Struct google_deploymentmanager2::Policy
[−]
[src]
pub struct Policy { pub audit_configs: Option<Vec<AuditConfig>>, pub version: Option<i32>, pub etag: Option<String>, pub rules: Option<Vec<Rule>>, pub bindings: Option<Vec<Binding>>, pub iam_owned: Option<bool>, }
Defines an Identity and Access Management (IAM) policy. It is used to specify access control policies for Cloud Platform resources.
A Policy
consists of a list of bindings
. A Binding
binds a list of members
to a role
, where the members can be user accounts, Google groups, Google domains, and service accounts. A role
is a named list of permissions defined by IAM.
Example
{ "bindings": [ { "role": "roles/owner", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-other-app@appspot.gserviceaccount.com", ] }, { "role": "roles/viewer", "members": ["user:sean@example.com"] } ] }
For a description of IAM and its features, see the IAM developer's guide.
Activities
This type is used in activities, which are methods you may call on this type or where this type is involved in. The list links the activity name, along with information about where it is used (one of request and response).
- get iam policy deployments (response)
- set iam policy deployments (request|response)
Fields
audit_configs: Option<Vec<AuditConfig>>
Specifies audit logging configs for "data access". "data access": generally refers to data reads/writes and admin reads. "admin activity": generally refers to admin writes.
Note: AuditConfig
doesn't apply to "admin activity", which always enables audit logging.
version: Option<i32>
Version of the Policy
. The default version is 0.
etag: Option<String>
etag
is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the etag
in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An etag
is returned in the response to getIamPolicy
, and systems are expected to put that etag in the request to setIamPolicy
to ensure that their change will be applied to the same version of the policy.
If no etag
is provided in the call to setIamPolicy
, then the existing policy is overwritten blindly.
rules: Option<Vec<Rule>>
If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
bindings: Option<Vec<Binding>>
Associates a list of members
to a role
. Multiple bindings
must not be specified for the same role
. bindings
with no members will result in an error.
iam_owned: Option<bool>
Trait Implementations
impl Debug for Policy
[src]
impl Clone for Policy
[src]
fn clone(&self) -> Policy
Returns a copy of the value. Read more
fn clone_from(&mut self, source: &Self)
1.0.0
Performs copy-assignment from source
. Read more