All Downloads are FREE. Search and download functionalities are using the official Maven repository.

scala.googleapis.storage.PolicyBinding.scala Maven / Gradle / Ivy

The newest version!
package googleapis.storage

import io.circe._
import io.circe.syntax._

final case class PolicyBinding(
    /** The condition that is associated with this binding. NOTE: an unsatisfied condition will not allow user access via current binding. Different bindings, including their conditions, are examined independently.
      */
    condition: Option[Expr] = None,
    /** A collection of identifiers for members who may assume the provided role. Recognized identifiers are as follows:
      * - allUsers — A special identifier that represents anyone on the internet; with or without a Google account.
      * - allAuthenticatedUsers — A special identifier that represents anyone who is authenticated with a Google account or a service account.
      * - user:emailid — An email address that represents a specific account. For example, user:[email protected] or user:[email protected].
      * - serviceAccount:emailid — An email address that represents a service account. For example,  serviceAccount:[email protected] .
      * - group:emailid — An email address that represents a Google group. For example, group:[email protected].
      * - domain:domain — A Google Apps domain name that represents all the users of that domain. For example, domain:google.com or domain:example.com.
      * - projectOwner:projectid — Owners of the given project. For example, projectOwner:my-example-project
      * - projectEditor:projectid — Editors of the given project. For example, projectEditor:my-example-project
      * - projectViewer:projectid — Viewers of the given project. For example, projectViewer:my-example-project
      */
    members: Option[List[String]] = None,
    /** The role to which members belong. Two types of roles are supported: new IAM roles, which grant permissions that do not map directly to those provided by ACLs, and legacy IAM roles, which do map directly to ACL permissions. All roles are of the format roles/storage.specificRole.
      * The new IAM roles are:
      * - roles/storage.admin — Full control of Google Cloud Storage resources.
      * - roles/storage.objectViewer — Read-Only access to Google Cloud Storage objects.
      * - roles/storage.objectCreator — Access to create objects in Google Cloud Storage.
      * - roles/storage.objectAdmin — Full control of Google Cloud Storage objects.   The legacy IAM roles are:
      * - roles/storage.legacyObjectReader — Read-only access to objects without listing. Equivalent to an ACL entry on an object with the READER role.
      * - roles/storage.legacyObjectOwner — Read/write access to existing objects without listing. Equivalent to an ACL entry on an object with the OWNER role.
      * - roles/storage.legacyBucketReader — Read access to buckets with object listing. Equivalent to an ACL entry on a bucket with the READER role.
      * - roles/storage.legacyBucketWriter — Read access to buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the WRITER role.
      * - roles/storage.legacyBucketOwner — Read and write access to existing buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the OWNER role.
      */
    role: Option[String] = None,
)
object PolicyBinding {
  implicit val encoder: Encoder[PolicyBinding] = Encoder.instance { x =>
    Json.obj(
      "condition" := x.condition,
      "members" := x.members,
      "role" := x.role,
    )
  }
  implicit val decoder: Decoder[PolicyBinding] = Decoder.instance { c =>
    for {
      v0 <- c.get[Option[Expr]]("condition")
      v1 <- c.get[Option[List[String]]]("members")
      v2 <- c.get[Option[String]]("role")
    } yield PolicyBinding(v0, v1, v2)
  }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy