Struct google_deploymentmanager2::Policy [−][src]
pub struct Policy { pub audit_configs: Option<Vec<AuditConfig>>, pub version: Option<i32>, pub etag: Option<String>, pub rules: Option<Vec<Rule>>, pub bindings: Option<Vec<Binding>>, pub iam_owned: Option<bool>, }
Defines an Identity and Access Management (IAM) policy. It is used to specify access control policies for Cloud Platform resources.
A Policy
consists of a list of bindings
. A Binding
binds a list of members
to a role
, where the members can be user accounts, Google groups, Google domains, and service accounts. A role
is a named list of permissions defined by IAM.
Example
{ "bindings": [ { "role": "roles/owner", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-other-app@appspot.gserviceaccount.com", ] }, { "role": "roles/viewer", "members": ["user:sean@example.com"] } ] }
For a description of IAM and its features, see the IAM developer's guide.
Activities
This type is used in activities, which are methods you may call on this type or where this type is involved in. The list links the activity name, along with information about where it is used (one of request and response).
- get iam policy deployments (response)
- set iam policy deployments (request|response)
Fields
audit_configs: Option<Vec<AuditConfig>>
Specifies cloud audit logging configuration for this policy.
version: Option<i32>
Version of the Policy
. The default version is 0.
etag: Option<String>
etag
is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag
in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag
is returned in the response to getIamPolicy
, and systems are expected to put that etag in the request to setIamPolicy
to ensure that their change will be applied to the same version of the policy.
If no etag
is provided in the call to setIamPolicy
, then the existing policy is overwritten blindly.
rules: Option<Vec<Rule>>
If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
bindings: Option<Vec<Binding>>
Associates a list of members
to a role
. bindings
with no members will result in an error.
iam_owned: Option<bool>
Trait Implementations
impl Default for Policy
[src]
impl Default for Policy
impl Clone for Policy
[src]
impl Clone for Policy
fn clone(&self) -> Policy
[src]
fn clone(&self) -> Policy
Returns a copy of the value. Read more
fn clone_from(&mut self, source: &Self)
1.0.0[src]
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source
. Read more
impl Debug for Policy
[src]
impl Debug for Policy
fn fmt(&self, f: &mut Formatter) -> Result
[src]
fn fmt(&self, f: &mut Formatter) -> Result
Formats the value using the given formatter. Read more
impl RequestValue for Policy
[src]
impl RequestValue for Policy
impl ResponseResult for Policy
[src]
impl ResponseResult for Policy