Google Cloud Native is in preview. Google Cloud Classic is fully supported.
Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi
google-native.accesscontextmanager/v1.getAccessPolicy
Explore with Pulumi AI
Google Cloud Native is in preview. Google Cloud Classic is fully supported.
Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi
Returns an access policy based on the name.
Using getAccessPolicy
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getAccessPolicy(args: GetAccessPolicyArgs, opts?: InvokeOptions): Promise<GetAccessPolicyResult>
function getAccessPolicyOutput(args: GetAccessPolicyOutputArgs, opts?: InvokeOptions): Output<GetAccessPolicyResult>
def get_access_policy(access_policy_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetAccessPolicyResult
def get_access_policy_output(access_policy_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetAccessPolicyResult]
func LookupAccessPolicy(ctx *Context, args *LookupAccessPolicyArgs, opts ...InvokeOption) (*LookupAccessPolicyResult, error)
func LookupAccessPolicyOutput(ctx *Context, args *LookupAccessPolicyOutputArgs, opts ...InvokeOption) LookupAccessPolicyResultOutput
> Note: This function is named LookupAccessPolicy
in the Go SDK.
public static class GetAccessPolicy
{
public static Task<GetAccessPolicyResult> InvokeAsync(GetAccessPolicyArgs args, InvokeOptions? opts = null)
public static Output<GetAccessPolicyResult> Invoke(GetAccessPolicyInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetAccessPolicyResult> getAccessPolicy(GetAccessPolicyArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: google-native:accesscontextmanager/v1:getAccessPolicy
arguments:
# arguments dictionary
The following arguments are supported:
- Access
Policy stringId
- Access
Policy stringId
- access
Policy StringId
- access
Policy stringId
- access_
policy_ strid
- access
Policy StringId
getAccessPolicy Result
The following output properties are available:
- Etag string
- An opaque identifier for the current version of the
AccessPolicy
. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format. - Name string
- Resource name of the
AccessPolicy
. Format:accessPolicies/{access_policy}
- Parent string
- The parent of this
AccessPolicy
in the Cloud Resource Hierarchy. Currently immutable once created. Format:organizations/{organization_id}
- Scopes List<string>
- The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with
scopes=["folders/123"]
has the following behavior: - ServicePerimeter can only restrict projects withinfolders/123
. - ServicePerimeter within policy A can only reference access levels defined within policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includesfolders/123
will result in an error. If no scopes are provided, then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list offolders/{folder_number}
orprojects/{project_number}
- Title string
- Human readable title. Does not affect behavior.
- Etag string
- An opaque identifier for the current version of the
AccessPolicy
. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format. - Name string
- Resource name of the
AccessPolicy
. Format:accessPolicies/{access_policy}
- Parent string
- The parent of this
AccessPolicy
in the Cloud Resource Hierarchy. Currently immutable once created. Format:organizations/{organization_id}
- Scopes []string
- The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with
scopes=["folders/123"]
has the following behavior: - ServicePerimeter can only restrict projects withinfolders/123
. - ServicePerimeter within policy A can only reference access levels defined within policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includesfolders/123
will result in an error. If no scopes are provided, then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list offolders/{folder_number}
orprojects/{project_number}
- Title string
- Human readable title. Does not affect behavior.
- etag String
- An opaque identifier for the current version of the
AccessPolicy
. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format. - name String
- Resource name of the
AccessPolicy
. Format:accessPolicies/{access_policy}
- parent String
- The parent of this
AccessPolicy
in the Cloud Resource Hierarchy. Currently immutable once created. Format:organizations/{organization_id}
- scopes List<String>
- The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with
scopes=["folders/123"]
has the following behavior: - ServicePerimeter can only restrict projects withinfolders/123
. - ServicePerimeter within policy A can only reference access levels defined within policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includesfolders/123
will result in an error. If no scopes are provided, then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list offolders/{folder_number}
orprojects/{project_number}
- title String
- Human readable title. Does not affect behavior.
- etag string
- An opaque identifier for the current version of the
AccessPolicy
. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format. - name string
- Resource name of the
AccessPolicy
. Format:accessPolicies/{access_policy}
- parent string
- The parent of this
AccessPolicy
in the Cloud Resource Hierarchy. Currently immutable once created. Format:organizations/{organization_id}
- scopes string[]
- The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with
scopes=["folders/123"]
has the following behavior: - ServicePerimeter can only restrict projects withinfolders/123
. - ServicePerimeter within policy A can only reference access levels defined within policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includesfolders/123
will result in an error. If no scopes are provided, then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list offolders/{folder_number}
orprojects/{project_number}
- title string
- Human readable title. Does not affect behavior.
- etag str
- An opaque identifier for the current version of the
AccessPolicy
. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format. - name str
- Resource name of the
AccessPolicy
. Format:accessPolicies/{access_policy}
- parent str
- The parent of this
AccessPolicy
in the Cloud Resource Hierarchy. Currently immutable once created. Format:organizations/{organization_id}
- scopes Sequence[str]
- The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with
scopes=["folders/123"]
has the following behavior: - ServicePerimeter can only restrict projects withinfolders/123
. - ServicePerimeter within policy A can only reference access levels defined within policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includesfolders/123
will result in an error. If no scopes are provided, then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list offolders/{folder_number}
orprojects/{project_number}
- title str
- Human readable title. Does not affect behavior.
- etag String
- An opaque identifier for the current version of the
AccessPolicy
. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format. - name String
- Resource name of the
AccessPolicy
. Format:accessPolicies/{access_policy}
- parent String
- The parent of this
AccessPolicy
in the Cloud Resource Hierarchy. Currently immutable once created. Format:organizations/{organization_id}
- scopes List<String>
- The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with
scopes=["folders/123"]
has the following behavior: - ServicePerimeter can only restrict projects withinfolders/123
. - ServicePerimeter within policy A can only reference access levels defined within policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includesfolders/123
will result in an error. If no scopes are provided, then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list offolders/{folder_number}
orprojects/{project_number}
- title String
- Human readable title. Does not affect behavior.
Package Details
- Repository
- Google Cloud Native pulumi/pulumi-google-native
- License
- Apache-2.0
Google Cloud Native is in preview. Google Cloud Classic is fully supported.
Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi