Struct google_cloudkms1_beta1::Policy
[−]
[src]
pub struct Policy { pub audit_configs: Option<Vec<AuditConfig>>, pub version: Option<i32>, pub etag: Option<String>, pub rules: Option<Vec<Rule>>, pub bindings: Option<Vec<Binding>>, pub iam_owned: Option<bool>, }
Defines an Identity and Access Management (IAM) policy. It is used to specify access control policies for Cloud Platform resources.
A Policy
consists of a list of bindings
. A Binding
binds a list of
members
to a role
, where the members can be user accounts, Google groups,
Google domains, and service accounts. A role
is a named list of permissions
defined by IAM.
Example
{ "bindings": [ { "role": "roles/owner", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-other-app@appspot.gserviceaccount.com", ] }, { "role": "roles/viewer", "members": ["user:sean@example.com"] } ] }
For a description of IAM and its features, see the IAM developer's guide.
Activities
This type is used in activities, which are methods you may call on this type or where this type is involved in. The list links the activity name, along with information about where it is used (one of request and response).
Fields
audit_configs: Option<Vec<AuditConfig>>
Specifies cloud audit logging configuration for this policy.
version: Option<i32>
Version of the Policy
. The default version is 0.
etag: Option<String>
etag
is used for optimistic concurrency control as a way to help
prevent simultaneous updates of a policy from overwriting each other.
It is strongly suggested that systems make use of the etag
in the
read-modify-write cycle to perform policy updates in order to avoid race
conditions: An etag
is returned in the response to getIamPolicy
, and
systems are expected to put that etag in the request to setIamPolicy
to
ensure that their change will be applied to the same version of the policy.
If no etag
is provided in the call to setIamPolicy
, then the existing
policy is overwritten blindly.
rules: Option<Vec<Rule>>
If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
bindings: Option<Vec<Binding>>
Associates a list of members
to a role
.
Multiple bindings
must not be specified for the same role
.
bindings
with no members will result in an error.
iam_owned: Option<bool>
no description provided
Trait Implementations
impl Default for Policy
[src]
impl Clone for Policy
[src]
fn clone(&self) -> Policy
[src]
Returns a copy of the value. Read more
fn clone_from(&mut self, source: &Self)
1.0.0[src]
Performs copy-assignment from source
. Read more