CreateBucketIamPolicy​Create​Bucket​Iam​Policy

CreateBucketIamPolicy CreateBucketIamPolicy

yaml
type: "io.kestra.plugin.gcp.gcs.CreateBucketIamPolicy"

Add role on an existing bucket.

Examples

Add role to a service account on a bucket

yaml
id: gcp_gcs_create_bucket_iam_policy
namespace: company.team

tasks:
  - id: create_bucket_iam_policy
    type: io.kestra.plugin.gcp.gcs.CreateBucketIamPolicy
    name: "my-bucket"
    member: "[email protected]"
    role: "roles/storage.admin"

Properties

member

  • Type: string
  • Dynamic: ✔️
  • Required: ✔️

Bucket's unique name

name

  • Type: string
  • Dynamic: ✔️
  • Required: ✔️

Bucket's unique name

role

  • Type: string
  • Dynamic: ✔️
  • Required: ✔️

Bucket's unique name

ifExists

  • Type: string
  • Dynamic:
  • Required:
  • Default: SKIP
  • Possible Values:
    • ERROR
    • SKIP

Policy to apply if a policy already exists.

impersonatedServiceAccount

  • Type: string
  • Dynamic: ✔️
  • Required:

The GCP service account to impersonate.

projectId

  • Type: string
  • Dynamic: ✔️
  • Required:

The GCP project ID.

scopes

  • Type: array
  • SubType: string
  • Dynamic: ✔️
  • Required:
  • Default: [https://www.googleapis.com/auth/cloud-platform]

The GCP scopes to be used.

serviceAccount

  • Type: string
  • Dynamic: ✔️
  • Required:

The GCP service account.

Outputs

bucket

  • Type: string
  • Required:

The bucket uri

created

  • Type: boolean
  • Required:

If the binding was added, or already exist

member

  • Type: string
  • Required:

The bucket uri

role

  • Type: string
  • Required:

The bucket uri

Was this page helpful?