blob: c4bb82585011b4931676880a79ba90940324ccf0 [file] [log] [blame]
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -04001<html><body>
2<style>
3
4body, h1, h2, h3, div, span, p, pre, a {
5 margin: 0;
6 padding: 0;
7 border: 0;
8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
13}
14
15body {
16 font-size: 13px;
17 padding: 1em;
18}
19
20h1 {
21 font-size: 26px;
22 margin-bottom: 1em;
23}
24
25h2 {
26 font-size: 24px;
27 margin-bottom: 1em;
28}
29
30h3 {
31 font-size: 20px;
32 margin-bottom: 1em;
33 margin-top: 1em;
34}
35
36pre, code {
37 line-height: 1.5;
38 font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39}
40
41pre {
42 margin-top: 0.5em;
43}
44
45h1, h2, h3, p {
46 font-family: Arial, sans serif;
47}
48
49h1, h2, h3 {
50 border-bottom: solid #CCC 1px;
51}
52
53.toc_element {
54 margin-top: 0.5em;
55}
56
57.firstline {
58 margin-left: 2 em;
59}
60
61.method {
62 margin-top: 1em;
63 border: solid 1px #CCC;
64 padding: 1em;
65 background: #EEE;
66}
67
68.details {
69 font-weight: bold;
70 font-size: 14px;
71}
72
73</style>
74
Bu Sun Kim715bd7f2019-06-14 16:50:42 -070075<h1><a href="servicemanagement_v1.html">Service Management API</a> . <a href="servicemanagement_v1.services.html">services</a> . <a href="servicemanagement_v1.services.consumers.html">consumers</a></h1>
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -040076<h2>Instance Methods</h2>
77<p class="toc_element">
Bu Sun Kim715bd7f2019-06-14 16:50:42 -070078 <code><a href="#getIamPolicy">getIamPolicy(resource, body=None, x__xgafv=None)</a></code></p>
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -040079<p class="firstline">Gets the access control policy for a resource.</p>
80<p class="toc_element">
Dan O'Mearadd494642020-05-01 07:42:23 -070081 <code><a href="#setIamPolicy">setIamPolicy(resource, body=None, x__xgafv=None)</a></code></p>
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -040082<p class="firstline">Sets the access control policy on the specified resource. Replaces any</p>
83<p class="toc_element">
Dan O'Mearadd494642020-05-01 07:42:23 -070084 <code><a href="#testIamPermissions">testIamPermissions(resource, body=None, x__xgafv=None)</a></code></p>
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -040085<p class="firstline">Returns permissions that a caller has on the specified resource.</p>
86<h3>Method Details</h3>
87<div class="method">
Bu Sun Kim715bd7f2019-06-14 16:50:42 -070088 <code class="details" id="getIamPolicy">getIamPolicy(resource, body=None, x__xgafv=None)</code>
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -040089 <pre>Gets the access control policy for a resource.
90Returns an empty policy if the resource exists and does not have a policy
91set.
92
93Args:
94 resource: string, REQUIRED: The resource for which the policy is being requested.
95See the operation documentation for the appropriate value for this field. (required)
Bu Sun Kim715bd7f2019-06-14 16:50:42 -070096 body: object, The request body.
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -040097 The object takes the form of:
98
99{ # Request message for `GetIamPolicy` method.
Dan O'Mearadd494642020-05-01 07:42:23 -0700100 "options": { # Encapsulates settings provided to GetIamPolicy. # OPTIONAL: A `GetPolicyOptions` object for specifying options to
101 # `GetIamPolicy`. This field is only used by Cloud IAM.
102 "requestedPolicyVersion": 42, # Optional. The policy format version to be returned.
103 #
104 # Valid values are 0, 1, and 3. Requests specifying an invalid value will be
105 # rejected.
106 #
107 # Requests for policies with any conditional bindings must specify version 3.
108 # Policies without any conditional bindings may specify any valid value or
109 # leave the field unset.
110 },
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400111 }
112
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400113 x__xgafv: string, V1 error format.
114 Allowed values
115 1 - v1 error format
116 2 - v2 error format
117
118Returns:
119 An object of the form:
120
Dan O'Mearadd494642020-05-01 07:42:23 -0700121 { # An Identity and Access Management (IAM) policy, which specifies access
122 # controls for Google Cloud resources.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400123 #
124 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700125 # A `Policy` is a collection of `bindings`. A `binding` binds one or more
126 # `members` to a single `role`. Members can be user accounts, service accounts,
127 # Google groups, and domains (such as G Suite). A `role` is a named list of
128 # permissions; each `role` can be an IAM predefined role or a user-created
129 # custom role.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400130 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700131 # Optionally, a `binding` can specify a `condition`, which is a logical
132 # expression that allows access to a resource only if the expression evaluates
133 # to `true`. A condition can add constraints based on attributes of the
134 # request, the resource, or both.
135 #
136 # **JSON example:**
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400137 #
138 # {
139 # "bindings": [
140 # {
Dan O'Mearadd494642020-05-01 07:42:23 -0700141 # "role": "roles/resourcemanager.organizationAdmin",
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400142 # "members": [
143 # "user:mike@example.com",
144 # "group:admins@example.com",
145 # "domain:google.com",
Dan O'Mearadd494642020-05-01 07:42:23 -0700146 # "serviceAccount:my-project-id@appspot.gserviceaccount.com"
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400147 # ]
148 # },
149 # {
Dan O'Mearadd494642020-05-01 07:42:23 -0700150 # "role": "roles/resourcemanager.organizationViewer",
151 # "members": ["user:eve@example.com"],
152 # "condition": {
153 # "title": "expirable access",
154 # "description": "Does not grant access after Sep 2020",
155 # "expression": "request.time &lt; timestamp('2020-10-01T00:00:00.000Z')",
156 # }
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400157 # }
Dan O'Mearadd494642020-05-01 07:42:23 -0700158 # ],
159 # "etag": "BwWWja0YfJA=",
160 # "version": 3
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400161 # }
162 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700163 # **YAML example:**
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700164 #
165 # bindings:
166 # - members:
167 # - user:mike@example.com
168 # - group:admins@example.com
169 # - domain:google.com
Dan O'Mearadd494642020-05-01 07:42:23 -0700170 # - serviceAccount:my-project-id@appspot.gserviceaccount.com
171 # role: roles/resourcemanager.organizationAdmin
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700172 # - members:
Dan O'Mearadd494642020-05-01 07:42:23 -0700173 # - user:eve@example.com
174 # role: roles/resourcemanager.organizationViewer
175 # condition:
176 # title: expirable access
177 # description: Does not grant access after Sep 2020
178 # expression: request.time &lt; timestamp('2020-10-01T00:00:00.000Z')
179 # - etag: BwWWja0YfJA=
180 # - version: 3
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700181 #
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400182 # For a description of IAM and its features, see the
Dan O'Mearadd494642020-05-01 07:42:23 -0700183 # [IAM documentation](https://cloud.google.com/iam/docs/).
184 "bindings": [ # Associates a list of `members` to a `role`. Optionally, may specify a
185 # `condition` that determines how and when the `bindings` are applied. Each
186 # of the `bindings` must contain at least one member.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700187 { # Associates `members` with a `role`.
188 "role": "A String", # Role that is assigned to `members`.
189 # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
Dan O'Mearadd494642020-05-01 07:42:23 -0700190 "condition": { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
191 # NOTE: An unsatisfied condition will not allow user access via current
192 # binding. Different bindings, including their conditions, are examined
193 # independently.
194 # syntax. CEL is a C-like expression language. The syntax and semantics of CEL
195 # are documented at https://github.com/google/cel-spec.
196 #
197 # Example (Comparison):
198 #
199 # title: "Summary size limit"
200 # description: "Determines if a summary is less than 100 chars"
201 # expression: "document.summary.size() &lt; 100"
202 #
203 # Example (Equality):
204 #
205 # title: "Requestor is owner"
206 # description: "Determines if requestor is the document owner"
207 # expression: "document.owner == request.auth.claims.email"
208 #
209 # Example (Logic):
210 #
211 # title: "Public documents"
212 # description: "Determine whether the document should be publicly visible"
213 # expression: "document.type != 'private' &amp;&amp; document.type != 'internal'"
214 #
215 # Example (Data Manipulation):
216 #
217 # title: "Notification string"
218 # description: "Create a notification string with a timestamp."
219 # expression: "'New message received at ' + string(document.create_time)"
220 #
221 # The exact variables and functions that may be referenced within an expression
222 # are determined by the service that evaluates it. See the service
223 # documentation for additional information.
224 "description": "A String", # Optional. Description of the expression. This is a longer text which
225 # describes the expression, e.g. when hovered over it in a UI.
226 "expression": "A String", # Textual representation of an expression in Common Expression Language
227 # syntax.
228 "location": "A String", # Optional. String indicating the location of the expression for error
229 # reporting, e.g. a file name and a position in the file.
230 "title": "A String", # Optional. Title for the expression, i.e. a short string describing
231 # its purpose. This can be used e.g. in UIs which allow to enter the
232 # expression.
233 },
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700234 "members": [ # Specifies the identities requesting access for a Cloud Platform resource.
235 # `members` can have the following values:
236 #
237 # * `allUsers`: A special identifier that represents anyone who is
238 # on the internet; with or without a Google account.
239 #
240 # * `allAuthenticatedUsers`: A special identifier that represents anyone
241 # who is authenticated with a Google account or a service account.
242 #
243 # * `user:{emailid}`: An email address that represents a specific Google
Dan O'Mearadd494642020-05-01 07:42:23 -0700244 # account. For example, `alice@example.com` .
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700245 #
246 #
247 # * `serviceAccount:{emailid}`: An email address that represents a service
248 # account. For example, `my-other-app@appspot.gserviceaccount.com`.
249 #
250 # * `group:{emailid}`: An email address that represents a Google group.
251 # For example, `admins@example.com`.
252 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700253 # * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique
254 # identifier) representing a user that has been recently deleted. For
255 # example, `alice@example.com?uid=123456789012345678901`. If the user is
256 # recovered, this value reverts to `user:{emailid}` and the recovered user
257 # retains the role in the binding.
258 #
259 # * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus
260 # unique identifier) representing a service account that has been recently
261 # deleted. For example,
262 # `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`.
263 # If the service account is undeleted, this value reverts to
264 # `serviceAccount:{emailid}` and the undeleted service account retains the
265 # role in the binding.
266 #
267 # * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique
268 # identifier) representing a Google group that has been recently
269 # deleted. For example, `admins@example.com?uid=123456789012345678901`. If
270 # the group is recovered, this value reverts to `group:{emailid}` and the
271 # recovered group retains the role in the binding.
272 #
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700273 #
274 # * `domain:{domain}`: The G Suite domain (primary) that represents all the
275 # users of that domain. For example, `google.com` or `example.com`.
276 #
277 "A String",
278 ],
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700279 },
280 ],
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400281 "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
282 { # Specifies the audit configuration for a service.
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400283 # The configuration determines which permission types are logged, and what
284 # identities, if any, are exempted from logging.
285 # An AuditConfig must have one or more AuditLogConfigs.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400286 #
287 # If there are AuditConfigs for both `allServices` and a specific service,
288 # the union of the two AuditConfigs is used for that service: the log_types
289 # specified in each AuditConfig are enabled, and the exempted_members in each
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700290 # AuditLogConfig are exempted.
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400291 #
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400292 # Example Policy with multiple AuditConfigs:
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400293 #
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400294 # {
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400295 # "audit_configs": [
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400296 # {
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400297 # "service": "allServices"
298 # "audit_log_configs": [
299 # {
300 # "log_type": "DATA_READ",
301 # "exempted_members": [
Dan O'Mearadd494642020-05-01 07:42:23 -0700302 # "user:jose@example.com"
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400303 # ]
304 # },
305 # {
306 # "log_type": "DATA_WRITE",
307 # },
308 # {
309 # "log_type": "ADMIN_READ",
310 # }
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400311 # ]
312 # },
313 # {
Dan O'Mearadd494642020-05-01 07:42:23 -0700314 # "service": "sampleservice.googleapis.com"
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400315 # "audit_log_configs": [
316 # {
317 # "log_type": "DATA_READ",
318 # },
319 # {
320 # "log_type": "DATA_WRITE",
321 # "exempted_members": [
Dan O'Mearadd494642020-05-01 07:42:23 -0700322 # "user:aliya@example.com"
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400323 # ]
324 # }
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400325 # ]
326 # }
327 # ]
328 # }
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400329 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700330 # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
331 # logging. It also exempts jose@example.com from DATA_READ logging, and
332 # aliya@example.com from DATA_WRITE logging.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400333 "auditLogConfigs": [ # The configuration for logging of each type of permission.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400334 { # Provides the configuration for logging a type of permissions.
335 # Example:
336 #
337 # {
338 # "audit_log_configs": [
339 # {
340 # "log_type": "DATA_READ",
341 # "exempted_members": [
Dan O'Mearadd494642020-05-01 07:42:23 -0700342 # "user:jose@example.com"
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400343 # ]
344 # },
345 # {
346 # "log_type": "DATA_WRITE",
347 # }
348 # ]
349 # }
350 #
351 # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
Dan O'Mearadd494642020-05-01 07:42:23 -0700352 # jose@example.com from DATA_READ logging.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400353 "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
354 # permission.
355 # Follows the same format of Binding.members.
356 "A String",
357 ],
358 "logType": "A String", # The log type that this config enables.
359 },
360 ],
361 "service": "A String", # Specifies a service that will be enabled for audit logging.
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400362 # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400363 # `allServices` is a special value that covers all services.
364 },
365 ],
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400366 "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
367 # prevent simultaneous updates of a policy from overwriting each other.
368 # It is strongly suggested that systems make use of the `etag` in the
369 # read-modify-write cycle to perform policy updates in order to avoid race
370 # conditions: An `etag` is returned in the response to `getIamPolicy`, and
371 # systems are expected to put that etag in the request to `setIamPolicy` to
372 # ensure that their change will be applied to the same version of the policy.
373 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700374 # **Important:** If you use IAM Conditions, you must include the `etag` field
375 # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
376 # you to overwrite a version `3` policy with a version `1` policy, and all of
377 # the conditions in the version `3` policy are lost.
378 "version": 42, # Specifies the format of the policy.
379 #
380 # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
381 # are rejected.
382 #
383 # Any operation that affects conditional role bindings must specify version
384 # `3`. This requirement applies to the following operations:
385 #
386 # * Getting a policy that includes a conditional role binding
387 # * Adding a conditional role binding to a policy
388 # * Changing a conditional role binding in a policy
389 # * Removing any role binding, with or without a condition, from a policy
390 # that includes conditions
391 #
392 # **Important:** If you use IAM Conditions, you must include the `etag` field
393 # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
394 # you to overwrite a version `3` policy with a version `1` policy, and all of
395 # the conditions in the version `3` policy are lost.
396 #
397 # If a policy does not include any conditions, operations on that policy may
398 # specify any valid version or leave the field unset.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400399 }</pre>
400</div>
401
402<div class="method">
Dan O'Mearadd494642020-05-01 07:42:23 -0700403 <code class="details" id="setIamPolicy">setIamPolicy(resource, body=None, x__xgafv=None)</code>
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400404 <pre>Sets the access control policy on the specified resource. Replaces any
405existing policy.
406
Dan O'Mearadd494642020-05-01 07:42:23 -0700407Can return Public Errors: NOT_FOUND, INVALID_ARGUMENT and PERMISSION_DENIED
408
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400409Args:
410 resource: string, REQUIRED: The resource for which the policy is being specified.
411See the operation documentation for the appropriate value for this field. (required)
Dan O'Mearadd494642020-05-01 07:42:23 -0700412 body: object, The request body.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400413 The object takes the form of:
414
415{ # Request message for `SetIamPolicy` method.
Dan O'Mearadd494642020-05-01 07:42:23 -0700416 "policy": { # An Identity and Access Management (IAM) policy, which specifies access # REQUIRED: The complete policy to be applied to the `resource`. The size of
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400417 # the policy is limited to a few 10s of KB. An empty policy is a
418 # valid policy but certain Cloud Platform services (such as Projects)
419 # might reject them.
Dan O'Mearadd494642020-05-01 07:42:23 -0700420 # controls for Google Cloud resources.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400421 #
422 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700423 # A `Policy` is a collection of `bindings`. A `binding` binds one or more
424 # `members` to a single `role`. Members can be user accounts, service accounts,
425 # Google groups, and domains (such as G Suite). A `role` is a named list of
426 # permissions; each `role` can be an IAM predefined role or a user-created
427 # custom role.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400428 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700429 # Optionally, a `binding` can specify a `condition`, which is a logical
430 # expression that allows access to a resource only if the expression evaluates
431 # to `true`. A condition can add constraints based on attributes of the
432 # request, the resource, or both.
433 #
434 # **JSON example:**
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400435 #
436 # {
437 # "bindings": [
438 # {
Dan O'Mearadd494642020-05-01 07:42:23 -0700439 # "role": "roles/resourcemanager.organizationAdmin",
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400440 # "members": [
441 # "user:mike@example.com",
442 # "group:admins@example.com",
443 # "domain:google.com",
Dan O'Mearadd494642020-05-01 07:42:23 -0700444 # "serviceAccount:my-project-id@appspot.gserviceaccount.com"
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400445 # ]
446 # },
447 # {
Dan O'Mearadd494642020-05-01 07:42:23 -0700448 # "role": "roles/resourcemanager.organizationViewer",
449 # "members": ["user:eve@example.com"],
450 # "condition": {
451 # "title": "expirable access",
452 # "description": "Does not grant access after Sep 2020",
453 # "expression": "request.time &lt; timestamp('2020-10-01T00:00:00.000Z')",
454 # }
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400455 # }
Dan O'Mearadd494642020-05-01 07:42:23 -0700456 # ],
457 # "etag": "BwWWja0YfJA=",
458 # "version": 3
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400459 # }
460 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700461 # **YAML example:**
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700462 #
463 # bindings:
464 # - members:
465 # - user:mike@example.com
466 # - group:admins@example.com
467 # - domain:google.com
Dan O'Mearadd494642020-05-01 07:42:23 -0700468 # - serviceAccount:my-project-id@appspot.gserviceaccount.com
469 # role: roles/resourcemanager.organizationAdmin
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700470 # - members:
Dan O'Mearadd494642020-05-01 07:42:23 -0700471 # - user:eve@example.com
472 # role: roles/resourcemanager.organizationViewer
473 # condition:
474 # title: expirable access
475 # description: Does not grant access after Sep 2020
476 # expression: request.time &lt; timestamp('2020-10-01T00:00:00.000Z')
477 # - etag: BwWWja0YfJA=
478 # - version: 3
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700479 #
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400480 # For a description of IAM and its features, see the
Dan O'Mearadd494642020-05-01 07:42:23 -0700481 # [IAM documentation](https://cloud.google.com/iam/docs/).
482 "bindings": [ # Associates a list of `members` to a `role`. Optionally, may specify a
483 # `condition` that determines how and when the `bindings` are applied. Each
484 # of the `bindings` must contain at least one member.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700485 { # Associates `members` with a `role`.
486 "role": "A String", # Role that is assigned to `members`.
487 # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
Dan O'Mearadd494642020-05-01 07:42:23 -0700488 "condition": { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
489 # NOTE: An unsatisfied condition will not allow user access via current
490 # binding. Different bindings, including their conditions, are examined
491 # independently.
492 # syntax. CEL is a C-like expression language. The syntax and semantics of CEL
493 # are documented at https://github.com/google/cel-spec.
494 #
495 # Example (Comparison):
496 #
497 # title: "Summary size limit"
498 # description: "Determines if a summary is less than 100 chars"
499 # expression: "document.summary.size() &lt; 100"
500 #
501 # Example (Equality):
502 #
503 # title: "Requestor is owner"
504 # description: "Determines if requestor is the document owner"
505 # expression: "document.owner == request.auth.claims.email"
506 #
507 # Example (Logic):
508 #
509 # title: "Public documents"
510 # description: "Determine whether the document should be publicly visible"
511 # expression: "document.type != 'private' &amp;&amp; document.type != 'internal'"
512 #
513 # Example (Data Manipulation):
514 #
515 # title: "Notification string"
516 # description: "Create a notification string with a timestamp."
517 # expression: "'New message received at ' + string(document.create_time)"
518 #
519 # The exact variables and functions that may be referenced within an expression
520 # are determined by the service that evaluates it. See the service
521 # documentation for additional information.
522 "description": "A String", # Optional. Description of the expression. This is a longer text which
523 # describes the expression, e.g. when hovered over it in a UI.
524 "expression": "A String", # Textual representation of an expression in Common Expression Language
525 # syntax.
526 "location": "A String", # Optional. String indicating the location of the expression for error
527 # reporting, e.g. a file name and a position in the file.
528 "title": "A String", # Optional. Title for the expression, i.e. a short string describing
529 # its purpose. This can be used e.g. in UIs which allow to enter the
530 # expression.
531 },
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700532 "members": [ # Specifies the identities requesting access for a Cloud Platform resource.
533 # `members` can have the following values:
534 #
535 # * `allUsers`: A special identifier that represents anyone who is
536 # on the internet; with or without a Google account.
537 #
538 # * `allAuthenticatedUsers`: A special identifier that represents anyone
539 # who is authenticated with a Google account or a service account.
540 #
541 # * `user:{emailid}`: An email address that represents a specific Google
Dan O'Mearadd494642020-05-01 07:42:23 -0700542 # account. For example, `alice@example.com` .
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700543 #
544 #
545 # * `serviceAccount:{emailid}`: An email address that represents a service
546 # account. For example, `my-other-app@appspot.gserviceaccount.com`.
547 #
548 # * `group:{emailid}`: An email address that represents a Google group.
549 # For example, `admins@example.com`.
550 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700551 # * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique
552 # identifier) representing a user that has been recently deleted. For
553 # example, `alice@example.com?uid=123456789012345678901`. If the user is
554 # recovered, this value reverts to `user:{emailid}` and the recovered user
555 # retains the role in the binding.
556 #
557 # * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus
558 # unique identifier) representing a service account that has been recently
559 # deleted. For example,
560 # `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`.
561 # If the service account is undeleted, this value reverts to
562 # `serviceAccount:{emailid}` and the undeleted service account retains the
563 # role in the binding.
564 #
565 # * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique
566 # identifier) representing a Google group that has been recently
567 # deleted. For example, `admins@example.com?uid=123456789012345678901`. If
568 # the group is recovered, this value reverts to `group:{emailid}` and the
569 # recovered group retains the role in the binding.
570 #
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700571 #
572 # * `domain:{domain}`: The G Suite domain (primary) that represents all the
573 # users of that domain. For example, `google.com` or `example.com`.
574 #
575 "A String",
576 ],
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700577 },
578 ],
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400579 "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
580 { # Specifies the audit configuration for a service.
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400581 # The configuration determines which permission types are logged, and what
582 # identities, if any, are exempted from logging.
583 # An AuditConfig must have one or more AuditLogConfigs.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400584 #
585 # If there are AuditConfigs for both `allServices` and a specific service,
586 # the union of the two AuditConfigs is used for that service: the log_types
587 # specified in each AuditConfig are enabled, and the exempted_members in each
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700588 # AuditLogConfig are exempted.
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400589 #
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400590 # Example Policy with multiple AuditConfigs:
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400591 #
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400592 # {
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400593 # "audit_configs": [
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400594 # {
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400595 # "service": "allServices"
596 # "audit_log_configs": [
597 # {
598 # "log_type": "DATA_READ",
599 # "exempted_members": [
Dan O'Mearadd494642020-05-01 07:42:23 -0700600 # "user:jose@example.com"
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400601 # ]
602 # },
603 # {
604 # "log_type": "DATA_WRITE",
605 # },
606 # {
607 # "log_type": "ADMIN_READ",
608 # }
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400609 # ]
610 # },
611 # {
Dan O'Mearadd494642020-05-01 07:42:23 -0700612 # "service": "sampleservice.googleapis.com"
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400613 # "audit_log_configs": [
614 # {
615 # "log_type": "DATA_READ",
616 # },
617 # {
618 # "log_type": "DATA_WRITE",
619 # "exempted_members": [
Dan O'Mearadd494642020-05-01 07:42:23 -0700620 # "user:aliya@example.com"
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400621 # ]
622 # }
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400623 # ]
624 # }
625 # ]
626 # }
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400627 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700628 # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
629 # logging. It also exempts jose@example.com from DATA_READ logging, and
630 # aliya@example.com from DATA_WRITE logging.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400631 "auditLogConfigs": [ # The configuration for logging of each type of permission.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400632 { # Provides the configuration for logging a type of permissions.
633 # Example:
634 #
635 # {
636 # "audit_log_configs": [
637 # {
638 # "log_type": "DATA_READ",
639 # "exempted_members": [
Dan O'Mearadd494642020-05-01 07:42:23 -0700640 # "user:jose@example.com"
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400641 # ]
642 # },
643 # {
644 # "log_type": "DATA_WRITE",
645 # }
646 # ]
647 # }
648 #
649 # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
Dan O'Mearadd494642020-05-01 07:42:23 -0700650 # jose@example.com from DATA_READ logging.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400651 "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
652 # permission.
653 # Follows the same format of Binding.members.
654 "A String",
655 ],
656 "logType": "A String", # The log type that this config enables.
657 },
658 ],
659 "service": "A String", # Specifies a service that will be enabled for audit logging.
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400660 # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400661 # `allServices` is a special value that covers all services.
662 },
663 ],
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400664 "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
665 # prevent simultaneous updates of a policy from overwriting each other.
666 # It is strongly suggested that systems make use of the `etag` in the
667 # read-modify-write cycle to perform policy updates in order to avoid race
668 # conditions: An `etag` is returned in the response to `getIamPolicy`, and
669 # systems are expected to put that etag in the request to `setIamPolicy` to
670 # ensure that their change will be applied to the same version of the policy.
671 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700672 # **Important:** If you use IAM Conditions, you must include the `etag` field
673 # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
674 # you to overwrite a version `3` policy with a version `1` policy, and all of
675 # the conditions in the version `3` policy are lost.
676 "version": 42, # Specifies the format of the policy.
677 #
678 # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
679 # are rejected.
680 #
681 # Any operation that affects conditional role bindings must specify version
682 # `3`. This requirement applies to the following operations:
683 #
684 # * Getting a policy that includes a conditional role binding
685 # * Adding a conditional role binding to a policy
686 # * Changing a conditional role binding in a policy
687 # * Removing any role binding, with or without a condition, from a policy
688 # that includes conditions
689 #
690 # **Important:** If you use IAM Conditions, you must include the `etag` field
691 # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
692 # you to overwrite a version `3` policy with a version `1` policy, and all of
693 # the conditions in the version `3` policy are lost.
694 #
695 # If a policy does not include any conditions, operations on that policy may
696 # specify any valid version or leave the field unset.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400697 },
698 "updateMask": "A String", # OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400699 # the fields in the mask will be modified. If no mask is provided, the
700 # following default mask is used:
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400701 # paths: "bindings, etag"
702 # This field is only used by Cloud IAM.
703 }
704
705 x__xgafv: string, V1 error format.
706 Allowed values
707 1 - v1 error format
708 2 - v2 error format
709
710Returns:
711 An object of the form:
712
Dan O'Mearadd494642020-05-01 07:42:23 -0700713 { # An Identity and Access Management (IAM) policy, which specifies access
714 # controls for Google Cloud resources.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400715 #
716 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700717 # A `Policy` is a collection of `bindings`. A `binding` binds one or more
718 # `members` to a single `role`. Members can be user accounts, service accounts,
719 # Google groups, and domains (such as G Suite). A `role` is a named list of
720 # permissions; each `role` can be an IAM predefined role or a user-created
721 # custom role.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400722 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700723 # Optionally, a `binding` can specify a `condition`, which is a logical
724 # expression that allows access to a resource only if the expression evaluates
725 # to `true`. A condition can add constraints based on attributes of the
726 # request, the resource, or both.
727 #
728 # **JSON example:**
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400729 #
730 # {
731 # "bindings": [
732 # {
Dan O'Mearadd494642020-05-01 07:42:23 -0700733 # "role": "roles/resourcemanager.organizationAdmin",
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400734 # "members": [
735 # "user:mike@example.com",
736 # "group:admins@example.com",
737 # "domain:google.com",
Dan O'Mearadd494642020-05-01 07:42:23 -0700738 # "serviceAccount:my-project-id@appspot.gserviceaccount.com"
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400739 # ]
740 # },
741 # {
Dan O'Mearadd494642020-05-01 07:42:23 -0700742 # "role": "roles/resourcemanager.organizationViewer",
743 # "members": ["user:eve@example.com"],
744 # "condition": {
745 # "title": "expirable access",
746 # "description": "Does not grant access after Sep 2020",
747 # "expression": "request.time &lt; timestamp('2020-10-01T00:00:00.000Z')",
748 # }
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400749 # }
Dan O'Mearadd494642020-05-01 07:42:23 -0700750 # ],
751 # "etag": "BwWWja0YfJA=",
752 # "version": 3
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400753 # }
754 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700755 # **YAML example:**
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700756 #
757 # bindings:
758 # - members:
759 # - user:mike@example.com
760 # - group:admins@example.com
761 # - domain:google.com
Dan O'Mearadd494642020-05-01 07:42:23 -0700762 # - serviceAccount:my-project-id@appspot.gserviceaccount.com
763 # role: roles/resourcemanager.organizationAdmin
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700764 # - members:
Dan O'Mearadd494642020-05-01 07:42:23 -0700765 # - user:eve@example.com
766 # role: roles/resourcemanager.organizationViewer
767 # condition:
768 # title: expirable access
769 # description: Does not grant access after Sep 2020
770 # expression: request.time &lt; timestamp('2020-10-01T00:00:00.000Z')
771 # - etag: BwWWja0YfJA=
772 # - version: 3
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700773 #
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400774 # For a description of IAM and its features, see the
Dan O'Mearadd494642020-05-01 07:42:23 -0700775 # [IAM documentation](https://cloud.google.com/iam/docs/).
776 "bindings": [ # Associates a list of `members` to a `role`. Optionally, may specify a
777 # `condition` that determines how and when the `bindings` are applied. Each
778 # of the `bindings` must contain at least one member.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700779 { # Associates `members` with a `role`.
780 "role": "A String", # Role that is assigned to `members`.
781 # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
Dan O'Mearadd494642020-05-01 07:42:23 -0700782 "condition": { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
783 # NOTE: An unsatisfied condition will not allow user access via current
784 # binding. Different bindings, including their conditions, are examined
785 # independently.
786 # syntax. CEL is a C-like expression language. The syntax and semantics of CEL
787 # are documented at https://github.com/google/cel-spec.
788 #
789 # Example (Comparison):
790 #
791 # title: "Summary size limit"
792 # description: "Determines if a summary is less than 100 chars"
793 # expression: "document.summary.size() &lt; 100"
794 #
795 # Example (Equality):
796 #
797 # title: "Requestor is owner"
798 # description: "Determines if requestor is the document owner"
799 # expression: "document.owner == request.auth.claims.email"
800 #
801 # Example (Logic):
802 #
803 # title: "Public documents"
804 # description: "Determine whether the document should be publicly visible"
805 # expression: "document.type != 'private' &amp;&amp; document.type != 'internal'"
806 #
807 # Example (Data Manipulation):
808 #
809 # title: "Notification string"
810 # description: "Create a notification string with a timestamp."
811 # expression: "'New message received at ' + string(document.create_time)"
812 #
813 # The exact variables and functions that may be referenced within an expression
814 # are determined by the service that evaluates it. See the service
815 # documentation for additional information.
816 "description": "A String", # Optional. Description of the expression. This is a longer text which
817 # describes the expression, e.g. when hovered over it in a UI.
818 "expression": "A String", # Textual representation of an expression in Common Expression Language
819 # syntax.
820 "location": "A String", # Optional. String indicating the location of the expression for error
821 # reporting, e.g. a file name and a position in the file.
822 "title": "A String", # Optional. Title for the expression, i.e. a short string describing
823 # its purpose. This can be used e.g. in UIs which allow to enter the
824 # expression.
825 },
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700826 "members": [ # Specifies the identities requesting access for a Cloud Platform resource.
827 # `members` can have the following values:
828 #
829 # * `allUsers`: A special identifier that represents anyone who is
830 # on the internet; with or without a Google account.
831 #
832 # * `allAuthenticatedUsers`: A special identifier that represents anyone
833 # who is authenticated with a Google account or a service account.
834 #
835 # * `user:{emailid}`: An email address that represents a specific Google
Dan O'Mearadd494642020-05-01 07:42:23 -0700836 # account. For example, `alice@example.com` .
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700837 #
838 #
839 # * `serviceAccount:{emailid}`: An email address that represents a service
840 # account. For example, `my-other-app@appspot.gserviceaccount.com`.
841 #
842 # * `group:{emailid}`: An email address that represents a Google group.
843 # For example, `admins@example.com`.
844 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700845 # * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique
846 # identifier) representing a user that has been recently deleted. For
847 # example, `alice@example.com?uid=123456789012345678901`. If the user is
848 # recovered, this value reverts to `user:{emailid}` and the recovered user
849 # retains the role in the binding.
850 #
851 # * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus
852 # unique identifier) representing a service account that has been recently
853 # deleted. For example,
854 # `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`.
855 # If the service account is undeleted, this value reverts to
856 # `serviceAccount:{emailid}` and the undeleted service account retains the
857 # role in the binding.
858 #
859 # * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique
860 # identifier) representing a Google group that has been recently
861 # deleted. For example, `admins@example.com?uid=123456789012345678901`. If
862 # the group is recovered, this value reverts to `group:{emailid}` and the
863 # recovered group retains the role in the binding.
864 #
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700865 #
866 # * `domain:{domain}`: The G Suite domain (primary) that represents all the
867 # users of that domain. For example, `google.com` or `example.com`.
868 #
869 "A String",
870 ],
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700871 },
872 ],
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400873 "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
874 { # Specifies the audit configuration for a service.
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400875 # The configuration determines which permission types are logged, and what
876 # identities, if any, are exempted from logging.
877 # An AuditConfig must have one or more AuditLogConfigs.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400878 #
879 # If there are AuditConfigs for both `allServices` and a specific service,
880 # the union of the two AuditConfigs is used for that service: the log_types
881 # specified in each AuditConfig are enabled, and the exempted_members in each
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700882 # AuditLogConfig are exempted.
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400883 #
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400884 # Example Policy with multiple AuditConfigs:
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400885 #
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400886 # {
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400887 # "audit_configs": [
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400888 # {
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400889 # "service": "allServices"
890 # "audit_log_configs": [
891 # {
892 # "log_type": "DATA_READ",
893 # "exempted_members": [
Dan O'Mearadd494642020-05-01 07:42:23 -0700894 # "user:jose@example.com"
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400895 # ]
896 # },
897 # {
898 # "log_type": "DATA_WRITE",
899 # },
900 # {
901 # "log_type": "ADMIN_READ",
902 # }
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400903 # ]
904 # },
905 # {
Dan O'Mearadd494642020-05-01 07:42:23 -0700906 # "service": "sampleservice.googleapis.com"
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400907 # "audit_log_configs": [
908 # {
909 # "log_type": "DATA_READ",
910 # },
911 # {
912 # "log_type": "DATA_WRITE",
913 # "exempted_members": [
Dan O'Mearadd494642020-05-01 07:42:23 -0700914 # "user:aliya@example.com"
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400915 # ]
916 # }
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400917 # ]
918 # }
919 # ]
920 # }
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400921 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700922 # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
923 # logging. It also exempts jose@example.com from DATA_READ logging, and
924 # aliya@example.com from DATA_WRITE logging.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400925 "auditLogConfigs": [ # The configuration for logging of each type of permission.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400926 { # Provides the configuration for logging a type of permissions.
927 # Example:
928 #
929 # {
930 # "audit_log_configs": [
931 # {
932 # "log_type": "DATA_READ",
933 # "exempted_members": [
Dan O'Mearadd494642020-05-01 07:42:23 -0700934 # "user:jose@example.com"
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400935 # ]
936 # },
937 # {
938 # "log_type": "DATA_WRITE",
939 # }
940 # ]
941 # }
942 #
943 # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
Dan O'Mearadd494642020-05-01 07:42:23 -0700944 # jose@example.com from DATA_READ logging.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400945 "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
946 # permission.
947 # Follows the same format of Binding.members.
948 "A String",
949 ],
950 "logType": "A String", # The log type that this config enables.
951 },
952 ],
953 "service": "A String", # Specifies a service that will be enabled for audit logging.
Sai Cheemalapati4ba8c232017-06-06 18:46:08 -0400954 # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400955 # `allServices` is a special value that covers all services.
956 },
957 ],
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400958 "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
959 # prevent simultaneous updates of a policy from overwriting each other.
960 # It is strongly suggested that systems make use of the `etag` in the
961 # read-modify-write cycle to perform policy updates in order to avoid race
962 # conditions: An `etag` is returned in the response to `getIamPolicy`, and
963 # systems are expected to put that etag in the request to `setIamPolicy` to
964 # ensure that their change will be applied to the same version of the policy.
965 #
Dan O'Mearadd494642020-05-01 07:42:23 -0700966 # **Important:** If you use IAM Conditions, you must include the `etag` field
967 # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
968 # you to overwrite a version `3` policy with a version `1` policy, and all of
969 # the conditions in the version `3` policy are lost.
970 "version": 42, # Specifies the format of the policy.
971 #
972 # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
973 # are rejected.
974 #
975 # Any operation that affects conditional role bindings must specify version
976 # `3`. This requirement applies to the following operations:
977 #
978 # * Getting a policy that includes a conditional role binding
979 # * Adding a conditional role binding to a policy
980 # * Changing a conditional role binding in a policy
981 # * Removing any role binding, with or without a condition, from a policy
982 # that includes conditions
983 #
984 # **Important:** If you use IAM Conditions, you must include the `etag` field
985 # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
986 # you to overwrite a version `3` policy with a version `1` policy, and all of
987 # the conditions in the version `3` policy are lost.
988 #
989 # If a policy does not include any conditions, operations on that policy may
990 # specify any valid version or leave the field unset.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400991 }</pre>
992</div>
993
994<div class="method">
Dan O'Mearadd494642020-05-01 07:42:23 -0700995 <code class="details" id="testIamPermissions">testIamPermissions(resource, body=None, x__xgafv=None)</code>
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -0400996 <pre>Returns permissions that a caller has on the specified resource.
997If the resource does not exist, this will return an empty set of
998permissions, not a NOT_FOUND error.
999
1000Note: This operation is designed to be used for building permission-aware
1001UIs and command-line tools, not for authorization checking. This operation
1002may "fail open" without warning.
1003
1004Args:
1005 resource: string, REQUIRED: The resource for which the policy detail is being requested.
1006See the operation documentation for the appropriate value for this field. (required)
Dan O'Mearadd494642020-05-01 07:42:23 -07001007 body: object, The request body.
Sai Cheemalapatic30d2b52017-03-13 12:12:03 -04001008 The object takes the form of:
1009
1010{ # Request message for `TestIamPermissions` method.
1011 "permissions": [ # The set of permissions to check for the `resource`. Permissions with
1012 # wildcards (such as '*' or 'storage.*') are not allowed. For more
1013 # information see
1014 # [IAM Overview](https://cloud.google.com/iam/docs/overview#permissions).
1015 "A String",
1016 ],
1017 }
1018
1019 x__xgafv: string, V1 error format.
1020 Allowed values
1021 1 - v1 error format
1022 2 - v2 error format
1023
1024Returns:
1025 An object of the form:
1026
1027 { # Response message for `TestIamPermissions` method.
1028 "permissions": [ # A subset of `TestPermissionsRequest.permissions` that the caller is
1029 # allowed.
1030 "A String",
1031 ],
1032 }</pre>
1033</div>
1034
1035</body></html>