Class IAMGrpc.IAMImplBase (3.8.0)

public abstract static class IAMGrpc.IAMImplBase implements BindableService

Creates and manages Identity and Access Management (IAM) resources. You can use this service to work with all of the following resources:

  • Service accounts, which identify an application or a virtual machine (VM) instance rather than a person
  • Service account keys, which service accounts use to authenticate with Google APIs
  • IAM policies for service accounts, which specify the roles that a principal has for the service account
  • IAM custom roles, which help you limit the number of permissions that you grant to principals In addition, you can use this service to complete the following tasks, among others:
  • Test whether a service account can use specific permissions
  • Check which roles you can grant for a specific resource
  • Lint, or validate, condition expressions in an IAM policy When you read data from the IAM API, each read is eventually consistent. In other words, if you write data with the IAM API, then immediately read that data, the read operation might return an older version of the data. To deal with this behavior, your application can retry the request with truncated exponential backoff. In contrast, writing data to the IAM API is sequentially consistent. In other words, write operations are always processed in the order in which they were received.

Inheritance

java.lang.Object > IAMGrpc.IAMImplBase

Implements

io.grpc.BindableService

Constructors

IAMImplBase()

public IAMImplBase()

Methods

bindService()

public final ServerServiceDefinition bindService()
Returns
TypeDescription
io.grpc.ServerServiceDefinition

createRole(CreateRoleRequest request, StreamObserver<Role> responseObserver)

public void createRole(CreateRoleRequest request, StreamObserver<Role> responseObserver)

Creates a new custom Role.

Parameters
NameDescription
requestCreateRoleRequest
responseObserverio.grpc.stub.StreamObserver<Role>

createServiceAccount(CreateServiceAccountRequest request, StreamObserver<ServiceAccount> responseObserver)

public void createServiceAccount(CreateServiceAccountRequest request, StreamObserver<ServiceAccount> responseObserver)

Creates a ServiceAccount.

Parameters
NameDescription
requestCreateServiceAccountRequest
responseObserverio.grpc.stub.StreamObserver<ServiceAccount>

createServiceAccountKey(CreateServiceAccountKeyRequest request, StreamObserver<ServiceAccountKey> responseObserver)

public void createServiceAccountKey(CreateServiceAccountKeyRequest request, StreamObserver<ServiceAccountKey> responseObserver)

Creates a ServiceAccountKey.

Parameters
NameDescription
requestCreateServiceAccountKeyRequest
responseObserverio.grpc.stub.StreamObserver<ServiceAccountKey>

deleteRole(DeleteRoleRequest request, StreamObserver<Role> responseObserver)

public void deleteRole(DeleteRoleRequest request, StreamObserver<Role> responseObserver)

Deletes a custom Role. When you delete a custom role, the following changes occur immediately:

  • You cannot bind a principal to the custom role in an IAM Policy.
  • Existing bindings to the custom role are not changed, but they have no effect.
  • By default, the response from ListRoles does not include the custom role. You have 7 days to undelete the custom role. After 7 days, the following changes occur:
  • The custom role is permanently deleted and cannot be recovered.
  • If an IAM policy contains a binding to the custom role, the binding is permanently removed.
Parameters
NameDescription
requestDeleteRoleRequest
responseObserverio.grpc.stub.StreamObserver<Role>

deleteServiceAccount(DeleteServiceAccountRequest request, StreamObserver<Empty> responseObserver)

public void deleteServiceAccount(DeleteServiceAccountRequest request, StreamObserver<Empty> responseObserver)

Deletes a ServiceAccount. Warning: After you delete a service account, you might not be able to undelete it. If you know that you need to re-enable the service account in the future, use DisableServiceAccount instead. If you delete a service account, IAM permanently removes the service account 30 days later. Google Cloud cannot recover the service account after it is permanently removed, even if you file a support request. To help avoid unplanned outages, we recommend that you disable the service account before you delete it. Use DisableServiceAccount to disable the service account, then wait at least 24 hours and watch for unintended consequences. If there are no unintended consequences, you can delete the service account.

Parameters
NameDescription
requestDeleteServiceAccountRequest
responseObserverio.grpc.stub.StreamObserver<Empty>

deleteServiceAccountKey(DeleteServiceAccountKeyRequest request, StreamObserver<Empty> responseObserver)

public void deleteServiceAccountKey(DeleteServiceAccountKeyRequest request, StreamObserver<Empty> responseObserver)

Deletes a ServiceAccountKey. Deleting a service account key does not revoke short-lived credentials that have been issued based on the service account key.

Parameters
NameDescription
requestDeleteServiceAccountKeyRequest
responseObserverio.grpc.stub.StreamObserver<Empty>

disableServiceAccount(DisableServiceAccountRequest request, StreamObserver<Empty> responseObserver)

public void disableServiceAccount(DisableServiceAccountRequest request, StreamObserver<Empty> responseObserver)

Disables a ServiceAccount immediately. If an application uses the service account to authenticate, that application can no longer call Google APIs or access Google Cloud resources. Existing access tokens for the service account are rejected, and requests for new access tokens will fail. To re-enable the service account, use EnableServiceAccount. After you re-enable the service account, its existing access tokens will be accepted, and you can request new access tokens. To help avoid unplanned outages, we recommend that you disable the service account before you delete it. Use this method to disable the service account, then wait at least 24 hours and watch for unintended consequences. If there are no unintended consequences, you can delete the service account with DeleteServiceAccount.

Parameters
NameDescription
requestDisableServiceAccountRequest
responseObserverio.grpc.stub.StreamObserver<Empty>

disableServiceAccountKey(DisableServiceAccountKeyRequest request, StreamObserver<Empty> responseObserver)

public void disableServiceAccountKey(DisableServiceAccountKeyRequest request, StreamObserver<Empty> responseObserver)

Disable a ServiceAccountKey. A disabled service account key can be re-enabled with EnableServiceAccountKey.

Parameters
NameDescription
requestDisableServiceAccountKeyRequest
responseObserverio.grpc.stub.StreamObserver<Empty>

enableServiceAccount(EnableServiceAccountRequest request, StreamObserver<Empty> responseObserver)

public void enableServiceAccount(EnableServiceAccountRequest request, StreamObserver<Empty> responseObserver)

Enables a ServiceAccount that was disabled by DisableServiceAccount. If the service account is already enabled, then this method has no effect. If the service account was disabled by other means—for example, if Google disabled the service account because it was compromised—you cannot use this method to enable the service account.

Parameters
NameDescription
requestEnableServiceAccountRequest
responseObserverio.grpc.stub.StreamObserver<Empty>

enableServiceAccountKey(EnableServiceAccountKeyRequest request, StreamObserver<Empty> responseObserver)

public void enableServiceAccountKey(EnableServiceAccountKeyRequest request, StreamObserver<Empty> responseObserver)

Enable a ServiceAccountKey.

Parameters
NameDescription
requestEnableServiceAccountKeyRequest
responseObserverio.grpc.stub.StreamObserver<Empty>

getIamPolicy(GetIamPolicyRequest request, StreamObserver<Policy> responseObserver)

public void getIamPolicy(GetIamPolicyRequest request, StreamObserver<Policy> responseObserver)

Gets the IAM policy that is attached to a ServiceAccount. This IAM policy specifies which principals have access to the service account. This method does not tell you whether the service account has been granted any roles on other resources. To check whether a service account has role grants on a resource, use the getIamPolicy method for that resource. For example, to view the role grants for a project, call the Resource Manager API's projects.getIamPolicy method.

Parameters
NameDescription
requestcom.google.iam.v1.GetIamPolicyRequest
responseObserverio.grpc.stub.StreamObserver<com.google.iam.v1.Policy>

getRole(GetRoleRequest request, StreamObserver<Role> responseObserver)

public void getRole(GetRoleRequest request, StreamObserver<Role> responseObserver)

Gets the definition of a Role.

Parameters
NameDescription
requestGetRoleRequest
responseObserverio.grpc.stub.StreamObserver<Role>

getServiceAccount(GetServiceAccountRequest request, StreamObserver<ServiceAccount> responseObserver)

public void getServiceAccount(GetServiceAccountRequest request, StreamObserver<ServiceAccount> responseObserver)

Gets a ServiceAccount.

Parameters
NameDescription
requestGetServiceAccountRequest
responseObserverio.grpc.stub.StreamObserver<ServiceAccount>

getServiceAccountKey(GetServiceAccountKeyRequest request, StreamObserver<ServiceAccountKey> responseObserver)

public void getServiceAccountKey(GetServiceAccountKeyRequest request, StreamObserver<ServiceAccountKey> responseObserver)

Gets a ServiceAccountKey.

Parameters
NameDescription
requestGetServiceAccountKeyRequest
responseObserverio.grpc.stub.StreamObserver<ServiceAccountKey>

lintPolicy(LintPolicyRequest request, StreamObserver<LintPolicyResponse> responseObserver)

public void lintPolicy(LintPolicyRequest request, StreamObserver<LintPolicyResponse> responseObserver)

Lints, or validates, an IAM policy. Currently checks the google.iam.v1.Binding.condition field, which contains a condition expression for a role binding. Successful calls to this method always return an HTTP 200 OK status code, even if the linter detects an issue in the IAM policy.

Parameters
NameDescription
requestLintPolicyRequest
responseObserverio.grpc.stub.StreamObserver<LintPolicyResponse>

listRoles(ListRolesRequest request, StreamObserver<ListRolesResponse> responseObserver)

public void listRoles(ListRolesRequest request, StreamObserver<ListRolesResponse> responseObserver)

Lists every predefined Role that IAM supports, or every custom role that is defined for an organization or project.

Parameters
NameDescription
requestListRolesRequest
responseObserverio.grpc.stub.StreamObserver<ListRolesResponse>

listServiceAccountKeys(ListServiceAccountKeysRequest request, StreamObserver<ListServiceAccountKeysResponse> responseObserver)

public void listServiceAccountKeys(ListServiceAccountKeysRequest request, StreamObserver<ListServiceAccountKeysResponse> responseObserver)

Lists every ServiceAccountKey for a service account.

Parameters
NameDescription
requestListServiceAccountKeysRequest
responseObserverio.grpc.stub.StreamObserver<ListServiceAccountKeysResponse>

listServiceAccounts(ListServiceAccountsRequest request, StreamObserver<ListServiceAccountsResponse> responseObserver)

public void listServiceAccounts(ListServiceAccountsRequest request, StreamObserver<ListServiceAccountsResponse> responseObserver)

Lists every ServiceAccount that belongs to a specific project.

Parameters
NameDescription
requestListServiceAccountsRequest
responseObserverio.grpc.stub.StreamObserver<ListServiceAccountsResponse>

patchServiceAccount(PatchServiceAccountRequest request, StreamObserver<ServiceAccount> responseObserver)

public void patchServiceAccount(PatchServiceAccountRequest request, StreamObserver<ServiceAccount> responseObserver)

Patches a ServiceAccount.

Parameters
NameDescription
requestPatchServiceAccountRequest
responseObserverio.grpc.stub.StreamObserver<ServiceAccount>

queryAuditableServices(QueryAuditableServicesRequest request, StreamObserver<QueryAuditableServicesResponse> responseObserver)

public void queryAuditableServices(QueryAuditableServicesRequest request, StreamObserver<QueryAuditableServicesResponse> responseObserver)

Returns a list of services that allow you to opt into audit logs that are not generated by default. To learn more about audit logs, see the Logging documentation.

Parameters
NameDescription
requestQueryAuditableServicesRequest
responseObserverio.grpc.stub.StreamObserver<QueryAuditableServicesResponse>

queryGrantableRoles(QueryGrantableRolesRequest request, StreamObserver<QueryGrantableRolesResponse> responseObserver)

public void queryGrantableRoles(QueryGrantableRolesRequest request, StreamObserver<QueryGrantableRolesResponse> responseObserver)

Lists roles that can be granted on a Google Cloud resource. A role is grantable if the IAM policy for the resource can contain bindings to the role.

Parameters
NameDescription
requestQueryGrantableRolesRequest
responseObserverio.grpc.stub.StreamObserver<QueryGrantableRolesResponse>

queryTestablePermissions(QueryTestablePermissionsRequest request, StreamObserver<QueryTestablePermissionsResponse> responseObserver)

public void queryTestablePermissions(QueryTestablePermissionsRequest request, StreamObserver<QueryTestablePermissionsResponse> responseObserver)

Lists every permission that you can test on a resource. A permission is testable if you can check whether a principal has that permission on the resource.

Parameters
NameDescription
requestQueryTestablePermissionsRequest
responseObserverio.grpc.stub.StreamObserver<QueryTestablePermissionsResponse>

setIamPolicy(SetIamPolicyRequest request, StreamObserver<Policy> responseObserver)

public void setIamPolicy(SetIamPolicyRequest request, StreamObserver<Policy> responseObserver)

Sets the IAM policy that is attached to a ServiceAccount. Use this method to grant or revoke access to the service account. For example, you could grant a principal the ability to impersonate the service account. This method does not enable the service account to access other resources. To grant roles to a service account on a resource, follow these steps:

  1. Call the resource's getIamPolicy method to get its current IAM policy.
  2. Edit the policy so that it binds the service account to an IAM role for the resource.
  3. Call the resource's setIamPolicy method to update its IAM policy. For detailed instructions, see Manage access to project, folders, and organizations or Manage access to other resources.
Parameters
NameDescription
requestcom.google.iam.v1.SetIamPolicyRequest
responseObserverio.grpc.stub.StreamObserver<com.google.iam.v1.Policy>

signBlob(SignBlobRequest request, StreamObserver<SignBlobResponse> responseObserver)

public void signBlob(SignBlobRequest request, StreamObserver<SignBlobResponse> responseObserver)

Note: This method is deprecated. Use the signBlob method in the IAM Service Account Credentials API instead. If you currently use this method, see the migration guide for instructions. Signs a blob using the system-managed private key for a ServiceAccount.

Parameters
NameDescription
requestSignBlobRequest
responseObserverio.grpc.stub.StreamObserver<SignBlobResponse>

signJwt(SignJwtRequest request, StreamObserver<SignJwtResponse> responseObserver)

public void signJwt(SignJwtRequest request, StreamObserver<SignJwtResponse> responseObserver)

Note: This method is deprecated. Use the signJwt method in the IAM Service Account Credentials API instead. If you currently use this method, see the migration guide for instructions. Signs a JSON Web Token (JWT) using the system-managed private key for a ServiceAccount.

Parameters
NameDescription
requestSignJwtRequest
responseObserverio.grpc.stub.StreamObserver<SignJwtResponse>

testIamPermissions(TestIamPermissionsRequest request, StreamObserver<TestIamPermissionsResponse> responseObserver)

public void testIamPermissions(TestIamPermissionsRequest request, StreamObserver<TestIamPermissionsResponse> responseObserver)

Tests whether the caller has the specified permissions on a ServiceAccount.

Parameters
NameDescription
requestcom.google.iam.v1.TestIamPermissionsRequest
responseObserverio.grpc.stub.StreamObserver<com.google.iam.v1.TestIamPermissionsResponse>

undeleteRole(UndeleteRoleRequest request, StreamObserver<Role> responseObserver)

public void undeleteRole(UndeleteRoleRequest request, StreamObserver<Role> responseObserver)

Undeletes a custom Role.

Parameters
NameDescription
requestUndeleteRoleRequest
responseObserverio.grpc.stub.StreamObserver<Role>

undeleteServiceAccount(UndeleteServiceAccountRequest request, StreamObserver<UndeleteServiceAccountResponse> responseObserver)

public void undeleteServiceAccount(UndeleteServiceAccountRequest request, StreamObserver<UndeleteServiceAccountResponse> responseObserver)

Restores a deleted ServiceAccount. Important: It is not always possible to restore a deleted service account. Use this method only as a last resort. After you delete a service account, IAM permanently removes the service account 30 days later. There is no way to restore a deleted service account that has been permanently removed.

Parameters
NameDescription
requestUndeleteServiceAccountRequest
responseObserverio.grpc.stub.StreamObserver<UndeleteServiceAccountResponse>

updateRole(UpdateRoleRequest request, StreamObserver<Role> responseObserver)

public void updateRole(UpdateRoleRequest request, StreamObserver<Role> responseObserver)

Updates the definition of a custom Role.

Parameters
NameDescription
requestUpdateRoleRequest
responseObserverio.grpc.stub.StreamObserver<Role>

updateServiceAccount(ServiceAccount request, StreamObserver<ServiceAccount> responseObserver)

public void updateServiceAccount(ServiceAccount request, StreamObserver<ServiceAccount> responseObserver)

Note: We are in the process of deprecating this method. Use PatchServiceAccount instead. Updates a ServiceAccount. You can update only the display_name field.

Parameters
NameDescription
requestServiceAccount
responseObserverio.grpc.stub.StreamObserver<ServiceAccount>

uploadServiceAccountKey(UploadServiceAccountKeyRequest request, StreamObserver<ServiceAccountKey> responseObserver)

public void uploadServiceAccountKey(UploadServiceAccountKeyRequest request, StreamObserver<ServiceAccountKey> responseObserver)

Uploads the public key portion of a key pair that you manage, and associates the public key with a ServiceAccount. After you upload the public key, you can use the private key from the key pair as a service account key.

Parameters
NameDescription
requestUploadServiceAccountKeyRequest
responseObserverio.grpc.stub.StreamObserver<ServiceAccountKey>