public static final class IamPolicySearchResult.Explanation.Builder extends GeneratedMessageV3.Builder<IamPolicySearchResult.Explanation.Builder> implements IamPolicySearchResult.ExplanationOrBuilder
Explanation about the IAM policy search result.
Protobuf type google.cloud.asset.v1.IamPolicySearchResult.Explanation
Static Methods
getDescriptor()
public static final Descriptors.Descriptor getDescriptor()
Returns
Methods
addRepeatedField(Descriptors.FieldDescriptor field, Object value)
public IamPolicySearchResult.Explanation.Builder addRepeatedField(Descriptors.FieldDescriptor field, Object value)
Parameters
Returns
Overrides
build()
public IamPolicySearchResult.Explanation build()
Returns
buildPartial()
public IamPolicySearchResult.Explanation buildPartial()
Returns
clear()
public IamPolicySearchResult.Explanation.Builder clear()
Returns
Overrides
clearField(Descriptors.FieldDescriptor field)
public IamPolicySearchResult.Explanation.Builder clearField(Descriptors.FieldDescriptor field)
Parameter
Returns
Overrides
clearMatchedPermissions()
public IamPolicySearchResult.Explanation.Builder clearMatchedPermissions()
Returns
clearOneof(Descriptors.OneofDescriptor oneof)
public IamPolicySearchResult.Explanation.Builder clearOneof(Descriptors.OneofDescriptor oneof)
Parameter
Returns
Overrides
clone()
public IamPolicySearchResult.Explanation.Builder clone()
Returns
Overrides
containsMatchedPermissions(String key)
public boolean containsMatchedPermissions(String key)
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
map<string, .google.cloud.asset.v1.IamPolicySearchResult.Explanation.Permissions> matched_permissions = 1;
Parameter
Returns
getDefaultInstanceForType()
public IamPolicySearchResult.Explanation getDefaultInstanceForType()
Returns
getDescriptorForType()
public Descriptors.Descriptor getDescriptorForType()
Returns
Overrides
getMatchedPermissions()
public Map<String,IamPolicySearchResult.Explanation.Permissions> getMatchedPermissions()
Returns
getMatchedPermissionsCount()
public int getMatchedPermissionsCount()
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
map<string, .google.cloud.asset.v1.IamPolicySearchResult.Explanation.Permissions> matched_permissions = 1;
Returns
getMatchedPermissionsMap()
public Map<String,IamPolicySearchResult.Explanation.Permissions> getMatchedPermissionsMap()
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
map<string, .google.cloud.asset.v1.IamPolicySearchResult.Explanation.Permissions> matched_permissions = 1;
Returns
getMatchedPermissionsOrDefault(String key, IamPolicySearchResult.Explanation.Permissions defaultValue)
public IamPolicySearchResult.Explanation.Permissions getMatchedPermissionsOrDefault(String key, IamPolicySearchResult.Explanation.Permissions defaultValue)
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
map<string, .google.cloud.asset.v1.IamPolicySearchResult.Explanation.Permissions> matched_permissions = 1;
Parameters
Returns
getMatchedPermissionsOrThrow(String key)
public IamPolicySearchResult.Explanation.Permissions getMatchedPermissionsOrThrow(String key)
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
map<string, .google.cloud.asset.v1.IamPolicySearchResult.Explanation.Permissions> matched_permissions = 1;
Parameter
Returns
getMutableMatchedPermissions()
public Map<String,IamPolicySearchResult.Explanation.Permissions> getMutableMatchedPermissions()
Use alternate mutation accessors instead.
Returns
internalGetFieldAccessorTable()
protected GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()
Returns
Overrides
internalGetMapField(int number)
protected MapField internalGetMapField(int number)
Parameter
Returns
Overrides
internalGetMutableMapField(int number)
protected MapField internalGetMutableMapField(int number)
Parameter
Returns
Overrides
isInitialized()
public final boolean isInitialized()
Returns
Overrides
mergeFrom(IamPolicySearchResult.Explanation other)
public IamPolicySearchResult.Explanation.Builder mergeFrom(IamPolicySearchResult.Explanation other)
Parameter
Returns
public IamPolicySearchResult.Explanation.Builder mergeFrom(CodedInputStream input, ExtensionRegistryLite extensionRegistry)
Parameters
Returns
Overrides
Exceptions
mergeFrom(Message other)
public IamPolicySearchResult.Explanation.Builder mergeFrom(Message other)
Parameter
Returns
Overrides
mergeUnknownFields(UnknownFieldSet unknownFields)
public final IamPolicySearchResult.Explanation.Builder mergeUnknownFields(UnknownFieldSet unknownFields)
Parameter
Returns
Overrides
putAllMatchedPermissions(Map<String,IamPolicySearchResult.Explanation.Permissions> values)
public IamPolicySearchResult.Explanation.Builder putAllMatchedPermissions(Map<String,IamPolicySearchResult.Explanation.Permissions> values)
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
map<string, .google.cloud.asset.v1.IamPolicySearchResult.Explanation.Permissions> matched_permissions = 1;
Parameter
Returns
putMatchedPermissions(String key, IamPolicySearchResult.Explanation.Permissions value)
public IamPolicySearchResult.Explanation.Builder putMatchedPermissions(String key, IamPolicySearchResult.Explanation.Permissions value)
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
map<string, .google.cloud.asset.v1.IamPolicySearchResult.Explanation.Permissions> matched_permissions = 1;
Parameters
Returns
removeMatchedPermissions(String key)
public IamPolicySearchResult.Explanation.Builder removeMatchedPermissions(String key)
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
map<string, .google.cloud.asset.v1.IamPolicySearchResult.Explanation.Permissions> matched_permissions = 1;
Parameter
Returns
setField(Descriptors.FieldDescriptor field, Object value)
public IamPolicySearchResult.Explanation.Builder setField(Descriptors.FieldDescriptor field, Object value)
Parameters
Returns
Overrides
setRepeatedField(Descriptors.FieldDescriptor field, int index, Object value)
public IamPolicySearchResult.Explanation.Builder setRepeatedField(Descriptors.FieldDescriptor field, int index, Object value)
Parameters
Returns
Overrides
setUnknownFields(UnknownFieldSet unknownFields)
public final IamPolicySearchResult.Explanation.Builder setUnknownFields(UnknownFieldSet unknownFields)
Parameter
Returns
Overrides