Class: Google::Cloud::Bigquery::Dataset::Access
- Inherits:
-
Object
- Object
- Google::Cloud::Bigquery::Dataset::Access
- Defined in:
- lib/google/cloud/bigquery/dataset/access.rb
Overview
Dataset Access Control
Represents the access control rules for a Google::Cloud::Bigquery::Dataset.
Instance Method Summary collapse
-
#add_owner_domain(domain) ⇒ Object
Add owner access to a domain.
-
#add_owner_group(email) ⇒ Object
Add owner access to a group.
-
#add_owner_iam_member(identity) ⇒ Object
Add owner access to some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
-
#add_owner_special(group) ⇒ Object
Add owner access to a special group.
-
#add_owner_user(email) ⇒ Object
Add owner access to a user.
-
#add_reader_domain(domain) ⇒ Object
Add reader access to a domain.
-
#add_reader_group(email) ⇒ Object
Add reader access to a group.
-
#add_reader_iam_member(identity) ⇒ Object
Add reader access to some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
-
#add_reader_routine(routine) ⇒ Object
Add access to a routine from a different dataset.
-
#add_reader_special(group) ⇒ Object
Add reader access to a special group.
-
#add_reader_user(email) ⇒ Object
Add reader access to a user.
-
#add_reader_view(view) ⇒ Object
Add reader access to a view.
-
#add_writer_domain(domain) ⇒ Object
Add writer access to a domain.
-
#add_writer_group(email) ⇒ Object
Add writer access to a group.
-
#add_writer_iam_member(identity) ⇒ Object
Add writer access to some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
-
#add_writer_special(group) ⇒ Object
Add writer access to a special group.
-
#add_writer_user(email) ⇒ Object
Add writer access to a user.
-
#owner_domain?(domain) ⇒ Boolean
Checks owner access for a domain.
-
#owner_group?(email) ⇒ Boolean
Checks owner access for a group.
-
#owner_iam_member?(identity) ⇒ Boolean
Checks owner access for some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
-
#owner_special?(group) ⇒ Boolean
Checks owner access for a special group.
-
#owner_user?(email) ⇒ Boolean
Checks owner access for a user.
-
#reader_domain?(domain) ⇒ Boolean
Checks reader access for a domain.
-
#reader_group?(email) ⇒ Boolean
Checks reader access for a group.
-
#reader_iam_member?(identity) ⇒ Boolean
Checks reader access for some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
-
#reader_routine?(routine) ⇒ Boolean
Checks access for a routine from a different dataset.
-
#reader_special?(group) ⇒ Boolean
Checks reader access for a special group.
-
#reader_user?(email) ⇒ Boolean
Checks reader access for a user.
-
#reader_view?(view) ⇒ Boolean
Checks reader access for a view.
-
#remove_owner_domain(domain) ⇒ Object
Remove owner access from a domain.
-
#remove_owner_group(email) ⇒ Object
Remove owner access from a group.
-
#remove_owner_iam_member(identity) ⇒ Object
Remove owner access from some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
-
#remove_owner_special(group) ⇒ Object
Remove owner access from a special group.
-
#remove_owner_user(email) ⇒ Object
Remove owner access from a user.
-
#remove_reader_domain(domain) ⇒ Object
Remove reader access from a domain.
-
#remove_reader_group(email) ⇒ Object
Remove reader access from a group.
-
#remove_reader_iam_member(identity) ⇒ Object
Remove reader access from some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
-
#remove_reader_routine(routine) ⇒ Object
Remove reader access from a routine from a different dataset.
-
#remove_reader_special(group) ⇒ Object
Remove reader access from a special group.
-
#remove_reader_user(email) ⇒ Object
Remove reader access from a user.
-
#remove_reader_view(view) ⇒ Object
Remove reader access from a view.
-
#remove_writer_domain(domain) ⇒ Object
Remove writer access from a domain.
-
#remove_writer_group(email) ⇒ Object
Remove writer access from a group.
-
#remove_writer_iam_member(identity) ⇒ Object
Remove writer access from some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
-
#remove_writer_special(group) ⇒ Object
Remove writer access from a special group.
-
#remove_writer_user(email) ⇒ Object
Remove writer access from a user.
-
#writer_domain?(domain) ⇒ Boolean
Checks writer access for a domain.
-
#writer_group?(email) ⇒ Boolean
Checks writer access for a group.
-
#writer_iam_member?(identity) ⇒ Boolean
Checks writer access for some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
-
#writer_special?(group) ⇒ Boolean
Checks writer access for a special group.
-
#writer_user?(email) ⇒ Boolean
Checks writer access for a user.
Instance Method Details
#add_owner_domain(domain) ⇒ Object
Add owner access to a domain.
442 443 444 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 442 def add_owner_domain domain add_access_role_scope_value :owner, :domain, domain end |
#add_owner_group(email) ⇒ Object
Add owner access to a group.
402 403 404 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 402 def add_owner_group email add_access_role_scope_value :owner, :group, email end |
#add_owner_iam_member(identity) ⇒ Object
Add owner access to some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
422 423 424 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 422 def add_owner_iam_member identity add_access_role_scope_value :owner, :iam_member, identity end |
#add_owner_special(group) ⇒ Object
Add owner access to a special group.
462 463 464 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 462 def add_owner_special group add_access_role_scope_value :owner, :special, group end |
#add_owner_user(email) ⇒ Object
Add owner access to a user.
383 384 385 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 383 def add_owner_user email add_access_role_scope_value :owner, :user, email end |
#add_reader_domain(domain) ⇒ Object
Add reader access to a domain.
192 193 194 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 192 def add_reader_domain domain add_access_role_scope_value :reader, :domain, domain end |
#add_reader_group(email) ⇒ Object
Add reader access to a group.
152 153 154 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 152 def add_reader_group email add_access_role_scope_value :reader, :group, email end |
#add_reader_iam_member(identity) ⇒ Object
Add reader access to some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
172 173 174 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 172 def add_reader_iam_member identity add_access_role_scope_value :reader, :iam_member, identity end |
#add_reader_routine(routine) ⇒ Object
Add access to a routine from a different dataset. Queries executed against that routine will have read access to views/tables/routines in this dataset. Only UDF is supported for now. The role field is not required when this field is set. If that routine is updated by any user, access to the routine needs to be granted again via an update operation.
239 240 241 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 239 def add_reader_routine routine add_access_routine routine end |
#add_reader_special(group) ⇒ Object
Add reader access to a special group.
212 213 214 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 212 def add_reader_special group add_access_role_scope_value :reader, :special, group end |
#add_reader_user(email) ⇒ Object
Add reader access to a user.
133 134 135 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 133 def add_reader_user email add_access_role_scope_value :reader, :user, email end |
#add_reader_view(view) ⇒ Object
Add reader access to a view.
266 267 268 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 266 def add_reader_view view add_access_view view end |
#add_writer_domain(domain) ⇒ Object
Add writer access to a domain.
344 345 346 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 344 def add_writer_domain domain add_access_role_scope_value :writer, :domain, domain end |
#add_writer_group(email) ⇒ Object
Add writer access to a group.
304 305 306 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 304 def add_writer_group email add_access_role_scope_value :writer, :group, email end |
#add_writer_iam_member(identity) ⇒ Object
Add writer access to some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
324 325 326 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 324 def add_writer_iam_member identity add_access_role_scope_value :writer, :iam_member, identity end |
#add_writer_special(group) ⇒ Object
Add writer access to a special group.
364 365 366 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 364 def add_writer_special group add_access_role_scope_value :writer, :special, group end |
#add_writer_user(email) ⇒ Object
Add writer access to a user.
285 286 287 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 285 def add_writer_user email add_access_role_scope_value :writer, :user, email end |
#owner_domain?(domain) ⇒ Boolean
Checks owner access for a domain.
1117 1118 1119 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 1117 def owner_domain? domain lookup_access_role_scope_value :owner, :domain, domain end |
#owner_group?(email) ⇒ Boolean
Checks owner access for a group.
1079 1080 1081 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 1079 def owner_group? email lookup_access_role_scope_value :owner, :group, email end |
#owner_iam_member?(identity) ⇒ Boolean
Checks owner access for some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
1098 1099 1100 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 1098 def owner_iam_member? identity lookup_access_role_scope_value :owner, :iam_member, identity end |
#owner_special?(group) ⇒ Boolean
Checks owner access for a special group.
1136 1137 1138 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 1136 def owner_special? group lookup_access_role_scope_value :owner, :special, group end |
#owner_user?(email) ⇒ Boolean
Checks owner access for a user.
1061 1062 1063 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 1061 def owner_user? email lookup_access_role_scope_value :owner, :user, email end |
#reader_domain?(domain) ⇒ Boolean
Checks reader access for a domain.
879 880 881 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 879 def reader_domain? domain lookup_access_role_scope_value :reader, :domain, domain end |
#reader_group?(email) ⇒ Boolean
Checks reader access for a group.
841 842 843 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 841 def reader_group? email lookup_access_role_scope_value :reader, :group, email end |
#reader_iam_member?(identity) ⇒ Boolean
Checks reader access for some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
860 861 862 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 860 def reader_iam_member? identity lookup_access_role_scope_value :reader, :iam_member, identity end |
#reader_routine?(routine) ⇒ Boolean
Checks access for a routine from a different dataset. Queries executed against that routine will have read access to views/tables/routines in this dataset. Only UDF is supported for now. The role field is not required when this field is set. If that routine is updated by any user, access to the routine needs to be granted again via an update operation.
924 925 926 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 924 def reader_routine? routine lookup_access_routine routine end |
#reader_special?(group) ⇒ Boolean
Checks reader access for a special group.
898 899 900 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 898 def reader_special? group lookup_access_role_scope_value :reader, :special, group end |
#reader_user?(email) ⇒ Boolean
Checks reader access for a user.
823 824 825 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 823 def reader_user? email lookup_access_role_scope_value :reader, :user, email end |
#reader_view?(view) ⇒ Boolean
Checks reader access for a view.
950 951 952 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 950 def reader_view? view lookup_access_view view end |
#remove_owner_domain(domain) ⇒ Object
Remove owner access from a domain.
785 786 787 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 785 def remove_owner_domain domain remove_access_role_scope_value :owner, :domain, domain end |
#remove_owner_group(email) ⇒ Object
Remove owner access from a group.
745 746 747 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 745 def remove_owner_group email remove_access_role_scope_value :owner, :group, email end |
#remove_owner_iam_member(identity) ⇒ Object
Remove owner access from some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
765 766 767 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 765 def remove_owner_iam_member identity remove_access_role_scope_value :owner, :iam_member, identity end |
#remove_owner_special(group) ⇒ Object
Remove owner access from a special group.
805 806 807 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 805 def remove_owner_special group remove_access_role_scope_value :owner, :special, group end |
#remove_owner_user(email) ⇒ Object
Remove owner access from a user.
726 727 728 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 726 def remove_owner_user email remove_access_role_scope_value :owner, :user, email end |
#remove_reader_domain(domain) ⇒ Object
Remove reader access from a domain.
540 541 542 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 540 def remove_reader_domain domain remove_access_role_scope_value :reader, :domain, domain end |
#remove_reader_group(email) ⇒ Object
Remove reader access from a group.
500 501 502 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 500 def remove_reader_group email remove_access_role_scope_value :reader, :group, email end |
#remove_reader_iam_member(identity) ⇒ Object
Remove reader access from some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
520 521 522 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 520 def remove_reader_iam_member identity remove_access_role_scope_value :reader, :iam_member, identity end |
#remove_reader_routine(routine) ⇒ Object
Remove reader access from a routine from a different dataset.
582 583 584 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 582 def remove_reader_routine routine remove_access_routine routine end |
#remove_reader_special(group) ⇒ Object
Remove reader access from a special group.
560 561 562 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 560 def remove_reader_special group remove_access_role_scope_value :reader, :special, group end |
#remove_reader_user(email) ⇒ Object
Remove reader access from a user.
481 482 483 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 481 def remove_reader_user email remove_access_role_scope_value :reader, :user, email end |
#remove_reader_view(view) ⇒ Object
Remove reader access from a view.
609 610 611 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 609 def remove_reader_view view remove_access_view view end |
#remove_writer_domain(domain) ⇒ Object
Remove writer access from a domain.
687 688 689 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 687 def remove_writer_domain domain remove_access_role_scope_value :writer, :domain, domain end |
#remove_writer_group(email) ⇒ Object
Remove writer access from a group.
647 648 649 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 647 def remove_writer_group email remove_access_role_scope_value :writer, :group, email end |
#remove_writer_iam_member(identity) ⇒ Object
Remove writer access from some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
667 668 669 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 667 def remove_writer_iam_member identity remove_access_role_scope_value :writer, :iam_member, identity end |
#remove_writer_special(group) ⇒ Object
Remove writer access from a special group.
707 708 709 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 707 def remove_writer_special group remove_access_role_scope_value :writer, :special, group end |
#remove_writer_user(email) ⇒ Object
Remove writer access from a user.
628 629 630 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 628 def remove_writer_user email remove_access_role_scope_value :writer, :user, email end |
#writer_domain?(domain) ⇒ Boolean
Checks writer access for a domain.
1024 1025 1026 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 1024 def writer_domain? domain lookup_access_role_scope_value :writer, :domain, domain end |
#writer_group?(email) ⇒ Boolean
Checks writer access for a group.
986 987 988 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 986 def writer_group? email lookup_access_role_scope_value :writer, :group, email end |
#writer_iam_member?(identity) ⇒ Boolean
Checks writer access for some other type of member that appears in the IAM Policy but isn't a user, group, domain, or special group.
1005 1006 1007 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 1005 def writer_iam_member? identity lookup_access_role_scope_value :writer, :iam_member, identity end |
#writer_special?(group) ⇒ Boolean
Checks writer access for a special group.
1043 1044 1045 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 1043 def writer_special? group lookup_access_role_scope_value :writer, :special, group end |
#writer_user?(email) ⇒ Boolean
Checks writer access for a user.
968 969 970 |
# File 'lib/google/cloud/bigquery/dataset/access.rb', line 968 def writer_user? email lookup_access_role_scope_value :writer, :user, email end |