# -*- coding: utf-8 -*- # # Copyright 2019 Google LLC. All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. """Set IAM Policy.""" from __future__ import absolute_import from __future__ import division from __future__ import unicode_literals from googlecloudsdk.calliope import base from googlecloudsdk.command_lib.iap import util as iap_util @base.ReleaseTracks(base.ReleaseTrack.GA) @base.DefaultUniverseOnly class SetIamPolicy(base.Command): """Set the IAM policy for an IAP IAM resource. This command replaces the existing IAM policy for an IAP IAM resource, given a file encoded in JSON or YAML that contains the IAM policy. If the given policy file specifies an "etag" value, then the replacement will succeed only if the policy already in place matches that etag. (An etag obtained via $ {parent_command} get-iam-policy will prevent the replacement if the policy for the resource has been subsequently updated.) A policy file that does not contain an etag value will replace any existing policy for the resource. """ detailed_help = { 'EXAMPLES': """\ To set the IAM policy for the web accesses to the IAP protected resources within the active project, run: $ {command} POLICY_FILE To set the IAM policy for the web accesses to the IAP protected resources within a project, run: $ {command} POLICY_FILE --project=PROJECT_ID To set the IAM policy for the web accesses to the IAP protected resources within an App Engine application, run: $ {command} POLICY_FILE --resource-type=app-engine To set the IAM policy for the web accesses to the IAP protected resources within an App Engine service, run: $ {command} POLICY_FILE --resource-type=app-engine --service=SERVICE_ID To set the IAM policy for the web accesses to the IAP protected resources within an App Engine service version, run: $ {command} POLICY_FILE --resource-type=app-engine --service=SERVICE_ID --version=VERSION To set the IAM policy for the web accesses to the IAP protected resources within all backend services, run: $ {command} POLICY_FILE --resource-type=backend-services To set the IAM policy for the web accesses to the IAP protected resources within a backend service, run: $ {command} POLICY_FILE --resource-type=backend-services --service=SERVICE_ID To set the IAM policy for the web accesses to the IAP protected resources within a regional backend service, run: $ {command} POLICY_FILE --resource-type=backend-services --service=SERVICE_ID --region=REGION """, } _support_cloud_run = False @classmethod def Args(cls, parser): """Register flags for this command. Args: parser: An argparse.ArgumentParser-like object. It is mocked out in order to capture some information, but behaves like an ArgumentParser. """ iap_util.AddIapIamResourceArgs( parser, support_cloud_run=cls._support_cloud_run ) iap_util.AddIAMPolicyFileArg(parser) base.URI_FLAG.RemoveFromParser(parser) def Run(self, args): """This is what gets called when the user runs this command. Args: args: an argparse namespace. All the arguments that were provided to this command invocation. Returns: The specified function with its description and configured filter. """ iap_iam_ref = iap_util.ParseIapIamResource( self.ReleaseTrack(), args, self._support_cloud_run, ) return iap_iam_ref.SetIamPolicy(args.policy_file) @base.ReleaseTracks(base.ReleaseTrack.ALPHA, base.ReleaseTrack.BETA) class SetIamPolicyAlpha(SetIamPolicy): """Set the IAM policy for an IAP IAM resource. This command replaces the existing IAM policy for an IAP IAM resource, given a file encoded in JSON or YAML that contains the IAM policy. If the given policy file specifies an "etag" value, then the replacement will succeed only if the policy already in place matches that etag. (An etag obtained via $ {parent_command} get-iam-policy will prevent the replacement if the policy for the resource has been subsequently updated.) A policy file that does not contain an etag value will replace any existing policy for the resource. """ _support_cloud_run = True