You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: clients/storage/lib/google_api/storage/v1/model/policy_bindings.ex
+18-18Lines changed: 18 additions & 18 deletions
Original file line number
Diff line number
Diff line change
@@ -23,26 +23,26 @@ defmodule GoogleApi.Storage.V1.Model.PolicyBindings do
23
23
24
24
* `condition` (*type:* `GoogleApi.Storage.V1.Model.Expr.t`, *default:* `nil`) - The condition that is associated with this binding. NOTE: an unsatisfied condition will not allow user access via current binding. Different bindings, including their conditions, are examined independently.
25
25
* `members` (*type:* `list(String.t)`, *default:* `nil`) - A collection of identifiers for members who may assume the provided role. Recognized identifiers are as follows:
26
-
- allUsers — A special identifier that represents anyone on the internet; with or without a Google account.
27
-
- allAuthenticatedUsers — A special identifier that represents anyone who is authenticated with a Google account or a service account.
- serviceAccount:emailid - An email address that represents a service account. For example, serviceAccount:[email protected] .
30
+
- group:emailid - An email address that represents a Google group. For example, group:[email protected].
31
+
- domain:domain - A Google Apps domain name that represents all the users of that domain. For example, domain:google.com or domain:example.com.
32
+
- projectOwner:projectid - Owners of the given project. For example, projectOwner:my-example-project
33
+
- projectEditor:projectid - Editors of the given project. For example, projectEditor:my-example-project
34
+
- projectViewer:projectid - Viewers of the given project. For example, projectViewer:my-example-project
35
35
* `role` (*type:* `String.t`, *default:* `nil`) - The role to which members belong. Two types of roles are supported: new IAM roles, which grant permissions that do not map directly to those provided by ACLs, and legacy IAM roles, which do map directly to ACL permissions. All roles are of the format roles/storage.specificRole.
36
36
The new IAM roles are:
37
-
- roles/storage.admin — Full control of Google Cloud Storage resources.
38
-
- roles/storage.objectViewer — Read-Only access to Google Cloud Storage objects.
39
-
- roles/storage.objectCreator — Access to create objects in Google Cloud Storage.
40
-
- roles/storage.objectAdmin — Full control of Google Cloud Storage objects. The legacy IAM roles are:
41
-
- roles/storage.legacyObjectReader — Read-only access to objects without listing. Equivalent to an ACL entry on an object with the READER role.
42
-
- roles/storage.legacyObjectOwner — Read/write access to existing objects without listing. Equivalent to an ACL entry on an object with the OWNER role.
43
-
- roles/storage.legacyBucketReader — Read access to buckets with object listing. Equivalent to an ACL entry on a bucket with the READER role.
44
-
- roles/storage.legacyBucketWriter — Read access to buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the WRITER role.
45
-
- roles/storage.legacyBucketOwner — Read and write access to existing buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the OWNER role.
37
+
- roles/storage.admin - Full control of Google Cloud Storage resources.
38
+
- roles/storage.objectViewer - Read-Only access to Google Cloud Storage objects.
39
+
- roles/storage.objectCreator - Access to create objects in Google Cloud Storage.
40
+
- roles/storage.objectAdmin - Full control of Google Cloud Storage objects. The legacy IAM roles are:
41
+
- roles/storage.legacyObjectReader - Read-only access to objects without listing. Equivalent to an ACL entry on an object with the READER role.
42
+
- roles/storage.legacyObjectOwner - Read/write access to existing objects without listing. Equivalent to an ACL entry on an object with the OWNER role.
43
+
- roles/storage.legacyBucketReader - Read access to buckets with object listing. Equivalent to an ACL entry on a bucket with the READER role.
44
+
- roles/storage.legacyBucketWriter - Read access to buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the WRITER role.
45
+
- roles/storage.legacyBucketOwner - Read and write access to existing buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the OWNER role.
Copy file name to clipboardExpand all lines: clients/storage/lib/google_api/storage/v1/model/test_iam_permissions_response.ex
+20-20Lines changed: 20 additions & 20 deletions
Original file line number
Diff line number
Diff line change
@@ -23,26 +23,26 @@ defmodule GoogleApi.Storage.V1.Model.TestIamPermissionsResponse do
23
23
24
24
* `kind` (*type:* `String.t`, *default:* `storage#testIamPermissionsResponse`) - The kind of item this is.
25
25
* `permissions` (*type:* `list(String.t)`, *default:* `nil`) - The permissions held by the caller. Permissions are always of the format storage.resource.capability, where resource is one of buckets, objects, or managedFolders. The supported permissions are as follows:
26
-
- storage.buckets.delete — Delete bucket.
27
-
- storage.buckets.get — Read bucket metadata.
28
-
- storage.buckets.getIamPolicy — Read bucket IAM policy.
29
-
- storage.buckets.create — Create bucket.
30
-
- storage.buckets.list — List buckets.
31
-
- storage.buckets.setIamPolicy — Update bucket IAM policy.
0 commit comments