- 3.29.1 (latest)
- 3.29.0
- 3.28.0
- 3.27.1
- 3.26.4
- 3.25.1
- 3.24.3
- 3.23.0
- 3.22.0
- 3.21.0
- 3.20.1
- 3.19.1
- 3.18.1
- 3.17.1
- 3.16.0
- 3.15.0
- 3.14.2
- 3.13.1
- 3.12.0
- 3.11.0
- 3.10.0
- 3.9.1
- 3.8.1
- 3.7.1
- 3.6.1
- 3.5.0
- 3.4.0
- 3.3.0
- 3.2.1
- 3.1.0
- 2.2.2
- 2.1.0
- 2.0.0
- 1.3.2
- 1.2.0
- 1.1.0
- 1.0.0
- 0.10.0
- 0.9.0
- 0.8.0
- 0.7.0
- 0.6.0
- 0.5.0
- 0.4.1
- 0.3.0
Explanation about the IAM policy search result. .. attribute:: matched_permissions
The map from roles to their included permissions that match
the permission query (i.e., a query containing
policy.role.permissions:
). Example: if query
policy.role.permissions : "compute.disk.get"
matches a
policy binding that contains owner role, the
matched_permissions will be {"roles/owner":
["compute.disk.get"]}
. The roles can also be found in the
returned policy
bindings. Note that the map is populated
only for requests with permission queries.
Classes
MatchedPermissionsEntry
API documentation for asset_v1.types.IamPolicySearchResult.Explanation.MatchedPermissionsEntry
class.
Permissions
IAM permissions .. attribute:: permissions
A list of permissions. A sample permission string:
compute.disk.get
.