You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: discovery/admin-directory_v1.json
+30-2
Original file line number
Diff line number
Diff line change
@@ -4671,7 +4671,7 @@
4671
4671
}
4672
4672
}
4673
4673
},
4674
-
"revision": "20240924",
4674
+
"revision": "20241210",
4675
4675
"rootUrl": "https://admin.googleapis.com/",
4676
4676
"schemas": {
4677
4677
"Alias": {
@@ -5184,6 +5184,25 @@
5184
5184
},
5185
5185
"type": "object"
5186
5186
},
5187
+
"ByteUsage": {
5188
+
"description": "Represents a data capacity with some amount of current usage in bytes.",
5189
+
"id": "ByteUsage",
5190
+
"properties": {
5191
+
"capacityBytes": {
5192
+
"description": "Output only. The total capacity value, in bytes.",
5193
+
"format": "int64",
5194
+
"readOnly": true,
5195
+
"type": "string"
5196
+
},
5197
+
"usedBytes": {
5198
+
"description": "Output only. The current usage value, in bytes.",
5199
+
"format": "int64",
5200
+
"readOnly": true,
5201
+
"type": "string"
5202
+
}
5203
+
},
5204
+
"type": "object"
5205
+
},
5187
5206
"CalendarResource": {
5188
5207
"description": "Public API: Resources.calendars",
5189
5208
"id": "CalendarResource",
@@ -5640,6 +5659,11 @@
5640
5659
"readOnly": true,
5641
5660
"type": "string"
5642
5661
},
5662
+
"diskSpaceUsage": {
5663
+
"$ref": "ByteUsage",
5664
+
"description": "Output only. How much disk space the device has available and is currently using.",
5665
+
"readOnly": true
5666
+
},
5643
5667
"diskVolumeReports": {
5644
5668
"description": "Reports of disk space and other info about mounted/connected volumes.",
5645
5669
"items": {
@@ -7046,7 +7070,7 @@
7046
7070
"properties": {
7047
7071
"blockInheritance": {
7048
7072
"deprecated": true,
7049
-
"description": "Determines if a sub-organizational unit can inherit the settings of the parent organization. The default value is `false`, meaning a sub-organizational unit inherits the settings of the nearest parent organizational unit. This field is deprecated. Setting it to `true` is no longer supported and can have _unintended consequences_. For more information about inheritance and users in an organization structure, see the [administration help center](https://support.google.com/a/answer/4352075).",
7073
+
"description": "This field is deprecated and setting its value has no effect.",
7050
7074
"type": "boolean"
7051
7075
},
7052
7076
"description": {
@@ -7469,6 +7493,10 @@
7469
7493
"readOnly": true,
7470
7494
"type": "string"
7471
7495
},
7496
+
"condition": {
7497
+
"description": "Optional. The condition associated with this role assignment. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity Premium customers. A `RoleAssignment` with the `condition` field set will only take effect when the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`) is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, the following conditions are supported: - To make the `RoleAssignment` only applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'` Currently, the condition strings have to be verbatim and they only work with the following [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor - Groups Reader The condition follows [Cloud IAM condition syntax](https://cloud.google.com/iam/docs/conditions-overview). Additional conditions related to Locked Groups are available under Open Beta. - To make the `RoleAssignment` not applicable to [Locked Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.locked']) && resource.type == 'cloudidentity.googleapis.com/Group'` This condition can also be used in conjunction with a Security-related condition.",
* Determines if a sub-organizational unit can inherit the settings of the parent organization. The default value is `false`, meaning a sub-organizational unit inherits the settings of the nearest parent organizational unit. This field is deprecated. Setting it to `true` is no longer supported and can have _unintended consequences_. For more information about inheritance and users in an organization structure, see the [administration help center](https://support.google.com/a/answer/4352075).
1671
+
* This field is deprecated and setting its value has no effect.
* Output only. The type of the assignee (`USER` or `GROUP`).
1937
1954
*/
1938
1955
assigneeType?: string | null;
1956
+
/**
1957
+
* Optional. The condition associated with this role assignment. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity Premium customers. A `RoleAssignment` with the `condition` field set will only take effect when the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`) is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, the following conditions are supported: - To make the `RoleAssignment` only applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'` Currently, the condition strings have to be verbatim and they only work with the following [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor - Groups Reader The condition follows [Cloud IAM condition syntax](https://cloud.google.com/iam/docs/conditions-overview). Additional conditions related to Locked Groups are available under Open Beta. - To make the `RoleAssignment` not applicable to [Locked Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.locked']) && resource.type == 'cloudidentity.googleapis.com/Group'` This condition can also be used in conjunction with a Security-related condition.
0 commit comments