pub struct AccessPolicyMethods<'a, S>where
S: 'a,{ /* private fields */ }
Expand description
A builder providing access to all methods supported on accessPolicy resources.
It is not used directly, but through the AccessContextManager
hub.
§Example
Instantiate a resource builder
extern crate hyper;
extern crate hyper_rustls;
extern crate google_accesscontextmanager1 as accesscontextmanager1;
use std::default::Default;
use accesscontextmanager1::{AccessContextManager, oauth2, hyper, hyper_rustls, chrono, FieldMask};
let secret: oauth2::ApplicationSecret = Default::default();
let auth = oauth2::InstalledFlowAuthenticator::builder(
secret,
oauth2::InstalledFlowReturnMethod::HTTPRedirect,
).build().await.unwrap();
let mut hub = AccessContextManager::new(hyper::Client::builder().build(hyper_rustls::HttpsConnectorBuilder::new().with_native_roots().https_or_http().enable_http1().build()), auth);
// Usually you wouldn't bind this to a variable, but keep calling *CallBuilders*
// like `access_levels_create(...)`, `access_levels_delete(...)`, `access_levels_get(...)`, `access_levels_list(...)`, `access_levels_patch(...)`, `access_levels_replace_all(...)`, `access_levels_test_iam_permissions(...)`, `authorized_orgs_descs_create(...)`, `authorized_orgs_descs_delete(...)`, `authorized_orgs_descs_get(...)`, `authorized_orgs_descs_list(...)`, `authorized_orgs_descs_patch(...)`, `create(...)`, `delete(...)`, `get(...)`, `get_iam_policy(...)`, `list(...)`, `patch(...)`, `service_perimeters_commit(...)`, `service_perimeters_create(...)`, `service_perimeters_delete(...)`, `service_perimeters_get(...)`, `service_perimeters_list(...)`, `service_perimeters_patch(...)`, `service_perimeters_replace_all(...)`, `service_perimeters_test_iam_permissions(...)`, `set_iam_policy(...)` and `test_iam_permissions(...)`
// to build up your call.
let rb = hub.access_policies();
Implementations§
source§impl<'a, S> AccessPolicyMethods<'a, S>
impl<'a, S> AccessPolicyMethods<'a, S>
sourcepub fn access_levels_create(
&self,
request: AccessLevel,
parent: &str
) -> AccessPolicyAccessLevelCreateCall<'a, S>
pub fn access_levels_create( &self, request: AccessLevel, parent: &str ) -> AccessPolicyAccessLevelCreateCall<'a, S>
Create a builder to help you perform the following task:
Creates an access level. The long-running operation from this RPC has a successful status after the access level propagates to long-lasting storage. If access levels contain errors, an error response is returned for the first error encountered.
§Arguments
request
- No description provided.parent
- Required. Resource name for the access policy which owns this Access Level. Format:accessPolicies/{policy_id}
sourcepub fn access_levels_delete(
&self,
name: &str
) -> AccessPolicyAccessLevelDeleteCall<'a, S>
pub fn access_levels_delete( &self, name: &str ) -> AccessPolicyAccessLevelDeleteCall<'a, S>
Create a builder to help you perform the following task:
Deletes an access level based on the resource name. The long-running operation from this RPC has a successful status after the access level has been removed from long-lasting storage.
§Arguments
name
- Required. Resource name for the Access Level. Format:accessPolicies/{policy_id}/accessLevels/{access_level_id}
sourcepub fn access_levels_get(
&self,
name: &str
) -> AccessPolicyAccessLevelGetCall<'a, S>
pub fn access_levels_get( &self, name: &str ) -> AccessPolicyAccessLevelGetCall<'a, S>
Create a builder to help you perform the following task:
Gets an access level based on the resource name.
§Arguments
name
- Required. Resource name for the Access Level. Format:accessPolicies/{policy_id}/accessLevels/{access_level_id}
sourcepub fn access_levels_list(
&self,
parent: &str
) -> AccessPolicyAccessLevelListCall<'a, S>
pub fn access_levels_list( &self, parent: &str ) -> AccessPolicyAccessLevelListCall<'a, S>
Create a builder to help you perform the following task:
Lists all access levels for an access policy.
§Arguments
parent
- Required. Resource name for the access policy to list Access Levels from. Format:accessPolicies/{policy_id}
sourcepub fn access_levels_patch(
&self,
request: AccessLevel,
name: &str
) -> AccessPolicyAccessLevelPatchCall<'a, S>
pub fn access_levels_patch( &self, request: AccessLevel, name: &str ) -> AccessPolicyAccessLevelPatchCall<'a, S>
Create a builder to help you perform the following task:
Updates an access level. The long-running operation from this RPC has a successful status after the changes to the access level propagate to long-lasting storage. If access levels contain errors, an error response is returned for the first error encountered.
§Arguments
request
- No description provided.name
- Resource name for theAccessLevel
. Format:accessPolicies/{access_policy}/accessLevels/{access_level}
. Theaccess_level
component must begin with a letter, followed by alphanumeric characters or_
. Its maximum length is 50 characters. After you create anAccessLevel
, you cannot change itsname
.
sourcepub fn access_levels_replace_all(
&self,
request: ReplaceAccessLevelsRequest,
parent: &str
) -> AccessPolicyAccessLevelReplaceAllCall<'a, S>
pub fn access_levels_replace_all( &self, request: ReplaceAccessLevelsRequest, parent: &str ) -> AccessPolicyAccessLevelReplaceAllCall<'a, S>
Create a builder to help you perform the following task:
Replaces all existing access levels in an access policy with the access levels provided. This is done atomically. The long-running operation from this RPC has a successful status after all replacements propagate to long-lasting storage. If the replacement contains errors, an error response is returned for the first error encountered. Upon error, the replacement is cancelled, and existing access levels are not affected. The Operation.response field contains ReplaceAccessLevelsResponse. Removing access levels contained in existing service perimeters result in an error.
§Arguments
request
- No description provided.parent
- Required. Resource name for the access policy which owns these Access Levels. Format:accessPolicies/{policy_id}
sourcepub fn access_levels_test_iam_permissions(
&self,
request: TestIamPermissionsRequest,
resource: &str
) -> AccessPolicyAccessLevelTestIamPermissionCall<'a, S>
pub fn access_levels_test_iam_permissions( &self, request: TestIamPermissionsRequest, resource: &str ) -> AccessPolicyAccessLevelTestIamPermissionCall<'a, S>
Create a builder to help you perform the following task:
Returns the IAM permissions that the caller has on the specified Access Context Manager resource. The resource can be an AccessPolicy, AccessLevel, or ServicePerimeter. This method does not support other resources.
§Arguments
request
- No description provided.resource
- REQUIRED: The resource for which the policy detail is being requested. See Resource names for the appropriate value for this field.
Create a builder to help you perform the following task:
Creates an authorized orgs desc. The long-running operation from this RPC has a successful status after the authorized orgs desc propagates to long-lasting storage. If a authorized orgs desc contains errors, an error response is returned for the first error encountered. The name of this AuthorizedOrgsDesc
will be assigned during creation.
§Arguments
request
- No description provided.parent
- Required. Resource name for the access policy which owns this Authorized Orgs Desc. Format:accessPolicies/{policy_id}
Create a builder to help you perform the following task:
Deletes an authorized orgs desc based on the resource name. The long-running operation from this RPC has a successful status after the authorized orgs desc is removed from long-lasting storage.
§Arguments
name
- Required. Resource name for the Authorized Orgs Desc. Format:accessPolicies/{policy_id}/authorizedOrgsDesc/{authorized_orgs_desc_id}
Create a builder to help you perform the following task:
Gets an authorized orgs desc based on the resource name.
§Arguments
name
- Required. Resource name for the Authorized Orgs Desc. Format:accessPolicies/{policy_id}/authorizedOrgsDescs/{authorized_orgs_descs_id}
Create a builder to help you perform the following task:
Lists all authorized orgs descs for an access policy.
§Arguments
parent
- Required. Resource name for the access policy to list Authorized Orgs Desc from. Format:accessPolicies/{policy_id}
Create a builder to help you perform the following task:
Updates an authorized orgs desc. The long-running operation from this RPC has a successful status after the authorized orgs desc propagates to long-lasting storage. If a authorized orgs desc contains errors, an error response is returned for the first error encountered. Only the organization list in AuthorizedOrgsDesc
can be updated. The name, authorization_type, asset_type and authorization_direction cannot be updated.
§Arguments
request
- No description provided.name
- Resource name for theAuthorizedOrgsDesc
. Format:accessPolicies/{access_policy}/authorizedOrgsDescs/{authorized_orgs_desc}
. Theauthorized_orgs_desc
component must begin with a letter, followed by alphanumeric characters or_
. After you create anAuthorizedOrgsDesc
, you cannot change itsname
.
sourcepub fn service_perimeters_commit(
&self,
request: CommitServicePerimetersRequest,
parent: &str
) -> AccessPolicyServicePerimeterCommitCall<'a, S>
pub fn service_perimeters_commit( &self, request: CommitServicePerimetersRequest, parent: &str ) -> AccessPolicyServicePerimeterCommitCall<'a, S>
Create a builder to help you perform the following task:
Commits the dry-run specification for all the service perimeters in an access policy. A commit operation on a service perimeter involves copying its spec
field to the status
field of the service perimeter. Only service perimeters with use_explicit_dry_run_spec
field set to true are affected by a commit operation. The long-running operation from this RPC has a successful status after the dry-run specifications for all the service perimeters have been committed. If a commit fails, it causes the long-running operation to return an error response and the entire commit operation is cancelled. When successful, the Operation.response field contains CommitServicePerimetersResponse. The dry_run
and the spec
fields are cleared after a successful commit operation.
§Arguments
request
- No description provided.parent
- Required. Resource name for the parent Access Policy which owns all Service Perimeters in scope for the commit operation. Format:accessPolicies/{policy_id}
sourcepub fn service_perimeters_create(
&self,
request: ServicePerimeter,
parent: &str
) -> AccessPolicyServicePerimeterCreateCall<'a, S>
pub fn service_perimeters_create( &self, request: ServicePerimeter, parent: &str ) -> AccessPolicyServicePerimeterCreateCall<'a, S>
Create a builder to help you perform the following task:
Creates a service perimeter. The long-running operation from this RPC has a successful status after the service perimeter propagates to long-lasting storage. If a service perimeter contains errors, an error response is returned for the first error encountered.
§Arguments
request
- No description provided.parent
- Required. Resource name for the access policy which owns this Service Perimeter. Format:accessPolicies/{policy_id}
sourcepub fn service_perimeters_delete(
&self,
name: &str
) -> AccessPolicyServicePerimeterDeleteCall<'a, S>
pub fn service_perimeters_delete( &self, name: &str ) -> AccessPolicyServicePerimeterDeleteCall<'a, S>
Create a builder to help you perform the following task:
Deletes a service perimeter based on the resource name. The long-running operation from this RPC has a successful status after the service perimeter is removed from long-lasting storage.
§Arguments
name
- Required. Resource name for the Service Perimeter. Format:accessPolicies/{policy_id}/servicePerimeters/{service_perimeter_id}
sourcepub fn service_perimeters_get(
&self,
name: &str
) -> AccessPolicyServicePerimeterGetCall<'a, S>
pub fn service_perimeters_get( &self, name: &str ) -> AccessPolicyServicePerimeterGetCall<'a, S>
Create a builder to help you perform the following task:
Gets a service perimeter based on the resource name.
§Arguments
name
- Required. Resource name for the Service Perimeter. Format:accessPolicies/{policy_id}/servicePerimeters/{service_perimeters_id}
sourcepub fn service_perimeters_list(
&self,
parent: &str
) -> AccessPolicyServicePerimeterListCall<'a, S>
pub fn service_perimeters_list( &self, parent: &str ) -> AccessPolicyServicePerimeterListCall<'a, S>
Create a builder to help you perform the following task:
Lists all service perimeters for an access policy.
§Arguments
parent
- Required. Resource name for the access policy to list Service Perimeters from. Format:accessPolicies/{policy_id}
sourcepub fn service_perimeters_patch(
&self,
request: ServicePerimeter,
name: &str
) -> AccessPolicyServicePerimeterPatchCall<'a, S>
pub fn service_perimeters_patch( &self, request: ServicePerimeter, name: &str ) -> AccessPolicyServicePerimeterPatchCall<'a, S>
Create a builder to help you perform the following task:
Updates a service perimeter. The long-running operation from this RPC has a successful status after the service perimeter propagates to long-lasting storage. If a service perimeter contains errors, an error response is returned for the first error encountered.
§Arguments
request
- No description provided.name
- Resource name for theServicePerimeter
. Format:accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}
. Theservice_perimeter
component must begin with a letter, followed by alphanumeric characters or_
. After you create aServicePerimeter
, you cannot change itsname
.
sourcepub fn service_perimeters_replace_all(
&self,
request: ReplaceServicePerimetersRequest,
parent: &str
) -> AccessPolicyServicePerimeterReplaceAllCall<'a, S>
pub fn service_perimeters_replace_all( &self, request: ReplaceServicePerimetersRequest, parent: &str ) -> AccessPolicyServicePerimeterReplaceAllCall<'a, S>
Create a builder to help you perform the following task:
Replace all existing service perimeters in an access policy with the service perimeters provided. This is done atomically. The long-running operation from this RPC has a successful status after all replacements propagate to long-lasting storage. Replacements containing errors result in an error response for the first error encountered. Upon an error, replacement are cancelled and existing service perimeters are not affected. The Operation.response field contains ReplaceServicePerimetersResponse.
§Arguments
request
- No description provided.parent
- Required. Resource name for the access policy which owns these Service Perimeters. Format:accessPolicies/{policy_id}
sourcepub fn service_perimeters_test_iam_permissions(
&self,
request: TestIamPermissionsRequest,
resource: &str
) -> AccessPolicyServicePerimeterTestIamPermissionCall<'a, S>
pub fn service_perimeters_test_iam_permissions( &self, request: TestIamPermissionsRequest, resource: &str ) -> AccessPolicyServicePerimeterTestIamPermissionCall<'a, S>
Create a builder to help you perform the following task:
Returns the IAM permissions that the caller has on the specified Access Context Manager resource. The resource can be an AccessPolicy, AccessLevel, or ServicePerimeter. This method does not support other resources.
§Arguments
request
- No description provided.resource
- REQUIRED: The resource for which the policy detail is being requested. See Resource names for the appropriate value for this field.
sourcepub fn create(&self, request: AccessPolicy) -> AccessPolicyCreateCall<'a, S>
pub fn create(&self, request: AccessPolicy) -> AccessPolicyCreateCall<'a, S>
Create a builder to help you perform the following task:
Creates an access policy. This method fails if the organization already has an access policy. The long-running operation has a successful status after the access policy propagates to long-lasting storage. Syntactic and basic semantic errors are returned in metadata
as a BadRequest proto.
§Arguments
request
- No description provided.
sourcepub fn delete(&self, name: &str) -> AccessPolicyDeleteCall<'a, S>
pub fn delete(&self, name: &str) -> AccessPolicyDeleteCall<'a, S>
Create a builder to help you perform the following task:
Deletes an access policy based on the resource name. The long-running operation has a successful status after the access policy is removed from long-lasting storage.
§Arguments
name
- Required. Resource name for the access policy to delete. FormataccessPolicies/{policy_id}
sourcepub fn get(&self, name: &str) -> AccessPolicyGetCall<'a, S>
pub fn get(&self, name: &str) -> AccessPolicyGetCall<'a, S>
Create a builder to help you perform the following task:
Returns an access policy based on the name.
§Arguments
name
- Required. Resource name for the access policy to get. FormataccessPolicies/{policy_id}
sourcepub fn get_iam_policy(
&self,
request: GetIamPolicyRequest,
resource: &str
) -> AccessPolicyGetIamPolicyCall<'a, S>
pub fn get_iam_policy( &self, request: GetIamPolicyRequest, resource: &str ) -> AccessPolicyGetIamPolicyCall<'a, S>
Create a builder to help you perform the following task:
Gets the IAM policy for the specified Access Context Manager access policy.
§Arguments
request
- No description provided.resource
- REQUIRED: The resource for which the policy is being requested. See Resource names for the appropriate value for this field.
sourcepub fn list(&self) -> AccessPolicyListCall<'a, S>
pub fn list(&self) -> AccessPolicyListCall<'a, S>
Create a builder to help you perform the following task:
Lists all access policies in an organization.
sourcepub fn patch(
&self,
request: AccessPolicy,
name: &str
) -> AccessPolicyPatchCall<'a, S>
pub fn patch( &self, request: AccessPolicy, name: &str ) -> AccessPolicyPatchCall<'a, S>
Create a builder to help you perform the following task:
Updates an access policy. The long-running operation from this RPC has a successful status after the changes to the access policy propagate to long-lasting storage.
§Arguments
request
- No description provided.name
- Output only. Resource name of theAccessPolicy
. Format:accessPolicies/{access_policy}
sourcepub fn set_iam_policy(
&self,
request: SetIamPolicyRequest,
resource: &str
) -> AccessPolicySetIamPolicyCall<'a, S>
pub fn set_iam_policy( &self, request: SetIamPolicyRequest, resource: &str ) -> AccessPolicySetIamPolicyCall<'a, S>
Create a builder to help you perform the following task:
Sets the IAM policy for the specified Access Context Manager access policy. This method replaces the existing IAM policy on the access policy. The IAM policy controls the set of users who can perform specific operations on the Access Context Manager access policy.
§Arguments
request
- No description provided.resource
- REQUIRED: The resource for which the policy is being specified. See Resource names for the appropriate value for this field.
sourcepub fn test_iam_permissions(
&self,
request: TestIamPermissionsRequest,
resource: &str
) -> AccessPolicyTestIamPermissionCall<'a, S>
pub fn test_iam_permissions( &self, request: TestIamPermissionsRequest, resource: &str ) -> AccessPolicyTestIamPermissionCall<'a, S>
Create a builder to help you perform the following task:
Returns the IAM permissions that the caller has on the specified Access Context Manager resource. The resource can be an AccessPolicy, AccessLevel, or ServicePerimeter. This method does not support other resources.
§Arguments
request
- No description provided.resource
- REQUIRED: The resource for which the policy detail is being requested. See Resource names for the appropriate value for this field.