16
16
from collections import OrderedDict
17
17
import functools
18
18
import re
19
- from typing import Dict , Optional , Sequence , Tuple , Type , Union
19
+ from typing import Dict , Mapping , Optional , Sequence , Tuple , Type , Union
20
20
import pkg_resources
21
21
22
22
from google .api_core .client_options import ClientOptions
@@ -241,7 +241,7 @@ async def create_instance(
241
241
parent : str = None ,
242
242
instance_id : str = None ,
243
243
instance : gba_instance .Instance = None ,
244
- clusters : Dict [str , gba_instance .Cluster ] = None ,
244
+ clusters : Mapping [str , gba_instance .Cluster ] = None ,
245
245
retry : OptionalRetry = gapic_v1 .method .DEFAULT ,
246
246
timeout : float = None ,
247
247
metadata : Sequence [Tuple [str , str ]] = (),
@@ -281,7 +281,7 @@ async def create_instance(
281
281
This corresponds to the ``instance`` field
282
282
on the ``request`` instance; if ``request`` is provided, this
283
283
should not be set.
284
- clusters (Dict [str, gba_instance. Cluster]):
284
+ clusters (:class:`Mapping [str, google.cloud.bigtable_admin_v2.types. Cluster]` ):
285
285
Required. The clusters to be created within the
286
286
instance, mapped by desired cluster ID, e.g., just
287
287
``mycluster`` rather than
@@ -1872,21 +1872,26 @@ async def get_iam_policy(
1872
1872
1873
1873
Returns:
1874
1874
google.iam.v1.policy_pb2.Policy:
1875
- Defines an Identity and Access Management (IAM) policy. It is used to
1876
- specify access control policies for Cloud Platform
1877
- resources.
1875
+ An Identity and Access Management (IAM) policy, which specifies access
1876
+ controls for Google Cloud resources.
1878
1877
1879
1878
A Policy is a collection of bindings. A binding binds
1880
- one or more members to a single role. Members can be
1881
- user accounts, service accounts, Google groups, and
1882
- domains (such as G Suite). A role is a named list of
1883
- permissions (defined by IAM or configured by users).
1884
- A binding can optionally specify a condition, which
1885
- is a logic expression that further constrains the
1886
- role binding based on attributes about the request
1887
- and/or target resource.
1888
-
1889
- **JSON Example**
1879
+ one or more members, or principals, to a single role.
1880
+ Principals can be user accounts, service accounts,
1881
+ Google groups, and domains (such as G Suite). A role
1882
+ is a named list of permissions; each role can be an
1883
+ IAM predefined role or a user-created custom role.
1884
+
1885
+ For some types of Google Cloud resources, a binding
1886
+ can also specify a condition, which is a logical
1887
+ expression that allows access to a resource only if
1888
+ the expression evaluates to true. A condition can add
1889
+ constraints based on attributes of the request, the
1890
+ resource, or both. To learn which resources support
1891
+ conditions in their IAM policies, see the [IAM
1892
+ documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies).
1893
+
1894
+ **JSON example:**
1890
1895
1891
1896
{
1892
1897
"bindings": [
@@ -1901,17 +1906,17 @@ async def get_iam_policy(
1901
1906
1902
1907
}, { "role":
1903
1908
"roles/resourcemanager.organizationViewer",
1904
- "members": ["user:[email protected] "],
1909
+ "members": [ "user:[email protected] " ],
1905
1910
"condition": { "title": "expirable access",
1906
1911
"description": "Does not grant access after
1907
1912
Sep 2020", "expression": "request.time <
1908
1913
timestamp('2020-10-01T00:00:00.000Z')", } }
1909
1914
1910
- ]
1915
+ ], "etag": "BwWWja0YfJA=", "version": 3
1911
1916
1912
1917
}
1913
1918
1914
- **YAML Example **
1919
+ **YAML example: **
1915
1920
1916
1921
bindings: - members: - user:\ [email protected] -
1917
1922
group:\ [email protected] - domain:google.com -
@@ -1922,11 +1927,12 @@ async def get_iam_policy(
1922
1927
condition: title: expirable access description:
1923
1928
Does not grant access after Sep 2020 expression:
1924
1929
request.time <
1925
- timestamp('2020-10-01T00:00:00.000Z')
1930
+ timestamp('2020-10-01T00:00:00.000Z') etag:
1931
+ BwWWja0YfJA= version: 3
1926
1932
1927
1933
For a description of IAM and its features, see the
1928
- [IAM developer's
1929
- guide ](\ https://cloud.google.com/iam/docs).
1934
+ [IAM
1935
+ documentation ](\ https://cloud.google.com/iam/docs/ ).
1930
1936
1931
1937
"""
1932
1938
# Create or coerce a protobuf request object.
@@ -2016,21 +2022,26 @@ async def set_iam_policy(
2016
2022
2017
2023
Returns:
2018
2024
google.iam.v1.policy_pb2.Policy:
2019
- Defines an Identity and Access Management (IAM) policy. It is used to
2020
- specify access control policies for Cloud Platform
2021
- resources.
2025
+ An Identity and Access Management (IAM) policy, which specifies access
2026
+ controls for Google Cloud resources.
2022
2027
2023
2028
A Policy is a collection of bindings. A binding binds
2024
- one or more members to a single role. Members can be
2025
- user accounts, service accounts, Google groups, and
2026
- domains (such as G Suite). A role is a named list of
2027
- permissions (defined by IAM or configured by users).
2028
- A binding can optionally specify a condition, which
2029
- is a logic expression that further constrains the
2030
- role binding based on attributes about the request
2031
- and/or target resource.
2032
-
2033
- **JSON Example**
2029
+ one or more members, or principals, to a single role.
2030
+ Principals can be user accounts, service accounts,
2031
+ Google groups, and domains (such as G Suite). A role
2032
+ is a named list of permissions; each role can be an
2033
+ IAM predefined role or a user-created custom role.
2034
+
2035
+ For some types of Google Cloud resources, a binding
2036
+ can also specify a condition, which is a logical
2037
+ expression that allows access to a resource only if
2038
+ the expression evaluates to true. A condition can add
2039
+ constraints based on attributes of the request, the
2040
+ resource, or both. To learn which resources support
2041
+ conditions in their IAM policies, see the [IAM
2042
+ documentation](\ https://cloud.google.com/iam/help/conditions/resource-policies).
2043
+
2044
+ **JSON example:**
2034
2045
2035
2046
{
2036
2047
"bindings": [
@@ -2045,17 +2056,17 @@ async def set_iam_policy(
2045
2056
2046
2057
}, { "role":
2047
2058
"roles/resourcemanager.organizationViewer",
2048
- "members": ["user:[email protected] "],
2059
+ "members": [ "user:[email protected] " ],
2049
2060
"condition": { "title": "expirable access",
2050
2061
"description": "Does not grant access after
2051
2062
Sep 2020", "expression": "request.time <
2052
2063
timestamp('2020-10-01T00:00:00.000Z')", } }
2053
2064
2054
- ]
2065
+ ], "etag": "BwWWja0YfJA=", "version": 3
2055
2066
2056
2067
}
2057
2068
2058
- **YAML Example **
2069
+ **YAML example: **
2059
2070
2060
2071
bindings: - members: - user:\ [email protected] -
2061
2072
group:\ [email protected] - domain:google.com -
@@ -2066,11 +2077,12 @@ async def set_iam_policy(
2066
2077
condition: title: expirable access description:
2067
2078
Does not grant access after Sep 2020 expression:
2068
2079
request.time <
2069
- timestamp('2020-10-01T00:00:00.000Z')
2080
+ timestamp('2020-10-01T00:00:00.000Z') etag:
2081
+ BwWWja0YfJA= version: 3
2070
2082
2071
2083
For a description of IAM and its features, see the
2072
- [IAM developer's
2073
- guide ](\ https://cloud.google.com/iam/docs).
2084
+ [IAM
2085
+ documentation ](\ https://cloud.google.com/iam/docs/ ).
2074
2086
2075
2087
"""
2076
2088
# Create or coerce a protobuf request object.
0 commit comments