The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returned policy bindings. Note that the
map is populated only for requests with permission queries.
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returned policy bindings. Note that the
map is populated only for requests with permission queries.
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returned policy bindings. Note that the
map is populated only for requests with permission queries.
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returned policy bindings. Note that the
map is populated only for requests with permission queries.
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returned policy bindings. Note that the
map is populated only for requests with permission queries.
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returned policy bindings. Note that the
map is populated only for requests with permission queries.
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returned policy bindings. Note that the
map is populated only for requests with permission queries.
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returned policy bindings. Note that the
map is populated only for requests with permission queries.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-01-27 UTC."],[],[]]