "string",
        AuditConfigs = new[]
        {
            new GoogleNative.GameServices.V1Beta.Inputs.AuditConfigArgs
            {
                AuditLogConfigs = new[]
                {
                    new GoogleNative.GameServices.V1Beta.Inputs.AuditLogConfigArgs
                    {
                        ExemptedMembers = new[]
                        {
                            "string",
                        },
                        IgnoreChildExemptions = false,
                        LogType = GoogleNative.GameServices.V1Beta.AuditLogConfigLogType.LogTypeUnspecified,
                    },
                },
                Service = "string",
            },
        },
        Bindings = new[]
        {
            new GoogleNative.GameServices.V1Beta.Inputs.BindingArgs
            {
                BindingId = "string",
                Condition = new GoogleNative.GameServices.V1Beta.Inputs.ExprArgs
                {
                    Description = "string",
                    Expression = "string",
                    Location = "string",
                    Title = "string",
                },
                Members = new[]
                {
                    "string",
                },
                Role = "string",
            },
        },
        Etag = "string",
        Location = "string",
        Project = "string",
        Rules = new[]
        {
            new GoogleNative.GameServices.V1Beta.Inputs.RuleArgs
            {
                Action = GoogleNative.GameServices.V1Beta.RuleAction.NoAction,
                Conditions = new[]
                {
                    new GoogleNative.GameServices.V1Beta.Inputs.ConditionArgs
                    {
                        Iam = GoogleNative.GameServices.V1Beta.ConditionIam.NoAttr,
                        Op = GoogleNative.GameServices.V1Beta.ConditionOp.NoOp,
                        Svc = "string",
                        Sys = GoogleNative.GameServices.V1Beta.ConditionSys.NoAttr,
                        Values = new[]
                        {
                            "string",
                        },
                    },
                },
                Description = "string",
                In = new[]
                {
                    "string",
                },
                LogConfig = new[]
                {
                    new GoogleNative.GameServices.V1Beta.Inputs.LogConfigArgs
                    {
                        CloudAudit = new GoogleNative.GameServices.V1Beta.Inputs.CloudAuditOptionsArgs
                        {
                            AuthorizationLoggingOptions = new GoogleNative.GameServices.V1Beta.Inputs.AuthorizationLoggingOptionsArgs
                            {
                                PermissionType = GoogleNative.GameServices.V1Beta.AuthorizationLoggingOptionsPermissionType.PermissionTypeUnspecified,
                            },
                            LogName = GoogleNative.GameServices.V1Beta.CloudAuditOptionsLogName.UnspecifiedLogName,
                        },
                        Counter = new GoogleNative.GameServices.V1Beta.Inputs.CounterOptionsArgs
                        {
                            CustomFields = new[]
                            {
                                new GoogleNative.GameServices.V1Beta.Inputs.CustomFieldArgs
                                {
                                    Name = "string",
                                    Value = "string",
                                },
                            },
                            Field = "string",
                            Metric = "string",
                        },
                        DataAccess = new GoogleNative.GameServices.V1Beta.Inputs.DataAccessOptionsArgs
                        {
                            LogMode = GoogleNative.GameServices.V1Beta.DataAccessOptionsLogMode.LogModeUnspecified,
                        },
                    },
                },
                NotIn = new[]
                {
                    "string",
                },
                Permissions = new[]
                {
                    "string",
                },
            },
        },
        UpdateMask = "string",
        Version = 0,
    });
    
    example, err := gameservicesv1beta.NewGameServerDeploymentIamPolicy(ctx, "google-nativeGameServerDeploymentIamPolicyResource", &gameservicesv1beta.GameServerDeploymentIamPolicyArgs{
    GameServerDeploymentId: pulumi.String("string"),
    AuditConfigs: gameservices.AuditConfigArray{
    &gameservices.AuditConfigArgs{
    AuditLogConfigs: gameservices.AuditLogConfigArray{
    &gameservices.AuditLogConfigArgs{
    ExemptedMembers: pulumi.StringArray{
    pulumi.String("string"),
    },
    IgnoreChildExemptions: pulumi.Bool(false),
    LogType: gameservicesv1beta.AuditLogConfigLogTypeLogTypeUnspecified,
    },
    },
    Service: pulumi.String("string"),
    },
    },
    Bindings: gameservices.BindingArray{
    &gameservices.BindingArgs{
    BindingId: pulumi.String("string"),
    Condition: &gameservices.ExprArgs{
    Description: pulumi.String("string"),
    Expression: pulumi.String("string"),
    Location: pulumi.String("string"),
    Title: pulumi.String("string"),
    },
    Members: pulumi.StringArray{
    pulumi.String("string"),
    },
    Role: pulumi.String("string"),
    },
    },
    Etag: pulumi.String("string"),
    Location: pulumi.String("string"),
    Project: pulumi.String("string"),
    Rules: gameservices.RuleArray{
    &gameservices.RuleArgs{
    Action: gameservicesv1beta.RuleActionNoAction,
    Conditions: gameservices.ConditionArray{
    &gameservices.ConditionArgs{
    Iam: gameservicesv1beta.ConditionIamNoAttr,
    Op: gameservicesv1beta.ConditionOpNoOp,
    Svc: pulumi.String("string"),
    Sys: gameservicesv1beta.ConditionSysNoAttr,
    Values: pulumi.StringArray{
    pulumi.String("string"),
    },
    },
    },
    Description: pulumi.String("string"),
    In: pulumi.StringArray{
    pulumi.String("string"),
    },
    LogConfig: gameservices.LogConfigArray{
    &gameservices.LogConfigArgs{
    CloudAudit: &gameservices.CloudAuditOptionsArgs{
    AuthorizationLoggingOptions: &gameservices.AuthorizationLoggingOptionsArgs{
    PermissionType: gameservicesv1beta.AuthorizationLoggingOptionsPermissionTypePermissionTypeUnspecified,
    },
    LogName: gameservicesv1beta.CloudAuditOptionsLogNameUnspecifiedLogName,
    },
    Counter: &gameservices.CounterOptionsArgs{
    CustomFields: gameservices.CustomFieldArray{
    &gameservices.CustomFieldArgs{
    Name: pulumi.String("string"),
    Value: pulumi.String("string"),
    },
    },
    Field: pulumi.String("string"),
    Metric: pulumi.String("string"),
    },
    DataAccess: &gameservices.DataAccessOptionsArgs{
    LogMode: gameservicesv1beta.DataAccessOptionsLogModeLogModeUnspecified,
    },
    },
    },
    NotIn: pulumi.StringArray{
    pulumi.String("string"),
    },
    Permissions: pulumi.StringArray{
    pulumi.String("string"),
    },
    },
    },
    UpdateMask: pulumi.String("string"),
    Version: pulumi.Int(0),
    })
    
    var google_nativeGameServerDeploymentIamPolicyResource = new GameServerDeploymentIamPolicy("google-nativeGameServerDeploymentIamPolicyResource", GameServerDeploymentIamPolicyArgs.builder()        
        .gameServerDeploymentId("string")
        .auditConfigs(AuditConfigArgs.builder()
            .auditLogConfigs(AuditLogConfigArgs.builder()
                .exemptedMembers("string")
                .ignoreChildExemptions(false)
                .logType("LOG_TYPE_UNSPECIFIED")
                .build())
            .service("string")
            .build())
        .bindings(BindingArgs.builder()
            .bindingId("string")
            .condition(ExprArgs.builder()
                .description("string")
                .expression("string")
                .location("string")
                .title("string")
                .build())
            .members("string")
            .role("string")
            .build())
        .etag("string")
        .location("string")
        .project("string")
        .rules(RuleArgs.builder()
            .action("NO_ACTION")
            .conditions(ConditionArgs.builder()
                .iam("NO_ATTR")
                .op("NO_OP")
                .svc("string")
                .sys("NO_ATTR")
                .values("string")
                .build())
            .description("string")
            .in("string")
            .logConfig(LogConfigArgs.builder()
                .cloudAudit(CloudAuditOptionsArgs.builder()
                    .authorizationLoggingOptions(AuthorizationLoggingOptionsArgs.builder()
                        .permissionType("PERMISSION_TYPE_UNSPECIFIED")
                        .build())
                    .logName("UNSPECIFIED_LOG_NAME")
                    .build())
                .counter(CounterOptionsArgs.builder()
                    .customFields(CustomFieldArgs.builder()
                        .name("string")
                        .value("string")
                        .build())
                    .field("string")
                    .metric("string")
                    .build())
                .dataAccess(DataAccessOptionsArgs.builder()
                    .logMode("LOG_MODE_UNSPECIFIED")
                    .build())
                .build())
            .notIn("string")
            .permissions("string")
            .build())
        .updateMask("string")
        .version(0)
        .build());
    
    google_native_game_server_deployment_iam_policy_resource = google_native.gameservices.v1beta.GameServerDeploymentIamPolicy("google-nativeGameServerDeploymentIamPolicyResource",
        game_server_deployment_id="string",
        audit_configs=[google_native.gameservices.v1beta.AuditConfigArgs(
            audit_log_configs=[google_native.gameservices.v1beta.AuditLogConfigArgs(
                exempted_members=["string"],
                ignore_child_exemptions=False,
                log_type=google_native.gameservices.v1beta.AuditLogConfigLogType.LOG_TYPE_UNSPECIFIED,
            )],
            service="string",
        )],
        bindings=[google_native.gameservices.v1beta.BindingArgs(
            binding_id="string",
            condition=google_native.gameservices.v1beta.ExprArgs(
                description="string",
                expression="string",
                location="string",
                title="string",
            ),
            members=["string"],
            role="string",
        )],
        etag="string",
        location="string",
        project="string",
        rules=[google_native.gameservices.v1beta.RuleArgs(
            action=google_native.gameservices.v1beta.RuleAction.NO_ACTION,
            conditions=[google_native.gameservices.v1beta.ConditionArgs(
                iam=google_native.gameservices.v1beta.ConditionIam.NO_ATTR,
                op=google_native.gameservices.v1beta.ConditionOp.NO_OP,
                svc="string",
                sys=google_native.gameservices.v1beta.ConditionSys.NO_ATTR,
                values=["string"],
            )],
            description="string",
            in_=["string"],
            log_config=[google_native.gameservices.v1beta.LogConfigArgs(
                cloud_audit=google_native.gameservices.v1beta.CloudAuditOptionsArgs(
                    authorization_logging_options=google_native.gameservices.v1beta.AuthorizationLoggingOptionsArgs(
                        permission_type=google_native.gameservices.v1beta.AuthorizationLoggingOptionsPermissionType.PERMISSION_TYPE_UNSPECIFIED,
                    ),
                    log_name=google_native.gameservices.v1beta.CloudAuditOptionsLogName.UNSPECIFIED_LOG_NAME,
                ),
                counter=google_native.gameservices.v1beta.CounterOptionsArgs(
                    custom_fields=[google_native.gameservices.v1beta.CustomFieldArgs(
                        name="string",
                        value="string",
                    )],
                    field="string",
                    metric="string",
                ),
                data_access=google_native.gameservices.v1beta.DataAccessOptionsArgs(
                    log_mode=google_native.gameservices.v1beta.DataAccessOptionsLogMode.LOG_MODE_UNSPECIFIED,
                ),
            )],
            not_in=["string"],
            permissions=["string"],
        )],
        update_mask="string",
        version=0)
    
    const google_nativeGameServerDeploymentIamPolicyResource = new google_native.gameservices.v1beta.GameServerDeploymentIamPolicy("google-nativeGameServerDeploymentIamPolicyResource", {
        gameServerDeploymentId: "string",
        auditConfigs: [{
            auditLogConfigs: [{
                exemptedMembers: ["string"],
                ignoreChildExemptions: false,
                logType: google_native.gameservices.v1beta.AuditLogConfigLogType.LogTypeUnspecified,
            }],
            service: "string",
        }],
        bindings: [{
            bindingId: "string",
            condition: {
                description: "string",
                expression: "string",
                location: "string",
                title: "string",
            },
            members: ["string"],
            role: "string",
        }],
        etag: "string",
        location: "string",
        project: "string",
        rules: [{
            action: google_native.gameservices.v1beta.RuleAction.NoAction,
            conditions: [{
                iam: google_native.gameservices.v1beta.ConditionIam.NoAttr,
                op: google_native.gameservices.v1beta.ConditionOp.NoOp,
                svc: "string",
                sys: google_native.gameservices.v1beta.ConditionSys.NoAttr,
                values: ["string"],
            }],
            description: "string",
            "in": ["string"],
            logConfig: [{
                cloudAudit: {
                    authorizationLoggingOptions: {
                        permissionType: google_native.gameservices.v1beta.AuthorizationLoggingOptionsPermissionType.PermissionTypeUnspecified,
                    },
                    logName: google_native.gameservices.v1beta.CloudAuditOptionsLogName.UnspecifiedLogName,
                },
                counter: {
                    customFields: [{
                        name: "string",
                        value: "string",
                    }],
                    field: "string",
                    metric: "string",
                },
                dataAccess: {
                    logMode: google_native.gameservices.v1beta.DataAccessOptionsLogMode.LogModeUnspecified,
                },
            }],
            notIn: ["string"],
            permissions: ["string"],
        }],
        updateMask: "string",
        version: 0,
    });
    
    type: google-native:gameservices/v1beta:GameServerDeploymentIamPolicy
    properties:
        auditConfigs:
            - auditLogConfigs:
                - exemptedMembers:
                    - string
                  ignoreChildExemptions: false
                  logType: LOG_TYPE_UNSPECIFIED
              service: string
        bindings:
            - bindingId: string
              condition:
                description: string
                expression: string
                location: string
                title: string
              members:
                - string
              role: string
        etag: string
        gameServerDeploymentId: string
        location: string
        project: string
        rules:
            - action: NO_ACTION
              conditions:
                - iam: NO_ATTR
                  op: NO_OP
                  svc: string
                  sys: NO_ATTR
                  values:
                    - string
              description: string
              in:
                - string
              logConfig:
                - cloudAudit:
                    authorizationLoggingOptions:
                        permissionType: PERMISSION_TYPE_UNSPECIFIED
                    logName: UNSPECIFIED_LOG_NAME
                  counter:
                    customFields:
                        - name: string
                          value: string
                    field: string
                    metric: string
                  dataAccess:
                    logMode: LOG_MODE_UNSPECIFIED
              notIn:
                - string
              permissions:
                - string
        updateMask: string
        version: 0
    

    GameServerDeploymentIamPolicy Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The GameServerDeploymentIamPolicy resource accepts the following input properties:

    GameServerDeploymentId string
    AuditConfigs List<Pulumi.GoogleNative.GameServices.V1Beta.Inputs.AuditConfig>
    Specifies cloud audit logging configuration for this policy.
    Bindings List<Pulumi.GoogleNative.GameServices.V1Beta.Inputs.Binding>
    Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.
    Etag string
    etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.
    Location string
    Project string
    Rules List<Pulumi.GoogleNative.GameServices.V1Beta.Inputs.Rule>
    If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
    UpdateMask string
    OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
    Version int
    Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    GameServerDeploymentId string
    AuditConfigs []AuditConfigArgs
    Specifies cloud audit logging configuration for this policy.
    Bindings []BindingArgs
    Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.
    Etag string
    etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.
    Location string
    Project string
    Rules []RuleArgs
    If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
    UpdateMask string
    OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
    Version int
    Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    gameServerDeploymentId String
    auditConfigs List<AuditConfig>
    Specifies cloud audit logging configuration for this policy.
    bindings List<Binding>
    Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.
    etag String
    etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.
    location String
    project String
    rules List<Rule>
    If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
    updateMask String
    OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
    version Integer
    Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    gameServerDeploymentId string
    auditConfigs AuditConfig[]
    Specifies cloud audit logging configuration for this policy.
    bindings Binding[]
    Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.
    etag string
    etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.
    location string
    project string
    rules Rule[]
    If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
    updateMask string
    OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
    version number
    Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    game_server_deployment_id str
    audit_configs Sequence[AuditConfigArgs]
    Specifies cloud audit logging configuration for this policy.
    bindings Sequence[BindingArgs]
    Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.
    etag str
    etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.
    location str
    project str
    rules Sequence[RuleArgs]
    If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
    update_mask str
    OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
    version int
    Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    gameServerDeploymentId String
    auditConfigs List<Property Map>
    Specifies cloud audit logging configuration for this policy.
    bindings List<Property Map>
    Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal. The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:alice@example.com, and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.
    etag String
    etag is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag is returned in the response to getIamPolicy, and systems are expected to put that etag in the request to setIamPolicy to ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost.
    location String
    project String
    rules List<Property Map>
    If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
    updateMask String
    OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
    version Number
    Specifies the format of the policy. Valid values are 0, 1, and 3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version 3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include the etag field whenever you call setIamPolicy. If you omit this field, then IAM allows you to overwrite a version 3 policy with a version 1 policy, and all of the conditions in the version 3 policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the GameServerDeploymentIamPolicy resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Supporting Types

    AuditConfig, AuditConfigArgs

    AuditLogConfigs List<Pulumi.GoogleNative.GameServices.V1Beta.Inputs.AuditLogConfig>
    The configuration for logging of each type of permission.
    Service string
    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
    AuditLogConfigs []AuditLogConfig
    The configuration for logging of each type of permission.
    Service string
    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
    auditLogConfigs List<AuditLogConfig>
    The configuration for logging of each type of permission.
    service String
    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
    auditLogConfigs AuditLogConfig[]
    The configuration for logging of each type of permission.
    service string
    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
    audit_log_configs Sequence[AuditLogConfig]
    The configuration for logging of each type of permission.
    service str
    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
    auditLogConfigs List<Property Map>
    The configuration for logging of each type of permission.
    service String
    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    AuditConfigResponse, AuditConfigResponseArgs

    AuditLogConfigs List<Pulumi.GoogleNative.GameServices.V1Beta.Inputs.AuditLogConfigResponse>
    The configuration for logging of each type of permission.
    Service string
    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
    AuditLogConfigs []AuditLogConfigResponse
    The configuration for logging of each type of permission.
    Service string
    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
    auditLogConfigs List<AuditLogConfigResponse>
    The configuration for logging of each type of permission.
    service String
    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
    auditLogConfigs AuditLogConfigResponse[]
    The configuration for logging of each type of permission.
    service string
    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
    audit_log_configs Sequence[AuditLogConfigResponse]
    The configuration for logging of each type of permission.
    service str
    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
    auditLogConfigs List<Property Map>
    The configuration for logging of each type of permission.
    service String
    Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    AuditLogConfig, AuditLogConfigArgs

    ExemptedMembers List<string>
    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
    IgnoreChildExemptions bool
    LogType Pulumi.GoogleNative.GameServices.V1Beta.AuditLogConfigLogType
    The log type that this config enables.
    ExemptedMembers []string
    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
    IgnoreChildExemptions bool
    LogType AuditLogConfigLogType
    The log type that this config enables.
    exemptedMembers List<String>
    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
    ignoreChildExemptions Boolean
    logType AuditLogConfigLogType
    The log type that this config enables.
    exemptedMembers string[]
    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
    ignoreChildExemptions boolean
    logType AuditLogConfigLogType
    The log type that this config enables.
    exempted_members Sequence[str]
    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
    ignore_child_exemptions bool
    log_type AuditLogConfigLogType
    The log type that this config enables.
    exemptedMembers List<String>
    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
    ignoreChildExemptions Boolean
    logType "LOG_TYPE_UNSPECIFIED" | "ADMIN_READ" | "DATA_WRITE" | "DATA_READ"
    The log type that this config enables.

    AuditLogConfigLogType, AuditLogConfigLogTypeArgs

    LogTypeUnspecified
    LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
    AdminRead
    ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
    DataWrite
    DATA_WRITEData writes. Example: CloudSQL Users create
    DataRead
    DATA_READData reads. Example: CloudSQL Users list
    AuditLogConfigLogTypeLogTypeUnspecified
    LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
    AuditLogConfigLogTypeAdminRead
    ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
    AuditLogConfigLogTypeDataWrite
    DATA_WRITEData writes. Example: CloudSQL Users create
    AuditLogConfigLogTypeDataRead
    DATA_READData reads. Example: CloudSQL Users list
    LogTypeUnspecified
    LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
    AdminRead
    ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
    DataWrite
    DATA_WRITEData writes. Example: CloudSQL Users create
    DataRead
    DATA_READData reads. Example: CloudSQL Users list
    LogTypeUnspecified
    LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
    AdminRead
    ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
    DataWrite
    DATA_WRITEData writes. Example: CloudSQL Users create
    DataRead
    DATA_READData reads. Example: CloudSQL Users list
    LOG_TYPE_UNSPECIFIED
    LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
    ADMIN_READ
    ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
    DATA_WRITE
    DATA_WRITEData writes. Example: CloudSQL Users create
    DATA_READ
    DATA_READData reads. Example: CloudSQL Users list
    "LOG_TYPE_UNSPECIFIED"
    LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
    "ADMIN_READ"
    ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
    "DATA_WRITE"
    DATA_WRITEData writes. Example: CloudSQL Users create
    "DATA_READ"
    DATA_READData reads. Example: CloudSQL Users list

    AuditLogConfigResponse, AuditLogConfigResponseArgs

    ExemptedMembers List<string>
    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
    IgnoreChildExemptions bool
    LogType string
    The log type that this config enables.
    ExemptedMembers []string
    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
    IgnoreChildExemptions bool
    LogType string
    The log type that this config enables.
    exemptedMembers List<String>
    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
    ignoreChildExemptions Boolean
    logType String
    The log type that this config enables.
    exemptedMembers string[]
    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
    ignoreChildExemptions boolean
    logType string
    The log type that this config enables.
    exempted_members Sequence[str]
    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
    ignore_child_exemptions bool
    log_type str
    The log type that this config enables.
    exemptedMembers List<String>
    Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
    ignoreChildExemptions Boolean
    logType String
    The log type that this config enables.

    AuthorizationLoggingOptions, AuthorizationLoggingOptionsArgs

    PermissionType AuthorizationLoggingOptionsPermissionType
    The type of the permission that was checked.
    permissionType AuthorizationLoggingOptionsPermissionType
    The type of the permission that was checked.
    permissionType AuthorizationLoggingOptionsPermissionType
    The type of the permission that was checked.
    permission_type AuthorizationLoggingOptionsPermissionType
    The type of the permission that was checked.

    AuthorizationLoggingOptionsPermissionType, AuthorizationLoggingOptionsPermissionTypeArgs

    PermissionTypeUnspecified
    PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
    AdminRead
    ADMIN_READA read of admin (meta) data.
    AdminWrite
    ADMIN_WRITEA write of admin (meta) data.
    DataRead
    DATA_READA read of standard data.
    DataWrite
    DATA_WRITEA write of standard data.
    AuthorizationLoggingOptionsPermissionTypePermissionTypeUnspecified
    PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
    AuthorizationLoggingOptionsPermissionTypeAdminRead
    ADMIN_READA read of admin (meta) data.
    AuthorizationLoggingOptionsPermissionTypeAdminWrite
    ADMIN_WRITEA write of admin (meta) data.
    AuthorizationLoggingOptionsPermissionTypeDataRead
    DATA_READA read of standard data.
    AuthorizationLoggingOptionsPermissionTypeDataWrite
    DATA_WRITEA write of standard data.
    PermissionTypeUnspecified
    PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
    AdminRead
    ADMIN_READA read of admin (meta) data.
    AdminWrite
    ADMIN_WRITEA write of admin (meta) data.
    DataRead
    DATA_READA read of standard data.
    DataWrite
    DATA_WRITEA write of standard data.
    PermissionTypeUnspecified
    PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
    AdminRead
    ADMIN_READA read of admin (meta) data.
    AdminWrite
    ADMIN_WRITEA write of admin (meta) data.
    DataRead
    DATA_READA read of standard data.
    DataWrite
    DATA_WRITEA write of standard data.
    PERMISSION_TYPE_UNSPECIFIED
    PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
    ADMIN_READ
    ADMIN_READA read of admin (meta) data.
    ADMIN_WRITE
    ADMIN_WRITEA write of admin (meta) data.
    DATA_READ
    DATA_READA read of standard data.
    DATA_WRITE
    DATA_WRITEA write of standard data.
    "PERMISSION_TYPE_UNSPECIFIED"
    PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
    "ADMIN_READ"
    ADMIN_READA read of admin (meta) data.
    "ADMIN_WRITE"
    ADMIN_WRITEA write of admin (meta) data.
    "DATA_READ"
    DATA_READA read of standard data.
    "DATA_WRITE"
    DATA_WRITEA write of standard data.

    AuthorizationLoggingOptionsResponse, AuthorizationLoggingOptionsResponseArgs

    PermissionType string
    The type of the permission that was checked.
    PermissionType string
    The type of the permission that was checked.
    permissionType String
    The type of the permission that was checked.
    permissionType string
    The type of the permission that was checked.
    permission_type str
    The type of the permission that was checked.
    permissionType String
    The type of the permission that was checked.

    Binding, BindingArgs

    BindingId string
    Condition Pulumi.GoogleNative.GameServices.V1Beta.Inputs.Expr
    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    Members List<string>
    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.
    Role string
    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
    BindingId string
    Condition Expr
    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    Members []string
    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.
    Role string
    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
    bindingId String
    condition Expr
    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    members List<String>
    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.
    role String
    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
    bindingId string
    condition Expr
    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    members string[]
    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.
    role string
    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
    binding_id str
    condition Expr
    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    members Sequence[str]
    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.
    role str
    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
    bindingId String
    condition Property Map
    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    members List<String>
    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.
    role String
    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

    BindingResponse, BindingResponseArgs

    BindingId string
    Condition Pulumi.GoogleNative.GameServices.V1Beta.Inputs.ExprResponse
    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    Members List<string>
    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.
    Role string
    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
    BindingId string
    Condition ExprResponse
    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    Members []string
    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.
    Role string
    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
    bindingId String
    condition ExprResponse
    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    members List<String>
    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.
    role String
    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
    bindingId string
    condition ExprResponse
    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    members string[]
    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.
    role string
    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
    binding_id str
    condition ExprResponse
    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    members Sequence[str]
    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.
    role str
    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.
    bindingId String
    condition Property Map
    The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates to false, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
    members List<String>
    Specifies the principals requesting access for a Google Cloud resource. members can have the following values: * allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. * allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * user:{emailid}: An email address that represents a specific Google account. For example, alice@example.com . * serviceAccount:{emailid}: An email address that represents a Google service account. For example, my-other-app@appspot.gserviceaccount.com. * serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example, my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. * group:{emailid}: An email address that represents a Google group. For example, admins@example.com. * domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example, google.com or example.com. * deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example, alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts to user:{emailid} and the recovered user retains the role in the binding. * deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts to serviceAccount:{emailid} and the undeleted service account retains the role in the binding. * deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts to group:{emailid} and the recovered group retains the role in the binding.
    role String
    Role that is assigned to the list of members, or principals. For example, roles/viewer, roles/editor, or roles/owner.

    CloudAuditOptions, CloudAuditOptionsArgs

    AuthorizationLoggingOptions AuthorizationLoggingOptions
    Information used by the Cloud Audit Logging pipeline.
    LogName CloudAuditOptionsLogName
    The log_name to populate in the Cloud Audit Record.
    authorizationLoggingOptions AuthorizationLoggingOptions
    Information used by the Cloud Audit Logging pipeline.
    logName CloudAuditOptionsLogName
    The log_name to populate in the Cloud Audit Record.
    authorizationLoggingOptions AuthorizationLoggingOptions
    Information used by the Cloud Audit Logging pipeline.
    logName CloudAuditOptionsLogName
    The log_name to populate in the Cloud Audit Record.
    authorization_logging_options AuthorizationLoggingOptions
    Information used by the Cloud Audit Logging pipeline.
    log_name CloudAuditOptionsLogName
    The log_name to populate in the Cloud Audit Record.
    authorizationLoggingOptions Property Map
    Information used by the Cloud Audit Logging pipeline.
    logName "UNSPECIFIED_LOG_NAME" | "ADMIN_ACTIVITY" | "DATA_ACCESS"
    The log_name to populate in the Cloud Audit Record.

    CloudAuditOptionsLogName, CloudAuditOptionsLogNameArgs

    UnspecifiedLogName
    UNSPECIFIED_LOG_NAMEDefault. Should not be used.
    AdminActivity
    ADMIN_ACTIVITYCorresponds to "cloudaudit.googleapis.com/activity"
    DataAccess
    DATA_ACCESSCorresponds to "cloudaudit.googleapis.com/data_access"
    CloudAuditOptionsLogNameUnspecifiedLogName
    UNSPECIFIED_LOG_NAMEDefault. Should not be used.
    CloudAuditOptionsLogNameAdminActivity
    ADMIN_ACTIVITYCorresponds to "cloudaudit.googleapis.com/activity"
    CloudAuditOptionsLogNameDataAccess
    DATA_ACCESSCorresponds to "cloudaudit.googleapis.com/data_access"
    UnspecifiedLogName
    UNSPECIFIED_LOG_NAMEDefault. Should not be used.
    AdminActivity
    ADMIN_ACTIVITYCorresponds to "cloudaudit.googleapis.com/activity"
    DataAccess
    DATA_ACCESSCorresponds to "cloudaudit.googleapis.com/data_access"
    UnspecifiedLogName
    UNSPECIFIED_LOG_NAMEDefault. Should not be used.
    AdminActivity
    ADMIN_ACTIVITYCorresponds to "cloudaudit.googleapis.com/activity"
    DataAccess
    DATA_ACCESSCorresponds to "cloudaudit.googleapis.com/data_access"
    UNSPECIFIED_LOG_NAME
    UNSPECIFIED_LOG_NAMEDefault. Should not be used.
    ADMIN_ACTIVITY
    ADMIN_ACTIVITYCorresponds to "cloudaudit.googleapis.com/activity"
    DATA_ACCESS
    DATA_ACCESSCorresponds to "cloudaudit.googleapis.com/data_access"
    "UNSPECIFIED_LOG_NAME"
    UNSPECIFIED_LOG_NAMEDefault. Should not be used.
    "ADMIN_ACTIVITY"
    ADMIN_ACTIVITYCorresponds to "cloudaudit.googleapis.com/activity"
    "DATA_ACCESS"
    DATA_ACCESSCorresponds to "cloudaudit.googleapis.com/data_access"

    CloudAuditOptionsResponse, CloudAuditOptionsResponseArgs

    AuthorizationLoggingOptions Pulumi.GoogleNative.GameServices.V1Beta.Inputs.AuthorizationLoggingOptionsResponse
    Information used by the Cloud Audit Logging pipeline.
    LogName string
    The log_name to populate in the Cloud Audit Record.
    AuthorizationLoggingOptions AuthorizationLoggingOptionsResponse
    Information used by the Cloud Audit Logging pipeline.
    LogName string
    The log_name to populate in the Cloud Audit Record.
    authorizationLoggingOptions AuthorizationLoggingOptionsResponse
    Information used by the Cloud Audit Logging pipeline.
    logName String
    The log_name to populate in the Cloud Audit Record.
    authorizationLoggingOptions AuthorizationLoggingOptionsResponse
    Information used by the Cloud Audit Logging pipeline.
    logName string
    The log_name to populate in the Cloud Audit Record.
    authorization_logging_options AuthorizationLoggingOptionsResponse
    Information used by the Cloud Audit Logging pipeline.
    log_name str
    The log_name to populate in the Cloud Audit Record.
    authorizationLoggingOptions Property Map
    Information used by the Cloud Audit Logging pipeline.
    logName String
    The log_name to populate in the Cloud Audit Record.

    Condition, ConditionArgs

    Iam Pulumi.GoogleNative.GameServices.V1Beta.ConditionIam
    Trusted attributes supplied by the IAM system.
    Op Pulumi.GoogleNative.GameServices.V1Beta.ConditionOp
    An operator to apply the subject with.
    Svc string
    Trusted attributes discharged by the service.
    Sys Pulumi.GoogleNative.GameServices.V1Beta.ConditionSys
    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
    Values List<string>
    The objects of the condition.
    Iam ConditionIam
    Trusted attributes supplied by the IAM system.
    Op ConditionOp
    An operator to apply the subject with.
    Svc string
    Trusted attributes discharged by the service.
    Sys ConditionSys
    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
    Values []string
    The objects of the condition.
    iam ConditionIam
    Trusted attributes supplied by the IAM system.
    op ConditionOp
    An operator to apply the subject with.
    svc String
    Trusted attributes discharged by the service.
    sys ConditionSys
    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
    values List<String>
    The objects of the condition.
    iam ConditionIam
    Trusted attributes supplied by the IAM system.
    op ConditionOp
    An operator to apply the subject with.
    svc string
    Trusted attributes discharged by the service.
    sys ConditionSys
    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
    values string[]
    The objects of the condition.
    iam ConditionIam
    Trusted attributes supplied by the IAM system.
    op ConditionOp
    An operator to apply the subject with.
    svc str
    Trusted attributes discharged by the service.
    sys ConditionSys
    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
    values Sequence[str]
    The objects of the condition.
    iam "NO_ATTR" | "AUTHORITY" | "ATTRIBUTION" | "SECURITY_REALM" | "APPROVER" | "JUSTIFICATION_TYPE" | "CREDENTIALS_TYPE" | "CREDS_ASSERTION"
    Trusted attributes supplied by the IAM system.
    op "NO_OP" | "EQUALS" | "NOT_EQUALS" | "IN" | "NOT_IN" | "DISCHARGED"
    An operator to apply the subject with.
    svc String
    Trusted attributes discharged by the service.
    sys "NO_ATTR" | "REGION" | "SERVICE" | "NAME" | "IP"
    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
    values List<String>
    The objects of the condition.

    ConditionIam, ConditionIamArgs

    NoAttr
    NO_ATTRDefault non-attribute.
    Authority
    AUTHORITYEither principal or (if present) authority selector.
    Attribution
    ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
    SecurityRealm
    SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    Approver
    APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
    JustificationType
    JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
    CredentialsType
    CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    CredsAssertion
    CREDS_ASSERTIONEXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    ConditionIamNoAttr
    NO_ATTRDefault non-attribute.
    ConditionIamAuthority
    AUTHORITYEither principal or (if present) authority selector.
    ConditionIamAttribution
    ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
    ConditionIamSecurityRealm
    SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    ConditionIamApprover
    APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
    ConditionIamJustificationType
    JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
    ConditionIamCredentialsType
    CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    ConditionIamCredsAssertion
    CREDS_ASSERTIONEXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    NoAttr
    NO_ATTRDefault non-attribute.
    Authority
    AUTHORITYEither principal or (if present) authority selector.
    Attribution
    ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
    SecurityRealm
    SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    Approver
    APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
    JustificationType
    JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
    CredentialsType
    CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    CredsAssertion
    CREDS_ASSERTIONEXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    NoAttr
    NO_ATTRDefault non-attribute.
    Authority
    AUTHORITYEither principal or (if present) authority selector.
    Attribution
    ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
    SecurityRealm
    SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    Approver
    APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
    JustificationType
    JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
    CredentialsType
    CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    CredsAssertion
    CREDS_ASSERTIONEXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    NO_ATTR
    NO_ATTRDefault non-attribute.
    AUTHORITY
    AUTHORITYEither principal or (if present) authority selector.
    ATTRIBUTION
    ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
    SECURITY_REALM
    SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    APPROVER
    APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
    JUSTIFICATION_TYPE
    JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
    CREDENTIALS_TYPE
    CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    CREDS_ASSERTION
    CREDS_ASSERTIONEXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    "NO_ATTR"
    NO_ATTRDefault non-attribute.
    "AUTHORITY"
    AUTHORITYEither principal or (if present) authority selector.
    "ATTRIBUTION"
    ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
    "SECURITY_REALM"
    SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    "APPROVER"
    APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
    "JUSTIFICATION_TYPE"
    JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
    "CREDENTIALS_TYPE"
    CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
    "CREDS_ASSERTION"
    CREDS_ASSERTIONEXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).

    ConditionOp, ConditionOpArgs

    NoOp
    NO_OPDefault no-op.
    EqualsValue
    EQUALSDEPRECATED. Use IN instead.
    NotEquals
    NOT_EQUALSDEPRECATED. Use NOT_IN instead.
    In
    INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
    NotIn
    NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
    Discharged
    DISCHARGEDSubject is discharged
    ConditionOpNoOp
    NO_OPDefault no-op.
    ConditionOpEquals
    EQUALSDEPRECATED. Use IN instead.
    ConditionOpNotEquals
    NOT_EQUALSDEPRECATED. Use NOT_IN instead.
    ConditionOpIn
    INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
    ConditionOpNotIn
    NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
    ConditionOpDischarged
    DISCHARGEDSubject is discharged
    NoOp
    NO_OPDefault no-op.
    Equals
    EQUALSDEPRECATED. Use IN instead.
    NotEquals
    NOT_EQUALSDEPRECATED. Use NOT_IN instead.
    In
    INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
    NotIn
    NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
    Discharged
    DISCHARGEDSubject is discharged
    NoOp
    NO_OPDefault no-op.
    Equals
    EQUALSDEPRECATED. Use IN instead.
    NotEquals
    NOT_EQUALSDEPRECATED. Use NOT_IN instead.
    In
    INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
    NotIn
    NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
    Discharged
    DISCHARGEDSubject is discharged
    NO_OP
    NO_OPDefault no-op.
    EQUALS
    EQUALSDEPRECATED. Use IN instead.
    NOT_EQUALS
    NOT_EQUALSDEPRECATED. Use NOT_IN instead.
    IN_
    INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
    NOT_IN
    NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
    DISCHARGED
    DISCHARGEDSubject is discharged
    "NO_OP"
    NO_OPDefault no-op.
    "EQUALS"
    EQUALSDEPRECATED. Use IN instead.
    "NOT_EQUALS"
    NOT_EQUALSDEPRECATED. Use NOT_IN instead.
    "IN"
    INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
    "NOT_IN"
    NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
    "DISCHARGED"
    DISCHARGEDSubject is discharged

    ConditionResponse, ConditionResponseArgs

    Iam string
    Trusted attributes supplied by the IAM system.
    Op string
    An operator to apply the subject with.
    Svc string
    Trusted attributes discharged by the service.
    Sys string
    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
    Values List<string>
    The objects of the condition.
    Iam string
    Trusted attributes supplied by the IAM system.
    Op string
    An operator to apply the subject with.
    Svc string
    Trusted attributes discharged by the service.
    Sys string
    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
    Values []string
    The objects of the condition.
    iam String
    Trusted attributes supplied by the IAM system.
    op String
    An operator to apply the subject with.
    svc String
    Trusted attributes discharged by the service.
    sys String
    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
    values List<String>
    The objects of the condition.
    iam string
    Trusted attributes supplied by the IAM system.
    op string
    An operator to apply the subject with.
    svc string
    Trusted attributes discharged by the service.
    sys string
    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
    values string[]
    The objects of the condition.
    iam str
    Trusted attributes supplied by the IAM system.
    op str
    An operator to apply the subject with.
    svc str
    Trusted attributes discharged by the service.
    sys str
    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
    values Sequence[str]
    The objects of the condition.
    iam String
    Trusted attributes supplied by the IAM system.
    op String
    An operator to apply the subject with.
    svc String
    Trusted attributes discharged by the service.
    sys String
    Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
    values List<String>
    The objects of the condition.

    ConditionSys, ConditionSysArgs

    NoAttr
    NO_ATTRDefault non-attribute type
    Region
    REGIONRegion of the resource
    Service
    SERVICEService name
    Name
    NAMEResource name
    Ip
    IPIP address of the caller
    ConditionSysNoAttr
    NO_ATTRDefault non-attribute type
    ConditionSysRegion
    REGIONRegion of the resource
    ConditionSysService
    SERVICEService name
    ConditionSysName
    NAMEResource name
    ConditionSysIp
    IPIP address of the caller
    NoAttr
    NO_ATTRDefault non-attribute type
    Region
    REGIONRegion of the resource
    Service
    SERVICEService name
    Name
    NAMEResource name
    Ip
    IPIP address of the caller
    NoAttr
    NO_ATTRDefault non-attribute type
    Region
    REGIONRegion of the resource
    Service
    SERVICEService name
    Name
    NAMEResource name
    Ip
    IPIP address of the caller
    NO_ATTR
    NO_ATTRDefault non-attribute type
    REGION
    REGIONRegion of the resource
    SERVICE
    SERVICEService name
    NAME
    NAMEResource name
    IP
    IPIP address of the caller
    "NO_ATTR"
    NO_ATTRDefault non-attribute type
    "REGION"
    REGIONRegion of the resource
    "SERVICE"
    SERVICEService name
    "NAME"
    NAMEResource name
    "IP"
    IPIP address of the caller

    CounterOptions, CounterOptionsArgs

    CustomFields List<Pulumi.GoogleNative.GameServices.V1Beta.Inputs.CustomField>
    Custom fields.
    Field string
    The field value to attribute.
    Metric string
    The metric to update.
    CustomFields []CustomField
    Custom fields.
    Field string
    The field value to attribute.
    Metric string
    The metric to update.
    customFields List<CustomField>
    Custom fields.
    field String
    The field value to attribute.
    metric String
    The metric to update.
    customFields CustomField[]
    Custom fields.
    field string
    The field value to attribute.
    metric string
    The metric to update.
    custom_fields Sequence[CustomField]
    Custom fields.
    field str
    The field value to attribute.
    metric str
    The metric to update.
    customFields List<Property Map>
    Custom fields.
    field String
    The field value to attribute.
    metric String
    The metric to update.

    CounterOptionsResponse, CounterOptionsResponseArgs

    CustomFields List<Pulumi.GoogleNative.GameServices.V1Beta.Inputs.CustomFieldResponse>
    Custom fields.
    Field string
    The field value to attribute.
    Metric string
    The metric to update.
    CustomFields []CustomFieldResponse
    Custom fields.
    Field string
    The field value to attribute.
    Metric string
    The metric to update.
    customFields List<CustomFieldResponse>
    Custom fields.
    field String
    The field value to attribute.
    metric String
    The metric to update.
    customFields CustomFieldResponse[]
    Custom fields.
    field string
    The field value to attribute.
    metric string
    The metric to update.
    custom_fields Sequence[CustomFieldResponse]
    Custom fields.
    field str
    The field value to attribute.
    metric str
    The metric to update.
    customFields List<Property Map>
    Custom fields.
    field String
    The field value to attribute.
    metric String
    The metric to update.

    CustomField, CustomFieldArgs

    Name string
    Name is the field name.
    Value string
    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
    Name string
    Name is the field name.
    Value string
    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
    name String
    Name is the field name.
    value String
    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
    name string
    Name is the field name.
    value string
    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
    name str
    Name is the field name.
    value str
    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
    name String
    Name is the field name.
    value String
    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

    CustomFieldResponse, CustomFieldResponseArgs

    Name string
    Name is the field name.
    Value string
    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
    Name string
    Name is the field name.
    Value string
    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
    name String
    Name is the field name.
    value String
    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
    name string
    Name is the field name.
    value string
    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
    name str
    Name is the field name.
    value str
    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.
    name String
    Name is the field name.
    value String
    Value is the field value. It is important that in contrast to the CounterOptions.field, the value here is a constant that is not derived from the IAMContext.

    DataAccessOptions, DataAccessOptionsArgs

    DataAccessOptionsLogMode, DataAccessOptionsLogModeArgs

    LogModeUnspecified
    LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
    LogFailClosed
    LOG_FAIL_CLOSEDThe application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.
    DataAccessOptionsLogModeLogModeUnspecified
    LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
    DataAccessOptionsLogModeLogFailClosed
    LOG_FAIL_CLOSEDThe application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.
    LogModeUnspecified
    LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
    LogFailClosed
    LOG_FAIL_CLOSEDThe application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.
    LogModeUnspecified
    LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
    LogFailClosed
    LOG_FAIL_CLOSEDThe application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.
    LOG_MODE_UNSPECIFIED
    LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
    LOG_FAIL_CLOSED
    LOG_FAIL_CLOSEDThe application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.
    "LOG_MODE_UNSPECIFIED"
    LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
    "LOG_FAIL_CLOSED"
    LOG_FAIL_CLOSEDThe application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.

    DataAccessOptionsResponse, DataAccessOptionsResponseArgs

    LogMode string
    LogMode string
    logMode String
    logMode string
    logMode String

    Expr, ExprArgs

    Description string
    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
    Expression string
    Textual representation of an expression in Common Expression Language syntax.
    Location string
    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
    Title string
    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
    Description string
    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
    Expression string
    Textual representation of an expression in Common Expression Language syntax.
    Location string
    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
    Title string
    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
    description String
    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
    expression String
    Textual representation of an expression in Common Expression Language syntax.
    location String
    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
    title String
    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
    description string
    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
    expression string
    Textual representation of an expression in Common Expression Language syntax.
    location string
    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
    title string
    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
    description str
    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
    expression str
    Textual representation of an expression in Common Expression Language syntax.
    location str
    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
    title str
    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
    description String
    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
    expression String
    Textual representation of an expression in Common Expression Language syntax.
    location String
    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
    title String
    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

    ExprResponse, ExprResponseArgs

    Description string
    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
    Expression string
    Textual representation of an expression in Common Expression Language syntax.
    Location string
    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
    Title string
    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
    Description string
    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
    Expression string
    Textual representation of an expression in Common Expression Language syntax.
    Location string
    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
    Title string
    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
    description String
    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
    expression String
    Textual representation of an expression in Common Expression Language syntax.
    location String
    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
    title String
    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
    description string
    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
    expression string
    Textual representation of an expression in Common Expression Language syntax.
    location string
    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
    title string
    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
    description str
    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
    expression str
    Textual representation of an expression in Common Expression Language syntax.
    location str
    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
    title str
    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
    description String
    Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
    expression String
    Textual representation of an expression in Common Expression Language syntax.
    location String
    Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
    title String
    Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.

    LogConfig, LogConfigArgs

    CloudAudit CloudAuditOptions
    Cloud audit options.
    Counter CounterOptions
    Counter options.
    DataAccess DataAccessOptions
    Data access options.
    cloudAudit CloudAuditOptions
    Cloud audit options.
    counter CounterOptions
    Counter options.
    dataAccess DataAccessOptions
    Data access options.
    cloudAudit CloudAuditOptions
    Cloud audit options.
    counter CounterOptions
    Counter options.
    dataAccess DataAccessOptions
    Data access options.
    cloud_audit CloudAuditOptions
    Cloud audit options.
    counter CounterOptions
    Counter options.
    data_access DataAccessOptions
    Data access options.
    cloudAudit Property Map
    Cloud audit options.
    counter Property Map
    Counter options.
    dataAccess Property Map
    Data access options.

    LogConfigResponse, LogConfigResponseArgs

    cloudAudit Property Map
    Cloud audit options.
    counter Property Map
    Counter options.
    dataAccess Property Map
    Data access options.

    Rule, RuleArgs

    Action Pulumi.GoogleNative.GameServices.V1Beta.RuleAction
    Required
    Conditions List<Pulumi.GoogleNative.GameServices.V1Beta.Inputs.Condition>
    Additional restrictions that must be met. All conditions must pass for the rule to match.
    Description string
    Human-readable description of the rule.
    In List<string>
    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
    LogConfig List<Pulumi.GoogleNative.GameServices.V1Beta.Inputs.LogConfig>
    The config returned to callers of CheckPolicy for any entries that match the LOG action.
    NotIn List<string>
    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
    Permissions List<string>
    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
    Action RuleAction
    Required
    Conditions []Condition
    Additional restrictions that must be met. All conditions must pass for the rule to match.
    Description string
    Human-readable description of the rule.
    In []string
    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
    LogConfig []LogConfig
    The config returned to callers of CheckPolicy for any entries that match the LOG action.
    NotIn []string
    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
    Permissions []string
    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
    action RuleAction
    Required
    conditions List<Condition>
    Additional restrictions that must be met. All conditions must pass for the rule to match.
    description String
    Human-readable description of the rule.
    in List<String>
    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
    logConfig List<LogConfig>
    The config returned to callers of CheckPolicy for any entries that match the LOG action.
    notIn List<String>
    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
    permissions List<String>
    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
    action RuleAction
    Required
    conditions Condition[]
    Additional restrictions that must be met. All conditions must pass for the rule to match.
    description string
    Human-readable description of the rule.
    in string[]
    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
    logConfig LogConfig[]
    The config returned to callers of CheckPolicy for any entries that match the LOG action.
    notIn string[]
    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
    permissions string[]
    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
    action RuleAction
    Required
    conditions Sequence[Condition]
    Additional restrictions that must be met. All conditions must pass for the rule to match.
    description str
    Human-readable description of the rule.
    in_ Sequence[str]
    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
    log_config Sequence[LogConfig]
    The config returned to callers of CheckPolicy for any entries that match the LOG action.
    not_in Sequence[str]
    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
    permissions Sequence[str]
    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
    action "NO_ACTION" | "ALLOW" | "ALLOW_WITH_LOG" | "DENY" | "DENY_WITH_LOG" | "LOG"
    Required
    conditions List<Property Map>
    Additional restrictions that must be met. All conditions must pass for the rule to match.
    description String
    Human-readable description of the rule.
    in List<String>
    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
    logConfig List<Property Map>
    The config returned to callers of CheckPolicy for any entries that match the LOG action.
    notIn List<String>
    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
    permissions List<String>
    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

    RuleAction, RuleActionArgs

    NoAction
    NO_ACTIONDefault no action.
    Allow
    ALLOWMatching 'Entries' grant access.
    AllowWithLog
    ALLOW_WITH_LOGMatching 'Entries' grant access and the caller promises to log the request per the returned log_configs.
    Deny
    DENYMatching 'Entries' deny access.
    DenyWithLog
    DENY_WITH_LOGMatching 'Entries' deny access and the caller promises to log the request per the returned log_configs.
    Log
    LOGMatching 'Entries' tell IAM.Check callers to generate logs.
    RuleActionNoAction
    NO_ACTIONDefault no action.
    RuleActionAllow
    ALLOWMatching 'Entries' grant access.
    RuleActionAllowWithLog
    ALLOW_WITH_LOGMatching 'Entries' grant access and the caller promises to log the request per the returned log_configs.
    RuleActionDeny
    DENYMatching 'Entries' deny access.
    RuleActionDenyWithLog
    DENY_WITH_LOGMatching 'Entries' deny access and the caller promises to log the request per the returned log_configs.
    RuleActionLog
    LOGMatching 'Entries' tell IAM.Check callers to generate logs.
    NoAction
    NO_ACTIONDefault no action.
    Allow
    ALLOWMatching 'Entries' grant access.
    AllowWithLog
    ALLOW_WITH_LOGMatching 'Entries' grant access and the caller promises to log the request per the returned log_configs.
    Deny
    DENYMatching 'Entries' deny access.
    DenyWithLog
    DENY_WITH_LOGMatching 'Entries' deny access and the caller promises to log the request per the returned log_configs.
    Log
    LOGMatching 'Entries' tell IAM.Check callers to generate logs.
    NoAction
    NO_ACTIONDefault no action.
    Allow
    ALLOWMatching 'Entries' grant access.
    AllowWithLog
    ALLOW_WITH_LOGMatching 'Entries' grant access and the caller promises to log the request per the returned log_configs.
    Deny
    DENYMatching 'Entries' deny access.
    DenyWithLog
    DENY_WITH_LOGMatching 'Entries' deny access and the caller promises to log the request per the returned log_configs.
    Log
    LOGMatching 'Entries' tell IAM.Check callers to generate logs.
    NO_ACTION
    NO_ACTIONDefault no action.
    ALLOW
    ALLOWMatching 'Entries' grant access.
    ALLOW_WITH_LOG
    ALLOW_WITH_LOGMatching 'Entries' grant access and the caller promises to log the request per the returned log_configs.
    DENY
    DENYMatching 'Entries' deny access.
    DENY_WITH_LOG
    DENY_WITH_LOGMatching 'Entries' deny access and the caller promises to log the request per the returned log_configs.
    LOG
    LOGMatching 'Entries' tell IAM.Check callers to generate logs.
    "NO_ACTION"
    NO_ACTIONDefault no action.
    "ALLOW"
    ALLOWMatching 'Entries' grant access.
    "ALLOW_WITH_LOG"
    ALLOW_WITH_LOGMatching 'Entries' grant access and the caller promises to log the request per the returned log_configs.
    "DENY"
    DENYMatching 'Entries' deny access.
    "DENY_WITH_LOG"
    DENY_WITH_LOGMatching 'Entries' deny access and the caller promises to log the request per the returned log_configs.
    "LOG"
    LOGMatching 'Entries' tell IAM.Check callers to generate logs.

    RuleResponse, RuleResponseArgs

    Action string
    Required
    Conditions List<Pulumi.GoogleNative.GameServices.V1Beta.Inputs.ConditionResponse>
    Additional restrictions that must be met. All conditions must pass for the rule to match.
    Description string
    Human-readable description of the rule.
    In List<string>
    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
    LogConfig List<Pulumi.GoogleNative.GameServices.V1Beta.Inputs.LogConfigResponse>
    The config returned to callers of CheckPolicy for any entries that match the LOG action.
    NotIn List<string>
    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
    Permissions List<string>
    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
    Action string
    Required
    Conditions []ConditionResponse
    Additional restrictions that must be met. All conditions must pass for the rule to match.
    Description string
    Human-readable description of the rule.
    In []string
    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
    LogConfig []LogConfigResponse
    The config returned to callers of CheckPolicy for any entries that match the LOG action.
    NotIn []string
    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
    Permissions []string
    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
    action String
    Required
    conditions List<ConditionResponse>
    Additional restrictions that must be met. All conditions must pass for the rule to match.
    description String
    Human-readable description of the rule.
    in List<String>
    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
    logConfig List<LogConfigResponse>
    The config returned to callers of CheckPolicy for any entries that match the LOG action.
    notIn List<String>
    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
    permissions List<String>
    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
    action string
    Required
    conditions ConditionResponse[]
    Additional restrictions that must be met. All conditions must pass for the rule to match.
    description string
    Human-readable description of the rule.
    in string[]
    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
    logConfig LogConfigResponse[]
    The config returned to callers of CheckPolicy for any entries that match the LOG action.
    notIn string[]
    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
    permissions string[]
    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
    action str
    Required
    conditions Sequence[ConditionResponse]
    Additional restrictions that must be met. All conditions must pass for the rule to match.
    description str
    Human-readable description of the rule.
    in_ Sequence[str]
    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
    log_config Sequence[LogConfigResponse]
    The config returned to callers of CheckPolicy for any entries that match the LOG action.
    not_in Sequence[str]
    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
    permissions Sequence[str]
    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
    action String
    Required
    conditions List<Property Map>
    Additional restrictions that must be met. All conditions must pass for the rule to match.
    description String
    Human-readable description of the rule.
    in List<String>
    If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
    logConfig List<Property Map>
    The config returned to callers of CheckPolicy for any entries that match the LOG action.
    notIn List<String>
    If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
    permissions List<String>
    A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.

    Package Details

    Repository
    Google Cloud Native pulumi/pulumi-google-native
    License
    Apache-2.0
    google-native logo

    Google Cloud Native is in preview. Google Cloud Classic is fully supported.

    Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi