@@ -47,23 +47,27 @@ public final class RoleAssignment extends com.google.api.client.json.GenericJson
47
47
private java .lang .String assigneeType ;
48
48
49
49
/**
50
- * Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace
51
- * for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use
52
- * the feature. The condition associated with this role assignment. A `RoleAssignment` with the
53
- * `condition` field set will only take effect when the resource being accessed meets the
54
- * condition. If `condition` is empty, the role (`role_id`) is applied to the actor
55
- * (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are
56
- * supported: - To make the `RoleAssignment` only applicable to [Security
57
- * Groups](https://cloud.google.com/identity/docs/groups#group_types):
50
+ * Optional. The condition associated with this role assignment. Note: Feature is available to
51
+ * Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity
52
+ * Premium customers. A `RoleAssignment` with the `condition` field set will only take effect when
53
+ * the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`)
54
+ * is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently,
55
+ * the following conditions are supported: - To make the `RoleAssignment` only applicable to
56
+ * [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
58
57
* `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security'])
59
58
* && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not
60
59
* applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
61
60
* `!api.getAttribute('cloudidentity.googleapis.com/groups.labels',
62
61
* []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'`
63
- * Currently, the two condition strings have to be verbatim and they only work with the following
62
+ * Currently, the condition strings have to be verbatim and they only work with the following
64
63
* [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor -
65
64
* Groups Reader The condition follows [Cloud IAM condition
66
- * syntax](https://cloud.google.com/iam/docs/conditions-overview).
65
+ * syntax](https://cloud.google.com/iam/docs/conditions-overview). Additional conditions related
66
+ * to Locked Groups are available under Open Beta. - To make the `RoleAssignment` not applicable
67
+ * to [Locked Groups](https://cloud.google.com/identity/docs/groups#group_types):
68
+ * `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.locked'])
69
+ * && resource.type == 'cloudidentity.googleapis.com/Group'` This condition can also be used in
70
+ * conjunction with a Security-related condition.
67
71
* The value may be {@code null}.
68
72
*/
69
73
@ com .google .api .client .util .Key
@@ -153,47 +157,55 @@ public RoleAssignment setAssigneeType(java.lang.String assigneeType) {
153
157
}
154
158
155
159
/**
156
- * Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace
157
- * for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use
158
- * the feature. The condition associated with this role assignment. A `RoleAssignment` with the
159
- * `condition` field set will only take effect when the resource being accessed meets the
160
- * condition. If `condition` is empty, the role (`role_id`) is applied to the actor
161
- * (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are
162
- * supported: - To make the `RoleAssignment` only applicable to [Security
163
- * Groups](https://cloud.google.com/identity/docs/groups#group_types):
160
+ * Optional. The condition associated with this role assignment. Note: Feature is available to
161
+ * Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity
162
+ * Premium customers. A `RoleAssignment` with the `condition` field set will only take effect when
163
+ * the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`)
164
+ * is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently,
165
+ * the following conditions are supported: - To make the `RoleAssignment` only applicable to
166
+ * [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
164
167
* `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security'])
165
168
* && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not
166
169
* applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
167
170
* `!api.getAttribute('cloudidentity.googleapis.com/groups.labels',
168
171
* []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'`
169
- * Currently, the two condition strings have to be verbatim and they only work with the following
172
+ * Currently, the condition strings have to be verbatim and they only work with the following
170
173
* [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor -
171
174
* Groups Reader The condition follows [Cloud IAM condition
172
- * syntax](https://cloud.google.com/iam/docs/conditions-overview).
175
+ * syntax](https://cloud.google.com/iam/docs/conditions-overview). Additional conditions related
176
+ * to Locked Groups are available under Open Beta. - To make the `RoleAssignment` not applicable
177
+ * to [Locked Groups](https://cloud.google.com/identity/docs/groups#group_types):
178
+ * `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.locked'])
179
+ * && resource.type == 'cloudidentity.googleapis.com/Group'` This condition can also be used in
180
+ * conjunction with a Security-related condition.
173
181
* @return value or {@code null} for none
174
182
*/
175
183
public java .lang .String getCondition () {
176
184
return condition ;
177
185
}
178
186
179
187
/**
180
- * Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace
181
- * for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use
182
- * the feature. The condition associated with this role assignment. A `RoleAssignment` with the
183
- * `condition` field set will only take effect when the resource being accessed meets the
184
- * condition. If `condition` is empty, the role (`role_id`) is applied to the actor
185
- * (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are
186
- * supported: - To make the `RoleAssignment` only applicable to [Security
187
- * Groups](https://cloud.google.com/identity/docs/groups#group_types):
188
+ * Optional. The condition associated with this role assignment. Note: Feature is available to
189
+ * Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity
190
+ * Premium customers. A `RoleAssignment` with the `condition` field set will only take effect when
191
+ * the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`)
192
+ * is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently,
193
+ * the following conditions are supported: - To make the `RoleAssignment` only applicable to
194
+ * [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
188
195
* `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security'])
189
196
* && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not
190
197
* applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types):
191
198
* `!api.getAttribute('cloudidentity.googleapis.com/groups.labels',
192
199
* []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'`
193
- * Currently, the two condition strings have to be verbatim and they only work with the following
200
+ * Currently, the condition strings have to be verbatim and they only work with the following
194
201
* [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor -
195
202
* Groups Reader The condition follows [Cloud IAM condition
196
- * syntax](https://cloud.google.com/iam/docs/conditions-overview).
203
+ * syntax](https://cloud.google.com/iam/docs/conditions-overview). Additional conditions related
204
+ * to Locked Groups are available under Open Beta. - To make the `RoleAssignment` not applicable
205
+ * to [Locked Groups](https://cloud.google.com/identity/docs/groups#group_types):
206
+ * `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.locked'])
207
+ * && resource.type == 'cloudidentity.googleapis.com/Group'` This condition can also be used in
208
+ * conjunction with a Security-related condition.
197
209
* @param condition condition or {@code null} for none
198
210
*/
199
211
public RoleAssignment setCondition (java .lang .String condition ) {
0 commit comments