Skip to content

Latest commit

 

History

History
48 lines (31 loc) · 1.74 KB

google_compute_subnetwork_iam_policy.md

File metadata and controls

48 lines (31 loc) · 1.74 KB
title platform
About the google_compute_subnetwork_iam_policy resource
gcp

Syntax

A google_compute_subnetwork_iam_policy is used to test a Google Subnetwork Iam Policy resource

Examples

describe google_compute_subnetwork_iam_policy(project: "project", region: "region", name: "name") do
  it { should exist }
end

google_compute_subnetwork_iam_policy(project: "project", region: "region", name: "name").bindings.each do |binding|
  describe binding do
    its('role') { should eq 'roles/editor'}
    its('members') { should include 'user:[email protected]'}
  end
end

Properties

Properties that can be accessed from the google_compute_subnetwork_iam_policy resource:

  • iam_binding_roles: The list of roles that exist on the policy.

  • bindings: Associates a list of members to a role.

    • role: Role that is assigned to members. For example, roles/viewer, roles/editor, or roles/owner.

    • members: Specifies the identities requesting access for a Cloud Platform resource.

  • audit_configs: Specifies cloud audit logging configuration for this policy.

    • service: Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.

    • audit_log_configs: The configuration for logging of each type of permission.

      • log_type: The log type that this config enables. For example, ADMIN_READ, DATA_WRITE or DATA_READ

      • exempted_members: Specifies the identities that do not cause logging for this type of permission.

GCP Permissions

Ensure the Compute Engine API is enabled for the current project.