@maxim_mazurok/gapi.client.admin-directory_v1 0.0.20241113 → 0.0.20241126

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/index.d.ts +5 -1
  2. package/package.json +1 -1
package/index.d.ts CHANGED
@@ -9,7 +9,7 @@
9
9
  // This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
10
10
  // In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
11
11
  // Generated from: https://admin.googleapis.com/$discovery/rest?version=directory_v1
12
- // Revision: 20241113
12
+ // Revision: 20241126
13
13
 
14
14
  /// <reference types="gapi.client" />
15
15
 
@@ -1007,6 +1007,8 @@ declare namespace gapi.client {
1007
1007
  assignedTo?: string;
1008
1008
  /** Output only. The type of the assignee (`USER` or `GROUP`). */
1009
1009
  assigneeType?: string;
1010
+ /** Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use the feature. The condition associated with this role assignment. A `RoleAssignment` with the `condition` field set will only take effect when the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`) is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are supported: - To make the `RoleAssignment` only applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'` Currently, the two condition strings have to be verbatim and they only work with the following [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor - Groups Reader The condition follows [Cloud IAM condition syntax](https://cloud.google.com/iam/docs/conditions-overview). */
1011
+ condition?: string;
1010
1012
  /** ETag of the resource. */
1011
1013
  etag?: string;
1012
1014
  /** The type of the API resource. This is always `admin#directory#roleAssignment`. */
@@ -3401,6 +3403,8 @@ declare namespace gapi.client {
3401
3403
  assignedTo?: string;
3402
3404
  /** Output only. The type of the assignee (`USER` or `GROUP`). */
3403
3405
  assigneeType?: string;
3406
+ /** Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use the feature. The condition associated with this role assignment. A `RoleAssignment` with the `condition` field set will only take effect when the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`) is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are supported: - To make the `RoleAssignment` only applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'` Currently, the two condition strings have to be verbatim and they only work with the following [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor - Groups Reader The condition follows [Cloud IAM condition syntax](https://cloud.google.com/iam/docs/conditions-overview). */
3407
+ condition?: string;
3404
3408
  /** ETag of the resource. */
3405
3409
  etag?: string;
3406
3410
  /** The type of the API resource. This is always `admin#directory#roleAssignment`. */
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@maxim_mazurok/gapi.client.admin-directory_v1",
3
- "version": "0.0.20241113",
3
+ "version": "0.0.20241126",
4
4
  "description": "TypeScript typings for Admin SDK API directory_v1",
5
5
  "repository": {
6
6
  "type": "git",