Reference documentation and code samples for the Google Cloud Asset V1 Client class Explanation.
Explanation about the IAM policy search result.
Generated from protobuf message google.cloud.asset.v1.IamPolicySearchResult.Explanation
Methods
__construct
Constructor.
data
array
Optional. Data for populating the Message object.
↳ matched_permissions
array| Google\Protobuf\Internal\MapField
The map from roles to their included permissions that match the permission query (i.e., a query containing policy.role.permissions:
). Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The roles can also be found in the returned policy
bindings. Note that the map is populated only for requests with permission queries.
getMatchedPermissions
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
setMatchedPermissions
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:
).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}
. The
roles can also be found in the returned policy
bindings. Note that the
map is populated only for requests with permission queries.
$this