Struct google_accesscontextmanager1::api::AccessPolicy
source · pub struct AccessPolicy {
pub etag: Option<String>,
pub name: Option<String>,
pub parent: Option<String>,
pub scopes: Option<Vec<String>>,
pub title: Option<String>,
}
Expand description
AccessPolicy
is a container for AccessLevels
(which define the necessary attributes to use Google Cloud services) and ServicePerimeters
(which define regions of services able to freely pass data within a perimeter). An access policy is globally visible within an organization, and the restrictions it specifies apply to all projects within an organization.
§Activities
This type is used in activities, which are methods you may call on this type or where this type is involved in. The list links the activity name, along with information about where it is used (one of request and response).
- create access policies (request)
- get access policies (response)
- patch access policies (request)
Fields§
§etag: Option<String>
Output only. An opaque identifier for the current version of the AccessPolicy
. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format.
name: Option<String>
Output only. Resource name of the AccessPolicy
. Format: accessPolicies/{access_policy}
parent: Option<String>
Required. The parent of this AccessPolicy
in the Cloud Resource Hierarchy. Currently immutable once created. Format: organizations/{organization_id}
scopes: Option<Vec<String>>
The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with scopes=["folders/123"]
has the following behavior: - ServicePerimeter can only restrict projects within folders/123
. - ServicePerimeter within policy A can only reference access levels defined within policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includes folders/123
will result in an error. If no scopes are provided, then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list of folders/{folder_number}
or projects/{project_number}
title: Option<String>
Required. Human readable title. Does not affect behavior.
Trait Implementations§
source§impl Clone for AccessPolicy
impl Clone for AccessPolicy
source§fn clone(&self) -> AccessPolicy
fn clone(&self) -> AccessPolicy
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read more