Skip to content

Commit 708db6b

Browse files
1 parent 3f38ee4 commit 708db6b

File tree

4 files changed

+48
-36
lines changed

4 files changed

+48
-36
lines changed

clients/google-api-services-admin/directory_v1/2.0.0/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Add the following lines to your `pom.xml` file:
2222
<dependency>
2323
<groupId>com.google.apis</groupId>
2424
<artifactId>google-api-services-admin-directory</artifactId>
25-
<version>directory_v1-rev20241126-2.0.0</version>
25+
<version>directory_v1-rev20241210-2.0.0</version>
2626
</dependency>
2727
</dependencies>
2828
</project>
@@ -35,7 +35,7 @@ repositories {
3535
mavenCentral()
3636
}
3737
dependencies {
38-
implementation 'com.google.apis:google-api-services-admin-directory:directory_v1-rev20241126-2.0.0'
38+
implementation 'com.google.apis:google-api-services-admin-directory:directory_v1-rev20241210-2.0.0'
3939
}
4040
```
4141

clients/google-api-services-admin/directory_v1/2.0.0/com/google/api/services/directory/model/RoleAssignment.java

Lines changed: 42 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -47,23 +47,27 @@ public final class RoleAssignment extends com.google.api.client.json.GenericJson
4747
private java.lang.String assigneeType;
4848

4949
/**
50-
* Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace
51-
* for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use
52-
* the feature. The condition associated with this role assignment. A `RoleAssignment` with the
53-
* `condition` field set will only take effect when the resource being accessed meets the
54-
* condition. If `condition` is empty, the role (`role_id`) is applied to the actor
55-
* (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are
56-
* supported: - To make the `RoleAssignment` only applicable to [Security
57-
* Groups](https://cloud.google.com/identity/docs/groups#group_types):
50+
* Optional. The condition associated with this role assignment. Note: Feature is available to
51+
* Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity
52+
* Premium customers. A `RoleAssignment` with the `condition` field set will only take effect when
53+
* the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`)
54+
* is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently,
55+
* the following conditions are supported: - To make the `RoleAssignment` only applicable to
56+
* [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
5857
* `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security'])
5958
* && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not
6059
* applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
6160
* `!api.getAttribute('cloudidentity.googleapis.com/groups.labels',
6261
* []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'`
63-
* Currently, the two condition strings have to be verbatim and they only work with the following
62+
* Currently, the condition strings have to be verbatim and they only work with the following
6463
* [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor -
6564
* Groups Reader The condition follows [Cloud IAM condition
66-
* syntax](https://cloud.google.com/iam/docs/conditions-overview).
65+
* syntax](https://cloud.google.com/iam/docs/conditions-overview). Additional conditions related
66+
* to Locked Groups are available under Open Beta. - To make the `RoleAssignment` not applicable
67+
* to [Locked Groups](https://cloud.google.com/identity/docs/groups#group_types):
68+
* `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.locked'])
69+
* && resource.type == 'cloudidentity.googleapis.com/Group'` This condition can also be used in
70+
* conjunction with a Security-related condition.
6771
* The value may be {@code null}.
6872
*/
6973
@com.google.api.client.util.Key
@@ -153,47 +157,55 @@ public RoleAssignment setAssigneeType(java.lang.String assigneeType) {
153157
}
154158

155159
/**
156-
* Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace
157-
* for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use
158-
* the feature. The condition associated with this role assignment. A `RoleAssignment` with the
159-
* `condition` field set will only take effect when the resource being accessed meets the
160-
* condition. If `condition` is empty, the role (`role_id`) is applied to the actor
161-
* (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are
162-
* supported: - To make the `RoleAssignment` only applicable to [Security
163-
* Groups](https://cloud.google.com/identity/docs/groups#group_types):
160+
* Optional. The condition associated with this role assignment. Note: Feature is available to
161+
* Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity
162+
* Premium customers. A `RoleAssignment` with the `condition` field set will only take effect when
163+
* the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`)
164+
* is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently,
165+
* the following conditions are supported: - To make the `RoleAssignment` only applicable to
166+
* [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
164167
* `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security'])
165168
* && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not
166169
* applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
167170
* `!api.getAttribute('cloudidentity.googleapis.com/groups.labels',
168171
* []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'`
169-
* Currently, the two condition strings have to be verbatim and they only work with the following
172+
* Currently, the condition strings have to be verbatim and they only work with the following
170173
* [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor -
171174
* Groups Reader The condition follows [Cloud IAM condition
172-
* syntax](https://cloud.google.com/iam/docs/conditions-overview).
175+
* syntax](https://cloud.google.com/iam/docs/conditions-overview). Additional conditions related
176+
* to Locked Groups are available under Open Beta. - To make the `RoleAssignment` not applicable
177+
* to [Locked Groups](https://cloud.google.com/identity/docs/groups#group_types):
178+
* `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.locked'])
179+
* && resource.type == 'cloudidentity.googleapis.com/Group'` This condition can also be used in
180+
* conjunction with a Security-related condition.
173181
* @return value or {@code null} for none
174182
*/
175183
public java.lang.String getCondition() {
176184
return condition;
177185
}
178186

179187
/**
180-
* Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace
181-
* for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use
182-
* the feature. The condition associated with this role assignment. A `RoleAssignment` with the
183-
* `condition` field set will only take effect when the resource being accessed meets the
184-
* condition. If `condition` is empty, the role (`role_id`) is applied to the actor
185-
* (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are
186-
* supported: - To make the `RoleAssignment` only applicable to [Security
187-
* Groups](https://cloud.google.com/identity/docs/groups#group_types):
188+
* Optional. The condition associated with this role assignment. Note: Feature is available to
189+
* Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity
190+
* Premium customers. A `RoleAssignment` with the `condition` field set will only take effect when
191+
* the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`)
192+
* is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently,
193+
* the following conditions are supported: - To make the `RoleAssignment` only applicable to
194+
* [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
188195
* `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security'])
189196
* && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not
190197
* applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
191198
* `!api.getAttribute('cloudidentity.googleapis.com/groups.labels',
192199
* []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'`
193-
* Currently, the two condition strings have to be verbatim and they only work with the following
200+
* Currently, the condition strings have to be verbatim and they only work with the following
194201
* [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor -
195202
* Groups Reader The condition follows [Cloud IAM condition
196-
* syntax](https://cloud.google.com/iam/docs/conditions-overview).
203+
* syntax](https://cloud.google.com/iam/docs/conditions-overview). Additional conditions related
204+
* to Locked Groups are available under Open Beta. - To make the `RoleAssignment` not applicable
205+
* to [Locked Groups](https://cloud.google.com/identity/docs/groups#group_types):
206+
* `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.locked'])
207+
* && resource.type == 'cloudidentity.googleapis.com/Group'` This condition can also be used in
208+
* conjunction with a Security-related condition.
197209
* @param condition condition or {@code null} for none
198210
*/
199211
public RoleAssignment setCondition(java.lang.String condition) {

clients/google-api-services-admin/directory_v1/2.0.0/pom.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@
88

99
<groupId>com.google.apis</groupId>
1010
<artifactId>google-api-services-admin-directory</artifactId>
11-
<version>directory_v1-rev20241126-2.0.0</version>
12-
<name>Admin SDK API directory_v1-rev20241126-2.0.0</name>
11+
<version>directory_v1-rev20241210-2.0.0</version>
12+
<name>Admin SDK API directory_v1-rev20241210-2.0.0</name>
1313
<packaging>jar</packaging>
1414

1515
<inceptionYear>2011</inceptionYear>

clients/google-api-services-admin/directory_v1/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Add the following lines to your `pom.xml` file:
2222
<dependency>
2323
<groupId>com.google.apis</groupId>
2424
<artifactId>google-api-services-admin-directory</artifactId>
25-
<version>directory_v1-rev20241126-2.0.0</version>
25+
<version>directory_v1-rev20241210-2.0.0</version>
2626
</dependency>
2727
</dependencies>
2828
</project>
@@ -35,7 +35,7 @@ repositories {
3535
mavenCentral()
3636
}
3737
dependencies {
38-
implementation 'com.google.apis:google-api-services-admin-directory:directory_v1-rev20241126-2.0.0'
38+
implementation 'com.google.apis:google-api-services-admin-directory:directory_v1-rev20241210-2.0.0'
3939
}
4040
```
4141

0 commit comments

Comments
 (0)