The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returned policy bindings. Note that the
map is populated only for requests with permission queries.
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returned policy bindings. Note that the
map is populated only for requests with permission queries.
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returned policy bindings. Note that the
map is populated only for requests with permission queries.
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returned policy bindings. Note that the
map is populated only for requests with permission queries.
The map from roles to their included permissions that match the
permission query (i.e., a query containing policy.role.permissions:).
Example: if query policy.role.permissions:compute.disk.get
matches a policy binding that contains owner role, the
matched_permissions will be {"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returned policy bindings. Note that the
map is populated only for requests with permission queries.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-28 UTC."],[],[],null,[]]