AllowBindingExplanation(mapping=None, *, ignore_unknown_fields=False, **kwargs)
Details about how a role binding in an allow policy affects a principal's ability to use a permission.
Attributes |
|
---|---|
Name | Description |
allow_access_state |
google.cloud.policytroubleshooter_iam_v3.types.AllowAccessState
Required. Indicates whether *this role binding* gives the specified permission to the specified principal on the specified resource. This field does *not* indicate whether the principal actually has the permission on the resource. There might be another role binding that overrides this role binding. To determine whether the principal actually has the permission, use the overall_access_state field in the
TroubleshootIamPolicyResponse.
|
role |
str
The role that this role binding grants. For example, roles/compute.admin .
For a complete list of predefined IAM roles, as well as the
permissions in each role, see
https://cloud.google.com/iam/help/roles/reference.
|
role_permission |
google.cloud.policytroubleshooter_iam_v3.types.RolePermissionInclusionState
Indicates whether the role granted by this role binding contains the specified permission. |
role_permission_relevance |
google.cloud.policytroubleshooter_iam_v3.types.HeuristicRelevance
The relevance of the permission's existence, or nonexistence, in the role to the overall determination for the entire policy. |
combined_membership |
google.cloud.policytroubleshooter_iam_v3.types.AllowBindingExplanation.AnnotatedAllowMembership
The combined result of all memberships. Indicates if the principal is included in any role binding, either directly or indirectly. |
memberships |
MutableMapping[str, google.cloud.policytroubleshooter_iam_v3.types.AllowBindingExplanation.AnnotatedAllowMembership]
Indicates whether each role binding includes the principal specified in the request, either directly or indirectly. Each key identifies a principal in the role binding, and each value indicates whether the principal in the role binding includes the principal in the request. For example, suppose that a role binding includes the following principals: - user:alice@example.com
- group:product-eng@example.com
You want to troubleshoot access for
user:bob@example.com . This user is a member of the group
group:product-eng@example.com .
For the first principal in the role binding, the key is
user:alice@example.com , and the membership field in
the value is set to NOT_INCLUDED .
For the second principal in the role binding, the key is
group:product-eng@example.com , and the membership
field in the value is set to INCLUDED .
|
relevance |
google.cloud.policytroubleshooter_iam_v3.types.HeuristicRelevance
The relevance of this role binding to the overall determination for the entire policy. |
condition |
google.type.expr_pb2.Expr
A condition expression that specifies when the role binding grants access. To learn about IAM Conditions, see https://cloud.google.com/iam/help/conditions/overview. |
condition_explanation |
google.cloud.policytroubleshooter_iam_v3.types.ConditionExplanation
Condition evaluation state for this role binding. |
Classes
AnnotatedAllowMembership
AnnotatedAllowMembership(mapping=None, *, ignore_unknown_fields=False, **kwargs)
Details about whether the role binding includes the principal.
MembershipsEntry
MembershipsEntry(mapping=None, *, ignore_unknown_fields=False, **kwargs)
The abstract base class for a message.
Parameters | |
---|---|
Name | Description |
kwargs |
dict
Keys and values corresponding to the fields of the message. |
mapping |
Union[dict,
A dictionary or message to be used to determine the values for this message. |
ignore_unknown_fields |
Optional(bool)
If True, do not raise errors for unknown fields. Only applied if |