- 3.57.0 (latest)
- 3.56.0
- 3.55.0
- 3.53.0
- 3.52.0
- 3.51.0
- 3.50.0
- 3.49.0
- 3.48.0
- 3.47.0
- 3.46.0
- 3.45.0
- 3.44.0
- 3.43.0
- 3.41.0
- 3.40.0
- 3.39.0
- 3.38.0
- 3.37.0
- 3.36.0
- 3.35.0
- 3.34.0
- 3.33.0
- 3.32.0
- 3.31.0
- 3.28.0
- 3.27.0
- 3.26.0
- 3.25.0
- 3.24.0
- 3.23.0
- 3.22.0
- 3.21.0
- 3.20.0
- 3.19.0
- 3.18.0
- 3.17.0
- 3.16.0
- 3.15.0
- 3.14.0
- 3.13.0
- 3.12.0
- 3.11.0
- 3.10.0
- 3.9.0
- 3.8.0
- 3.7.2-SNAPSHOT
- 3.6.0
- 3.4.1
- 3.3.1
- 3.2.17
public static interface IamPolicySearchResult.ExplanationOrBuilder extends MessageOrBuilder
Implements
MessageOrBuilderMethods
containsMatchedPermissions(String key)
public abstract boolean containsMatchedPermissions(String key)
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
map<string, .google.cloud.asset.v1.IamPolicySearchResult.Explanation.Permissions> matched_permissions = 1;
Name | Description |
key |
String |
Type | Description |
boolean |
getMatchedPermissions()
public abstract Map<String,IamPolicySearchResult.Explanation.Permissions> getMatchedPermissions()
Use #getMatchedPermissionsMap() instead.
Type | Description |
Map<String,Permissions> |
getMatchedPermissionsCount()
public abstract int getMatchedPermissionsCount()
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
map<string, .google.cloud.asset.v1.IamPolicySearchResult.Explanation.Permissions> matched_permissions = 1;
Type | Description |
int |
getMatchedPermissionsMap()
public abstract Map<String,IamPolicySearchResult.Explanation.Permissions> getMatchedPermissionsMap()
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
map<string, .google.cloud.asset.v1.IamPolicySearchResult.Explanation.Permissions> matched_permissions = 1;
Type | Description |
Map<String,Permissions> |
getMatchedPermissionsOrDefault(String key, IamPolicySearchResult.Explanation.Permissions defaultValue)
public abstract IamPolicySearchResult.Explanation.Permissions getMatchedPermissionsOrDefault(String key, IamPolicySearchResult.Explanation.Permissions defaultValue)
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
map<string, .google.cloud.asset.v1.IamPolicySearchResult.Explanation.Permissions> matched_permissions = 1;
Name | Description |
key |
String |
defaultValue |
IamPolicySearchResult.Explanation.Permissions |
Type | Description |
IamPolicySearchResult.Explanation.Permissions |
getMatchedPermissionsOrThrow(String key)
public abstract IamPolicySearchResult.Explanation.Permissions getMatchedPermissionsOrThrow(String key)
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
map<string, .google.cloud.asset.v1.IamPolicySearchResult.Explanation.Permissions> matched_permissions = 1;
Name | Description |
key |
String |
Type | Description |
IamPolicySearchResult.Explanation.Permissions |