google_kms_crypto_key_iam_policy resource
Syntax
A google_kms_crypto_key_iam_policy
is used to test a Google CryptoKey Iam Policy resource
Examples
describe google_kms_crypto_key_iam_policy(project: "project", location: "location", key_ring_name: "key_ring_name", crypto_key_name: "crypto_key_name") do
it { should exist }
end
google_kms_crypto_key_iam_policy(project: "project", location: "location", key_ring_name: "key_ring_name", crypto_key_name: "crypto_key_name").bindings.each do |binding|
describe binding do
its('role') { should eq 'roles/editor'}
its('members') { should include 'user:[email protected]'}
end
end
Properties
Properties that can be accessed from the google_kms_crypto_key_iam_policy
resource:
iam_binding_roles
- The list of roles that exist on the policy.
bindings
- Associates a list of members to a role.
role
- Role that is assigned to members. For example, roles/viewer, roles/editor, or roles/owner.
members
- Specifies the identities requesting access for a Cloud Platform resource.
audit_configs
- Specifies cloud audit logging configuration for this policy.
service
- Specifies a service that will be enabled for audit logging. For example,
storage.googleapis.com
,cloudsql.googleapis.com
.allServices
is a special value that covers all services. audit_log_configs
- The configuration for logging of each type of permission.
log_type
- The log type that this config enables. For example, ADMIN_READ, DATA_WRITE or DATA_READ
exempted_members
- Specifies the identities that do not cause logging for this type of permission.
GCP Permissions
Ensure the Cloud Key Management Service (KMS) API is enabled for the current project.