@@ -47,23 +47,27 @@ public final class RoleAssignment extends com.google.api.client.json.GenericJson
4747 private java .lang .String assigneeType ;
4848
4949 /**
50- * Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace
51- * for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use
52- * the feature. The condition associated with this role assignment. A `RoleAssignment` with the
53- * `condition` field set will only take effect when the resource being accessed meets the
54- * condition. If `condition` is empty, the role (`role_id`) is applied to the actor
55- * (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are
56- * supported: - To make the `RoleAssignment` only applicable to [Security
57- * Groups](https://cloud.google.com/identity/docs/groups#group_types):
50+ * Optional. The condition associated with this role assignment. Note: Feature is available to
51+ * Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity
52+ * Premium customers. A `RoleAssignment` with the `condition` field set will only take effect when
53+ * the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`)
54+ * is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently,
55+ * the following conditions are supported: - To make the `RoleAssignment` only applicable to
56+ * [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
5857 * `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security'])
5958 * && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not
6059 * applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
6160 * `!api.getAttribute('cloudidentity.googleapis.com/groups.labels',
6261 * []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'`
63- * Currently, the two condition strings have to be verbatim and they only work with the following
62+ * Currently, the condition strings have to be verbatim and they only work with the following
6463 * [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor -
6564 * Groups Reader The condition follows [Cloud IAM condition
66- * syntax](https://cloud.google.com/iam/docs/conditions-overview).
65+ * syntax](https://cloud.google.com/iam/docs/conditions-overview). Additional conditions related
66+ * to Locked Groups are available under Open Beta. - To make the `RoleAssignment` not applicable
67+ * to [Locked Groups](https://cloud.google.com/identity/docs/groups#group_types):
68+ * `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.locked'])
69+ * && resource.type == 'cloudidentity.googleapis.com/Group'` This condition can also be used in
70+ * conjunction with a Security-related condition.
6771 * The value may be {@code null}.
6872 */
6973 @ com .google .api .client .util .Key
@@ -153,47 +157,55 @@ public RoleAssignment setAssigneeType(java.lang.String assigneeType) {
153157 }
154158
155159 /**
156- * Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace
157- * for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use
158- * the feature. The condition associated with this role assignment. A `RoleAssignment` with the
159- * `condition` field set will only take effect when the resource being accessed meets the
160- * condition. If `condition` is empty, the role (`role_id`) is applied to the actor
161- * (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are
162- * supported: - To make the `RoleAssignment` only applicable to [Security
163- * Groups](https://cloud.google.com/identity/docs/groups#group_types):
160+ * Optional. The condition associated with this role assignment. Note: Feature is available to
161+ * Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity
162+ * Premium customers. A `RoleAssignment` with the `condition` field set will only take effect when
163+ * the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`)
164+ * is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently,
165+ * the following conditions are supported: - To make the `RoleAssignment` only applicable to
166+ * [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
164167 * `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security'])
165168 * && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not
166169 * applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
167170 * `!api.getAttribute('cloudidentity.googleapis.com/groups.labels',
168171 * []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'`
169- * Currently, the two condition strings have to be verbatim and they only work with the following
172+ * Currently, the condition strings have to be verbatim and they only work with the following
170173 * [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor -
171174 * Groups Reader The condition follows [Cloud IAM condition
172- * syntax](https://cloud.google.com/iam/docs/conditions-overview).
175+ * syntax](https://cloud.google.com/iam/docs/conditions-overview). Additional conditions related
176+ * to Locked Groups are available under Open Beta. - To make the `RoleAssignment` not applicable
177+ * to [Locked Groups](https://cloud.google.com/identity/docs/groups#group_types):
178+ * `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.locked'])
179+ * && resource.type == 'cloudidentity.googleapis.com/Group'` This condition can also be used in
180+ * conjunction with a Security-related condition.
173181 * @return value or {@code null} for none
174182 */
175183 public java .lang .String getCondition () {
176184 return condition ;
177185 }
178186
179187 /**
180- * Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace
181- * for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use
182- * the feature. The condition associated with this role assignment. A `RoleAssignment` with the
183- * `condition` field set will only take effect when the resource being accessed meets the
184- * condition. If `condition` is empty, the role (`role_id`) is applied to the actor
185- * (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are
186- * supported: - To make the `RoleAssignment` only applicable to [Security
187- * Groups](https://cloud.google.com/identity/docs/groups#group_types):
188+ * Optional. The condition associated with this role assignment. Note: Feature is available to
189+ * Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity
190+ * Premium customers. A `RoleAssignment` with the `condition` field set will only take effect when
191+ * the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`)
192+ * is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently,
193+ * the following conditions are supported: - To make the `RoleAssignment` only applicable to
194+ * [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
188195 * `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security'])
189196 * && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not
190197 * applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
191198 * `!api.getAttribute('cloudidentity.googleapis.com/groups.labels',
192199 * []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'`
193- * Currently, the two condition strings have to be verbatim and they only work with the following
200+ * Currently, the condition strings have to be verbatim and they only work with the following
194201 * [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor -
195202 * Groups Reader The condition follows [Cloud IAM condition
196- * syntax](https://cloud.google.com/iam/docs/conditions-overview).
203+ * syntax](https://cloud.google.com/iam/docs/conditions-overview). Additional conditions related
204+ * to Locked Groups are available under Open Beta. - To make the `RoleAssignment` not applicable
205+ * to [Locked Groups](https://cloud.google.com/identity/docs/groups#group_types):
206+ * `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.locked'])
207+ * && resource.type == 'cloudidentity.googleapis.com/Group'` This condition can also be used in
208+ * conjunction with a Security-related condition.
197209 * @param condition condition or {@code null} for none
198210 */
199211 public RoleAssignment setCondition (java .lang .String condition ) {
0 commit comments