database_roles_iam_policies
Creates, updates, deletes, gets or lists a database_roles_iam_policies
resource.
Overview
Name | database_roles_iam_policies |
Type | Resource |
Id | google.spanner.database_roles_iam_policies |
Fields
The following fields are returned by SELECT
queries:
SELECT
not supported for this resource, use SHOW METHODS
to view available operations for the resource.
Methods
The following methods are available for this resource:
Name | Accessible by | Required Params | Optional Params | Description |
---|---|---|---|---|
projects_instances_databases_database_roles_test_iam_permissions | exec | projectsId , instancesId , databasesId , databaseRolesId | Returns permissions that the caller has on the specified database or backup resource. Attempting this RPC on a non-existent Cloud Spanner database will result in a NOT_FOUND error if the user has spanner.databases.list permission on the containing Cloud Spanner instance. Otherwise returns an empty set of permissions. Calling this method on a backup that does not exist will result in a NOT_FOUND error if the user has spanner.backups.list permission on the containing instance. Calling this method on a backup schedule that does not exist will result in a NOT_FOUND error if the user has spanner.backupSchedules.list permission on the containing database. |
Parameters
Parameters can be passed in the WHERE
clause of a query. Check the Methods section to see which parameters are required or optional for each operation.
Name | Datatype | Description |
---|---|---|
databaseRolesId | string | |
databasesId | string | |
instancesId | string | |
projectsId | string |
Lifecycle Methods
- projects_instances_databases_database_roles_test_iam_permissions
Returns permissions that the caller has on the specified database or backup resource. Attempting this RPC on a non-existent Cloud Spanner database will result in a NOT_FOUND error if the user has spanner.databases.list
permission on the containing Cloud Spanner instance. Otherwise returns an empty set of permissions. Calling this method on a backup that does not exist will result in a NOT_FOUND error if the user has spanner.backups.list
permission on the containing instance. Calling this method on a backup schedule that does not exist will result in a NOT_FOUND error if the user has spanner.backupSchedules.list
permission on the containing database.
EXEC google.spanner.database_roles_iam_policies.projects_instances_databases_database_roles_test_iam_permissions
@projectsId='{{ projectsId }}' --required,
@instancesId='{{ instancesId }}' --required,
@databasesId='{{ databasesId }}' --required,
@databaseRolesId='{{ databaseRolesId }}' --required
@@json=
'{
"permissions": "{{ permissions }}"
}';