JFIF  x x C         C     "        } !1AQa "q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz        w !1AQ aq"2B #3Rbr{ gilour

File "RoleAssignment.php"

Full Path: /home/palsarh/web/palsarh.in/public_html/vendor/google/apiclient-services/src/Directory/RoleAssignment.php
File size: 8.76 KB
MIME-type: text/x-php
Charset: utf-8

<?php
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */

namespace Google\Service\Directory;

class RoleAssignment extends \Google\Model
{
  /**
   * An individual user within the domain.
   */
  public const ASSIGNEE_TYPE_user = 'user';
  /**
   * A group within the domain.
   */
  public const ASSIGNEE_TYPE_group = 'group';
  /**
   * The unique ID of the entity this role is assigned to—either the `user_id`
   * of a user, the `group_id` of a group, or the `uniqueId` of a service
   * account as defined in [Identity and Access Management (IAM)](https://cloud.
   * google.com/iam/docs/reference/rest/v1/projects.serviceAccounts).
   *
   * @var string
   */
  public $assignedTo;
  /**
   * Output only. The type of the assignee (`USER` or `GROUP`).
   *
   * @var string
   */
  public $assigneeType;
  /**
   * Optional. The condition associated with this role assignment. Note: Feature
   * is available to Enterprise Standard, Enterprise Plus, Google Workspace for
   * Education Plus and Cloud Identity Premium customers. A `RoleAssignment`
   * with the `condition` field set will only take effect when the resource
   * being accessed meets the condition. If `condition` is empty, the role
   * (`role_id`) is applied to the actor (`assigned_to`) at the scope
   * (`scope_type`) unconditionally. Currently, the following conditions are
   * supported: - To make the `RoleAssignment` only applicable to [Security
   * Groups](https://cloud.google.com/identity/docs/groups#group_types):
   * `api.getAttribute('cloudidentity.googleapis.com/groups.labels',
   * []).hasAny(['groups.security']) && resource.type ==
   * 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not
   * applicable to [Security
   * Groups](https://cloud.google.com/identity/docs/groups#group_types):
   * `!api.getAttribute('cloudidentity.googleapis.com/groups.labels',
   * []).hasAny(['groups.security']) && resource.type ==
   * 'cloudidentity.googleapis.com/Group'` Currently, the condition strings have
   * to be verbatim and they only work with the following [pre-built
   * administrator roles](https://support.google.com/a/answer/2405986): - Groups
   * Editor - Groups Reader The condition follows [Cloud IAM condition
   * syntax](https://cloud.google.com/iam/docs/conditions-overview). - To make
   * the `RoleAssignment` not applicable to [Locked
   * Groups](https://cloud.google.com/identity/docs/groups#group_types):
   * `!api.getAttribute('cloudidentity.googleapis.com/groups.labels',
   * []).hasAny(['groups.locked']) && resource.type ==
   * 'cloudidentity.googleapis.com/Group'` This condition can also be used in
   * conjunction with a Security-related condition.
   *
   * @var string
   */
  public $condition;
  /**
   * ETag of the resource.
   *
   * @var string
   */
  public $etag;
  /**
   * The type of the API resource. This is always
   * `admin#directory#roleAssignment`.
   *
   * @var string
   */
  public $kind;
  /**
   * If the role is restricted to an organization unit, this contains the ID for
   * the organization unit the exercise of this role is restricted to.
   *
   * @var string
   */
  public $orgUnitId;
  /**
   * ID of this roleAssignment.
   *
   * @var string
   */
  public $roleAssignmentId;
  /**
   * The ID of the role that is assigned.
   *
   * @var string
   */
  public $roleId;
  /**
   * The scope in which this role is assigned.
   *
   * @var string
   */
  public $scopeType;

  /**
   * The unique ID of the entity this role is assigned to—either the `user_id`
   * of a user, the `group_id` of a group, or the `uniqueId` of a service
   * account as defined in [Identity and Access Management (IAM)](https://cloud.
   * google.com/iam/docs/reference/rest/v1/projects.serviceAccounts).
   *
   * @param string $assignedTo
   */
  public function setAssignedTo($assignedTo)
  {
    $this->assignedTo = $assignedTo;
  }
  /**
   * @return string
   */
  public function getAssignedTo()
  {
    return $this->assignedTo;
  }
  /**
   * Output only. The type of the assignee (`USER` or `GROUP`).
   *
   * Accepted values: user, group
   *
   * @param self::ASSIGNEE_TYPE_* $assigneeType
   */
  public function setAssigneeType($assigneeType)
  {
    $this->assigneeType = $assigneeType;
  }
  /**
   * @return self::ASSIGNEE_TYPE_*
   */
  public function getAssigneeType()
  {
    return $this->assigneeType;
  }
  /**
   * Optional. The condition associated with this role assignment. Note: Feature
   * is available to Enterprise Standard, Enterprise Plus, Google Workspace for
   * Education Plus and Cloud Identity Premium customers. A `RoleAssignment`
   * with the `condition` field set will only take effect when the resource
   * being accessed meets the condition. If `condition` is empty, the role
   * (`role_id`) is applied to the actor (`assigned_to`) at the scope
   * (`scope_type`) unconditionally. Currently, the following conditions are
   * supported: - To make the `RoleAssignment` only applicable to [Security
   * Groups](https://cloud.google.com/identity/docs/groups#group_types):
   * `api.getAttribute('cloudidentity.googleapis.com/groups.labels',
   * []).hasAny(['groups.security']) && resource.type ==
   * 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not
   * applicable to [Security
   * Groups](https://cloud.google.com/identity/docs/groups#group_types):
   * `!api.getAttribute('cloudidentity.googleapis.com/groups.labels',
   * []).hasAny(['groups.security']) && resource.type ==
   * 'cloudidentity.googleapis.com/Group'` Currently, the condition strings have
   * to be verbatim and they only work with the following [pre-built
   * administrator roles](https://support.google.com/a/answer/2405986): - Groups
   * Editor - Groups Reader The condition follows [Cloud IAM condition
   * syntax](https://cloud.google.com/iam/docs/conditions-overview). - To make
   * the `RoleAssignment` not applicable to [Locked
   * Groups](https://cloud.google.com/identity/docs/groups#group_types):
   * `!api.getAttribute('cloudidentity.googleapis.com/groups.labels',
   * []).hasAny(['groups.locked']) && resource.type ==
   * 'cloudidentity.googleapis.com/Group'` This condition can also be used in
   * conjunction with a Security-related condition.
   *
   * @param string $condition
   */
  public function setCondition($condition)
  {
    $this->condition = $condition;
  }
  /**
   * @return string
   */
  public function getCondition()
  {
    return $this->condition;
  }
  /**
   * ETag of the resource.
   *
   * @param string $etag
   */
  public function setEtag($etag)
  {
    $this->etag = $etag;
  }
  /**
   * @return string
   */
  public function getEtag()
  {
    return $this->etag;
  }
  /**
   * The type of the API resource. This is always
   * `admin#directory#roleAssignment`.
   *
   * @param string $kind
   */
  public function setKind($kind)
  {
    $this->kind = $kind;
  }
  /**
   * @return string
   */
  public function getKind()
  {
    return $this->kind;
  }
  /**
   * If the role is restricted to an organization unit, this contains the ID for
   * the organization unit the exercise of this role is restricted to.
   *
   * @param string $orgUnitId
   */
  public function setOrgUnitId($orgUnitId)
  {
    $this->orgUnitId = $orgUnitId;
  }
  /**
   * @return string
   */
  public function getOrgUnitId()
  {
    return $this->orgUnitId;
  }
  /**
   * ID of this roleAssignment.
   *
   * @param string $roleAssignmentId
   */
  public function setRoleAssignmentId($roleAssignmentId)
  {
    $this->roleAssignmentId = $roleAssignmentId;
  }
  /**
   * @return string
   */
  public function getRoleAssignmentId()
  {
    return $this->roleAssignmentId;
  }
  /**
   * The ID of the role that is assigned.
   *
   * @param string $roleId
   */
  public function setRoleId($roleId)
  {
    $this->roleId = $roleId;
  }
  /**
   * @return string
   */
  public function getRoleId()
  {
    return $this->roleId;
  }
  /**
   * The scope in which this role is assigned.
   *
   * @param string $scopeType
   */
  public function setScopeType($scopeType)
  {
    $this->scopeType = $scopeType;
  }
  /**
   * @return string
   */
  public function getScopeType()
  {
    return $this->scopeType;
  }
}

// Adding a class alias for backwards compatibility with the previous class name.
class_alias(RoleAssignment::class, 'Google_Service_Directory_RoleAssignment');