Skip to content

Commit 0d7f4e7

Browse files
yoshi-automationsofisl
authored andcommitted
feat(admin): update the API
#### admin:directory_v1 The following keys were added: - schemas.ByteUsage.description - schemas.ByteUsage.id - schemas.ByteUsage.properties.capacityBytes.description - schemas.ByteUsage.properties.capacityBytes.format - schemas.ByteUsage.properties.capacityBytes.readOnly - schemas.ByteUsage.properties.capacityBytes.type - schemas.ByteUsage.properties.usedBytes.description - schemas.ByteUsage.properties.usedBytes.format - schemas.ByteUsage.properties.usedBytes.readOnly - schemas.ByteUsage.properties.usedBytes.type - schemas.ByteUsage.type - schemas.ChromeOsDevice.properties.diskSpaceUsage.$ref - schemas.ChromeOsDevice.properties.diskSpaceUsage.description - schemas.ChromeOsDevice.properties.diskSpaceUsage.readOnly - schemas.RoleAssignment.properties.condition.description - schemas.RoleAssignment.properties.condition.type The following keys were changed: - schemas.OrgUnit.properties.blockInheritance.description
1 parent 78e0e66 commit 0d7f4e7

File tree

2 files changed

+52
-3
lines changed

2 files changed

+52
-3
lines changed

discovery/admin-directory_v1.json

+30-2
Original file line numberDiff line numberDiff line change
@@ -4671,7 +4671,7 @@
46714671
}
46724672
}
46734673
},
4674-
"revision": "20240924",
4674+
"revision": "20241210",
46754675
"rootUrl": "https://admin.googleapis.com/",
46764676
"schemas": {
46774677
"Alias": {
@@ -5184,6 +5184,25 @@
51845184
},
51855185
"type": "object"
51865186
},
5187+
"ByteUsage": {
5188+
"description": "Represents a data capacity with some amount of current usage in bytes.",
5189+
"id": "ByteUsage",
5190+
"properties": {
5191+
"capacityBytes": {
5192+
"description": "Output only. The total capacity value, in bytes.",
5193+
"format": "int64",
5194+
"readOnly": true,
5195+
"type": "string"
5196+
},
5197+
"usedBytes": {
5198+
"description": "Output only. The current usage value, in bytes.",
5199+
"format": "int64",
5200+
"readOnly": true,
5201+
"type": "string"
5202+
}
5203+
},
5204+
"type": "object"
5205+
},
51875206
"CalendarResource": {
51885207
"description": "Public API: Resources.calendars",
51895208
"id": "CalendarResource",
@@ -5640,6 +5659,11 @@
56405659
"readOnly": true,
56415660
"type": "string"
56425661
},
5662+
"diskSpaceUsage": {
5663+
"$ref": "ByteUsage",
5664+
"description": "Output only. How much disk space the device has available and is currently using.",
5665+
"readOnly": true
5666+
},
56435667
"diskVolumeReports": {
56445668
"description": "Reports of disk space and other info about mounted/connected volumes.",
56455669
"items": {
@@ -7046,7 +7070,7 @@
70467070
"properties": {
70477071
"blockInheritance": {
70487072
"deprecated": true,
7049-
"description": "Determines if a sub-organizational unit can inherit the settings of the parent organization. The default value is `false`, meaning a sub-organizational unit inherits the settings of the nearest parent organizational unit. This field is deprecated. Setting it to `true` is no longer supported and can have _unintended consequences_. For more information about inheritance and users in an organization structure, see the [administration help center](https://support.google.com/a/answer/4352075).",
7073+
"description": "This field is deprecated and setting its value has no effect.",
70507074
"type": "boolean"
70517075
},
70527076
"description": {
@@ -7469,6 +7493,10 @@
74697493
"readOnly": true,
74707494
"type": "string"
74717495
},
7496+
"condition": {
7497+
"description": "Optional. The condition associated with this role assignment. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity Premium customers. A `RoleAssignment` with the `condition` field set will only take effect when the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`) is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, the following conditions are supported: - To make the `RoleAssignment` only applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'` Currently, the condition strings have to be verbatim and they only work with the following [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor - Groups Reader The condition follows [Cloud IAM condition syntax](https://cloud.google.com/iam/docs/conditions-overview). Additional conditions related to Locked Groups are available under Open Beta. - To make the `RoleAssignment` not applicable to [Locked Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.locked']) && resource.type == 'cloudidentity.googleapis.com/Group'` This condition can also be used in conjunction with a Security-related condition.",
7498+
"type": "string"
7499+
},
74727500
"etag": {
74737501
"description": "ETag of the resource.",
74747502
"type": "string"

src/apis/admin/directory_v1.ts

+22-1
Original file line numberDiff line numberDiff line change
@@ -473,6 +473,19 @@ export namespace admin_directory_v1 {
473473
*/
474474
nextPageToken?: string | null;
475475
}
476+
/**
477+
* Represents a data capacity with some amount of current usage in bytes.
478+
*/
479+
export interface Schema$ByteUsage {
480+
/**
481+
* Output only. The total capacity value, in bytes.
482+
*/
483+
capacityBytes?: string | null;
484+
/**
485+
* Output only. The current usage value, in bytes.
486+
*/
487+
usedBytes?: string | null;
488+
}
476489
/**
477490
* Public API: Resources.calendars
478491
*/
@@ -708,6 +721,10 @@ export namespace admin_directory_v1 {
708721
* Output only. Device license type.
709722
*/
710723
deviceLicenseType?: string | null;
724+
/**
725+
* Output only. How much disk space the device has available and is currently using.
726+
*/
727+
diskSpaceUsage?: Schema$ByteUsage;
711728
/**
712729
* Reports of disk space and other info about mounted/connected volumes.
713730
*/
@@ -1651,7 +1668,7 @@ export namespace admin_directory_v1 {
16511668
*/
16521669
export interface Schema$OrgUnit {
16531670
/**
1654-
* Determines if a sub-organizational unit can inherit the settings of the parent organization. The default value is `false`, meaning a sub-organizational unit inherits the settings of the nearest parent organizational unit. This field is deprecated. Setting it to `true` is no longer supported and can have _unintended consequences_. For more information about inheritance and users in an organization structure, see the [administration help center](https://support.google.com/a/answer/4352075).
1671+
* This field is deprecated and setting its value has no effect.
16551672
*/
16561673
blockInheritance?: boolean | null;
16571674
/**
@@ -1936,6 +1953,10 @@ export namespace admin_directory_v1 {
19361953
* Output only. The type of the assignee (`USER` or `GROUP`).
19371954
*/
19381955
assigneeType?: string | null;
1956+
/**
1957+
* Optional. The condition associated with this role assignment. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity Premium customers. A `RoleAssignment` with the `condition` field set will only take effect when the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`) is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, the following conditions are supported: - To make the `RoleAssignment` only applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'` Currently, the condition strings have to be verbatim and they only work with the following [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor - Groups Reader The condition follows [Cloud IAM condition syntax](https://cloud.google.com/iam/docs/conditions-overview). Additional conditions related to Locked Groups are available under Open Beta. - To make the `RoleAssignment` not applicable to [Locked Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.locked']) && resource.type == 'cloudidentity.googleapis.com/Group'` This condition can also be used in conjunction with a Security-related condition.
1958+
*/
1959+
condition?: string | null;
19391960
/**
19401961
* ETag of the resource.
19411962
*/

0 commit comments

Comments
 (0)