Struct google_api_proto::google::cloud::policytroubleshooter::iam::v3beta::DenyRuleExplanation
source · pub struct DenyRuleExplanation {
pub deny_access_state: i32,
pub combined_denied_permission: Option<AnnotatedPermissionMatching>,
pub denied_permissions: BTreeMap<String, AnnotatedPermissionMatching>,
pub combined_exception_permission: Option<AnnotatedPermissionMatching>,
pub exception_permissions: BTreeMap<String, AnnotatedPermissionMatching>,
pub combined_denied_principal: Option<AnnotatedDenyPrincipalMatching>,
pub denied_principals: BTreeMap<String, AnnotatedDenyPrincipalMatching>,
pub combined_exception_principal: Option<AnnotatedDenyPrincipalMatching>,
pub exception_principals: BTreeMap<String, AnnotatedDenyPrincipalMatching>,
pub relevance: i32,
pub condition: Option<Expr>,
pub condition_explanation: Option<ConditionExplanation>,
}
Expand description
Details about how a deny rule in a deny policy affects a principal’s ability to use a permission.
Fields§
§deny_access_state: i32
Required. Indicates whether this rule denies the specified permission to the specified principal for the specified resource.
This field does not indicate whether the principal is actually denied on
the permission for the resource. There might be another rule that overrides
this rule. To determine whether the principal actually has the permission,
use the overall_access_state
field in the
[TroubleshootIamPolicyResponse][google.cloud.policytroubleshooter.iam.v3beta.TroubleshootIamPolicyResponse].
combined_denied_permission: Option<AnnotatedPermissionMatching>
Indicates whether the permission in the request is listed as a denied permission in the deny rule.
denied_permissions: BTreeMap<String, AnnotatedPermissionMatching>
Lists all denied permissions in the deny rule and indicates whether each permission matches the permission in the request.
Each key identifies a denied permission in the rule, and each value indicates whether the denied permission matches the permission in the request.
combined_exception_permission: Option<AnnotatedPermissionMatching>
Indicates whether the permission in the request is listed as an exception permission in the deny rule.
exception_permissions: BTreeMap<String, AnnotatedPermissionMatching>
Lists all exception permissions in the deny rule and indicates whether each permission matches the permission in the request.
Each key identifies a exception permission in the rule, and each value indicates whether the exception permission matches the permission in the request.
combined_denied_principal: Option<AnnotatedDenyPrincipalMatching>
Indicates whether the principal is listed as a denied principal in the deny rule, either directly or through membership in a principal set.
denied_principals: BTreeMap<String, AnnotatedDenyPrincipalMatching>
Lists all denied principals in the deny rule and indicates whether each principal matches the principal in the request, either directly or through membership in a principal set.
Each key identifies a denied principal in the rule, and each value indicates whether the denied principal matches the principal in the request.
combined_exception_principal: Option<AnnotatedDenyPrincipalMatching>
Indicates whether the principal is listed as an exception principal in the deny rule, either directly or through membership in a principal set.
exception_principals: BTreeMap<String, AnnotatedDenyPrincipalMatching>
Lists all exception principals in the deny rule and indicates whether each principal matches the principal in the request, either directly or through membership in a principal set.
Each key identifies a exception principal in the rule, and each value indicates whether the exception principal matches the principal in the request.
relevance: i32
The relevance of this role binding to the overall determination for the entire policy.
condition: Option<Expr>
A condition expression that specifies when the deny rule denies the principal access.
To learn about IAM Conditions, see https://cloud.google.com/iam/help/conditions/overview.
condition_explanation: Option<ConditionExplanation>
Condition evaluation state for this role binding.
Implementations§
source§impl DenyRuleExplanation
impl DenyRuleExplanation
sourcepub fn deny_access_state(&self) -> DenyAccessState
pub fn deny_access_state(&self) -> DenyAccessState
Returns the enum value of deny_access_state
, or the default if the field is set to an invalid enum value.
sourcepub fn set_deny_access_state(&mut self, value: DenyAccessState)
pub fn set_deny_access_state(&mut self, value: DenyAccessState)
Sets deny_access_state
to the provided enum value.
sourcepub fn relevance(&self) -> HeuristicRelevance
pub fn relevance(&self) -> HeuristicRelevance
Returns the enum value of relevance
, or the default if the field is set to an invalid enum value.
sourcepub fn set_relevance(&mut self, value: HeuristicRelevance)
pub fn set_relevance(&mut self, value: HeuristicRelevance)
Sets relevance
to the provided enum value.
Trait Implementations§
source§impl Clone for DenyRuleExplanation
impl Clone for DenyRuleExplanation
source§fn clone(&self) -> DenyRuleExplanation
fn clone(&self) -> DenyRuleExplanation
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for DenyRuleExplanation
impl Debug for DenyRuleExplanation
source§impl Default for DenyRuleExplanation
impl Default for DenyRuleExplanation
source§impl Message for DenyRuleExplanation
impl Message for DenyRuleExplanation
source§fn encoded_len(&self) -> usize
fn encoded_len(&self) -> usize
source§fn encode(&self, buf: &mut impl BufMut) -> Result<(), EncodeError>where
Self: Sized,
fn encode(&self, buf: &mut impl BufMut) -> Result<(), EncodeError>where
Self: Sized,
source§fn encode_to_vec(&self) -> Vec<u8>where
Self: Sized,
fn encode_to_vec(&self) -> Vec<u8>where
Self: Sized,
source§fn encode_length_delimited(
&self,
buf: &mut impl BufMut,
) -> Result<(), EncodeError>where
Self: Sized,
fn encode_length_delimited(
&self,
buf: &mut impl BufMut,
) -> Result<(), EncodeError>where
Self: Sized,
source§fn encode_length_delimited_to_vec(&self) -> Vec<u8>where
Self: Sized,
fn encode_length_delimited_to_vec(&self) -> Vec<u8>where
Self: Sized,
source§fn decode(buf: impl Buf) -> Result<Self, DecodeError>where
Self: Default,
fn decode(buf: impl Buf) -> Result<Self, DecodeError>where
Self: Default,
source§fn decode_length_delimited(buf: impl Buf) -> Result<Self, DecodeError>where
Self: Default,
fn decode_length_delimited(buf: impl Buf) -> Result<Self, DecodeError>where
Self: Default,
source§fn merge(&mut self, buf: impl Buf) -> Result<(), DecodeError>where
Self: Sized,
fn merge(&mut self, buf: impl Buf) -> Result<(), DecodeError>where
Self: Sized,
self
. Read moresource§fn merge_length_delimited(&mut self, buf: impl Buf) -> Result<(), DecodeError>where
Self: Sized,
fn merge_length_delimited(&mut self, buf: impl Buf) -> Result<(), DecodeError>where
Self: Sized,
self
.source§impl PartialEq for DenyRuleExplanation
impl PartialEq for DenyRuleExplanation
source§fn eq(&self, other: &DenyRuleExplanation) -> bool
fn eq(&self, other: &DenyRuleExplanation) -> bool
self
and other
values to be equal, and is used
by ==
.impl StructuralPartialEq for DenyRuleExplanation
Auto Trait Implementations§
impl Freeze for DenyRuleExplanation
impl RefUnwindSafe for DenyRuleExplanation
impl Send for DenyRuleExplanation
impl Sync for DenyRuleExplanation
impl Unpin for DenyRuleExplanation
impl UnwindSafe for DenyRuleExplanation
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
§impl<T> Instrument for T
impl<T> Instrument for T
§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoRequest<T> for T
impl<T> IntoRequest<T> for T
source§fn into_request(self) -> Request<T>
fn into_request(self) -> Request<T>
T
in a tonic::Request