📂 File Browser

/AgentAI/vendor/google/apiclient-services/src/Storage
🌙 Dark Mode
🎯 Quick Launch:

📁 Directories

📁 Resource/ 🔓 Open

📄 Files

🐘 AdvanceRelocateBucketOperationRequest.php
▶ Open 📄 View Source
🐘 AnywhereCache.php
▶ Open 📄 View Source
🐘 AnywhereCaches.php
▶ Open 📄 View Source
🐘 Bucket.php
▶ Open 📄 View Source
🐘 BucketAccessControl.php
▶ Open 📄 View Source
🐘 BucketAccessControlProjectTeam.php
▶ Open 📄 View Source
🐘 BucketAccessControls.php
▶ Open 📄 View Source
🐘 BucketAutoclass.php
▶ Open 📄 View Source
🐘 BucketBilling.php
▶ Open 📄 View Source
🐘 BucketCors.php
▶ Open 📄 View Source
🐘 BucketCustomPlacementConfig.php
▶ Open 📄 View Source
🐘 BucketEncryption.php
▶ Open 📄 View Source
🐘 BucketEncryptionCustomerManagedEncryptionEnforcementConfig.php
▶ Open 📄 View Source
🐘 BucketEncryptionCustomerSuppliedEncryptionEnforcementConfig.php
▶ Open 📄 View Source
🐘 BucketEncryptionGoogleManagedEncryptionEnforcementConfig.php
▶ Open 📄 View Source
🐘 BucketHierarchicalNamespace.php
▶ Open 📄 View Source
🐘 BucketIamConfiguration.php
▶ Open 📄 View Source
🐘 BucketIamConfigurationBucketPolicyOnly.php
▶ Open 📄 View Source
🐘 BucketIamConfigurationUniformBucketLevelAccess.php
▶ Open 📄 View Source
🐘 BucketIpFilter.php
▶ Open 📄 View Source
🐘 BucketIpFilterPublicNetworkSource.php
▶ Open 📄 View Source
🐘 BucketIpFilterVpcNetworkSources.php
▶ Open 📄 View Source
🐘 BucketLifecycle.php
▶ Open 📄 View Source
🐘 BucketLifecycleRule.php
▶ Open 📄 View Source
🐘 BucketLifecycleRuleAction.php
▶ Open 📄 View Source
🐘 BucketLifecycleRuleCondition.php
▶ Open 📄 View Source
🐘 BucketLogging.php
▶ Open 📄 View Source
🐘 BucketObjectRetention.php
▶ Open 📄 View Source
🐘 BucketOwner.php
▶ Open 📄 View Source
🐘 BucketRetentionPolicy.php
▶ Open 📄 View Source
🐘 BucketSoftDeletePolicy.php
▶ Open 📄 View Source
🐘 BucketStorageLayout.php
▶ Open 📄 View Source
🐘 BucketStorageLayoutCustomPlacementConfig.php
▶ Open 📄 View Source
🐘 BucketStorageLayoutHierarchicalNamespace.php
▶ Open 📄 View Source
🐘 BucketVersioning.php
▶ Open 📄 View Source
🐘 BucketWebsite.php
▶ Open 📄 View Source
🐘 Buckets.php
▶ Open 📄 View Source
🐘 BulkRestoreObjectsRequest.php
▶ Open 📄 View Source
🐘 Channel.php
▶ Open 📄 View Source
🐘 ComposeRequest.php
▶ Open 📄 View Source
🐘 ComposeRequestSourceObjects.php
▶ Open 📄 View Source
🐘 ComposeRequestSourceObjectsObjectPreconditions.php
▶ Open 📄 View Source
🐘 Expr.php
▶ Open 📄 View Source
🐘 Folder.php
▶ Open 📄 View Source
🐘 FolderPendingRenameInfo.php
▶ Open 📄 View Source
🐘 Folders.php
▶ Open 📄 View Source
🐘 GoogleLongrunningListOperationsResponse.php
▶ Open 📄 View Source
🐘 GoogleLongrunningOperation.php
▶ Open 📄 View Source
🐘 GoogleRpcStatus.php
▶ Open 📄 View Source
🐘 HmacKey.php
▶ Open 📄 View Source
🐘 HmacKeyMetadata.php
▶ Open 📄 View Source
🐘 HmacKeysMetadata.php
▶ Open 📄 View Source
🐘 ManagedFolder.php
▶ Open 📄 View Source
🐘 ManagedFolders.php
▶ Open 📄 View Source
🐘 Notification.php
▶ Open 📄 View Source
🐘 Notifications.php
▶ Open 📄 View Source
🐘 ObjectAccessControl.php
▶ Open 📄 View Source
🐘 ObjectAccessControlProjectTeam.php
▶ Open 📄 View Source
🐘 ObjectAccessControls.php
▶ Open 📄 View Source
🐘 ObjectCustomContextPayload.php
▶ Open 📄 View Source
🐘 Objects.php
▶ Open 📄 View Source
🐘 Policy.php
▶ Open 📄 View Source
🐘 PolicyBindings.php
▶ Open 📄 View Source
🐘 RelocateBucketRequest.php
▶ Open 📄 View Source
🐘 RelocateBucketRequestDestinationCustomPlacementConfig.php
▶ Open 📄 View Source
🐘 RewriteResponse.php
▶ Open 📄 View Source
🐘 ServiceAccount.php
▶ Open 📄 View Source
🐘 StorageObject.php
▶ Open 📄 View Source
🐘 StorageObjectContexts.php
▶ Open 📄 View Source
🐘 StorageObjectCustomerEncryption.php
▶ Open 📄 View Source
🐘 StorageObjectOwner.php
▶ Open 📄 View Source
🐘 StorageObjectRetention.php
▶ Open 📄 View Source
🐘 TestIamPermissionsResponse.php
▶ Open 📄 View Source

📄 Source: PolicyBindings.php

<?php
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */

namespace Google\Service\Storage;

class PolicyBindings extends \Google\Collection
{
  protected $collection_key = 'members';
  protected $conditionType = Expr::class;
  protected $conditionDataType = '';
  /**
   * A collection of identifiers for members who may assume the provided role.
   * Recognized identifiers are as follows: - allUsers - A special identifier
   * that represents anyone on the internet; with or without a Google account.
   * - allAuthenticatedUsers - A special identifier that represents anyone who
   * is authenticated with a Google account or a service account.   -
   * user:emailid - An email address that represents a specific account. For
   * example, user:alice@gmail.com or user:joe@example.com.   -
   * serviceAccount:emailid - An email address that represents a service
   * account. For example,  serviceAccount:my-other-
   * app@appspot.gserviceaccount.com .   - group:emailid - An email address that
   * represents a Google group. For example, group:admins@example.com.   -
   * domain:domain - A Google Apps domain name that represents all the users of
   * that domain. For example, domain:google.com or domain:example.com.   -
   * projectOwner:projectid - Owners of the given project. For example,
   * projectOwner:my-example-project   - projectEditor:projectid - Editors of
   * the given project. For example, projectEditor:my-example-project   -
   * projectViewer:projectid - Viewers of the given project. For example,
   * projectViewer:my-example-project
   *
   * @var string[]
   */
  public $members;
  /**
   * The role to which members belong. Two types of roles are supported: new IAM
   * roles, which grant permissions that do not map directly to those provided
   * by ACLs, and legacy IAM roles, which do map directly to ACL permissions.
   * All roles are of the format roles/storage.specificRole. The new IAM roles
   * are:   - roles/storage.admin - Full control of Google Cloud Storage
   * resources.   - roles/storage.objectViewer - Read-Only access to Google
   * Cloud Storage objects.   - roles/storage.objectCreator - Access to create
   * objects in Google Cloud Storage.   - roles/storage.objectAdmin - Full
   * control of Google Cloud Storage objects.   The legacy IAM roles are:   -
   * roles/storage.legacyObjectReader - Read-only access to objects without
   * listing. Equivalent to an ACL entry on an object with the READER role.   -
   * roles/storage.legacyObjectOwner - Read/write access to existing objects
   * without listing. Equivalent to an ACL entry on an object with the OWNER
   * role.   - roles/storage.legacyBucketReader - Read access to buckets with
   * object listing. Equivalent to an ACL entry on a bucket with the READER
   * role.   - roles/storage.legacyBucketWriter - Read access to buckets with
   * object listing/creation/deletion. Equivalent to an ACL entry on a bucket
   * with the WRITER role.   - roles/storage.legacyBucketOwner - Read and write
   * access to existing buckets with object listing/creation/deletion.
   * Equivalent to an ACL entry on a bucket with the OWNER role.
   *
   * @var string
   */
  public $role;

  /**
   * The condition that is associated with this binding. NOTE: an unsatisfied
   * condition will not allow user access via current binding. Different
   * bindings, including their conditions, are examined independently.
   *
   * @param Expr $condition
   */
  public function setCondition(Expr $condition)
  {
    $this->condition = $condition;
  }
  /**
   * @return Expr
   */
  public function getCondition()
  {
    return $this->condition;
  }
  /**
   * A collection of identifiers for members who may assume the provided role.
   * Recognized identifiers are as follows: - allUsers - A special identifier
   * that represents anyone on the internet; with or without a Google account.
   * - allAuthenticatedUsers - A special identifier that represents anyone who
   * is authenticated with a Google account or a service account.   -
   * user:emailid - An email address that represents a specific account. For
   * example, user:alice@gmail.com or user:joe@example.com.   -
   * serviceAccount:emailid - An email address that represents a service
   * account. For example,  serviceAccount:my-other-
   * app@appspot.gserviceaccount.com .   - group:emailid - An email address that
   * represents a Google group. For example, group:admins@example.com.   -
   * domain:domain - A Google Apps domain name that represents all the users of
   * that domain. For example, domain:google.com or domain:example.com.   -
   * projectOwner:projectid - Owners of the given project. For example,
   * projectOwner:my-example-project   - projectEditor:projectid - Editors of
   * the given project. For example, projectEditor:my-example-project   -
   * projectViewer:projectid - Viewers of the given project. For example,
   * projectViewer:my-example-project
   *
   * @param string[] $members
   */
  public function setMembers($members)
  {
    $this->members = $members;
  }
  /**
   * @return string[]
   */
  public function getMembers()
  {
    return $this->members;
  }
  /**
   * The role to which members belong. Two types of roles are supported: new IAM
   * roles, which grant permissions that do not map directly to those provided
   * by ACLs, and legacy IAM roles, which do map directly to ACL permissions.
   * All roles are of the format roles/storage.specificRole. The new IAM roles
   * are:   - roles/storage.admin - Full control of Google Cloud Storage
   * resources.   - roles/storage.objectViewer - Read-Only access to Google
   * Cloud Storage objects.   - roles/storage.objectCreator - Access to create
   * objects in Google Cloud Storage.   - roles/storage.objectAdmin - Full
   * control of Google Cloud Storage objects.   The legacy IAM roles are:   -
   * roles/storage.legacyObjectReader - Read-only access to objects without
   * listing. Equivalent to an ACL entry on an object with the READER role.   -
   * roles/storage.legacyObjectOwner - Read/write access to existing objects
   * without listing. Equivalent to an ACL entry on an object with the OWNER
   * role.   - roles/storage.legacyBucketReader - Read access to buckets with
   * object listing. Equivalent to an ACL entry on a bucket with the READER
   * role.   - roles/storage.legacyBucketWriter - Read access to buckets with
   * object listing/creation/deletion. Equivalent to an ACL entry on a bucket
   * with the WRITER role.   - roles/storage.legacyBucketOwner - Read and write
   * access to existing buckets with object listing/creation/deletion.
   * Equivalent to an ACL entry on a bucket with the OWNER role.
   *
   * @param string $role
   */
  public function setRole($role)
  {
    $this->role = $role;
  }
  /**
   * @return string
   */
  public function getRole()
  {
    return $this->role;
  }
}

// Adding a class alias for backwards compatibility with the previous class name.
class_alias(PolicyBindings::class, 'Google_Service_Storage_PolicyBindings');
← Back