- Resource: SavedQuery
- QueryContent
- IamPolicyAnalysisQuery
- ResourceSelector
- IdentitySelector
- AccessSelector
- Options
- ConditionContext
- Methods
Resource: SavedQuery
A saved query which can be shared with others or used later.
JSON representation |
---|
{
"name"
:
string
,
"description"
:
string
,
"createTime"
:
string
,
"creator"
:
string
,
"lastUpdateTime"
:
string
,
"lastUpdater"
:
string
,
"labels"
:
{
string
:
string
,
...
}
,
"content"
:
{
object (
|
name
string
The resource name of the saved query. The format must be:
- projects/projectNumber/savedQueries/savedQueryId
- folders/folder_number/savedQueries/savedQueryId
- organizations/organization_number/savedQueries/savedQueryId
description
string
The description of this saved query. This value should be fewer than 255 characters.
createTime
string (
Timestamp
format)
Output only. The create time of this saved query.
Uses RFC 3339, where generated output will always be Z-normalized and uses 0, 3, 6 or 9 fractional digits. Offsets other than "Z" are also accepted. Examples: "2014-10-02T15:01:23Z"
, "2014-10-02T15:01:23.045123456Z"
or "2014-10-02T15:01:23+05:30"
.
creator
string
Output only. The account's email address who has created this saved query.
lastUpdateTime
string (
Timestamp
format)
Output only. The last update time of this saved query.
Uses RFC 3339, where generated output will always be Z-normalized and uses 0, 3, 6 or 9 fractional digits. Offsets other than "Z" are also accepted. Examples: "2014-10-02T15:01:23Z"
, "2014-10-02T15:01:23.045123456Z"
or "2014-10-02T15:01:23+05:30"
.
lastUpdater
string
Output only. The account's email address who has updated this saved query most recently.
labels
map (key: string, value: string)
Labels applied on the resource. This value should not contain more than 10 entries. The key and value of each entry must be non-empty and fewer than 64 characters.
An object containing a list of "key": value
pairs. Example: { "name": "wrench", "mass": "1.3kg", "count": "3" }
.
content
object (
QueryContent
)
The query content.
QueryContent
The query content.
JSON representation |
---|
{ // Union field |
Union field query_content
.
query_content
can be only one of the following:
iamPolicyAnalysisQuery
object (
IamPolicyAnalysisQuery
)
An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy
RPC or the AssetService.AnalyzeIamPolicyLongrunning
RPC.
IamPolicyAnalysisQuery
IAM policy analysis query message.
JSON representation |
---|
{ "scope" : string , "resourceSelector" : { object ( |
Fields | |
---|---|
scope
|
Required. The relative name of the root asset. Only resources and IAM policies within the scope will be analyzed. This can only be an organization number (such as "organizations/123"), a folder number (such as "folders/123"), a project ID (such as "projects/my-project-id"), or a project number (such as "projects/12345"). To know how to get organization ID, visit here . To know how to get folder or project ID, visit here . |
resourceSelector
|
Optional. Specifies a resource for analysis. |
identitySelector
|
Optional. Specifies an identity for analysis. |
accessSelector
|
Optional. Specifies roles or permissions for analysis. This is optional. |
options
|
Optional. The query options. |
conditionContext
|
Optional. The hypothetical context for IAM conditions evaluation. |
ResourceSelector
Specifies the resource to analyze for access policies, which may be set directly on the resource, or on ancestors such as organizations, folders or projects.
JSON representation |
---|
{ "fullResourceName" : string } |
Fields | |
---|---|
fullResourceName
|
Required. The full resource name of a resource of supported resource types . |
IdentitySelector
Specifies an identity for which to determine resource access, based on roles assigned either directly to them or to the groups they belong to, directly or indirectly.
JSON representation |
---|
{ "identity" : string } |
Fields | |
---|---|
identity
|
Required. The identity appear in the form of principals in IAM policy binding . The examples of supported forms are: "user: mike@example.com" , "group: admins@example.com" , "domain:google.com", "serviceAccount: my-project-id@appspot.gserviceaccount.com" . Notice that wildcard characters (such as * and ?) are not supported. You must give a specific identity. |
AccessSelector
Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10.
JSON representation |
---|
{ "roles" : [ string ] , "permissions" : [ string ] } |
Fields | |
---|---|
roles[]
|
Optional. The roles to appear in result. |
permissions[]
|
Optional. The permissions to appear in result. |
Options
Contains query options.
JSON representation |
---|
{ "expandGroups" : boolean , "expandRoles" : boolean , "expandResources" : boolean , "outputResourceEdges" : boolean , "outputGroupEdges" : boolean , "analyzeServiceAccountImpersonation" : boolean } |
outputResourceEdges
boolean
Optional. If true, the result will output the relevant parent/child relationships between resources. Default is false.
outputGroupEdges
boolean
Optional. If true, the result will output the relevant membership relationships between groups and other groups, and between groups and principals. Default is false.
analyzeServiceAccountImpersonation
boolean
Optional. If true, the response will include access analysis from identities to resources via service account impersonation. This is a very expensive operation, because many derived queries will be executed. We highly recommend you use AssetService.AnalyzeIamPolicyLongrunning
RPC instead.
For example, if the request analyzes for which resources user A has permission P, and there's an IAM policy states user A has iam.serviceAccounts.getAccessToken permission to a service account SA, and there's another IAM policy states service account SA has permission P to a Google Cloud folder F, then user A potentially has access to the Google Cloud folder F. And those advanced analysis results will be included in AnalyzeIamPolicyResponse.service_account_impersonation_analysis
.
Another example, if the request analyzes for who has permission P to a Google Cloud folder F, and there's an IAM policy states user A has iam.serviceAccounts.actAs permission to a service account SA, and there's another IAM policy states service account SA has permission P to the Google Cloud folder F, then user A potentially has access to the Google Cloud folder F. And those advanced analysis results will be included in AnalyzeIamPolicyResponse.service_account_impersonation_analysis
.
Only the following permissions are considered in this analysis:
-
iam.serviceAccounts.actAs
-
iam.serviceAccounts.signBlob
-
iam.serviceAccounts.signJwt
-
iam.serviceAccounts.getAccessToken
-
iam.serviceAccounts.getOpenIdToken
-
iam.serviceAccounts.implicitDelegation
Default is false.
ConditionContext
The IAM conditions context.
JSON representation |
---|
{ // Union field |
TimeContext
. The IAM conditions time context. TimeContext
can be only one of the following:accessTime
string (
Timestamp
format)
The hypothetical access timestamp to evaluate IAM conditions. Note that this value must not be earlier than the current time; otherwise, an INVALID_ARGUMENT error will be returned.
Uses RFC 3339, where generated output will always be Z-normalized and uses 0, 3, 6 or 9 fractional digits. Offsets other than "Z" are also accepted. Examples: "2014-10-02T15:01:23Z"
, "2014-10-02T15:01:23.045123456Z"
or "2014-10-02T15:01:23+05:30"
.
Methods |
|
---|---|
|
Creates a saved query in a parent project/folder/organization. |
|
Deletes a saved query. |
|
Gets details about a saved query. |
|
Lists all saved queries in a parent project/folder/organization. |
|
Updates a saved query. |