google-cloud-policy_troubleshooter-iam-v3 0.a → 0.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.yardopts +12 -0
- data/AUTHENTICATION.md +149 -0
- data/README.md +144 -8
- data/lib/google/cloud/policy_troubleshooter/iam/v3/policy_troubleshooter/client.rb +400 -0
- data/lib/google/cloud/policy_troubleshooter/iam/v3/policy_troubleshooter/credentials.rb +49 -0
- data/lib/google/cloud/policy_troubleshooter/iam/v3/policy_troubleshooter/rest/client.rb +372 -0
- data/lib/google/cloud/policy_troubleshooter/iam/v3/policy_troubleshooter/rest/service_stub.rb +108 -0
- data/lib/google/cloud/policy_troubleshooter/iam/v3/policy_troubleshooter/rest.rb +55 -0
- data/lib/google/cloud/policy_troubleshooter/iam/v3/policy_troubleshooter.rb +58 -0
- data/lib/google/cloud/policy_troubleshooter/iam/v3/rest.rb +39 -0
- data/lib/google/cloud/policy_troubleshooter/iam/v3/version.rb +7 -2
- data/lib/google/cloud/policy_troubleshooter/iam/v3.rb +47 -0
- data/lib/google/cloud/policytroubleshooter/iam/v3/troubleshooter_pb.rb +86 -0
- data/lib/google/cloud/policytroubleshooter/iam/v3/troubleshooter_services_pb.rb +51 -0
- data/lib/google-cloud-policy_troubleshooter-iam-v3.rb +21 -0
- data/proto_docs/README.md +4 -0
- data/proto_docs/google/api/client.rb +381 -0
- data/proto_docs/google/api/field_behavior.rb +85 -0
- data/proto_docs/google/api/launch_stage.rb +71 -0
- data/proto_docs/google/api/resource.rb +222 -0
- data/proto_docs/google/cloud/policytroubleshooter/iam/v3/troubleshooter.rb +826 -0
- data/proto_docs/google/iam/v1/policy.rb +426 -0
- data/proto_docs/google/iam/v2/deny.rb +110 -0
- data/proto_docs/google/iam/v2/policy.rb +241 -0
- data/proto_docs/google/longrunning/operations.rb +164 -0
- data/proto_docs/google/protobuf/any.rb +144 -0
- data/proto_docs/google/protobuf/duration.rb +98 -0
- data/proto_docs/google/protobuf/empty.rb +34 -0
- data/proto_docs/google/protobuf/struct.rb +96 -0
- data/proto_docs/google/protobuf/timestamp.rb +127 -0
- data/proto_docs/google/rpc/status.rb +48 -0
- data/proto_docs/google/type/expr.rb +75 -0
- metadata +229 -13
@@ -0,0 +1,426 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2023 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Iam
|
22
|
+
module V1
|
23
|
+
# An Identity and Access Management (IAM) policy, which specifies access
|
24
|
+
# controls for Google Cloud resources.
|
25
|
+
#
|
26
|
+
#
|
27
|
+
# A `Policy` is a collection of `bindings`. A `binding` binds one or more
|
28
|
+
# `members`, or principals, to a single `role`. Principals can be user
|
29
|
+
# accounts, service accounts, Google groups, and domains (such as G Suite). A
|
30
|
+
# `role` is a named list of permissions; each `role` can be an IAM predefined
|
31
|
+
# role or a user-created custom role.
|
32
|
+
#
|
33
|
+
# For some types of Google Cloud resources, a `binding` can also specify a
|
34
|
+
# `condition`, which is a logical expression that allows access to a resource
|
35
|
+
# only if the expression evaluates to `true`. A condition can add constraints
|
36
|
+
# based on attributes of the request, the resource, or both. To learn which
|
37
|
+
# resources support conditions in their IAM policies, see the
|
38
|
+
# [IAM
|
39
|
+
# documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
|
40
|
+
#
|
41
|
+
# **JSON example:**
|
42
|
+
#
|
43
|
+
# ```
|
44
|
+
# {
|
45
|
+
# "bindings": [
|
46
|
+
# {
|
47
|
+
# "role": "roles/resourcemanager.organizationAdmin",
|
48
|
+
# "members": [
|
49
|
+
# "user:mike@example.com",
|
50
|
+
# "group:admins@example.com",
|
51
|
+
# "domain:google.com",
|
52
|
+
# "serviceAccount:my-project-id@appspot.gserviceaccount.com"
|
53
|
+
# ]
|
54
|
+
# },
|
55
|
+
# {
|
56
|
+
# "role": "roles/resourcemanager.organizationViewer",
|
57
|
+
# "members": [
|
58
|
+
# "user:eve@example.com"
|
59
|
+
# ],
|
60
|
+
# "condition": {
|
61
|
+
# "title": "expirable access",
|
62
|
+
# "description": "Does not grant access after Sep 2020",
|
63
|
+
# "expression": "request.time <
|
64
|
+
# timestamp('2020-10-01T00:00:00.000Z')",
|
65
|
+
# }
|
66
|
+
# }
|
67
|
+
# ],
|
68
|
+
# "etag": "BwWWja0YfJA=",
|
69
|
+
# "version": 3
|
70
|
+
# }
|
71
|
+
# ```
|
72
|
+
#
|
73
|
+
# **YAML example:**
|
74
|
+
#
|
75
|
+
# ```
|
76
|
+
# bindings:
|
77
|
+
# - members:
|
78
|
+
# - user:mike@example.com
|
79
|
+
# - group:admins@example.com
|
80
|
+
# - domain:google.com
|
81
|
+
# - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
82
|
+
# role: roles/resourcemanager.organizationAdmin
|
83
|
+
# - members:
|
84
|
+
# - user:eve@example.com
|
85
|
+
# role: roles/resourcemanager.organizationViewer
|
86
|
+
# condition:
|
87
|
+
# title: expirable access
|
88
|
+
# description: Does not grant access after Sep 2020
|
89
|
+
# expression: request.time < timestamp('2020-10-01T00:00:00.000Z')
|
90
|
+
# etag: BwWWja0YfJA=
|
91
|
+
# version: 3
|
92
|
+
# ```
|
93
|
+
#
|
94
|
+
# For a description of IAM and its features, see the
|
95
|
+
# [IAM documentation](https://cloud.google.com/iam/docs/).
|
96
|
+
# @!attribute [rw] version
|
97
|
+
# @return [::Integer]
|
98
|
+
# Specifies the format of the policy.
|
99
|
+
#
|
100
|
+
# Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
|
101
|
+
# are rejected.
|
102
|
+
#
|
103
|
+
# Any operation that affects conditional role bindings must specify version
|
104
|
+
# `3`. This requirement applies to the following operations:
|
105
|
+
#
|
106
|
+
# * Getting a policy that includes a conditional role binding
|
107
|
+
# * Adding a conditional role binding to a policy
|
108
|
+
# * Changing a conditional role binding in a policy
|
109
|
+
# * Removing any role binding, with or without a condition, from a policy
|
110
|
+
# that includes conditions
|
111
|
+
#
|
112
|
+
# **Important:** If you use IAM Conditions, you must include the `etag` field
|
113
|
+
# whenever you call `setIamPolicy`. If you omit this field, then IAM allows
|
114
|
+
# you to overwrite a version `3` policy with a version `1` policy, and all of
|
115
|
+
# the conditions in the version `3` policy are lost.
|
116
|
+
#
|
117
|
+
# If a policy does not include any conditions, operations on that policy may
|
118
|
+
# specify any valid version or leave the field unset.
|
119
|
+
#
|
120
|
+
# To learn which resources support conditions in their IAM policies, see the
|
121
|
+
# [IAM
|
122
|
+
# documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
|
123
|
+
# @!attribute [rw] bindings
|
124
|
+
# @return [::Array<::Google::Iam::V1::Binding>]
|
125
|
+
# Associates a list of `members`, or principals, with a `role`. Optionally,
|
126
|
+
# may specify a `condition` that determines how and when the `bindings` are
|
127
|
+
# applied. Each of the `bindings` must contain at least one principal.
|
128
|
+
#
|
129
|
+
# The `bindings` in a `Policy` can refer to up to 1,500 principals; up to 250
|
130
|
+
# of these principals can be Google groups. Each occurrence of a principal
|
131
|
+
# counts towards these limits. For example, if the `bindings` grant 50
|
132
|
+
# different roles to `user:alice@example.com`, and not to any other
|
133
|
+
# principal, then you can add another 1,450 principals to the `bindings` in
|
134
|
+
# the `Policy`.
|
135
|
+
# @!attribute [rw] audit_configs
|
136
|
+
# @return [::Array<::Google::Iam::V1::AuditConfig>]
|
137
|
+
# Specifies cloud audit logging configuration for this policy.
|
138
|
+
# @!attribute [rw] etag
|
139
|
+
# @return [::String]
|
140
|
+
# `etag` is used for optimistic concurrency control as a way to help
|
141
|
+
# prevent simultaneous updates of a policy from overwriting each other.
|
142
|
+
# It is strongly suggested that systems make use of the `etag` in the
|
143
|
+
# read-modify-write cycle to perform policy updates in order to avoid race
|
144
|
+
# conditions: An `etag` is returned in the response to `getIamPolicy`, and
|
145
|
+
# systems are expected to put that etag in the request to `setIamPolicy` to
|
146
|
+
# ensure that their change will be applied to the same version of the policy.
|
147
|
+
#
|
148
|
+
# **Important:** If you use IAM Conditions, you must include the `etag` field
|
149
|
+
# whenever you call `setIamPolicy`. If you omit this field, then IAM allows
|
150
|
+
# you to overwrite a version `3` policy with a version `1` policy, and all of
|
151
|
+
# the conditions in the version `3` policy are lost.
|
152
|
+
class Policy
|
153
|
+
include ::Google::Protobuf::MessageExts
|
154
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
155
|
+
end
|
156
|
+
|
157
|
+
# Associates `members`, or principals, with a `role`.
|
158
|
+
# @!attribute [rw] role
|
159
|
+
# @return [::String]
|
160
|
+
# Role that is assigned to the list of `members`, or principals.
|
161
|
+
# For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
|
162
|
+
# @!attribute [rw] members
|
163
|
+
# @return [::Array<::String>]
|
164
|
+
# Specifies the principals requesting access for a Google Cloud resource.
|
165
|
+
# `members` can have the following values:
|
166
|
+
#
|
167
|
+
# * `allUsers`: A special identifier that represents anyone who is
|
168
|
+
# on the internet; with or without a Google account.
|
169
|
+
#
|
170
|
+
# * `allAuthenticatedUsers`: A special identifier that represents anyone
|
171
|
+
# who is authenticated with a Google account or a service account.
|
172
|
+
#
|
173
|
+
# * `user:{emailid}`: An email address that represents a specific Google
|
174
|
+
# account. For example, `alice@example.com` .
|
175
|
+
#
|
176
|
+
#
|
177
|
+
# * `serviceAccount:{emailid}`: An email address that represents a service
|
178
|
+
# account. For example, `my-other-app@appspot.gserviceaccount.com`.
|
179
|
+
#
|
180
|
+
# * `group:{emailid}`: An email address that represents a Google group.
|
181
|
+
# For example, `admins@example.com`.
|
182
|
+
#
|
183
|
+
# * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique
|
184
|
+
# identifier) representing a user that has been recently deleted. For
|
185
|
+
# example, `alice@example.com?uid=123456789012345678901`. If the user is
|
186
|
+
# recovered, this value reverts to `user:{emailid}` and the recovered user
|
187
|
+
# retains the role in the binding.
|
188
|
+
#
|
189
|
+
# * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus
|
190
|
+
# unique identifier) representing a service account that has been recently
|
191
|
+
# deleted. For example,
|
192
|
+
# `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`.
|
193
|
+
# If the service account is undeleted, this value reverts to
|
194
|
+
# `serviceAccount:{emailid}` and the undeleted service account retains the
|
195
|
+
# role in the binding.
|
196
|
+
#
|
197
|
+
# * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique
|
198
|
+
# identifier) representing a Google group that has been recently
|
199
|
+
# deleted. For example, `admins@example.com?uid=123456789012345678901`. If
|
200
|
+
# the group is recovered, this value reverts to `group:{emailid}` and the
|
201
|
+
# recovered group retains the role in the binding.
|
202
|
+
#
|
203
|
+
#
|
204
|
+
# * `domain:{domain}`: The G Suite domain (primary) that represents all the
|
205
|
+
# users of that domain. For example, `google.com` or `example.com`.
|
206
|
+
# @!attribute [rw] condition
|
207
|
+
# @return [::Google::Type::Expr]
|
208
|
+
# The condition that is associated with this binding.
|
209
|
+
#
|
210
|
+
# If the condition evaluates to `true`, then this binding applies to the
|
211
|
+
# current request.
|
212
|
+
#
|
213
|
+
# If the condition evaluates to `false`, then this binding does not apply to
|
214
|
+
# the current request. However, a different role binding might grant the same
|
215
|
+
# role to one or more of the principals in this binding.
|
216
|
+
#
|
217
|
+
# To learn which resources support conditions in their IAM policies, see the
|
218
|
+
# [IAM
|
219
|
+
# documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
|
220
|
+
class Binding
|
221
|
+
include ::Google::Protobuf::MessageExts
|
222
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
223
|
+
end
|
224
|
+
|
225
|
+
# Specifies the audit configuration for a service.
|
226
|
+
# The configuration determines which permission types are logged, and what
|
227
|
+
# identities, if any, are exempted from logging.
|
228
|
+
# An AuditConfig must have one or more AuditLogConfigs.
|
229
|
+
#
|
230
|
+
# If there are AuditConfigs for both `allServices` and a specific service,
|
231
|
+
# the union of the two AuditConfigs is used for that service: the log_types
|
232
|
+
# specified in each AuditConfig are enabled, and the exempted_members in each
|
233
|
+
# AuditLogConfig are exempted.
|
234
|
+
#
|
235
|
+
# Example Policy with multiple AuditConfigs:
|
236
|
+
#
|
237
|
+
# {
|
238
|
+
# "audit_configs": [
|
239
|
+
# {
|
240
|
+
# "service": "allServices",
|
241
|
+
# "audit_log_configs": [
|
242
|
+
# {
|
243
|
+
# "log_type": "DATA_READ",
|
244
|
+
# "exempted_members": [
|
245
|
+
# "user:jose@example.com"
|
246
|
+
# ]
|
247
|
+
# },
|
248
|
+
# {
|
249
|
+
# "log_type": "DATA_WRITE"
|
250
|
+
# },
|
251
|
+
# {
|
252
|
+
# "log_type": "ADMIN_READ"
|
253
|
+
# }
|
254
|
+
# ]
|
255
|
+
# },
|
256
|
+
# {
|
257
|
+
# "service": "sampleservice.googleapis.com",
|
258
|
+
# "audit_log_configs": [
|
259
|
+
# {
|
260
|
+
# "log_type": "DATA_READ"
|
261
|
+
# },
|
262
|
+
# {
|
263
|
+
# "log_type": "DATA_WRITE",
|
264
|
+
# "exempted_members": [
|
265
|
+
# "user:aliya@example.com"
|
266
|
+
# ]
|
267
|
+
# }
|
268
|
+
# ]
|
269
|
+
# }
|
270
|
+
# ]
|
271
|
+
# }
|
272
|
+
#
|
273
|
+
# For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
|
274
|
+
# logging. It also exempts `jose@example.com` from DATA_READ logging, and
|
275
|
+
# `aliya@example.com` from DATA_WRITE logging.
|
276
|
+
# @!attribute [rw] service
|
277
|
+
# @return [::String]
|
278
|
+
# Specifies a service that will be enabled for audit logging.
|
279
|
+
# For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
|
280
|
+
# `allServices` is a special value that covers all services.
|
281
|
+
# @!attribute [rw] audit_log_configs
|
282
|
+
# @return [::Array<::Google::Iam::V1::AuditLogConfig>]
|
283
|
+
# The configuration for logging of each type of permission.
|
284
|
+
class AuditConfig
|
285
|
+
include ::Google::Protobuf::MessageExts
|
286
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
287
|
+
end
|
288
|
+
|
289
|
+
# Provides the configuration for logging a type of permissions.
|
290
|
+
# Example:
|
291
|
+
#
|
292
|
+
# {
|
293
|
+
# "audit_log_configs": [
|
294
|
+
# {
|
295
|
+
# "log_type": "DATA_READ",
|
296
|
+
# "exempted_members": [
|
297
|
+
# "user:jose@example.com"
|
298
|
+
# ]
|
299
|
+
# },
|
300
|
+
# {
|
301
|
+
# "log_type": "DATA_WRITE"
|
302
|
+
# }
|
303
|
+
# ]
|
304
|
+
# }
|
305
|
+
#
|
306
|
+
# This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
|
307
|
+
# jose@example.com from DATA_READ logging.
|
308
|
+
# @!attribute [rw] log_type
|
309
|
+
# @return [::Google::Iam::V1::AuditLogConfig::LogType]
|
310
|
+
# The log type that this config enables.
|
311
|
+
# @!attribute [rw] exempted_members
|
312
|
+
# @return [::Array<::String>]
|
313
|
+
# Specifies the identities that do not cause logging for this type of
|
314
|
+
# permission.
|
315
|
+
# Follows the same format of
|
316
|
+
# {::Google::Iam::V1::Binding#members Binding.members}.
|
317
|
+
class AuditLogConfig
|
318
|
+
include ::Google::Protobuf::MessageExts
|
319
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
320
|
+
|
321
|
+
# The list of valid permission types for which logging can be configured.
|
322
|
+
# Admin writes are always logged, and are not configurable.
|
323
|
+
module LogType
|
324
|
+
# Default case. Should never be this.
|
325
|
+
LOG_TYPE_UNSPECIFIED = 0
|
326
|
+
|
327
|
+
# Admin reads. Example: CloudIAM getIamPolicy
|
328
|
+
ADMIN_READ = 1
|
329
|
+
|
330
|
+
# Data writes. Example: CloudSQL Users create
|
331
|
+
DATA_WRITE = 2
|
332
|
+
|
333
|
+
# Data reads. Example: CloudSQL Users list
|
334
|
+
DATA_READ = 3
|
335
|
+
end
|
336
|
+
end
|
337
|
+
|
338
|
+
# The difference delta between two policies.
|
339
|
+
# @!attribute [rw] binding_deltas
|
340
|
+
# @return [::Array<::Google::Iam::V1::BindingDelta>]
|
341
|
+
# The delta for Bindings between two policies.
|
342
|
+
# @!attribute [rw] audit_config_deltas
|
343
|
+
# @return [::Array<::Google::Iam::V1::AuditConfigDelta>]
|
344
|
+
# The delta for AuditConfigs between two policies.
|
345
|
+
class PolicyDelta
|
346
|
+
include ::Google::Protobuf::MessageExts
|
347
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
348
|
+
end
|
349
|
+
|
350
|
+
# One delta entry for Binding. Each individual change (only one member in each
|
351
|
+
# entry) to a binding will be a separate entry.
|
352
|
+
# @!attribute [rw] action
|
353
|
+
# @return [::Google::Iam::V1::BindingDelta::Action]
|
354
|
+
# The action that was performed on a Binding.
|
355
|
+
# Required
|
356
|
+
# @!attribute [rw] role
|
357
|
+
# @return [::String]
|
358
|
+
# Role that is assigned to `members`.
|
359
|
+
# For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
|
360
|
+
# Required
|
361
|
+
# @!attribute [rw] member
|
362
|
+
# @return [::String]
|
363
|
+
# A single identity requesting access for a Google Cloud resource.
|
364
|
+
# Follows the same format of Binding.members.
|
365
|
+
# Required
|
366
|
+
# @!attribute [rw] condition
|
367
|
+
# @return [::Google::Type::Expr]
|
368
|
+
# The condition that is associated with this binding.
|
369
|
+
class BindingDelta
|
370
|
+
include ::Google::Protobuf::MessageExts
|
371
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
372
|
+
|
373
|
+
# The type of action performed on a Binding in a policy.
|
374
|
+
module Action
|
375
|
+
# Unspecified.
|
376
|
+
ACTION_UNSPECIFIED = 0
|
377
|
+
|
378
|
+
# Addition of a Binding.
|
379
|
+
ADD = 1
|
380
|
+
|
381
|
+
# Removal of a Binding.
|
382
|
+
REMOVE = 2
|
383
|
+
end
|
384
|
+
end
|
385
|
+
|
386
|
+
# One delta entry for AuditConfig. Each individual change (only one
|
387
|
+
# exempted_member in each entry) to a AuditConfig will be a separate entry.
|
388
|
+
# @!attribute [rw] action
|
389
|
+
# @return [::Google::Iam::V1::AuditConfigDelta::Action]
|
390
|
+
# The action that was performed on an audit configuration in a policy.
|
391
|
+
# Required
|
392
|
+
# @!attribute [rw] service
|
393
|
+
# @return [::String]
|
394
|
+
# Specifies a service that was configured for Cloud Audit Logging.
|
395
|
+
# For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
|
396
|
+
# `allServices` is a special value that covers all services.
|
397
|
+
# Required
|
398
|
+
# @!attribute [rw] exempted_member
|
399
|
+
# @return [::String]
|
400
|
+
# A single identity that is exempted from "data access" audit
|
401
|
+
# logging for the `service` specified above.
|
402
|
+
# Follows the same format of Binding.members.
|
403
|
+
# @!attribute [rw] log_type
|
404
|
+
# @return [::String]
|
405
|
+
# Specifies the log_type that was be enabled. ADMIN_ACTIVITY is always
|
406
|
+
# enabled, and cannot be configured.
|
407
|
+
# Required
|
408
|
+
class AuditConfigDelta
|
409
|
+
include ::Google::Protobuf::MessageExts
|
410
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
411
|
+
|
412
|
+
# The type of action performed on an audit configuration in a policy.
|
413
|
+
module Action
|
414
|
+
# Unspecified.
|
415
|
+
ACTION_UNSPECIFIED = 0
|
416
|
+
|
417
|
+
# Addition of an audit configuration.
|
418
|
+
ADD = 1
|
419
|
+
|
420
|
+
# Removal of an audit configuration.
|
421
|
+
REMOVE = 2
|
422
|
+
end
|
423
|
+
end
|
424
|
+
end
|
425
|
+
end
|
426
|
+
end
|
@@ -0,0 +1,110 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2023 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Iam
|
22
|
+
module V2
|
23
|
+
# A deny rule in an IAM deny policy.
|
24
|
+
# @!attribute [rw] denied_principals
|
25
|
+
# @return [::Array<::String>]
|
26
|
+
# The identities that are prevented from using one or more permissions on
|
27
|
+
# Google Cloud resources. This field can contain the following values:
|
28
|
+
#
|
29
|
+
# * `principalSet://goog/public:all`: A special identifier that represents
|
30
|
+
# any principal that is on the internet, even if they do not have a Google
|
31
|
+
# Account or are not logged in.
|
32
|
+
#
|
33
|
+
# * `principal://goog/subject/{email_id}`: A specific Google Account.
|
34
|
+
# Includes Gmail, Cloud Identity, and Google Workspace user accounts. For
|
35
|
+
# example, `principal://goog/subject/alice@example.com`.
|
36
|
+
#
|
37
|
+
# * `deleted:principal://goog/subject/{email_id}?uid={uid}`: A specific
|
38
|
+
# Google Account that was deleted recently. For example,
|
39
|
+
# `deleted:principal://goog/subject/alice@example.com?uid=1234567890`. If
|
40
|
+
# the Google Account is recovered, this identifier reverts to the standard
|
41
|
+
# identifier for a Google Account.
|
42
|
+
#
|
43
|
+
# * `principalSet://goog/group/{group_id}`: A Google group. For example,
|
44
|
+
# `principalSet://goog/group/admins@example.com`.
|
45
|
+
#
|
46
|
+
# * `deleted:principalSet://goog/group/{group_id}?uid={uid}`: A Google group
|
47
|
+
# that was deleted recently. For example,
|
48
|
+
# `deleted:principalSet://goog/group/admins@example.com?uid=1234567890`. If
|
49
|
+
# the Google group is restored, this identifier reverts to the standard
|
50
|
+
# identifier for a Google group.
|
51
|
+
#
|
52
|
+
# * `principal://iam.googleapis.com/projects/-/serviceAccounts/{service_account_id}`:
|
53
|
+
# A Google Cloud service account. For example,
|
54
|
+
# `principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-account@iam.gserviceaccount.com`.
|
55
|
+
#
|
56
|
+
# * `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/{service_account_id}?uid={uid}`:
|
57
|
+
# A Google Cloud service account that was deleted recently. For example,
|
58
|
+
# `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-account@iam.gserviceaccount.com?uid=1234567890`.
|
59
|
+
# If the service account is undeleted, this identifier reverts to the
|
60
|
+
# standard identifier for a service account.
|
61
|
+
#
|
62
|
+
# * `principalSet://goog/cloudIdentityCustomerId/{customer_id}`: All of the
|
63
|
+
# principals associated with the specified Google Workspace or Cloud
|
64
|
+
# Identity customer ID. For example,
|
65
|
+
# `principalSet://goog/cloudIdentityCustomerId/C01Abc35`.
|
66
|
+
# @!attribute [rw] exception_principals
|
67
|
+
# @return [::Array<::String>]
|
68
|
+
# The identities that are excluded from the deny rule, even if they are
|
69
|
+
# listed in the `denied_principals`. For example, you could add a Google
|
70
|
+
# group to the `denied_principals`, then exclude specific users who belong to
|
71
|
+
# that group.
|
72
|
+
#
|
73
|
+
# This field can contain the same values as the `denied_principals` field,
|
74
|
+
# excluding `principalSet://goog/public:all`, which represents all users on
|
75
|
+
# the internet.
|
76
|
+
# @!attribute [rw] denied_permissions
|
77
|
+
# @return [::Array<::String>]
|
78
|
+
# The permissions that are explicitly denied by this rule. Each permission
|
79
|
+
# uses the format `{service_fqdn}/{resource}.{verb}`, where `{service_fqdn}`
|
80
|
+
# is the fully qualified domain name for the service. For example,
|
81
|
+
# `iam.googleapis.com/roles.list`.
|
82
|
+
# @!attribute [rw] exception_permissions
|
83
|
+
# @return [::Array<::String>]
|
84
|
+
# Specifies the permissions that this rule excludes from the set of denied
|
85
|
+
# permissions given by `denied_permissions`. If a permission appears in
|
86
|
+
# `denied_permissions` _and_ in `exception_permissions` then it will _not_ be
|
87
|
+
# denied.
|
88
|
+
#
|
89
|
+
# The excluded permissions can be specified using the same syntax as
|
90
|
+
# `denied_permissions`.
|
91
|
+
# @!attribute [rw] denial_condition
|
92
|
+
# @return [::Google::Type::Expr]
|
93
|
+
# The condition that determines whether this deny rule applies to a request.
|
94
|
+
# If the condition expression evaluates to `true`, then the deny rule is
|
95
|
+
# applied; otherwise, the deny rule is not applied.
|
96
|
+
#
|
97
|
+
# Each deny rule is evaluated independently. If this deny rule does not apply
|
98
|
+
# to a request, other deny rules might still apply.
|
99
|
+
#
|
100
|
+
# The condition can use CEL functions that evaluate
|
101
|
+
# [resource
|
102
|
+
# tags](https://cloud.google.com/iam/help/conditions/resource-tags). Other
|
103
|
+
# functions and operators are not supported.
|
104
|
+
class DenyRule
|
105
|
+
include ::Google::Protobuf::MessageExts
|
106
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
107
|
+
end
|
108
|
+
end
|
109
|
+
end
|
110
|
+
end
|