Skip to content

Commit 579c138

Browse files
feat(admin): update the api
#### admin:directory_v1 The following keys were added: - schemas.RoleAssignment.properties.condition.type (Total Keys: 1)
1 parent 52ab819 commit 579c138

File tree

2 files changed

+9
-1
lines changed

2 files changed

+9
-1
lines changed

docs/dyn/admin_directory_v1.roleAssignments.html

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,6 +130,7 @@ <h3>Method Details</h3>
130130
{ # Defines an assignment of a role.
131131
&quot;assignedTo&quot;: &quot;A String&quot;, # The unique ID of the entity this role is assigned to—either the `user_id` of a user, the `group_id` of a group, or the `uniqueId` of a service account as defined in [Identity and Access Management (IAM)](https://cloud.google.com/iam/docs/reference/rest/v1/projects.serviceAccounts).
132132
&quot;assigneeType&quot;: &quot;A String&quot;, # Output only. The type of the assignee (`USER` or `GROUP`).
133+
&quot;condition&quot;: &quot;A String&quot;, # Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use the feature. The condition associated with this role assignment. A `RoleAssignment` with the `condition` field set will only take effect when the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`) is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are supported: - To make the `RoleAssignment` only applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `api.getAttribute(&#x27;cloudidentity.googleapis.com/groups.labels&#x27;, []).hasAny([&#x27;groups.security&#x27;]) &amp;&amp; resource.type == &#x27;cloudidentity.googleapis.com/Group&#x27;` - To make the `RoleAssignment` not applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute(&#x27;cloudidentity.googleapis.com/groups.labels&#x27;, []).hasAny([&#x27;groups.security&#x27;]) &amp;&amp; resource.type == &#x27;cloudidentity.googleapis.com/Group&#x27;` Currently, the two condition strings have to be verbatim and they only work with the following [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor - Groups Reader The condition follows [Cloud IAM condition syntax](https://cloud.google.com/iam/docs/conditions-overview).
133134
&quot;etag&quot;: &quot;A String&quot;, # ETag of the resource.
134135
&quot;kind&quot;: &quot;admin#directory#roleAssignment&quot;, # The type of the API resource. This is always `admin#directory#roleAssignment`.
135136
&quot;orgUnitId&quot;: &quot;A String&quot;, # If the role is restricted to an organization unit, this contains the ID for the organization unit the exercise of this role is restricted to.
@@ -151,6 +152,7 @@ <h3>Method Details</h3>
151152
{ # Defines an assignment of a role.
152153
&quot;assignedTo&quot;: &quot;A String&quot;, # The unique ID of the entity this role is assigned to—either the `user_id` of a user, the `group_id` of a group, or the `uniqueId` of a service account as defined in [Identity and Access Management (IAM)](https://cloud.google.com/iam/docs/reference/rest/v1/projects.serviceAccounts).
153154
&quot;assigneeType&quot;: &quot;A String&quot;, # Output only. The type of the assignee (`USER` or `GROUP`).
155+
&quot;condition&quot;: &quot;A String&quot;, # Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use the feature. The condition associated with this role assignment. A `RoleAssignment` with the `condition` field set will only take effect when the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`) is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are supported: - To make the `RoleAssignment` only applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `api.getAttribute(&#x27;cloudidentity.googleapis.com/groups.labels&#x27;, []).hasAny([&#x27;groups.security&#x27;]) &amp;&amp; resource.type == &#x27;cloudidentity.googleapis.com/Group&#x27;` - To make the `RoleAssignment` not applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute(&#x27;cloudidentity.googleapis.com/groups.labels&#x27;, []).hasAny([&#x27;groups.security&#x27;]) &amp;&amp; resource.type == &#x27;cloudidentity.googleapis.com/Group&#x27;` Currently, the two condition strings have to be verbatim and they only work with the following [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor - Groups Reader The condition follows [Cloud IAM condition syntax](https://cloud.google.com/iam/docs/conditions-overview).
154156
&quot;etag&quot;: &quot;A String&quot;, # ETag of the resource.
155157
&quot;kind&quot;: &quot;admin#directory#roleAssignment&quot;, # The type of the API resource. This is always `admin#directory#roleAssignment`.
156158
&quot;orgUnitId&quot;: &quot;A String&quot;, # If the role is restricted to an organization unit, this contains the ID for the organization unit the exercise of this role is restricted to.
@@ -170,6 +172,7 @@ <h3>Method Details</h3>
170172
{ # Defines an assignment of a role.
171173
&quot;assignedTo&quot;: &quot;A String&quot;, # The unique ID of the entity this role is assigned to—either the `user_id` of a user, the `group_id` of a group, or the `uniqueId` of a service account as defined in [Identity and Access Management (IAM)](https://cloud.google.com/iam/docs/reference/rest/v1/projects.serviceAccounts).
172174
&quot;assigneeType&quot;: &quot;A String&quot;, # Output only. The type of the assignee (`USER` or `GROUP`).
175+
&quot;condition&quot;: &quot;A String&quot;, # Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use the feature. The condition associated with this role assignment. A `RoleAssignment` with the `condition` field set will only take effect when the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`) is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are supported: - To make the `RoleAssignment` only applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `api.getAttribute(&#x27;cloudidentity.googleapis.com/groups.labels&#x27;, []).hasAny([&#x27;groups.security&#x27;]) &amp;&amp; resource.type == &#x27;cloudidentity.googleapis.com/Group&#x27;` - To make the `RoleAssignment` not applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute(&#x27;cloudidentity.googleapis.com/groups.labels&#x27;, []).hasAny([&#x27;groups.security&#x27;]) &amp;&amp; resource.type == &#x27;cloudidentity.googleapis.com/Group&#x27;` Currently, the two condition strings have to be verbatim and they only work with the following [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor - Groups Reader The condition follows [Cloud IAM condition syntax](https://cloud.google.com/iam/docs/conditions-overview).
173176
&quot;etag&quot;: &quot;A String&quot;, # ETag of the resource.
174177
&quot;kind&quot;: &quot;admin#directory#roleAssignment&quot;, # The type of the API resource. This is always `admin#directory#roleAssignment`.
175178
&quot;orgUnitId&quot;: &quot;A String&quot;, # If the role is restricted to an organization unit, this contains the ID for the organization unit the exercise of this role is restricted to.
@@ -204,6 +207,7 @@ <h3>Method Details</h3>
204207
{ # Defines an assignment of a role.
205208
&quot;assignedTo&quot;: &quot;A String&quot;, # The unique ID of the entity this role is assigned to—either the `user_id` of a user, the `group_id` of a group, or the `uniqueId` of a service account as defined in [Identity and Access Management (IAM)](https://cloud.google.com/iam/docs/reference/rest/v1/projects.serviceAccounts).
206209
&quot;assigneeType&quot;: &quot;A String&quot;, # Output only. The type of the assignee (`USER` or `GROUP`).
210+
&quot;condition&quot;: &quot;A String&quot;, # Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use the feature. The condition associated with this role assignment. A `RoleAssignment` with the `condition` field set will only take effect when the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`) is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are supported: - To make the `RoleAssignment` only applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `api.getAttribute(&#x27;cloudidentity.googleapis.com/groups.labels&#x27;, []).hasAny([&#x27;groups.security&#x27;]) &amp;&amp; resource.type == &#x27;cloudidentity.googleapis.com/Group&#x27;` - To make the `RoleAssignment` not applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute(&#x27;cloudidentity.googleapis.com/groups.labels&#x27;, []).hasAny([&#x27;groups.security&#x27;]) &amp;&amp; resource.type == &#x27;cloudidentity.googleapis.com/Group&#x27;` Currently, the two condition strings have to be verbatim and they only work with the following [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor - Groups Reader The condition follows [Cloud IAM condition syntax](https://cloud.google.com/iam/docs/conditions-overview).
207211
&quot;etag&quot;: &quot;A String&quot;, # ETag of the resource.
208212
&quot;kind&quot;: &quot;admin#directory#roleAssignment&quot;, # The type of the API resource. This is always `admin#directory#roleAssignment`.
209213
&quot;orgUnitId&quot;: &quot;A String&quot;, # If the role is restricted to an organization unit, this contains the ID for the organization unit the exercise of this role is restricted to.

googleapiclient/discovery_cache/documents/admin.directory_v1.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4671,7 +4671,7 @@
46714671
}
46724672
}
46734673
},
4674-
"revision": "20241113",
4674+
"revision": "20241126",
46754675
"rootUrl": "https://admin.googleapis.com/",
46764676
"schemas": {
46774677
"Alias": {
@@ -7493,6 +7493,10 @@ false
74937493
"readOnly": true,
74947494
"type": "string"
74957495
},
7496+
"condition": {
7497+
"description": "Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use the feature. The condition associated with this role assignment. A `RoleAssignment` with the `condition` field set will only take effect when the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`) is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are supported: - To make the `RoleAssignment` only applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'` Currently, the two condition strings have to be verbatim and they only work with the following [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor - Groups Reader The condition follows [Cloud IAM condition syntax](https://cloud.google.com/iam/docs/conditions-overview).",
7498+
"type": "string"
7499+
},
74967500
"etag": {
74977501
"description": "ETag of the resource.",
74987502
"type": "string"

0 commit comments

Comments
 (0)