Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

GoogleCloudPolicytroubleshooterIamV3ExplainedAllowPolicy

import type { GoogleCloudPolicytroubleshooterIamV3ExplainedAllowPolicy } from "https://googleapis.deno.dev/v1/policytroubleshooter:v3.ts";

Details about how a specific IAM allow policy contributed to the final access state.

interface GoogleCloudPolicytroubleshooterIamV3ExplainedAllowPolicy {
allowAccessState?:
| "ALLOW_ACCESS_STATE_UNSPECIFIED"
| "ALLOW_ACCESS_STATE_GRANTED"
| "ALLOW_ACCESS_STATE_NOT_GRANTED"
| "ALLOW_ACCESS_STATE_UNKNOWN_CONDITIONAL"
| "ALLOW_ACCESS_STATE_UNKNOWN_INFO";
fullResourceName?: string;
relevance?: "HEURISTIC_RELEVANCE_UNSPECIFIED" | "HEURISTIC_RELEVANCE_NORMAL" | "HEURISTIC_RELEVANCE_HIGH";
}

§Properties

§
allowAccessState?: "ALLOW_ACCESS_STATE_UNSPECIFIED" | "ALLOW_ACCESS_STATE_GRANTED" | "ALLOW_ACCESS_STATE_NOT_GRANTED" | "ALLOW_ACCESS_STATE_UNKNOWN_CONDITIONAL" | "ALLOW_ACCESS_STATE_UNKNOWN_INFO"
[src]

Required. Indicates whether this policy provides the specified permission to the specified principal for the specified resource. This field does not indicate whether the principal actually has the permission for the resource. There might be another policy that overrides this policy. To determine whether the principal actually has the permission, use the overall_access_state field in the TroubleshootIamPolicyResponse.

§

Details about how each role binding in the policy affects the principal's ability, or inability, to use the permission for the resource. The order of the role bindings matches the role binding order in the policy. If the sender of the request does not have access to the policy, this field is omitted.

§
fullResourceName?: string
[src]

The full resource name that identifies the resource. For example, //compute.googleapis.com/projects/my-project/zones/us-central1-a/instances/my-instance. If the sender of the request does not have access to the policy, this field is omitted. For examples of full resource names for Google Cloud services, see https://cloud.google.com/iam/help/troubleshooter/full-resource-names.

§

The IAM allow policy attached to the resource. If the sender of the request does not have access to the policy, this field is empty.

§
relevance?: "HEURISTIC_RELEVANCE_UNSPECIFIED" | "HEURISTIC_RELEVANCE_NORMAL" | "HEURISTIC_RELEVANCE_HIGH"
[src]

The relevance of this policy to the overall access state in the TroubleshootIamPolicyResponse. If the sender of the request does not have access to the policy, this field is omitted.