Class AllowBindingExplanation (0.1.10)

AllowBindingExplanation(mapping=None, *, ignore_unknown_fields=False, **kwargs)

Details about how a role binding in an allow policy affects a principal's ability to use a permission.

Attributes

Name Description
allow_access_state google.cloud.policytroubleshooter_iam_v3.types.AllowAccessState
Required. Indicates whether *this role binding* gives the specified permission to the specified principal on the specified resource. This field does *not* indicate whether the principal actually has the permission on the resource. There might be another role binding that overrides this role binding. To determine whether the principal actually has the permission, use the overall_access_state field in the TroubleshootIamPolicyResponse.
role str
The role that this role binding grants. For example, roles/compute.admin. For a complete list of predefined IAM roles, as well as the permissions in each role, see https://cloud.google.com/iam/help/roles/reference.
role_permission google.cloud.policytroubleshooter_iam_v3.types.RolePermissionInclusionState
Indicates whether the role granted by this role binding contains the specified permission.
role_permission_relevance google.cloud.policytroubleshooter_iam_v3.types.HeuristicRelevance
The relevance of the permission's existence, or nonexistence, in the role to the overall determination for the entire policy.
combined_membership google.cloud.policytroubleshooter_iam_v3.types.AllowBindingExplanation.AnnotatedAllowMembership
The combined result of all memberships. Indicates if the principal is included in any role binding, either directly or indirectly.
memberships MutableMapping[str, google.cloud.policytroubleshooter_iam_v3.types.AllowBindingExplanation.AnnotatedAllowMembership]
Indicates whether each role binding includes the principal specified in the request, either directly or indirectly. Each key identifies a principal in the role binding, and each value indicates whether the principal in the role binding includes the principal in the request. For example, suppose that a role binding includes the following principals: - user:alice@example.com - group:product-eng@example.com You want to troubleshoot access for user:bob@example.com. This user is a member of the group group:product-eng@example.com. For the first principal in the role binding, the key is user:alice@example.com, and the membership field in the value is set to NOT_INCLUDED. For the second principal in the role binding, the key is group:product-eng@example.com, and the membership field in the value is set to INCLUDED.
relevance google.cloud.policytroubleshooter_iam_v3.types.HeuristicRelevance
The relevance of this role binding to the overall determination for the entire policy.
condition google.type.expr_pb2.Expr
A condition expression that specifies when the role binding grants access. To learn about IAM Conditions, see https://cloud.google.com/iam/help/conditions/overview.
condition_explanation google.cloud.policytroubleshooter_iam_v3.types.ConditionExplanation
Condition evaluation state for this role binding.

Classes

AnnotatedAllowMembership

AnnotatedAllowMembership(mapping=None, *, ignore_unknown_fields=False, **kwargs)

Details about whether the role binding includes the principal.

MembershipsEntry

MembershipsEntry(mapping=None, *, ignore_unknown_fields=False, **kwargs)

The abstract base class for a message.

Parameters
Name Description
kwargs dict

Keys and values corresponding to the fields of the message.

mapping Union[dict, .Message]

A dictionary or message to be used to determine the values for this message.

ignore_unknown_fields Optional(bool)

If True, do not raise errors for unknown fields. Only applied if mapping is a mapping type or there are keyword parameters.