Class: Google::Cloud::OrgPolicy::V1::Policy::ListPolicy

Inherits:
Object
  • Object
show all
Extended by:
Protobuf::MessageExts::ClassMethods
Includes:
Protobuf::MessageExts
Defined in:
proto_docs/google/cloud/orgpolicy/v1/orgpolicy.rb

Overview

Used in policy_type to specify how list_policy behaves at this resource.

ListPolicy can define specific values and subtrees of Cloud Resource Manager resource hierarchy (Organizations, Folders, Projects) that are allowed or denied by setting the allowed_values and denied_values fields. This is achieved by using the under: and optional is: prefixes. The under: prefix is used to denote resource subtree values. The is: prefix is used to denote specific values, and is required only if the value contains a ":". Values prefixed with "is:" are treated the same as values with no prefix. Ancestry subtrees must be in one of the following formats: - "projects/", e.g. "projects/tokyo-rain-123" - "folders/", e.g. "folders/1234" - "organizations/", e.g. "organizations/1234" The supports_under field of the associated Constraint defines whether ancestry prefixes can be used. You can set allowed_values and denied_values in the same Policy if all_values is ALL_VALUES_UNSPECIFIED. ALLOW or DENY are used to allow or deny all values. If all_values is set to either ALLOW or DENY, allowed_values and denied_values must be unset.

Defined Under Namespace

Modules: AllValues

Instance Attribute Summary collapse

Instance Attribute Details

#all_values::Google::Cloud::OrgPolicy::V1::Policy::ListPolicy::AllValues

Returns The policy all_values state.

Returns:



209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
# File 'proto_docs/google/cloud/orgpolicy/v1/orgpolicy.rb', line 209

class ListPolicy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # This enum can be used to set `Policies` that apply to all possible
  # configuration values rather than specific values in `allowed_values` or
  # `denied_values`.
  #
  # Settting this to `ALLOW` will mean this `Policy` allows all values.
  # Similarly, setting it to `DENY` will mean no values are allowed. If
  # set to either `ALLOW` or `DENY,  `allowed_values` and `denied_values`
  # must be unset. Setting this to `ALL_VALUES_UNSPECIFIED` allows for
  # setting `allowed_values` and `denied_values`.
  module AllValues
    # Indicates that allowed_values or denied_values must be set.
    ALL_VALUES_UNSPECIFIED = 0

    # A policy with this set allows all values.
    ALLOW = 1

    # A policy with this set denies all values.
    DENY = 2
  end
end

#allowed_values::Array<::String>

Returns List of values allowed at this resource. Can only be set if all_values is set to ALL_VALUES_UNSPECIFIED.

Returns:

  • (::Array<::String>)

    List of values allowed at this resource. Can only be set if all_values is set to ALL_VALUES_UNSPECIFIED.



209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
# File 'proto_docs/google/cloud/orgpolicy/v1/orgpolicy.rb', line 209

class ListPolicy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # This enum can be used to set `Policies` that apply to all possible
  # configuration values rather than specific values in `allowed_values` or
  # `denied_values`.
  #
  # Settting this to `ALLOW` will mean this `Policy` allows all values.
  # Similarly, setting it to `DENY` will mean no values are allowed. If
  # set to either `ALLOW` or `DENY,  `allowed_values` and `denied_values`
  # must be unset. Setting this to `ALL_VALUES_UNSPECIFIED` allows for
  # setting `allowed_values` and `denied_values`.
  module AllValues
    # Indicates that allowed_values or denied_values must be set.
    ALL_VALUES_UNSPECIFIED = 0

    # A policy with this set allows all values.
    ALLOW = 1

    # A policy with this set denies all values.
    DENY = 2
  end
end

#denied_values::Array<::String>

Returns List of values denied at this resource. Can only be set if all_values is set to ALL_VALUES_UNSPECIFIED.

Returns:

  • (::Array<::String>)

    List of values denied at this resource. Can only be set if all_values is set to ALL_VALUES_UNSPECIFIED.



209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
# File 'proto_docs/google/cloud/orgpolicy/v1/orgpolicy.rb', line 209

class ListPolicy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # This enum can be used to set `Policies` that apply to all possible
  # configuration values rather than specific values in `allowed_values` or
  # `denied_values`.
  #
  # Settting this to `ALLOW` will mean this `Policy` allows all values.
  # Similarly, setting it to `DENY` will mean no values are allowed. If
  # set to either `ALLOW` or `DENY,  `allowed_values` and `denied_values`
  # must be unset. Setting this to `ALL_VALUES_UNSPECIFIED` allows for
  # setting `allowed_values` and `denied_values`.
  module AllValues
    # Indicates that allowed_values or denied_values must be set.
    ALL_VALUES_UNSPECIFIED = 0

    # A policy with this set allows all values.
    ALLOW = 1

    # A policy with this set denies all values.
    DENY = 2
  end
end

#inherit_from_parent::Boolean

Returns Determines the inheritance behavior for this Policy.

By default, a ListPolicy set at a resource supercedes any Policy set anywhere up the resource hierarchy. However, if inherit_from_parent is set to true, then the values from the effective Policy of the parent resource are inherited, meaning the values set in this Policy are added to the values inherited up the hierarchy.

Setting Policy hierarchies that inherit both allowed values and denied values isn't recommended in most circumstances to keep the configuration simple and understandable. However, it is possible to set a Policy with allowed_values set that inherits a Policy with denied_values set. In this case, the values that are allowed must be in allowed_values and not present in denied_values.

For example, suppose you have a Constraint constraints/serviceuser.services, which has a constraint_type of list_constraint, and with constraint_default set to ALLOW. Suppose that at the Organization level, a Policy is applied that restricts the allowed API activations to {E1, E2}. Then, if a Policy is applied to a project below the Organization that has inherit_from_parent set to false and field all_values set to DENY, then an attempt to activate any API will be denied.

The following examples demonstrate different possible layerings for projects/bar parented by organizations/foo:

Example 1 (no inherited values): organizations/foo has a Policy with values: {allowed_values: "E1" allowed_values:"E2"} projects/bar has inherit_from_parent false and values: {allowed_values: "E3" allowed_values: "E4"} The accepted values at organizations/foo are E1, E2. The accepted values at projects/bar are E3, and E4.

Example 2 (inherited values): organizations/foo has a Policy with values: {allowed_values: "E1" allowed_values:"E2"} projects/bar has a Policy with values: {value: "E3" value: "E4" inherit_from_parent: true} The accepted values at organizations/foo are E1, E2. The accepted values at projects/bar are E1, E2, E3, and E4.

Example 3 (inheriting both allowed and denied values): organizations/foo has a Policy with values: {allowed_values: "E1" allowed_values: "E2"} projects/bar has a Policy with: {denied_values: "E1"} The accepted values at organizations/foo are E1, E2. The value accepted at projects/bar is E2.

Example 4 (RestoreDefault): organizations/foo has a Policy with values: {allowed_values: "E1" allowed_values:"E2"} projects/bar has a Policy with values: {RestoreDefault: \{}} The accepted values at organizations/foo are E1, E2. The accepted values at projects/bar are either all or none depending on the value of constraint_default (if ALLOW, all; if DENY, none).

Example 5 (no policy inherits parent policy): organizations/foo has no Policy set. projects/bar has no Policy set. The accepted values at both levels are either all or none depending on the value of constraint_default (if ALLOW, all; if DENY, none).

Example 6 (ListConstraint allowing all): organizations/foo has a Policy with values: {allowed_values: "E1" allowed_values: "E2"} projects/bar has a Policy with: {all: ALLOW} The accepted values at organizations/foo are E1, E2. Any value is accepted atprojects/bar`.

Example 7 (ListConstraint allowing none): organizations/foo has a Policy with values: {allowed_values: "E1" allowed_values: "E2"} projects/bar has a Policy with: {all: DENY} The accepted values at organizations/foo are E1, E2. No value is accepted atprojects/bar`.

Example 10 (allowed and denied subtrees of Resource Manager hierarchy): Given the following resource hierarchy O1->{F1, F2}; F1->{P1}; F2->{P2, P3}, organizations/foo has a Policy with values: {allowed_values: "under:organizations/O1"} projects/bar has a Policy with: {allowed_values: "under:projects/P3"} {denied_values: "under:folders/F2"} The accepted values at organizations/foo are organizations/O1, folders/F1, folders/F2, projects/P1, projects/P2, projects/P3. The accepted values at projects/bar are organizations/O1, folders/F1, projects/P1.

Returns:

  • (::Boolean)

    Determines the inheritance behavior for this Policy.

    By default, a ListPolicy set at a resource supercedes any Policy set anywhere up the resource hierarchy. However, if inherit_from_parent is set to true, then the values from the effective Policy of the parent resource are inherited, meaning the values set in this Policy are added to the values inherited up the hierarchy.

    Setting Policy hierarchies that inherit both allowed values and denied values isn't recommended in most circumstances to keep the configuration simple and understandable. However, it is possible to set a Policy with allowed_values set that inherits a Policy with denied_values set. In this case, the values that are allowed must be in allowed_values and not present in denied_values.

    For example, suppose you have a Constraint constraints/serviceuser.services, which has a constraint_type of list_constraint, and with constraint_default set to ALLOW. Suppose that at the Organization level, a Policy is applied that restricts the allowed API activations to {E1, E2}. Then, if a Policy is applied to a project below the Organization that has inherit_from_parent set to false and field all_values set to DENY, then an attempt to activate any API will be denied.

    The following examples demonstrate different possible layerings for projects/bar parented by organizations/foo:

    Example 1 (no inherited values): organizations/foo has a Policy with values: {allowed_values: "E1" allowed_values:"E2"} projects/bar has inherit_from_parent false and values: {allowed_values: "E3" allowed_values: "E4"} The accepted values at organizations/foo are E1, E2. The accepted values at projects/bar are E3, and E4.

    Example 2 (inherited values): organizations/foo has a Policy with values: {allowed_values: "E1" allowed_values:"E2"} projects/bar has a Policy with values: {value: "E3" value: "E4" inherit_from_parent: true} The accepted values at organizations/foo are E1, E2. The accepted values at projects/bar are E1, E2, E3, and E4.

    Example 3 (inheriting both allowed and denied values): organizations/foo has a Policy with values: {allowed_values: "E1" allowed_values: "E2"} projects/bar has a Policy with: {denied_values: "E1"} The accepted values at organizations/foo are E1, E2. The value accepted at projects/bar is E2.

    Example 4 (RestoreDefault): organizations/foo has a Policy with values: {allowed_values: "E1" allowed_values:"E2"} projects/bar has a Policy with values: {RestoreDefault: \{}} The accepted values at organizations/foo are E1, E2. The accepted values at projects/bar are either all or none depending on the value of constraint_default (if ALLOW, all; if DENY, none).

    Example 5 (no policy inherits parent policy): organizations/foo has no Policy set. projects/bar has no Policy set. The accepted values at both levels are either all or none depending on the value of constraint_default (if ALLOW, all; if DENY, none).

    Example 6 (ListConstraint allowing all): organizations/foo has a Policy with values: {allowed_values: "E1" allowed_values: "E2"} projects/bar has a Policy with: {all: ALLOW} The accepted values at organizations/foo are E1, E2. Any value is accepted atprojects/bar`.

    Example 7 (ListConstraint allowing none): organizations/foo has a Policy with values: {allowed_values: "E1" allowed_values: "E2"} projects/bar has a Policy with: {all: DENY} The accepted values at organizations/foo are E1, E2. No value is accepted atprojects/bar`.

    Example 10 (allowed and denied subtrees of Resource Manager hierarchy): Given the following resource hierarchy O1->{F1, F2}; F1->{P1}; F2->{P2, P3}, organizations/foo has a Policy with values: {allowed_values: "under:organizations/O1"} projects/bar has a Policy with: {allowed_values: "under:projects/P3"} {denied_values: "under:folders/F2"} The accepted values at organizations/foo are organizations/O1, folders/F1, folders/F2, projects/P1, projects/P2, projects/P3. The accepted values at projects/bar are organizations/O1, folders/F1, projects/P1.



209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
# File 'proto_docs/google/cloud/orgpolicy/v1/orgpolicy.rb', line 209

class ListPolicy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # This enum can be used to set `Policies` that apply to all possible
  # configuration values rather than specific values in `allowed_values` or
  # `denied_values`.
  #
  # Settting this to `ALLOW` will mean this `Policy` allows all values.
  # Similarly, setting it to `DENY` will mean no values are allowed. If
  # set to either `ALLOW` or `DENY,  `allowed_values` and `denied_values`
  # must be unset. Setting this to `ALL_VALUES_UNSPECIFIED` allows for
  # setting `allowed_values` and `denied_values`.
  module AllValues
    # Indicates that allowed_values or denied_values must be set.
    ALL_VALUES_UNSPECIFIED = 0

    # A policy with this set allows all values.
    ALLOW = 1

    # A policy with this set denies all values.
    DENY = 2
  end
end

#suggested_value::String

Returns Optional. The Google Cloud Console will try to default to a configuration that matches the value specified in this Policy. If suggested_value is not set, it will inherit the value specified higher in the hierarchy, unless inherit_from_parent is false.

Returns:

  • (::String)

    Optional. The Google Cloud Console will try to default to a configuration that matches the value specified in this Policy. If suggested_value is not set, it will inherit the value specified higher in the hierarchy, unless inherit_from_parent is false.



209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
# File 'proto_docs/google/cloud/orgpolicy/v1/orgpolicy.rb', line 209

class ListPolicy
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # This enum can be used to set `Policies` that apply to all possible
  # configuration values rather than specific values in `allowed_values` or
  # `denied_values`.
  #
  # Settting this to `ALLOW` will mean this `Policy` allows all values.
  # Similarly, setting it to `DENY` will mean no values are allowed. If
  # set to either `ALLOW` or `DENY,  `allowed_values` and `denied_values`
  # must be unset. Setting this to `ALL_VALUES_UNSPECIFIED` allows for
  # setting `allowed_values` and `denied_values`.
  module AllValues
    # Indicates that allowed_values or denied_values must be set.
    ALL_VALUES_UNSPECIFIED = 0

    # A policy with this set allows all values.
    ALLOW = 1

    # A policy with this set denies all values.
    DENY = 2
  end
end