Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

V1AnalyzeIamPolicyOptions

import type { V1AnalyzeIamPolicyOptions } from "https://googleapis.deno.dev/v1/cloudasset:v1.ts";

Additional options for CloudAsset#v1AnalyzeIamPolicy.

interface V1AnalyzeIamPolicyOptions {
[analysisQuery.accessSelector.permissions]?: string;
[analysisQuery.accessSelector.roles]?: string;
[analysisQuery.conditionContext.accessTime]?: Date;
[analysisQuery.identitySelector.identity]?: string;
[analysisQuery.options.analyzeServiceAccountImpersonation]?: boolean;
[analysisQuery.options.expandGroups]?: boolean;
[analysisQuery.options.expandResources]?: boolean;
[analysisQuery.options.expandRoles]?: boolean;
[analysisQuery.options.outputGroupEdges]?: boolean;
[analysisQuery.options.outputResourceEdges]?: boolean;
[analysisQuery.resourceSelector.fullResourceName]?: string;
executionTimeout?: number;
savedAnalysisQuery?: string;
}

§Properties

§
[analysisQuery.accessSelector.permissions]?: string
[src]

Optional. The permissions to appear in result.

§
[analysisQuery.accessSelector.roles]?: string
[src]

Optional. The roles to appear in result.

§
[analysisQuery.conditionContext.accessTime]?: Date
[src]

The hypothetical access timestamp to evaluate IAM conditions. Note that this value must not be earlier than the current time; otherwise, an INVALID_ARGUMENT error will be returned.

§
[analysisQuery.identitySelector.identity]?: string
[src]

Required. The identity appear in the form of principals in IAM policy binding. The examples of supported forms are: "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com". Notice that wildcard characters (such as * and ?) are not supported. You must give a specific identity.

§
[analysisQuery.options.analyzeServiceAccountImpersonation]?: boolean
[src]

Optional. If true, the response will include access analysis from identities to resources via service account impersonation. This is a very expensive operation, because many derived queries will be executed. We highly recommend you use AssetService.AnalyzeIamPolicyLongrunning RPC instead. For example, if the request analyzes for which resources user A has permission P, and there's an IAM policy states user A has iam.serviceAccounts.getAccessToken permission to a service account SA, and there's another IAM policy states service account SA has permission P to a Google Cloud folder F, then user A potentially has access to the Google Cloud folder F. And those advanced analysis results will be included in AnalyzeIamPolicyResponse.service_account_impersonation_analysis. Another example, if the request analyzes for who has permission P to a Google Cloud folder F, and there's an IAM policy states user A has iam.serviceAccounts.actAs permission to a service account SA, and there's another IAM policy states service account SA has permission P to the Google Cloud folder F, then user A potentially has access to the Google Cloud folder F. And those advanced analysis results will be included in AnalyzeIamPolicyResponse.service_account_impersonation_analysis. Only the following permissions are considered in this analysis: * iam.serviceAccounts.actAs * iam.serviceAccounts.signBlob * iam.serviceAccounts.signJwt * iam.serviceAccounts.getAccessToken * iam.serviceAccounts.getOpenIdToken * iam.serviceAccounts.implicitDelegation Default is false.

§
[analysisQuery.options.expandGroups]?: boolean
[src]

Optional. If true, the identities section of the result will expand any Google groups appearing in an IAM policy binding. If IamPolicyAnalysisQuery.identity_selector is specified, the identity in the result will be determined by the selector, and this flag is not allowed to set. If true, the default max expansion per group is 1000 for AssetService.AnalyzeIamPolicy][]. Default is false.

§
[analysisQuery.options.expandResources]?: boolean
[src]

Optional. If true and IamPolicyAnalysisQuery.resource_selector is not specified, the resource section of the result will expand any resource attached to an IAM policy to include resources lower in the resource hierarchy. For example, if the request analyzes for which resources user A has permission P, and the results include an IAM policy with P on a Google Cloud folder, the results will also include resources in that folder with permission P. If true and IamPolicyAnalysisQuery.resource_selector is specified, the resource section of the result will expand the specified resource to include resources lower in the resource hierarchy. Only project or lower resources are supported. Folder and organization resources cannot be used together with this option. For example, if the request analyzes for which users have permission P on a Google Cloud project with this option enabled, the results will include all users who have permission P on that project or any lower resource. If true, the default max expansion per resource is 1000 for AssetService.AnalyzeIamPolicy][] and 100000 for AssetService.AnalyzeIamPolicyLongrunning][]. Default is false.

§
[analysisQuery.options.expandRoles]?: boolean
[src]

Optional. If true, the access section of result will expand any roles appearing in IAM policy bindings to include their permissions. If IamPolicyAnalysisQuery.access_selector is specified, the access section of the result will be determined by the selector, and this flag is not allowed to set. Default is false.

§
[analysisQuery.options.outputGroupEdges]?: boolean
[src]

Optional. If true, the result will output the relevant membership relationships between groups and other groups, and between groups and principals. Default is false.

§
[analysisQuery.options.outputResourceEdges]?: boolean
[src]

Optional. If true, the result will output the relevant parent/child relationships between resources. Default is false.

§
[analysisQuery.resourceSelector.fullResourceName]?: string
[src]
§
executionTimeout?: number
[src]

Optional. Amount of time executable has to complete. See JSON representation of Duration. If this field is set with a value less than the RPC deadline, and the execution of your query hasn't finished in the specified execution timeout, you will get a response with partial result. Otherwise, your query's execution will continue until the RPC deadline. If it's not finished until then, you will get a DEADLINE_EXCEEDED error. Default is empty.

§
savedAnalysisQuery?: string
[src]

Optional. The name of a saved query, which must be in the format of: * projects/project_number/savedQueries/saved_query_id * folders/folder_number/savedQueries/saved_query_id * organizations/organization_number/savedQueries/saved_query_id If both analysis_query and saved_analysis_query are provided, they will be merged together with the saved_analysis_query as base and the analysis_query as overrides. For more details of the merge behavior, refer to the MergeFrom page. Note that you cannot override primitive fields with default value, such as 0 or empty string, etc., because we use proto3, which doesn't support field presence yet.