CreateBucketIamPolicy
CreateBucketIamPolicy
yaml
type: "io.kestra.plugin.gcp.gcs.CreateBucketIamPolicy"
Add role on an existing bucket.
Examples
Add role to a service account on a bucket
yaml
id: gcp_gcs_create_bucket_iam_policy
namespace: company.team
tasks:
- id: create_bucket_iam_policy
type: io.kestra.plugin.gcp.gcs.CreateBucketIamPolicy
name: "my-bucket"
member: "[email protected]"
role: "roles/storage.admin"
Properties
member
- Type: string
- Dynamic: ✔️
- Required: ✔️
Bucket's unique name
name
- Type: string
- Dynamic: ✔️
- Required: ✔️
Bucket's unique name
role
- Type: string
- Dynamic: ✔️
- Required: ✔️
Bucket's unique name
ifExists
- Type: string
- Dynamic: ❓
- Required: ❌
- Default:
SKIP
- Possible Values:
ERROR
SKIP
Policy to apply if a policy already exists.
impersonatedServiceAccount
- Type: string
- Dynamic: ✔️
- Required: ❌
The GCP service account to impersonate.
projectId
- Type: string
- Dynamic: ✔️
- Required: ❌
The GCP project ID.
scopes
- Type: array
- SubType: string
- Dynamic: ✔️
- Required: ❌
- Default:
[https://www.googleapis.com/auth/cloud-platform]
The GCP scopes to be used.
serviceAccount
- Type: string
- Dynamic: ✔️
- Required: ❌
The GCP service account.
Outputs
bucket
- Type: string
- Required: ❌
The bucket uri
created
- Type: boolean
- Required: ❌
If the binding was added, or already exist
member
- Type: string
- Required: ❌
The bucket uri
role
- Type: string
- Required: ❌
The bucket uri
Was this page helpful?