Google Cloud Native is in preview. Google Cloud Classic is fully supported.
google-native.gameservices/v1beta.GameServerDeploymentIamPolicy
Explore with Pulumi AI
Google Cloud Native is in preview. Google Cloud Classic is fully supported.
Sets the access control policy on the specified resource. Replaces any existing policy. Can return NOT_FOUND, INVALID_ARGUMENT, and PERMISSION_DENIED errors.
Note - this resource’s API doesn’t support deletion. When deleted, the resource will persist
on Google Cloud even though it will be deleted from Pulumi state.
Create GameServerDeploymentIamPolicy Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new GameServerDeploymentIamPolicy(name: string, args: GameServerDeploymentIamPolicyArgs, opts?: CustomResourceOptions);@overload
def GameServerDeploymentIamPolicy(resource_name: str,
                                  args: GameServerDeploymentIamPolicyArgs,
                                  opts: Optional[ResourceOptions] = None)
@overload
def GameServerDeploymentIamPolicy(resource_name: str,
                                  opts: Optional[ResourceOptions] = None,
                                  game_server_deployment_id: Optional[str] = None,
                                  audit_configs: Optional[Sequence[AuditConfigArgs]] = None,
                                  bindings: Optional[Sequence[BindingArgs]] = None,
                                  etag: Optional[str] = None,
                                  location: Optional[str] = None,
                                  project: Optional[str] = None,
                                  rules: Optional[Sequence[RuleArgs]] = None,
                                  update_mask: Optional[str] = None,
                                  version: Optional[int] = None)func NewGameServerDeploymentIamPolicy(ctx *Context, name string, args GameServerDeploymentIamPolicyArgs, opts ...ResourceOption) (*GameServerDeploymentIamPolicy, error)public GameServerDeploymentIamPolicy(string name, GameServerDeploymentIamPolicyArgs args, CustomResourceOptions? opts = null)
public GameServerDeploymentIamPolicy(String name, GameServerDeploymentIamPolicyArgs args)
public GameServerDeploymentIamPolicy(String name, GameServerDeploymentIamPolicyArgs args, CustomResourceOptions options)
type: google-native:gameservices/v1beta:GameServerDeploymentIamPolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args GameServerDeploymentIamPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args GameServerDeploymentIamPolicyArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args GameServerDeploymentIamPolicyArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args GameServerDeploymentIamPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args GameServerDeploymentIamPolicyArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var google_nativeGameServerDeploymentIamPolicyResource = new GoogleNative.GameServices.V1Beta.GameServerDeploymentIamPolicy("google-nativeGameServerDeploymentIamPolicyResource", new()
{
    GameServerDeploymentId = "string",
    AuditConfigs = new[]
    {
        new GoogleNative.GameServices.V1Beta.Inputs.AuditConfigArgs
        {
            AuditLogConfigs = new[]
            {
                new GoogleNative.GameServices.V1Beta.Inputs.AuditLogConfigArgs
                {
                    ExemptedMembers = new[]
                    {
                        "string",
                    },
                    IgnoreChildExemptions = false,
                    LogType = GoogleNative.GameServices.V1Beta.AuditLogConfigLogType.LogTypeUnspecified,
                },
            },
            Service = "string",
        },
    },
    Bindings = new[]
    {
        new GoogleNative.GameServices.V1Beta.Inputs.BindingArgs
        {
            BindingId = "string",
            Condition = new GoogleNative.GameServices.V1Beta.Inputs.ExprArgs
            {
                Description = "string",
                Expression = "string",
                Location = "string",
                Title = "string",
            },
            Members = new[]
            {
                "string",
            },
            Role = "string",
        },
    },
    Etag = "string",
    Location = "string",
    Project = "string",
    Rules = new[]
    {
        new GoogleNative.GameServices.V1Beta.Inputs.RuleArgs
        {
            Action = GoogleNative.GameServices.V1Beta.RuleAction.NoAction,
            Conditions = new[]
            {
                new GoogleNative.GameServices.V1Beta.Inputs.ConditionArgs
                {
                    Iam = GoogleNative.GameServices.V1Beta.ConditionIam.NoAttr,
                    Op = GoogleNative.GameServices.V1Beta.ConditionOp.NoOp,
                    Svc = "string",
                    Sys = GoogleNative.GameServices.V1Beta.ConditionSys.NoAttr,
                    Values = new[]
                    {
                        "string",
                    },
                },
            },
            Description = "string",
            In = new[]
            {
                "string",
            },
            LogConfig = new[]
            {
                new GoogleNative.GameServices.V1Beta.Inputs.LogConfigArgs
                {
                    CloudAudit = new GoogleNative.GameServices.V1Beta.Inputs.CloudAuditOptionsArgs
                    {
                        AuthorizationLoggingOptions = new GoogleNative.GameServices.V1Beta.Inputs.AuthorizationLoggingOptionsArgs
                        {
                            PermissionType = GoogleNative.GameServices.V1Beta.AuthorizationLoggingOptionsPermissionType.PermissionTypeUnspecified,
                        },
                        LogName = GoogleNative.GameServices.V1Beta.CloudAuditOptionsLogName.UnspecifiedLogName,
                    },
                    Counter = new GoogleNative.GameServices.V1Beta.Inputs.CounterOptionsArgs
                    {
                        CustomFields = new[]
                        {
                            new GoogleNative.GameServices.V1Beta.Inputs.CustomFieldArgs
                            {
                                Name = "string",
                                Value = "string",
                            },
                        },
                        Field = "string",
                        Metric = "string",
                    },
                    DataAccess = new GoogleNative.GameServices.V1Beta.Inputs.DataAccessOptionsArgs
                    {
                        LogMode = GoogleNative.GameServices.V1Beta.DataAccessOptionsLogMode.LogModeUnspecified,
                    },
                },
            },
            NotIn = new[]
            {
                "string",
            },
            Permissions = new[]
            {
                "string",
            },
        },
    },
    UpdateMask = "string",
    Version = 0,
});
example, err := gameservicesv1beta.NewGameServerDeploymentIamPolicy(ctx, "google-nativeGameServerDeploymentIamPolicyResource", &gameservicesv1beta.GameServerDeploymentIamPolicyArgs{
	GameServerDeploymentId: pulumi.String("string"),
	AuditConfigs: gameservices.AuditConfigArray{
		&gameservices.AuditConfigArgs{
			AuditLogConfigs: gameservices.AuditLogConfigArray{
				&gameservices.AuditLogConfigArgs{
					ExemptedMembers: pulumi.StringArray{
						pulumi.String("string"),
					},
					IgnoreChildExemptions: pulumi.Bool(false),
					LogType:               gameservicesv1beta.AuditLogConfigLogTypeLogTypeUnspecified,
				},
			},
			Service: pulumi.String("string"),
		},
	},
	Bindings: gameservices.BindingArray{
		&gameservices.BindingArgs{
			BindingId: pulumi.String("string"),
			Condition: &gameservices.ExprArgs{
				Description: pulumi.String("string"),
				Expression:  pulumi.String("string"),
				Location:    pulumi.String("string"),
				Title:       pulumi.String("string"),
			},
			Members: pulumi.StringArray{
				pulumi.String("string"),
			},
			Role: pulumi.String("string"),
		},
	},
	Etag:     pulumi.String("string"),
	Location: pulumi.String("string"),
	Project:  pulumi.String("string"),
	Rules: gameservices.RuleArray{
		&gameservices.RuleArgs{
			Action: gameservicesv1beta.RuleActionNoAction,
			Conditions: gameservices.ConditionArray{
				&gameservices.ConditionArgs{
					Iam: gameservicesv1beta.ConditionIamNoAttr,
					Op:  gameservicesv1beta.ConditionOpNoOp,
					Svc: pulumi.String("string"),
					Sys: gameservicesv1beta.ConditionSysNoAttr,
					Values: pulumi.StringArray{
						pulumi.String("string"),
					},
				},
			},
			Description: pulumi.String("string"),
			In: pulumi.StringArray{
				pulumi.String("string"),
			},
			LogConfig: gameservices.LogConfigArray{
				&gameservices.LogConfigArgs{
					CloudAudit: &gameservices.CloudAuditOptionsArgs{
						AuthorizationLoggingOptions: &gameservices.AuthorizationLoggingOptionsArgs{
							PermissionType: gameservicesv1beta.AuthorizationLoggingOptionsPermissionTypePermissionTypeUnspecified,
						},
						LogName: gameservicesv1beta.CloudAuditOptionsLogNameUnspecifiedLogName,
					},
					Counter: &gameservices.CounterOptionsArgs{
						CustomFields: gameservices.CustomFieldArray{
							&gameservices.CustomFieldArgs{
								Name:  pulumi.String("string"),
								Value: pulumi.String("string"),
							},
						},
						Field:  pulumi.String("string"),
						Metric: pulumi.String("string"),
					},
					DataAccess: &gameservices.DataAccessOptionsArgs{
						LogMode: gameservicesv1beta.DataAccessOptionsLogModeLogModeUnspecified,
					},
				},
			},
			NotIn: pulumi.StringArray{
				pulumi.String("string"),
			},
			Permissions: pulumi.StringArray{
				pulumi.String("string"),
			},
		},
	},
	UpdateMask: pulumi.String("string"),
	Version:    pulumi.Int(0),
})
var google_nativeGameServerDeploymentIamPolicyResource = new GameServerDeploymentIamPolicy("google-nativeGameServerDeploymentIamPolicyResource", GameServerDeploymentIamPolicyArgs.builder()
    .gameServerDeploymentId("string")
    .auditConfigs(AuditConfigArgs.builder()
        .auditLogConfigs(AuditLogConfigArgs.builder()
            .exemptedMembers("string")
            .ignoreChildExemptions(false)
            .logType("LOG_TYPE_UNSPECIFIED")
            .build())
        .service("string")
        .build())
    .bindings(BindingArgs.builder()
        .bindingId("string")
        .condition(ExprArgs.builder()
            .description("string")
            .expression("string")
            .location("string")
            .title("string")
            .build())
        .members("string")
        .role("string")
        .build())
    .etag("string")
    .location("string")
    .project("string")
    .rules(RuleArgs.builder()
        .action("NO_ACTION")
        .conditions(ConditionArgs.builder()
            .iam("NO_ATTR")
            .op("NO_OP")
            .svc("string")
            .sys("NO_ATTR")
            .values("string")
            .build())
        .description("string")
        .in("string")
        .logConfig(LogConfigArgs.builder()
            .cloudAudit(CloudAuditOptionsArgs.builder()
                .authorizationLoggingOptions(AuthorizationLoggingOptionsArgs.builder()
                    .permissionType("PERMISSION_TYPE_UNSPECIFIED")
                    .build())
                .logName("UNSPECIFIED_LOG_NAME")
                .build())
            .counter(CounterOptionsArgs.builder()
                .customFields(CustomFieldArgs.builder()
                    .name("string")
                    .value("string")
                    .build())
                .field("string")
                .metric("string")
                .build())
            .dataAccess(DataAccessOptionsArgs.builder()
                .logMode("LOG_MODE_UNSPECIFIED")
                .build())
            .build())
        .notIn("string")
        .permissions("string")
        .build())
    .updateMask("string")
    .version(0)
    .build());
google_native_game_server_deployment_iam_policy_resource = google_native.gameservices.v1beta.GameServerDeploymentIamPolicy("google-nativeGameServerDeploymentIamPolicyResource",
    game_server_deployment_id="string",
    audit_configs=[{
        "audit_log_configs": [{
            "exempted_members": ["string"],
            "ignore_child_exemptions": False,
            "log_type": google_native.gameservices.v1beta.AuditLogConfigLogType.LOG_TYPE_UNSPECIFIED,
        }],
        "service": "string",
    }],
    bindings=[{
        "binding_id": "string",
        "condition": {
            "description": "string",
            "expression": "string",
            "location": "string",
            "title": "string",
        },
        "members": ["string"],
        "role": "string",
    }],
    etag="string",
    location="string",
    project="string",
    rules=[{
        "action": google_native.gameservices.v1beta.RuleAction.NO_ACTION,
        "conditions": [{
            "iam": google_native.gameservices.v1beta.ConditionIam.NO_ATTR,
            "op": google_native.gameservices.v1beta.ConditionOp.NO_OP,
            "svc": "string",
            "sys": google_native.gameservices.v1beta.ConditionSys.NO_ATTR,
            "values": ["string"],
        }],
        "description": "string",
        "in_": ["string"],
        "log_config": [{
            "cloud_audit": {
                "authorization_logging_options": {
                    "permission_type": google_native.gameservices.v1beta.AuthorizationLoggingOptionsPermissionType.PERMISSION_TYPE_UNSPECIFIED,
                },
                "log_name": google_native.gameservices.v1beta.CloudAuditOptionsLogName.UNSPECIFIED_LOG_NAME,
            },
            "counter": {
                "custom_fields": [{
                    "name": "string",
                    "value": "string",
                }],
                "field": "string",
                "metric": "string",
            },
            "data_access": {
                "log_mode": google_native.gameservices.v1beta.DataAccessOptionsLogMode.LOG_MODE_UNSPECIFIED,
            },
        }],
        "not_in": ["string"],
        "permissions": ["string"],
    }],
    update_mask="string",
    version=0)
const google_nativeGameServerDeploymentIamPolicyResource = new google_native.gameservices.v1beta.GameServerDeploymentIamPolicy("google-nativeGameServerDeploymentIamPolicyResource", {
    gameServerDeploymentId: "string",
    auditConfigs: [{
        auditLogConfigs: [{
            exemptedMembers: ["string"],
            ignoreChildExemptions: false,
            logType: google_native.gameservices.v1beta.AuditLogConfigLogType.LogTypeUnspecified,
        }],
        service: "string",
    }],
    bindings: [{
        bindingId: "string",
        condition: {
            description: "string",
            expression: "string",
            location: "string",
            title: "string",
        },
        members: ["string"],
        role: "string",
    }],
    etag: "string",
    location: "string",
    project: "string",
    rules: [{
        action: google_native.gameservices.v1beta.RuleAction.NoAction,
        conditions: [{
            iam: google_native.gameservices.v1beta.ConditionIam.NoAttr,
            op: google_native.gameservices.v1beta.ConditionOp.NoOp,
            svc: "string",
            sys: google_native.gameservices.v1beta.ConditionSys.NoAttr,
            values: ["string"],
        }],
        description: "string",
        "in": ["string"],
        logConfig: [{
            cloudAudit: {
                authorizationLoggingOptions: {
                    permissionType: google_native.gameservices.v1beta.AuthorizationLoggingOptionsPermissionType.PermissionTypeUnspecified,
                },
                logName: google_native.gameservices.v1beta.CloudAuditOptionsLogName.UnspecifiedLogName,
            },
            counter: {
                customFields: [{
                    name: "string",
                    value: "string",
                }],
                field: "string",
                metric: "string",
            },
            dataAccess: {
                logMode: google_native.gameservices.v1beta.DataAccessOptionsLogMode.LogModeUnspecified,
            },
        }],
        notIn: ["string"],
        permissions: ["string"],
    }],
    updateMask: "string",
    version: 0,
});
type: google-native:gameservices/v1beta:GameServerDeploymentIamPolicy
properties:
    auditConfigs:
        - auditLogConfigs:
            - exemptedMembers:
                - string
              ignoreChildExemptions: false
              logType: LOG_TYPE_UNSPECIFIED
          service: string
    bindings:
        - bindingId: string
          condition:
            description: string
            expression: string
            location: string
            title: string
          members:
            - string
          role: string
    etag: string
    gameServerDeploymentId: string
    location: string
    project: string
    rules:
        - action: NO_ACTION
          conditions:
            - iam: NO_ATTR
              op: NO_OP
              svc: string
              sys: NO_ATTR
              values:
                - string
          description: string
          in:
            - string
          logConfig:
            - cloudAudit:
                authorizationLoggingOptions:
                    permissionType: PERMISSION_TYPE_UNSPECIFIED
                logName: UNSPECIFIED_LOG_NAME
              counter:
                customFields:
                    - name: string
                      value: string
                field: string
                metric: string
              dataAccess:
                logMode: LOG_MODE_UNSPECIFIED
          notIn:
            - string
          permissions:
            - string
    updateMask: string
    version: 0
GameServerDeploymentIamPolicy Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The GameServerDeploymentIamPolicy resource accepts the following input properties:
- GameServer stringDeployment Id 
- AuditConfigs List<Pulumi.Google Native. Game Services. V1Beta. Inputs. Audit Config> 
- Specifies cloud audit logging configuration for this policy.
- Bindings
List<Pulumi.Google Native. Game Services. V1Beta. Inputs. Binding> 
- Associates a list of members, or principals, with arole. Optionally, may specify aconditionthat determines how and when thebindingsare applied. Each of thebindingsmust contain at least one principal. Thebindingsin aPolicycan refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if thebindingsgrant 50 different roles touser:alice@example.com, and not to any other principal, then you can add another 1,450 principals to thebindingsin thePolicy.
- Etag string
- etagis used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the- etagin the read-modify-write cycle to perform policy updates in order to avoid race conditions: An- etagis returned in the response to- getIamPolicy, and systems are expected to put that etag in the request to- setIamPolicyto ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the- etagfield whenever you call- setIamPolicy. If you omit this field, then IAM allows you to overwrite a version- 3policy with a version- 1policy, and all of the conditions in the version- 3policy are lost.
- Location string
- Project string
- Rules
List<Pulumi.Google Native. Game Services. V1Beta. Inputs. Rule> 
- If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
- UpdateMask string
- OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
- Version int
- Specifies the format of the policy. Valid values are 0,1, and3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include theetagfield whenever you callsetIamPolicy. If you omit this field, then IAM allows you to overwrite a version3policy with a version1policy, and all of the conditions in the version3policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- GameServer stringDeployment Id 
- AuditConfigs []AuditConfig Args 
- Specifies cloud audit logging configuration for this policy.
- Bindings
[]BindingArgs 
- Associates a list of members, or principals, with arole. Optionally, may specify aconditionthat determines how and when thebindingsare applied. Each of thebindingsmust contain at least one principal. Thebindingsin aPolicycan refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if thebindingsgrant 50 different roles touser:alice@example.com, and not to any other principal, then you can add another 1,450 principals to thebindingsin thePolicy.
- Etag string
- etagis used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the- etagin the read-modify-write cycle to perform policy updates in order to avoid race conditions: An- etagis returned in the response to- getIamPolicy, and systems are expected to put that etag in the request to- setIamPolicyto ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the- etagfield whenever you call- setIamPolicy. If you omit this field, then IAM allows you to overwrite a version- 3policy with a version- 1policy, and all of the conditions in the version- 3policy are lost.
- Location string
- Project string
- Rules
[]RuleArgs 
- If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
- UpdateMask string
- OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
- Version int
- Specifies the format of the policy. Valid values are 0,1, and3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include theetagfield whenever you callsetIamPolicy. If you omit this field, then IAM allows you to overwrite a version3policy with a version1policy, and all of the conditions in the version3policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- gameServer StringDeployment Id 
- auditConfigs List<AuditConfig> 
- Specifies cloud audit logging configuration for this policy.
- bindings List<Binding>
- Associates a list of members, or principals, with arole. Optionally, may specify aconditionthat determines how and when thebindingsare applied. Each of thebindingsmust contain at least one principal. Thebindingsin aPolicycan refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if thebindingsgrant 50 different roles touser:alice@example.com, and not to any other principal, then you can add another 1,450 principals to thebindingsin thePolicy.
- etag String
- etagis used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the- etagin the read-modify-write cycle to perform policy updates in order to avoid race conditions: An- etagis returned in the response to- getIamPolicy, and systems are expected to put that etag in the request to- setIamPolicyto ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the- etagfield whenever you call- setIamPolicy. If you omit this field, then IAM allows you to overwrite a version- 3policy with a version- 1policy, and all of the conditions in the version- 3policy are lost.
- location String
- project String
- rules List<Rule>
- If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
- updateMask String
- OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
- version Integer
- Specifies the format of the policy. Valid values are 0,1, and3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include theetagfield whenever you callsetIamPolicy. If you omit this field, then IAM allows you to overwrite a version3policy with a version1policy, and all of the conditions in the version3policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- gameServer stringDeployment Id 
- auditConfigs AuditConfig[] 
- Specifies cloud audit logging configuration for this policy.
- bindings Binding[]
- Associates a list of members, or principals, with arole. Optionally, may specify aconditionthat determines how and when thebindingsare applied. Each of thebindingsmust contain at least one principal. Thebindingsin aPolicycan refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if thebindingsgrant 50 different roles touser:alice@example.com, and not to any other principal, then you can add another 1,450 principals to thebindingsin thePolicy.
- etag string
- etagis used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the- etagin the read-modify-write cycle to perform policy updates in order to avoid race conditions: An- etagis returned in the response to- getIamPolicy, and systems are expected to put that etag in the request to- setIamPolicyto ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the- etagfield whenever you call- setIamPolicy. If you omit this field, then IAM allows you to overwrite a version- 3policy with a version- 1policy, and all of the conditions in the version- 3policy are lost.
- location string
- project string
- rules Rule[]
- If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
- updateMask string
- OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
- version number
- Specifies the format of the policy. Valid values are 0,1, and3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include theetagfield whenever you callsetIamPolicy. If you omit this field, then IAM allows you to overwrite a version3policy with a version1policy, and all of the conditions in the version3policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- game_server_ strdeployment_ id 
- audit_configs Sequence[AuditConfig Args] 
- Specifies cloud audit logging configuration for this policy.
- bindings
Sequence[BindingArgs] 
- Associates a list of members, or principals, with arole. Optionally, may specify aconditionthat determines how and when thebindingsare applied. Each of thebindingsmust contain at least one principal. Thebindingsin aPolicycan refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if thebindingsgrant 50 different roles touser:alice@example.com, and not to any other principal, then you can add another 1,450 principals to thebindingsin thePolicy.
- etag str
- etagis used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the- etagin the read-modify-write cycle to perform policy updates in order to avoid race conditions: An- etagis returned in the response to- getIamPolicy, and systems are expected to put that etag in the request to- setIamPolicyto ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the- etagfield whenever you call- setIamPolicy. If you omit this field, then IAM allows you to overwrite a version- 3policy with a version- 1policy, and all of the conditions in the version- 3policy are lost.
- location str
- project str
- rules
Sequence[RuleArgs] 
- If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
- update_mask str
- OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
- version int
- Specifies the format of the policy. Valid values are 0,1, and3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include theetagfield whenever you callsetIamPolicy. If you omit this field, then IAM allows you to overwrite a version3policy with a version1policy, and all of the conditions in the version3policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- gameServer StringDeployment Id 
- auditConfigs List<Property Map>
- Specifies cloud audit logging configuration for this policy.
- bindings List<Property Map>
- Associates a list of members, or principals, with arole. Optionally, may specify aconditionthat determines how and when thebindingsare applied. Each of thebindingsmust contain at least one principal. Thebindingsin aPolicycan refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if thebindingsgrant 50 different roles touser:alice@example.com, and not to any other principal, then you can add another 1,450 principals to thebindingsin thePolicy.
- etag String
- etagis used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the- etagin the read-modify-write cycle to perform policy updates in order to avoid race conditions: An- etagis returned in the response to- getIamPolicy, and systems are expected to put that etag in the request to- setIamPolicyto ensure that their change will be applied to the same version of the policy. Important: If you use IAM Conditions, you must include the- etagfield whenever you call- setIamPolicy. If you omit this field, then IAM allows you to overwrite a version- 3policy with a version- 1policy, and all of the conditions in the version- 3policy are lost.
- location String
- project String
- rules List<Property Map>
- If more than one rule is specified, the rules are applied in the following manner: - All matching LOG rules are always applied. - If any DENY/DENY_WITH_LOG rule matches, permission is denied. Logging will be applied if one or more matching rule requires logging. - Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is granted. Logging will be applied if one or more matching rule requires logging. - Otherwise, if no rule applies, permission is denied.
- updateMask String
- OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only the fields in the mask will be modified. If no mask is provided, the following default mask is used: paths: "bindings, etag"
- version Number
- Specifies the format of the policy. Valid values are 0,1, and3. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version3. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions Important: If you use IAM Conditions, you must include theetagfield whenever you callsetIamPolicy. If you omit this field, then IAM allows you to overwrite a version3policy with a version1policy, and all of the conditions in the version3policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the IAM documentation.
Outputs
All input properties are implicitly available as output properties. Additionally, the GameServerDeploymentIamPolicy resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Supporting Types
AuditConfig, AuditConfigArgs    
- AuditLog List<Pulumi.Configs Google Native. Game Services. V1Beta. Inputs. Audit Log Config> 
- The configuration for logging of each type of permission.
- Service string
- Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com,cloudsql.googleapis.com.allServicesis a special value that covers all services.
- AuditLog []AuditConfigs Log Config 
- The configuration for logging of each type of permission.
- Service string
- Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com,cloudsql.googleapis.com.allServicesis a special value that covers all services.
- auditLog List<AuditConfigs Log Config> 
- The configuration for logging of each type of permission.
- service String
- Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com,cloudsql.googleapis.com.allServicesis a special value that covers all services.
- auditLog AuditConfigs Log Config[] 
- The configuration for logging of each type of permission.
- service string
- Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com,cloudsql.googleapis.com.allServicesis a special value that covers all services.
- audit_log_ Sequence[Auditconfigs Log Config] 
- The configuration for logging of each type of permission.
- service str
- Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com,cloudsql.googleapis.com.allServicesis a special value that covers all services.
- auditLog List<Property Map>Configs 
- The configuration for logging of each type of permission.
- service String
- Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com,cloudsql.googleapis.com.allServicesis a special value that covers all services.
AuditConfigResponse, AuditConfigResponseArgs      
- AuditLog List<Pulumi.Configs Google Native. Game Services. V1Beta. Inputs. Audit Log Config Response> 
- The configuration for logging of each type of permission.
- Service string
- Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com,cloudsql.googleapis.com.allServicesis a special value that covers all services.
- AuditLog []AuditConfigs Log Config Response 
- The configuration for logging of each type of permission.
- Service string
- Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com,cloudsql.googleapis.com.allServicesis a special value that covers all services.
- auditLog List<AuditConfigs Log Config Response> 
- The configuration for logging of each type of permission.
- service String
- Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com,cloudsql.googleapis.com.allServicesis a special value that covers all services.
- auditLog AuditConfigs Log Config Response[] 
- The configuration for logging of each type of permission.
- service string
- Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com,cloudsql.googleapis.com.allServicesis a special value that covers all services.
- audit_log_ Sequence[Auditconfigs Log Config Response] 
- The configuration for logging of each type of permission.
- service str
- Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com,cloudsql.googleapis.com.allServicesis a special value that covers all services.
- auditLog List<Property Map>Configs 
- The configuration for logging of each type of permission.
- service String
- Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com,cloudsql.googleapis.com.allServicesis a special value that covers all services.
AuditLogConfig, AuditLogConfigArgs      
- ExemptedMembers List<string>
- Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
- IgnoreChild boolExemptions 
- LogType Pulumi.Google Native. Game Services. V1Beta. Audit Log Config Log Type 
- The log type that this config enables.
- ExemptedMembers []string
- Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
- IgnoreChild boolExemptions 
- LogType AuditLog Config Log Type 
- The log type that this config enables.
- exemptedMembers List<String>
- Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
- ignoreChild BooleanExemptions 
- logType AuditLog Config Log Type 
- The log type that this config enables.
- exemptedMembers string[]
- Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
- ignoreChild booleanExemptions 
- logType AuditLog Config Log Type 
- The log type that this config enables.
- exempted_members Sequence[str]
- Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
- ignore_child_ boolexemptions 
- log_type AuditLog Config Log Type 
- The log type that this config enables.
- exemptedMembers List<String>
- Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
- ignoreChild BooleanExemptions 
- logType "LOG_TYPE_UNSPECIFIED" | "ADMIN_READ" | "DATA_WRITE" | "DATA_READ"
- The log type that this config enables.
AuditLogConfigLogType, AuditLogConfigLogTypeArgs          
- LogType Unspecified 
- LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
- AdminRead 
- ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
- DataWrite 
- DATA_WRITEData writes. Example: CloudSQL Users create
- DataRead 
- DATA_READData reads. Example: CloudSQL Users list
- AuditLog Config Log Type Log Type Unspecified 
- LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
- AuditLog Config Log Type Admin Read 
- ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
- AuditLog Config Log Type Data Write 
- DATA_WRITEData writes. Example: CloudSQL Users create
- AuditLog Config Log Type Data Read 
- DATA_READData reads. Example: CloudSQL Users list
- LogType Unspecified 
- LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
- AdminRead 
- ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
- DataWrite 
- DATA_WRITEData writes. Example: CloudSQL Users create
- DataRead 
- DATA_READData reads. Example: CloudSQL Users list
- LogType Unspecified 
- LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
- AdminRead 
- ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
- DataWrite 
- DATA_WRITEData writes. Example: CloudSQL Users create
- DataRead 
- DATA_READData reads. Example: CloudSQL Users list
- LOG_TYPE_UNSPECIFIED
- LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
- ADMIN_READ
- ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
- DATA_WRITE
- DATA_WRITEData writes. Example: CloudSQL Users create
- DATA_READ
- DATA_READData reads. Example: CloudSQL Users list
- "LOG_TYPE_UNSPECIFIED"
- LOG_TYPE_UNSPECIFIEDDefault case. Should never be this.
- "ADMIN_READ"
- ADMIN_READAdmin reads. Example: CloudIAM getIamPolicy
- "DATA_WRITE"
- DATA_WRITEData writes. Example: CloudSQL Users create
- "DATA_READ"
- DATA_READData reads. Example: CloudSQL Users list
AuditLogConfigResponse, AuditLogConfigResponseArgs        
- ExemptedMembers List<string>
- Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
- IgnoreChild boolExemptions 
- LogType string
- The log type that this config enables.
- ExemptedMembers []string
- Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
- IgnoreChild boolExemptions 
- LogType string
- The log type that this config enables.
- exemptedMembers List<String>
- Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
- ignoreChild BooleanExemptions 
- logType String
- The log type that this config enables.
- exemptedMembers string[]
- Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
- ignoreChild booleanExemptions 
- logType string
- The log type that this config enables.
- exempted_members Sequence[str]
- Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
- ignore_child_ boolexemptions 
- log_type str
- The log type that this config enables.
- exemptedMembers List<String>
- Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
- ignoreChild BooleanExemptions 
- logType String
- The log type that this config enables.
AuthorizationLoggingOptions, AuthorizationLoggingOptionsArgs      
- PermissionType Pulumi.Google Native. Game Services. V1Beta. Authorization Logging Options Permission Type 
- The type of the permission that was checked.
- PermissionType AuthorizationLogging Options Permission Type 
- The type of the permission that was checked.
- permissionType AuthorizationLogging Options Permission Type 
- The type of the permission that was checked.
- permissionType AuthorizationLogging Options Permission Type 
- The type of the permission that was checked.
- permission_type AuthorizationLogging Options Permission Type 
- The type of the permission that was checked.
- permissionType "PERMISSION_TYPE_UNSPECIFIED" | "ADMIN_READ" | "ADMIN_WRITE" | "DATA_READ" | "DATA_WRITE"
- The type of the permission that was checked.
AuthorizationLoggingOptionsPermissionType, AuthorizationLoggingOptionsPermissionTypeArgs          
- PermissionType Unspecified 
- PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
- AdminRead 
- ADMIN_READA read of admin (meta) data.
- AdminWrite 
- ADMIN_WRITEA write of admin (meta) data.
- DataRead 
- DATA_READA read of standard data.
- DataWrite 
- DATA_WRITEA write of standard data.
- AuthorizationLogging Options Permission Type Permission Type Unspecified 
- PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
- AuthorizationLogging Options Permission Type Admin Read 
- ADMIN_READA read of admin (meta) data.
- AuthorizationLogging Options Permission Type Admin Write 
- ADMIN_WRITEA write of admin (meta) data.
- AuthorizationLogging Options Permission Type Data Read 
- DATA_READA read of standard data.
- AuthorizationLogging Options Permission Type Data Write 
- DATA_WRITEA write of standard data.
- PermissionType Unspecified 
- PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
- AdminRead 
- ADMIN_READA read of admin (meta) data.
- AdminWrite 
- ADMIN_WRITEA write of admin (meta) data.
- DataRead 
- DATA_READA read of standard data.
- DataWrite 
- DATA_WRITEA write of standard data.
- PermissionType Unspecified 
- PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
- AdminRead 
- ADMIN_READA read of admin (meta) data.
- AdminWrite 
- ADMIN_WRITEA write of admin (meta) data.
- DataRead 
- DATA_READA read of standard data.
- DataWrite 
- DATA_WRITEA write of standard data.
- PERMISSION_TYPE_UNSPECIFIED
- PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
- ADMIN_READ
- ADMIN_READA read of admin (meta) data.
- ADMIN_WRITE
- ADMIN_WRITEA write of admin (meta) data.
- DATA_READ
- DATA_READA read of standard data.
- DATA_WRITE
- DATA_WRITEA write of standard data.
- "PERMISSION_TYPE_UNSPECIFIED"
- PERMISSION_TYPE_UNSPECIFIEDDefault. Should not be used.
- "ADMIN_READ"
- ADMIN_READA read of admin (meta) data.
- "ADMIN_WRITE"
- ADMIN_WRITEA write of admin (meta) data.
- "DATA_READ"
- DATA_READA read of standard data.
- "DATA_WRITE"
- DATA_WRITEA write of standard data.
AuthorizationLoggingOptionsResponse, AuthorizationLoggingOptionsResponseArgs        
- PermissionType string
- The type of the permission that was checked.
- PermissionType string
- The type of the permission that was checked.
- permissionType String
- The type of the permission that was checked.
- permissionType string
- The type of the permission that was checked.
- permission_type str
- The type of the permission that was checked.
- permissionType String
- The type of the permission that was checked.
Binding, BindingArgs  
- BindingId string
- Condition
Pulumi.Google Native. Game Services. V1Beta. Inputs. Expr 
- The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates tofalse, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- Members List<string>
- Specifies the principals requesting access for a Google Cloud resource. memberscan have the following values: *allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. *allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. *user:{emailid}: An email address that represents a specific Google account. For example,alice@example.com. *serviceAccount:{emailid}: An email address that represents a Google service account. For example,my-other-app@appspot.gserviceaccount.com. *serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example,my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. *group:{emailid}: An email address that represents a Google group. For example,admins@example.com. *domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example,google.comorexample.com. *deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example,alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts touser:{emailid}and the recovered user retains the role in the binding. *deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example,my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts toserviceAccount:{emailid}and the undeleted service account retains the role in the binding. *deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example,admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts togroup:{emailid}and the recovered group retains the role in the binding.
- Role string
- Role that is assigned to the list of members, or principals. For example,roles/viewer,roles/editor, orroles/owner.
- BindingId string
- Condition Expr
- The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates tofalse, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- Members []string
- Specifies the principals requesting access for a Google Cloud resource. memberscan have the following values: *allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. *allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. *user:{emailid}: An email address that represents a specific Google account. For example,alice@example.com. *serviceAccount:{emailid}: An email address that represents a Google service account. For example,my-other-app@appspot.gserviceaccount.com. *serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example,my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. *group:{emailid}: An email address that represents a Google group. For example,admins@example.com. *domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example,google.comorexample.com. *deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example,alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts touser:{emailid}and the recovered user retains the role in the binding. *deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example,my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts toserviceAccount:{emailid}and the undeleted service account retains the role in the binding. *deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example,admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts togroup:{emailid}and the recovered group retains the role in the binding.
- Role string
- Role that is assigned to the list of members, or principals. For example,roles/viewer,roles/editor, orroles/owner.
- bindingId String
- condition Expr
- The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates tofalse, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- members List<String>
- Specifies the principals requesting access for a Google Cloud resource. memberscan have the following values: *allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. *allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. *user:{emailid}: An email address that represents a specific Google account. For example,alice@example.com. *serviceAccount:{emailid}: An email address that represents a Google service account. For example,my-other-app@appspot.gserviceaccount.com. *serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example,my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. *group:{emailid}: An email address that represents a Google group. For example,admins@example.com. *domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example,google.comorexample.com. *deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example,alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts touser:{emailid}and the recovered user retains the role in the binding. *deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example,my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts toserviceAccount:{emailid}and the undeleted service account retains the role in the binding. *deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example,admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts togroup:{emailid}and the recovered group retains the role in the binding.
- role String
- Role that is assigned to the list of members, or principals. For example,roles/viewer,roles/editor, orroles/owner.
- bindingId string
- condition Expr
- The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates tofalse, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- members string[]
- Specifies the principals requesting access for a Google Cloud resource. memberscan have the following values: *allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. *allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. *user:{emailid}: An email address that represents a specific Google account. For example,alice@example.com. *serviceAccount:{emailid}: An email address that represents a Google service account. For example,my-other-app@appspot.gserviceaccount.com. *serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example,my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. *group:{emailid}: An email address that represents a Google group. For example,admins@example.com. *domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example,google.comorexample.com. *deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example,alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts touser:{emailid}and the recovered user retains the role in the binding. *deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example,my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts toserviceAccount:{emailid}and the undeleted service account retains the role in the binding. *deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example,admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts togroup:{emailid}and the recovered group retains the role in the binding.
- role string
- Role that is assigned to the list of members, or principals. For example,roles/viewer,roles/editor, orroles/owner.
- binding_id str
- condition Expr
- The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates tofalse, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- members Sequence[str]
- Specifies the principals requesting access for a Google Cloud resource. memberscan have the following values: *allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. *allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. *user:{emailid}: An email address that represents a specific Google account. For example,alice@example.com. *serviceAccount:{emailid}: An email address that represents a Google service account. For example,my-other-app@appspot.gserviceaccount.com. *serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example,my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. *group:{emailid}: An email address that represents a Google group. For example,admins@example.com. *domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example,google.comorexample.com. *deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example,alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts touser:{emailid}and the recovered user retains the role in the binding. *deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example,my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts toserviceAccount:{emailid}and the undeleted service account retains the role in the binding. *deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example,admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts togroup:{emailid}and the recovered group retains the role in the binding.
- role str
- Role that is assigned to the list of members, or principals. For example,roles/viewer,roles/editor, orroles/owner.
- bindingId String
- condition Property Map
- The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates tofalse, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- members List<String>
- Specifies the principals requesting access for a Google Cloud resource. memberscan have the following values: *allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. *allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. *user:{emailid}: An email address that represents a specific Google account. For example,alice@example.com. *serviceAccount:{emailid}: An email address that represents a Google service account. For example,my-other-app@appspot.gserviceaccount.com. *serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example,my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. *group:{emailid}: An email address that represents a Google group. For example,admins@example.com. *domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example,google.comorexample.com. *deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example,alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts touser:{emailid}and the recovered user retains the role in the binding. *deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example,my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts toserviceAccount:{emailid}and the undeleted service account retains the role in the binding. *deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example,admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts togroup:{emailid}and the recovered group retains the role in the binding.
- role String
- Role that is assigned to the list of members, or principals. For example,roles/viewer,roles/editor, orroles/owner.
BindingResponse, BindingResponseArgs    
- BindingId string
- Condition
Pulumi.Google Native. Game Services. V1Beta. Inputs. Expr Response 
- The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates tofalse, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- Members List<string>
- Specifies the principals requesting access for a Google Cloud resource. memberscan have the following values: *allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. *allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. *user:{emailid}: An email address that represents a specific Google account. For example,alice@example.com. *serviceAccount:{emailid}: An email address that represents a Google service account. For example,my-other-app@appspot.gserviceaccount.com. *serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example,my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. *group:{emailid}: An email address that represents a Google group. For example,admins@example.com. *domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example,google.comorexample.com. *deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example,alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts touser:{emailid}and the recovered user retains the role in the binding. *deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example,my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts toserviceAccount:{emailid}and the undeleted service account retains the role in the binding. *deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example,admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts togroup:{emailid}and the recovered group retains the role in the binding.
- Role string
- Role that is assigned to the list of members, or principals. For example,roles/viewer,roles/editor, orroles/owner.
- BindingId string
- Condition
ExprResponse 
- The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates tofalse, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- Members []string
- Specifies the principals requesting access for a Google Cloud resource. memberscan have the following values: *allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. *allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. *user:{emailid}: An email address that represents a specific Google account. For example,alice@example.com. *serviceAccount:{emailid}: An email address that represents a Google service account. For example,my-other-app@appspot.gserviceaccount.com. *serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example,my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. *group:{emailid}: An email address that represents a Google group. For example,admins@example.com. *domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example,google.comorexample.com. *deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example,alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts touser:{emailid}and the recovered user retains the role in the binding. *deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example,my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts toserviceAccount:{emailid}and the undeleted service account retains the role in the binding. *deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example,admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts togroup:{emailid}and the recovered group retains the role in the binding.
- Role string
- Role that is assigned to the list of members, or principals. For example,roles/viewer,roles/editor, orroles/owner.
- bindingId String
- condition
ExprResponse 
- The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates tofalse, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- members List<String>
- Specifies the principals requesting access for a Google Cloud resource. memberscan have the following values: *allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. *allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. *user:{emailid}: An email address that represents a specific Google account. For example,alice@example.com. *serviceAccount:{emailid}: An email address that represents a Google service account. For example,my-other-app@appspot.gserviceaccount.com. *serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example,my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. *group:{emailid}: An email address that represents a Google group. For example,admins@example.com. *domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example,google.comorexample.com. *deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example,alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts touser:{emailid}and the recovered user retains the role in the binding. *deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example,my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts toserviceAccount:{emailid}and the undeleted service account retains the role in the binding. *deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example,admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts togroup:{emailid}and the recovered group retains the role in the binding.
- role String
- Role that is assigned to the list of members, or principals. For example,roles/viewer,roles/editor, orroles/owner.
- bindingId string
- condition
ExprResponse 
- The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates tofalse, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- members string[]
- Specifies the principals requesting access for a Google Cloud resource. memberscan have the following values: *allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. *allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. *user:{emailid}: An email address that represents a specific Google account. For example,alice@example.com. *serviceAccount:{emailid}: An email address that represents a Google service account. For example,my-other-app@appspot.gserviceaccount.com. *serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example,my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. *group:{emailid}: An email address that represents a Google group. For example,admins@example.com. *domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example,google.comorexample.com. *deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example,alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts touser:{emailid}and the recovered user retains the role in the binding. *deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example,my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts toserviceAccount:{emailid}and the undeleted service account retains the role in the binding. *deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example,admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts togroup:{emailid}and the recovered group retains the role in the binding.
- role string
- Role that is assigned to the list of members, or principals. For example,roles/viewer,roles/editor, orroles/owner.
- binding_id str
- condition
ExprResponse 
- The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates tofalse, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- members Sequence[str]
- Specifies the principals requesting access for a Google Cloud resource. memberscan have the following values: *allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. *allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. *user:{emailid}: An email address that represents a specific Google account. For example,alice@example.com. *serviceAccount:{emailid}: An email address that represents a Google service account. For example,my-other-app@appspot.gserviceaccount.com. *serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example,my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. *group:{emailid}: An email address that represents a Google group. For example,admins@example.com. *domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example,google.comorexample.com. *deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example,alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts touser:{emailid}and the recovered user retains the role in the binding. *deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example,my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts toserviceAccount:{emailid}and the undeleted service account retains the role in the binding. *deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example,admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts togroup:{emailid}and the recovered group retains the role in the binding.
- role str
- Role that is assigned to the list of members, or principals. For example,roles/viewer,roles/editor, orroles/owner.
- bindingId String
- condition Property Map
- The condition that is associated with this binding. If the condition evaluates to true, then this binding applies to the current request. If the condition evaluates tofalse, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the IAM documentation.
- members List<String>
- Specifies the principals requesting access for a Google Cloud resource. memberscan have the following values: *allUsers: A special identifier that represents anyone who is on the internet; with or without a Google account. *allAuthenticatedUsers: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. *user:{emailid}: An email address that represents a specific Google account. For example,alice@example.com. *serviceAccount:{emailid}: An email address that represents a Google service account. For example,my-other-app@appspot.gserviceaccount.com. *serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]: An identifier for a Kubernetes service account. For example,my-project.svc.id.goog[my-namespace/my-kubernetes-sa]. *group:{emailid}: An email address that represents a Google group. For example,admins@example.com. *domain:{domain}: The G Suite domain (primary) that represents all the users of that domain. For example,google.comorexample.com. *deleted:user:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a user that has been recently deleted. For example,alice@example.com?uid=123456789012345678901. If the user is recovered, this value reverts touser:{emailid}and the recovered user retains the role in the binding. *deleted:serviceAccount:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a service account that has been recently deleted. For example,my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901. If the service account is undeleted, this value reverts toserviceAccount:{emailid}and the undeleted service account retains the role in the binding. *deleted:group:{emailid}?uid={uniqueid}: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example,admins@example.com?uid=123456789012345678901. If the group is recovered, this value reverts togroup:{emailid}and the recovered group retains the role in the binding.
- role String
- Role that is assigned to the list of members, or principals. For example,roles/viewer,roles/editor, orroles/owner.
CloudAuditOptions, CloudAuditOptionsArgs      
- 
Pulumi.Google Native. Game Services. V1Beta. Inputs. Authorization Logging Options 
- Information used by the Cloud Audit Logging pipeline.
- LogName Pulumi.Google Native. Game Services. V1Beta. Cloud Audit Options Log Name 
- The log_name to populate in the Cloud Audit Record.
- 
AuthorizationLogging Options 
- Information used by the Cloud Audit Logging pipeline.
- LogName CloudAudit Options Log Name 
- The log_name to populate in the Cloud Audit Record.
- 
AuthorizationLogging Options 
- Information used by the Cloud Audit Logging pipeline.
- logName CloudAudit Options Log Name 
- The log_name to populate in the Cloud Audit Record.
- 
AuthorizationLogging Options 
- Information used by the Cloud Audit Logging pipeline.
- logName CloudAudit Options Log Name 
- The log_name to populate in the Cloud Audit Record.
- 
AuthorizationLogging Options 
- Information used by the Cloud Audit Logging pipeline.
- log_name CloudAudit Options Log Name 
- The log_name to populate in the Cloud Audit Record.
- Property Map
- Information used by the Cloud Audit Logging pipeline.
- logName "UNSPECIFIED_LOG_NAME" | "ADMIN_ACTIVITY" | "DATA_ACCESS"
- The log_name to populate in the Cloud Audit Record.
CloudAuditOptionsLogName, CloudAuditOptionsLogNameArgs          
- UnspecifiedLog Name 
- UNSPECIFIED_LOG_NAMEDefault. Should not be used.
- AdminActivity 
- ADMIN_ACTIVITYCorresponds to "cloudaudit.googleapis.com/activity"
- DataAccess 
- DATA_ACCESSCorresponds to "cloudaudit.googleapis.com/data_access"
- CloudAudit Options Log Name Unspecified Log Name 
- UNSPECIFIED_LOG_NAMEDefault. Should not be used.
- CloudAudit Options Log Name Admin Activity 
- ADMIN_ACTIVITYCorresponds to "cloudaudit.googleapis.com/activity"
- CloudAudit Options Log Name Data Access 
- DATA_ACCESSCorresponds to "cloudaudit.googleapis.com/data_access"
- UnspecifiedLog Name 
- UNSPECIFIED_LOG_NAMEDefault. Should not be used.
- AdminActivity 
- ADMIN_ACTIVITYCorresponds to "cloudaudit.googleapis.com/activity"
- DataAccess 
- DATA_ACCESSCorresponds to "cloudaudit.googleapis.com/data_access"
- UnspecifiedLog Name 
- UNSPECIFIED_LOG_NAMEDefault. Should not be used.
- AdminActivity 
- ADMIN_ACTIVITYCorresponds to "cloudaudit.googleapis.com/activity"
- DataAccess 
- DATA_ACCESSCorresponds to "cloudaudit.googleapis.com/data_access"
- UNSPECIFIED_LOG_NAME
- UNSPECIFIED_LOG_NAMEDefault. Should not be used.
- ADMIN_ACTIVITY
- ADMIN_ACTIVITYCorresponds to "cloudaudit.googleapis.com/activity"
- DATA_ACCESS
- DATA_ACCESSCorresponds to "cloudaudit.googleapis.com/data_access"
- "UNSPECIFIED_LOG_NAME"
- UNSPECIFIED_LOG_NAMEDefault. Should not be used.
- "ADMIN_ACTIVITY"
- ADMIN_ACTIVITYCorresponds to "cloudaudit.googleapis.com/activity"
- "DATA_ACCESS"
- DATA_ACCESSCorresponds to "cloudaudit.googleapis.com/data_access"
CloudAuditOptionsResponse, CloudAuditOptionsResponseArgs        
- 
Pulumi.Google Native. Game Services. V1Beta. Inputs. Authorization Logging Options Response 
- Information used by the Cloud Audit Logging pipeline.
- LogName string
- The log_name to populate in the Cloud Audit Record.
- 
AuthorizationLogging Options Response 
- Information used by the Cloud Audit Logging pipeline.
- LogName string
- The log_name to populate in the Cloud Audit Record.
- 
AuthorizationLogging Options Response 
- Information used by the Cloud Audit Logging pipeline.
- logName String
- The log_name to populate in the Cloud Audit Record.
- 
AuthorizationLogging Options Response 
- Information used by the Cloud Audit Logging pipeline.
- logName string
- The log_name to populate in the Cloud Audit Record.
- 
AuthorizationLogging Options Response 
- Information used by the Cloud Audit Logging pipeline.
- log_name str
- The log_name to populate in the Cloud Audit Record.
- Property Map
- Information used by the Cloud Audit Logging pipeline.
- logName String
- The log_name to populate in the Cloud Audit Record.
Condition, ConditionArgs  
- Iam
Pulumi.Google Native. Game Services. V1Beta. Condition Iam 
- Trusted attributes supplied by the IAM system.
- Op
Pulumi.Google Native. Game Services. V1Beta. Condition Op 
- An operator to apply the subject with.
- Svc string
- Trusted attributes discharged by the service.
- Sys
Pulumi.Google Native. Game Services. V1Beta. Condition Sys 
- Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
- Values List<string>
- The objects of the condition.
- Iam
ConditionIam 
- Trusted attributes supplied by the IAM system.
- Op
ConditionOp 
- An operator to apply the subject with.
- Svc string
- Trusted attributes discharged by the service.
- Sys
ConditionSys 
- Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
- Values []string
- The objects of the condition.
- iam
ConditionIam 
- Trusted attributes supplied by the IAM system.
- op
ConditionOp 
- An operator to apply the subject with.
- svc String
- Trusted attributes discharged by the service.
- sys
ConditionSys 
- Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
- values List<String>
- The objects of the condition.
- iam
ConditionIam 
- Trusted attributes supplied by the IAM system.
- op
ConditionOp 
- An operator to apply the subject with.
- svc string
- Trusted attributes discharged by the service.
- sys
ConditionSys 
- Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
- values string[]
- The objects of the condition.
- iam
ConditionIam 
- Trusted attributes supplied by the IAM system.
- op
ConditionOp 
- An operator to apply the subject with.
- svc str
- Trusted attributes discharged by the service.
- sys
ConditionSys 
- Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
- values Sequence[str]
- The objects of the condition.
- iam "NO_ATTR" | "AUTHORITY" | "ATTRIBUTION" | "SECURITY_REALM" | "APPROVER" | "JUSTIFICATION_TYPE" | "CREDENTIALS_TYPE" | "CREDS_ASSERTION"
- Trusted attributes supplied by the IAM system.
- op "NO_OP" | "EQUALS" | "NOT_EQUALS" | "IN" | "NOT_IN" | "DISCHARGED"
- An operator to apply the subject with.
- svc String
- Trusted attributes discharged by the service.
- sys "NO_ATTR" | "REGION" | "SERVICE" | "NAME" | "IP"
- Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
- values List<String>
- The objects of the condition.
ConditionIam, ConditionIamArgs    
- NoAttr 
- NO_ATTRDefault non-attribute.
- Authority
- AUTHORITYEither principal or (if present) authority selector.
- Attribution
- ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
- SecurityRealm 
- SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- Approver
- APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
- JustificationType 
- JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
- CredentialsType 
- CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- CredsAssertion 
- CREDS_ASSERTIONEXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- ConditionIam No Attr 
- NO_ATTRDefault non-attribute.
- ConditionIam Authority 
- AUTHORITYEither principal or (if present) authority selector.
- ConditionIam Attribution 
- ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
- ConditionIam Security Realm 
- SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- ConditionIam Approver 
- APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
- ConditionIam Justification Type 
- JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
- ConditionIam Credentials Type 
- CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- ConditionIam Creds Assertion 
- CREDS_ASSERTIONEXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- NoAttr 
- NO_ATTRDefault non-attribute.
- Authority
- AUTHORITYEither principal or (if present) authority selector.
- Attribution
- ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
- SecurityRealm 
- SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- Approver
- APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
- JustificationType 
- JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
- CredentialsType 
- CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- CredsAssertion 
- CREDS_ASSERTIONEXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- NoAttr 
- NO_ATTRDefault non-attribute.
- Authority
- AUTHORITYEither principal or (if present) authority selector.
- Attribution
- ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
- SecurityRealm 
- SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- Approver
- APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
- JustificationType 
- JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
- CredentialsType 
- CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- CredsAssertion 
- CREDS_ASSERTIONEXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- NO_ATTR
- NO_ATTRDefault non-attribute.
- AUTHORITY
- AUTHORITYEither principal or (if present) authority selector.
- ATTRIBUTION
- ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
- SECURITY_REALM
- SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- APPROVER
- APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
- JUSTIFICATION_TYPE
- JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
- CREDENTIALS_TYPE
- CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- CREDS_ASSERTION
- CREDS_ASSERTIONEXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- "NO_ATTR"
- NO_ATTRDefault non-attribute.
- "AUTHORITY"
- AUTHORITYEither principal or (if present) authority selector.
- "ATTRIBUTION"
- ATTRIBUTIONThe principal (even if an authority selector is present), which must only be used for attribution, not authorization.
- "SECURITY_REALM"
- SECURITY_REALMAny of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates "any of the request's realms match one of the given values; with NOT_IN, "none of the realms match any of the given values". Note that a value can be: - 'self:campus' (i.e., clients that are in the same campus) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'self:prod-region' (i.e., allow connections from clients that are in the same prod region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - 'self' [DEPRECATED] (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the absence of a realm, so realm conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- "APPROVER"
- APPROVERAn approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).
- "JUSTIFICATION_TYPE"
- JUSTIFICATION_TYPEWhat types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. "MANUAL_STRING". It is not permitted to grant access based on the absence of a justification, so justification conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.
- "CREDENTIALS_TYPE"
- CREDENTIALS_TYPEWhat type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the absence of a credentials type, so the conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
- "CREDS_ASSERTION"
- CREDS_ASSERTIONEXPERIMENTAL -- DO NOT USE. The conditions can only be used in a "positive" context (e.g., ALLOW/IN or DENY/NOT_IN).
ConditionOp, ConditionOpArgs    
- NoOp 
- NO_OPDefault no-op.
- EqualsValue 
- EQUALSDEPRECATED. Use IN instead.
- NotEquals 
- NOT_EQUALSDEPRECATED. Use NOT_IN instead.
- In
- INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
- NotIn 
- NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
- Discharged
- DISCHARGEDSubject is discharged
- ConditionOp No Op 
- NO_OPDefault no-op.
- ConditionOp Equals 
- EQUALSDEPRECATED. Use IN instead.
- ConditionOp Not Equals 
- NOT_EQUALSDEPRECATED. Use NOT_IN instead.
- ConditionOp In 
- INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
- ConditionOp Not In 
- NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
- ConditionOp Discharged 
- DISCHARGEDSubject is discharged
- NoOp 
- NO_OPDefault no-op.
- Equals
- EQUALSDEPRECATED. Use IN instead.
- NotEquals 
- NOT_EQUALSDEPRECATED. Use NOT_IN instead.
- In
- INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
- NotIn 
- NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
- Discharged
- DISCHARGEDSubject is discharged
- NoOp 
- NO_OPDefault no-op.
- Equals
- EQUALSDEPRECATED. Use IN instead.
- NotEquals 
- NOT_EQUALSDEPRECATED. Use NOT_IN instead.
- In
- INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
- NotIn 
- NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
- Discharged
- DISCHARGEDSubject is discharged
- NO_OP
- NO_OPDefault no-op.
- EQUALS
- EQUALSDEPRECATED. Use IN instead.
- NOT_EQUALS
- NOT_EQUALSDEPRECATED. Use NOT_IN instead.
- IN_
- INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
- NOT_IN
- NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
- DISCHARGED
- DISCHARGEDSubject is discharged
- "NO_OP"
- NO_OPDefault no-op.
- "EQUALS"
- EQUALSDEPRECATED. Use IN instead.
- "NOT_EQUALS"
- NOT_EQUALSDEPRECATED. Use NOT_IN instead.
- "IN"
- INThe condition is true if the subject (or any element of it if it is a set) matches any of the supplied values.
- "NOT_IN"
- NOT_INThe condition is true if the subject (or every element of it if it is a set) matches none of the supplied values.
- "DISCHARGED"
- DISCHARGEDSubject is discharged
ConditionResponse, ConditionResponseArgs    
- Iam string
- Trusted attributes supplied by the IAM system.
- Op string
- An operator to apply the subject with.
- Svc string
- Trusted attributes discharged by the service.
- Sys string
- Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
- Values List<string>
- The objects of the condition.
- Iam string
- Trusted attributes supplied by the IAM system.
- Op string
- An operator to apply the subject with.
- Svc string
- Trusted attributes discharged by the service.
- Sys string
- Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
- Values []string
- The objects of the condition.
- iam String
- Trusted attributes supplied by the IAM system.
- op String
- An operator to apply the subject with.
- svc String
- Trusted attributes discharged by the service.
- sys String
- Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
- values List<String>
- The objects of the condition.
- iam string
- Trusted attributes supplied by the IAM system.
- op string
- An operator to apply the subject with.
- svc string
- Trusted attributes discharged by the service.
- sys string
- Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
- values string[]
- The objects of the condition.
- iam str
- Trusted attributes supplied by the IAM system.
- op str
- An operator to apply the subject with.
- svc str
- Trusted attributes discharged by the service.
- sys str
- Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
- values Sequence[str]
- The objects of the condition.
- iam String
- Trusted attributes supplied by the IAM system.
- op String
- An operator to apply the subject with.
- svc String
- Trusted attributes discharged by the service.
- sys String
- Trusted attributes supplied by any service that owns resources and uses the IAM system for access control.
- values List<String>
- The objects of the condition.
ConditionSys, ConditionSysArgs    
- NoAttr 
- NO_ATTRDefault non-attribute type
- Region
- REGIONRegion of the resource
- Service
- SERVICEService name
- Name
- NAMEResource name
- Ip
- IPIP address of the caller
- ConditionSys No Attr 
- NO_ATTRDefault non-attribute type
- ConditionSys Region 
- REGIONRegion of the resource
- ConditionSys Service 
- SERVICEService name
- ConditionSys Name 
- NAMEResource name
- ConditionSys Ip 
- IPIP address of the caller
- NoAttr 
- NO_ATTRDefault non-attribute type
- Region
- REGIONRegion of the resource
- Service
- SERVICEService name
- Name
- NAMEResource name
- Ip
- IPIP address of the caller
- NoAttr 
- NO_ATTRDefault non-attribute type
- Region
- REGIONRegion of the resource
- Service
- SERVICEService name
- Name
- NAMEResource name
- Ip
- IPIP address of the caller
- NO_ATTR
- NO_ATTRDefault non-attribute type
- REGION
- REGIONRegion of the resource
- SERVICE
- SERVICEService name
- NAME
- NAMEResource name
- IP
- IPIP address of the caller
- "NO_ATTR"
- NO_ATTRDefault non-attribute type
- "REGION"
- REGIONRegion of the resource
- "SERVICE"
- SERVICEService name
- "NAME"
- NAMEResource name
- "IP"
- IPIP address of the caller
CounterOptions, CounterOptionsArgs    
- CustomFields List<Pulumi.Google Native. Game Services. V1Beta. Inputs. Custom Field> 
- Custom fields.
- Field string
- The field value to attribute.
- Metric string
- The metric to update.
- CustomFields []CustomField 
- Custom fields.
- Field string
- The field value to attribute.
- Metric string
- The metric to update.
- customFields List<CustomField> 
- Custom fields.
- field String
- The field value to attribute.
- metric String
- The metric to update.
- customFields CustomField[] 
- Custom fields.
- field string
- The field value to attribute.
- metric string
- The metric to update.
- custom_fields Sequence[CustomField] 
- Custom fields.
- field str
- The field value to attribute.
- metric str
- The metric to update.
- customFields List<Property Map>
- Custom fields.
- field String
- The field value to attribute.
- metric String
- The metric to update.
CounterOptionsResponse, CounterOptionsResponseArgs      
- CustomFields List<Pulumi.Google Native. Game Services. V1Beta. Inputs. Custom Field Response> 
- Custom fields.
- Field string
- The field value to attribute.
- Metric string
- The metric to update.
- CustomFields []CustomField Response 
- Custom fields.
- Field string
- The field value to attribute.
- Metric string
- The metric to update.
- customFields List<CustomField Response> 
- Custom fields.
- field String
- The field value to attribute.
- metric String
- The metric to update.
- customFields CustomField Response[] 
- Custom fields.
- field string
- The field value to attribute.
- metric string
- The metric to update.
- custom_fields Sequence[CustomField Response] 
- Custom fields.
- field str
- The field value to attribute.
- metric str
- The metric to update.
- customFields List<Property Map>
- Custom fields.
- field String
- The field value to attribute.
- metric String
- The metric to update.
CustomField, CustomFieldArgs    
CustomFieldResponse, CustomFieldResponseArgs      
DataAccessOptions, DataAccessOptionsArgs      
DataAccessOptionsLogMode, DataAccessOptionsLogModeArgs          
- LogMode Unspecified 
- LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
- LogFail Closed 
- LOG_FAIL_CLOSEDThe application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.
- DataAccess Options Log Mode Log Mode Unspecified 
- LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
- DataAccess Options Log Mode Log Fail Closed 
- LOG_FAIL_CLOSEDThe application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.
- LogMode Unspecified 
- LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
- LogFail Closed 
- LOG_FAIL_CLOSEDThe application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.
- LogMode Unspecified 
- LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
- LogFail Closed 
- LOG_FAIL_CLOSEDThe application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.
- LOG_MODE_UNSPECIFIED
- LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
- LOG_FAIL_CLOSED
- LOG_FAIL_CLOSEDThe application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.
- "LOG_MODE_UNSPECIFIED"
- LOG_MODE_UNSPECIFIEDClient is not required to write a partial Gin log immediately after the authorization check. If client chooses to write one and it fails, client may either fail open (allow the operation to continue) or fail closed (handle as a DENY outcome).
- "LOG_FAIL_CLOSED"
- LOG_FAIL_CLOSEDThe application's operation in the context of which this authorization check is being made may only be performed if it is successfully logged to Gin. For instance, the authorization library may satisfy this obligation by emitting a partial log entry at authorization check time and only returning ALLOW to the application if it succeeds. If a matching Rule has this directive, but the client has not indicated that it will honor such requirements, then the IAM check will result in authorization failure by setting CheckPolicyResponse.success=false.
DataAccessOptionsResponse, DataAccessOptionsResponseArgs        
- LogMode string
- LogMode string
- logMode String
- logMode string
- log_mode str
- logMode String
Expr, ExprArgs  
- Description string
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- Expression string
- Textual representation of an expression in Common Expression Language syntax.
- Location string
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- Title string
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- Description string
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- Expression string
- Textual representation of an expression in Common Expression Language syntax.
- Location string
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- Title string
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description String
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression String
- Textual representation of an expression in Common Expression Language syntax.
- location String
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title String
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description string
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression string
- Textual representation of an expression in Common Expression Language syntax.
- location string
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title string
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description str
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression str
- Textual representation of an expression in Common Expression Language syntax.
- location str
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title str
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description String
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression String
- Textual representation of an expression in Common Expression Language syntax.
- location String
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title String
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
ExprResponse, ExprResponseArgs    
- Description string
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- Expression string
- Textual representation of an expression in Common Expression Language syntax.
- Location string
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- Title string
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- Description string
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- Expression string
- Textual representation of an expression in Common Expression Language syntax.
- Location string
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- Title string
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description String
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression String
- Textual representation of an expression in Common Expression Language syntax.
- location String
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title String
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description string
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression string
- Textual representation of an expression in Common Expression Language syntax.
- location string
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title string
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description str
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression str
- Textual representation of an expression in Common Expression Language syntax.
- location str
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title str
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description String
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression String
- Textual representation of an expression in Common Expression Language syntax.
- location String
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title String
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
LogConfig, LogConfigArgs    
- CloudAudit Pulumi.Google Native. Game Services. V1Beta. Inputs. Cloud Audit Options 
- Cloud audit options.
- Counter
Pulumi.Google Native. Game Services. V1Beta. Inputs. Counter Options 
- Counter options.
- DataAccess Pulumi.Google Native. Game Services. V1Beta. Inputs. Data Access Options 
- Data access options.
- CloudAudit CloudAudit Options 
- Cloud audit options.
- Counter
CounterOptions 
- Counter options.
- DataAccess DataAccess Options 
- Data access options.
- cloudAudit CloudAudit Options 
- Cloud audit options.
- counter
CounterOptions 
- Counter options.
- dataAccess DataAccess Options 
- Data access options.
- cloudAudit CloudAudit Options 
- Cloud audit options.
- counter
CounterOptions 
- Counter options.
- dataAccess DataAccess Options 
- Data access options.
- cloud_audit CloudAudit Options 
- Cloud audit options.
- counter
CounterOptions 
- Counter options.
- data_access DataAccess Options 
- Data access options.
- cloudAudit Property Map
- Cloud audit options.
- counter Property Map
- Counter options.
- dataAccess Property Map
- Data access options.
LogConfigResponse, LogConfigResponseArgs      
- CloudAudit CloudAudit Options Response 
- Cloud audit options.
- Counter
CounterOptions Response 
- Counter options.
- DataAccess DataAccess Options Response 
- Data access options.
- cloudAudit CloudAudit Options Response 
- Cloud audit options.
- counter
CounterOptions Response 
- Counter options.
- dataAccess DataAccess Options Response 
- Data access options.
- cloudAudit CloudAudit Options Response 
- Cloud audit options.
- counter
CounterOptions Response 
- Counter options.
- dataAccess DataAccess Options Response 
- Data access options.
- cloud_audit CloudAudit Options Response 
- Cloud audit options.
- counter
CounterOptions Response 
- Counter options.
- data_access DataAccess Options Response 
- Data access options.
- cloudAudit Property Map
- Cloud audit options.
- counter Property Map
- Counter options.
- dataAccess Property Map
- Data access options.
Rule, RuleArgs  
- Action
Pulumi.Google Native. Game Services. V1Beta. Rule Action 
- Required
- Conditions
List<Pulumi.Google Native. Game Services. V1Beta. Inputs. Condition> 
- Additional restrictions that must be met. All conditions must pass for the rule to match.
- Description string
- Human-readable description of the rule.
- In List<string>
- If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
- LogConfig List<Pulumi.Google Native. Game Services. V1Beta. Inputs. Log Config> 
- The config returned to callers of CheckPolicy for any entries that match the LOG action.
- NotIn List<string>
- If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
- Permissions List<string>
- A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
- Action
RuleAction 
- Required
- Conditions []Condition
- Additional restrictions that must be met. All conditions must pass for the rule to match.
- Description string
- Human-readable description of the rule.
- In []string
- If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
- LogConfig []LogConfig 
- The config returned to callers of CheckPolicy for any entries that match the LOG action.
- NotIn []string
- If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
- Permissions []string
- A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
- action
RuleAction 
- Required
- conditions List<Condition>
- Additional restrictions that must be met. All conditions must pass for the rule to match.
- description String
- Human-readable description of the rule.
- in List<String>
- If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
- logConfig List<LogConfig> 
- The config returned to callers of CheckPolicy for any entries that match the LOG action.
- notIn List<String>
- If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
- permissions List<String>
- A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
- action
RuleAction 
- Required
- conditions Condition[]
- Additional restrictions that must be met. All conditions must pass for the rule to match.
- description string
- Human-readable description of the rule.
- in string[]
- If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
- logConfig LogConfig[] 
- The config returned to callers of CheckPolicy for any entries that match the LOG action.
- notIn string[]
- If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
- permissions string[]
- A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
- action
RuleAction 
- Required
- conditions Sequence[Condition]
- Additional restrictions that must be met. All conditions must pass for the rule to match.
- description str
- Human-readable description of the rule.
- in_ Sequence[str]
- If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
- log_config Sequence[LogConfig] 
- The config returned to callers of CheckPolicy for any entries that match the LOG action.
- not_in Sequence[str]
- If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
- permissions Sequence[str]
- A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
- action "NO_ACTION" | "ALLOW" | "ALLOW_WITH_LOG" | "DENY" | "DENY_WITH_LOG" | "LOG"
- Required
- conditions List<Property Map>
- Additional restrictions that must be met. All conditions must pass for the rule to match.
- description String
- Human-readable description of the rule.
- in List<String>
- If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
- logConfig List<Property Map>
- The config returned to callers of CheckPolicy for any entries that match the LOG action.
- notIn List<String>
- If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
- permissions List<String>
- A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
RuleAction, RuleActionArgs    
- NoAction 
- NO_ACTIONDefault no action.
- Allow
- ALLOWMatching 'Entries' grant access.
- AllowWith Log 
- ALLOW_WITH_LOGMatching 'Entries' grant access and the caller promises to log the request per the returned log_configs.
- Deny
- DENYMatching 'Entries' deny access.
- DenyWith Log 
- DENY_WITH_LOGMatching 'Entries' deny access and the caller promises to log the request per the returned log_configs.
- Log
- LOGMatching 'Entries' tell IAM.Check callers to generate logs.
- RuleAction No Action 
- NO_ACTIONDefault no action.
- RuleAction Allow 
- ALLOWMatching 'Entries' grant access.
- RuleAction Allow With Log 
- ALLOW_WITH_LOGMatching 'Entries' grant access and the caller promises to log the request per the returned log_configs.
- RuleAction Deny 
- DENYMatching 'Entries' deny access.
- RuleAction Deny With Log 
- DENY_WITH_LOGMatching 'Entries' deny access and the caller promises to log the request per the returned log_configs.
- RuleAction Log 
- LOGMatching 'Entries' tell IAM.Check callers to generate logs.
- NoAction 
- NO_ACTIONDefault no action.
- Allow
- ALLOWMatching 'Entries' grant access.
- AllowWith Log 
- ALLOW_WITH_LOGMatching 'Entries' grant access and the caller promises to log the request per the returned log_configs.
- Deny
- DENYMatching 'Entries' deny access.
- DenyWith Log 
- DENY_WITH_LOGMatching 'Entries' deny access and the caller promises to log the request per the returned log_configs.
- Log
- LOGMatching 'Entries' tell IAM.Check callers to generate logs.
- NoAction 
- NO_ACTIONDefault no action.
- Allow
- ALLOWMatching 'Entries' grant access.
- AllowWith Log 
- ALLOW_WITH_LOGMatching 'Entries' grant access and the caller promises to log the request per the returned log_configs.
- Deny
- DENYMatching 'Entries' deny access.
- DenyWith Log 
- DENY_WITH_LOGMatching 'Entries' deny access and the caller promises to log the request per the returned log_configs.
- Log
- LOGMatching 'Entries' tell IAM.Check callers to generate logs.
- NO_ACTION
- NO_ACTIONDefault no action.
- ALLOW
- ALLOWMatching 'Entries' grant access.
- ALLOW_WITH_LOG
- ALLOW_WITH_LOGMatching 'Entries' grant access and the caller promises to log the request per the returned log_configs.
- DENY
- DENYMatching 'Entries' deny access.
- DENY_WITH_LOG
- DENY_WITH_LOGMatching 'Entries' deny access and the caller promises to log the request per the returned log_configs.
- LOG
- LOGMatching 'Entries' tell IAM.Check callers to generate logs.
- "NO_ACTION"
- NO_ACTIONDefault no action.
- "ALLOW"
- ALLOWMatching 'Entries' grant access.
- "ALLOW_WITH_LOG"
- ALLOW_WITH_LOGMatching 'Entries' grant access and the caller promises to log the request per the returned log_configs.
- "DENY"
- DENYMatching 'Entries' deny access.
- "DENY_WITH_LOG"
- DENY_WITH_LOGMatching 'Entries' deny access and the caller promises to log the request per the returned log_configs.
- "LOG"
- LOGMatching 'Entries' tell IAM.Check callers to generate logs.
RuleResponse, RuleResponseArgs    
- Action string
- Required
- Conditions
List<Pulumi.Google Native. Game Services. V1Beta. Inputs. Condition Response> 
- Additional restrictions that must be met. All conditions must pass for the rule to match.
- Description string
- Human-readable description of the rule.
- In List<string>
- If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
- LogConfig List<Pulumi.Google Native. Game Services. V1Beta. Inputs. Log Config Response> 
- The config returned to callers of CheckPolicy for any entries that match the LOG action.
- NotIn List<string>
- If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
- Permissions List<string>
- A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
- Action string
- Required
- Conditions
[]ConditionResponse 
- Additional restrictions that must be met. All conditions must pass for the rule to match.
- Description string
- Human-readable description of the rule.
- In []string
- If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
- LogConfig []LogConfig Response 
- The config returned to callers of CheckPolicy for any entries that match the LOG action.
- NotIn []string
- If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
- Permissions []string
- A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
- action String
- Required
- conditions
List<ConditionResponse> 
- Additional restrictions that must be met. All conditions must pass for the rule to match.
- description String
- Human-readable description of the rule.
- in List<String>
- If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
- logConfig List<LogConfig Response> 
- The config returned to callers of CheckPolicy for any entries that match the LOG action.
- notIn List<String>
- If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
- permissions List<String>
- A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
- action string
- Required
- conditions
ConditionResponse[] 
- Additional restrictions that must be met. All conditions must pass for the rule to match.
- description string
- Human-readable description of the rule.
- in string[]
- If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
- logConfig LogConfig Response[] 
- The config returned to callers of CheckPolicy for any entries that match the LOG action.
- notIn string[]
- If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
- permissions string[]
- A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
- action str
- Required
- conditions
Sequence[ConditionResponse] 
- Additional restrictions that must be met. All conditions must pass for the rule to match.
- description str
- Human-readable description of the rule.
- in_ Sequence[str]
- If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
- log_config Sequence[LogConfig Response] 
- The config returned to callers of CheckPolicy for any entries that match the LOG action.
- not_in Sequence[str]
- If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
- permissions Sequence[str]
- A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
- action String
- Required
- conditions List<Property Map>
- Additional restrictions that must be met. All conditions must pass for the rule to match.
- description String
- Human-readable description of the rule.
- in List<String>
- If one or more 'in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.
- logConfig List<Property Map>
- The config returned to callers of CheckPolicy for any entries that match the LOG action.
- notIn List<String>
- If one or more 'not_in' clauses are specified, the rule matches if the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries. The format for in and not_in entries can be found at in the Local IAM documentation (see go/local-iam#features).
- permissions List<String>
- A permission is a string of form '..' (e.g., 'storage.buckets.list'). A value of '' matches all permissions, and a verb part of '' (e.g., 'storage.buckets.*') matches all verbs.
Package Details
- Repository
- Google Cloud Native pulumi/pulumi-google-native
- License
- Apache-2.0
Google Cloud Native is in preview. Google Cloud Classic is fully supported.