google-apis-accesscontextmanager_v1 0.25.0 → 0.27.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +9 -0
- data/lib/google/apis/accesscontextmanager_v1/classes.rb +52 -46
- data/lib/google/apis/accesscontextmanager_v1/gem_version.rb +3 -3
- data/lib/google/apis/accesscontextmanager_v1/service.rb +13 -12
- data/lib/google/apis/accesscontextmanager_v1.rb +2 -1
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 58fa7e865f2c86db504a6ab7d5538349b62664545d8643ea8f481a17a7514796
|
4
|
+
data.tar.gz: '058059c637418a093059f95d0accc4d28b933c67d9ef18fd203bd48c1234e4b4'
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: fba53db8fb7232cc81d3b4fffa009222bd08f412a81680a3e41832d85e4ba205676b8258524de4786a37ec9efaaced54cfde0f9b0eab3b7a596b4c250c88193d
|
7
|
+
data.tar.gz: 38685a9b30181faed96a68b2b3d3afe8be25825453924ba171def3cb5c327bb70738c00371de9195d22c6f2d6291d6bf03f804af8de466cce7c229d6d0c00406
|
data/CHANGELOG.md
CHANGED
@@ -1,5 +1,14 @@
|
|
1
1
|
# Release history for google-apis-accesscontextmanager_v1
|
2
2
|
|
3
|
+
### v0.27.0 (2023-02-05)
|
4
|
+
|
5
|
+
* Regenerated from discovery document revision 20230130
|
6
|
+
|
7
|
+
### v0.26.0 (2023-01-15)
|
8
|
+
|
9
|
+
* Regenerated from discovery document revision 20230109
|
10
|
+
* Regenerated using generator version 0.11.1
|
11
|
+
|
3
12
|
### v0.25.0 (2022-12-26)
|
4
13
|
|
5
14
|
* Regenerated from discovery document revision 20221213
|
@@ -248,47 +248,49 @@ module Google
|
|
248
248
|
end
|
249
249
|
end
|
250
250
|
|
251
|
-
# `AuthorizedOrgsDesc`
|
252
|
-
# authorization type and asset type and its authorization direction.
|
251
|
+
# `AuthorizedOrgsDesc` contains data for an organization's authorization policy.
|
253
252
|
class AuthorizedOrgsDesc
|
254
253
|
include Google::Apis::Core::Hashable
|
255
254
|
|
256
|
-
# The asset type of this authorized orgs desc.
|
255
|
+
# The asset type of this authorized orgs desc. Valid values are `
|
256
|
+
# ASSET_TYPE_DEVICE`, and `ASSET_TYPE_CREDENTIAL_STRENGTH`.
|
257
257
|
# Corresponds to the JSON property `assetType`
|
258
258
|
# @return [String]
|
259
259
|
attr_accessor :asset_type
|
260
260
|
|
261
|
-
#
|
262
|
-
#
|
263
|
-
#
|
264
|
-
#
|
265
|
-
#
|
266
|
-
#
|
267
|
-
#
|
268
|
-
#
|
269
|
-
#
|
270
|
-
# AUTHORIZATION_DIRECTION_TO`
|
271
|
-
#
|
261
|
+
# The direction of the authorization relationship between this organization and
|
262
|
+
# the organizations listed in the `orgs` field. The valid values for this field
|
263
|
+
# include the following: `AUTHORIZATION_DIRECTION_FROM`: Allows this
|
264
|
+
# organization to evaluate traffic in the organizations listed in the `orgs`
|
265
|
+
# field. `AUTHORIZATION_DIRECTION_TO`: Allows the organizations listed in the `
|
266
|
+
# orgs` field to evaluate the traffic in this organization. For the
|
267
|
+
# authorization relationship to take effect, all of the organizations must
|
268
|
+
# authorize and specify the appropriate relationship direction. For example, if
|
269
|
+
# organization A authorized organization B and C to evaluate its traffic, by
|
270
|
+
# specifying `AUTHORIZATION_DIRECTION_TO` as the authorization direction,
|
271
|
+
# organizations B and C must specify `AUTHORIZATION_DIRECTION_FROM` as the
|
272
|
+
# authorization direction in their `AuthorizedOrgsDesc` resource.
|
272
273
|
# Corresponds to the JSON property `authorizationDirection`
|
273
274
|
# @return [String]
|
274
275
|
attr_accessor :authorization_direction
|
275
276
|
|
276
|
-
#
|
277
|
-
#
|
277
|
+
# A granular control type for authorization levels. Valid value is `
|
278
|
+
# AUTHORIZATION_TYPE_TRUST`.
|
278
279
|
# Corresponds to the JSON property `authorizationType`
|
279
280
|
# @return [String]
|
280
281
|
attr_accessor :authorization_type
|
281
282
|
|
282
|
-
#
|
283
|
-
#
|
284
|
-
#
|
285
|
-
#
|
286
|
-
#
|
283
|
+
# Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/`
|
284
|
+
# access_policy`/authorizedOrgsDescs/`authorized_orgs_desc``. The `
|
285
|
+
# authorized_orgs_desc` component must begin with a letter, followed by
|
286
|
+
# alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you
|
287
|
+
# cannot change its `name`.
|
287
288
|
# Corresponds to the JSON property `name`
|
288
289
|
# @return [String]
|
289
290
|
attr_accessor :name
|
290
291
|
|
291
|
-
# The list of organization ids in this AuthorizedOrgsDesc.
|
292
|
+
# The list of organization ids in this AuthorizedOrgsDesc. Format: `
|
293
|
+
# organizations/` Example: `organizations/123456`
|
292
294
|
# Corresponds to the JSON property `orgs`
|
293
295
|
# @return [Array<String>]
|
294
296
|
attr_accessor :orgs
|
@@ -374,22 +376,22 @@ module Google
|
|
374
376
|
# kubernetes-engine/docs/how-to/kubernetes-service-accounts). For example, `my-
|
375
377
|
# project.svc.id.goog[my-namespace/my-kubernetes-sa]`. * `group:`emailid``: An
|
376
378
|
# email address that represents a Google group. For example, `admins@example.com`
|
377
|
-
# . * `
|
378
|
-
#
|
379
|
-
#
|
380
|
-
#
|
381
|
-
# the
|
382
|
-
#
|
383
|
-
#
|
379
|
+
# . * `domain:`domain``: The G Suite domain (primary) that represents all the
|
380
|
+
# users of that domain. For example, `google.com` or `example.com`. * `deleted:
|
381
|
+
# user:`emailid`?uid=`uniqueid``: An email address (plus unique identifier)
|
382
|
+
# representing a user that has been recently deleted. For example, `alice@
|
383
|
+
# example.com?uid=123456789012345678901`. If the user is recovered, this value
|
384
|
+
# reverts to `user:`emailid`` and the recovered user retains the role in the
|
385
|
+
# binding. * `deleted:serviceAccount:`emailid`?uid=`uniqueid``: An email address
|
386
|
+
# (plus unique identifier) representing a service account that has been recently
|
387
|
+
# deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=
|
384
388
|
# 123456789012345678901`. If the service account is undeleted, this value
|
385
389
|
# reverts to `serviceAccount:`emailid`` and the undeleted service account
|
386
390
|
# retains the role in the binding. * `deleted:group:`emailid`?uid=`uniqueid``:
|
387
391
|
# An email address (plus unique identifier) representing a Google group that has
|
388
392
|
# been recently deleted. For example, `admins@example.com?uid=
|
389
393
|
# 123456789012345678901`. If the group is recovered, this value reverts to `
|
390
|
-
# group:`emailid`` and the recovered group retains the role in the binding.
|
391
|
-
# domain:`domain``: The G Suite domain (primary) that represents all the users
|
392
|
-
# of that domain. For example, `google.com` or `example.com`.
|
394
|
+
# group:`emailid`` and the recovered group retains the role in the binding.
|
393
395
|
# Corresponds to the JSON property `members`
|
394
396
|
# @return [Array<String>]
|
395
397
|
attr_accessor :members
|
@@ -1038,10 +1040,11 @@ module Google
|
|
1038
1040
|
|
1039
1041
|
# A Google Cloud resource that is allowed to ingress the perimeter. Requests
|
1040
1042
|
# from these resources will be allowed to access perimeter data. Currently only
|
1041
|
-
# projects are allowed.
|
1042
|
-
#
|
1043
|
-
#
|
1044
|
-
#
|
1043
|
+
# projects and VPCs are allowed. Project format: `projects/`project_number`` VPC
|
1044
|
+
# network format: `//compute.googleapis.com/projects/`PROJECT_ID`/global/
|
1045
|
+
# networks/`NAME``. The project may be in any Google Cloud organization, not
|
1046
|
+
# just the organization that the perimeter is defined in. `*` is not allowed,
|
1047
|
+
# the case of allowing all Google Cloud resources only is not supported.
|
1045
1048
|
# Corresponds to the JSON property `resource`
|
1046
1049
|
# @return [String]
|
1047
1050
|
attr_accessor :resource
|
@@ -1145,7 +1148,7 @@ module Google
|
|
1145
1148
|
class ListAuthorizedOrgsDescsResponse
|
1146
1149
|
include Google::Apis::Core::Hashable
|
1147
1150
|
|
1148
|
-
# List of the Authorized Orgs Desc instances.
|
1151
|
+
# List of all the Authorized Orgs Desc instances.
|
1149
1152
|
# Corresponds to the JSON property `authorizedOrgsDescs`
|
1150
1153
|
# @return [Array<Google::Apis::AccesscontextmanagerV1::AuthorizedOrgsDesc>]
|
1151
1154
|
attr_accessor :authorized_orgs_descs
|
@@ -1575,9 +1578,10 @@ module Google
|
|
1575
1578
|
# has a target outside of the `ServicePerimeter`, the request will be blocked.
|
1576
1579
|
# Otherwise the request is allowed. There are two types of Service Perimeter -
|
1577
1580
|
# Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google
|
1578
|
-
# Cloud project can only belong to a single regular Service
|
1579
|
-
# Perimeter Bridges can contain only Google Cloud projects as
|
1580
|
-
# Google Cloud project may belong to multiple Service
|
1581
|
+
# Cloud project or VPC network can only belong to a single regular Service
|
1582
|
+
# Perimeter. Service Perimeter Bridges can contain only Google Cloud projects as
|
1583
|
+
# members, a single Google Cloud project may belong to multiple Service
|
1584
|
+
# Perimeter Bridges.
|
1581
1585
|
class ServicePerimeter
|
1582
1586
|
include Google::Apis::Core::Hashable
|
1583
1587
|
|
@@ -1594,11 +1598,11 @@ module Google
|
|
1594
1598
|
# @return [String]
|
1595
1599
|
attr_accessor :name
|
1596
1600
|
|
1597
|
-
# Perimeter type indicator. A single project is allowed to be a
|
1598
|
-
# regular perimeter, but multiple service perimeter bridges. A
|
1599
|
-
# a included in a perimeter bridge without being included in
|
1600
|
-
# For perimeter bridges, the restricted service list as well
|
1601
|
-
# lists must be empty.
|
1601
|
+
# Perimeter type indicator. A single project or VPC network is allowed to be a
|
1602
|
+
# member of single regular perimeter, but multiple service perimeter bridges. A
|
1603
|
+
# project cannot be a included in a perimeter bridge without being included in
|
1604
|
+
# regular perimeter. For perimeter bridges, the restricted service list as well
|
1605
|
+
# as access level lists must be empty.
|
1602
1606
|
# Corresponds to the JSON property `perimeterType`
|
1603
1607
|
# @return [String]
|
1604
1608
|
attr_accessor :perimeter_type
|
@@ -1681,7 +1685,9 @@ module Google
|
|
1681
1685
|
attr_accessor :ingress_policies
|
1682
1686
|
|
1683
1687
|
# A list of Google Cloud resources that are inside of the service perimeter.
|
1684
|
-
# Currently only projects are allowed.
|
1688
|
+
# Currently only projects and VPCs are allowed. Project format: `projects/`
|
1689
|
+
# project_number`` VPC network format: `//compute.googleapis.com/projects/`
|
1690
|
+
# PROJECT_ID`/global/networks/`NAME``.
|
1685
1691
|
# Corresponds to the JSON property `resources`
|
1686
1692
|
# @return [Array<String>]
|
1687
1693
|
attr_accessor :resources
|
@@ -16,13 +16,13 @@ module Google
|
|
16
16
|
module Apis
|
17
17
|
module AccesscontextmanagerV1
|
18
18
|
# Version of the google-apis-accesscontextmanager_v1 gem
|
19
|
-
GEM_VERSION = "0.
|
19
|
+
GEM_VERSION = "0.27.0"
|
20
20
|
|
21
21
|
# Version of the code generator used to generate this client
|
22
|
-
GENERATOR_VERSION = "0.11.
|
22
|
+
GENERATOR_VERSION = "0.11.1"
|
23
23
|
|
24
24
|
# Revision of the discovery document this client was generated from
|
25
|
-
REVISION = "
|
25
|
+
REVISION = "20230130"
|
26
26
|
end
|
27
27
|
end
|
28
28
|
end
|
@@ -22,7 +22,8 @@ module Google
|
|
22
22
|
module AccesscontextmanagerV1
|
23
23
|
# Access Context Manager API
|
24
24
|
#
|
25
|
-
# An API for setting attribute based access control to requests to
|
25
|
+
# An API for setting attribute based access control to requests to Google Cloud
|
26
|
+
# services.
|
26
27
|
#
|
27
28
|
# @example
|
28
29
|
# require 'google/apis/accesscontextmanager_v1'
|
@@ -604,8 +605,8 @@ module Google
|
|
604
605
|
execute_or_queue_command(command, &block)
|
605
606
|
end
|
606
607
|
|
607
|
-
# Creates
|
608
|
-
# successful status after the authorized orgs desc propagates to long-lasting
|
608
|
+
# Creates an authorized orgs desc. The long-running operation from this RPC has
|
609
|
+
# a successful status after the authorized orgs desc propagates to long-lasting
|
609
610
|
# storage. If a authorized orgs desc contains errors, an error response is
|
610
611
|
# returned for the first error encountered. The name of this `AuthorizedOrgsDesc`
|
611
612
|
# will be assigned during creation.
|
@@ -642,7 +643,7 @@ module Google
|
|
642
643
|
execute_or_queue_command(command, &block)
|
643
644
|
end
|
644
645
|
|
645
|
-
# Deletes
|
646
|
+
# Deletes an authorized orgs desc based on the resource name. The long-running
|
646
647
|
# operation from this RPC has a successful status after the authorized orgs desc
|
647
648
|
# is removed from long-lasting storage.
|
648
649
|
# @param [String] name
|
@@ -675,7 +676,7 @@ module Google
|
|
675
676
|
execute_or_queue_command(command, &block)
|
676
677
|
end
|
677
678
|
|
678
|
-
# Gets
|
679
|
+
# Gets an authorized orgs desc based on the resource name.
|
679
680
|
# @param [String] name
|
680
681
|
# Required. Resource name for the Authorized Orgs Desc. Format: `accessPolicies/`
|
681
682
|
# policy_id`/authorizedOrgsDescs/`authorized_orgs_descs_id``
|
@@ -744,18 +745,18 @@ module Google
|
|
744
745
|
execute_or_queue_command(command, &block)
|
745
746
|
end
|
746
747
|
|
747
|
-
# Updates
|
748
|
-
# successful status after the authorized orgs desc propagates to long-lasting
|
748
|
+
# Updates an authorized orgs desc. The long-running operation from this RPC has
|
749
|
+
# a successful status after the authorized orgs desc propagates to long-lasting
|
749
750
|
# storage. If a authorized orgs desc contains errors, an error response is
|
750
751
|
# returned for the first error encountered. Only the organization list in `
|
751
752
|
# AuthorizedOrgsDesc` can be updated. The name, authorization_type, asset_type
|
752
753
|
# and authorization_direction cannot be updated.
|
753
754
|
# @param [String] name
|
754
|
-
#
|
755
|
-
#
|
756
|
-
#
|
757
|
-
#
|
758
|
-
#
|
755
|
+
# Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/`
|
756
|
+
# access_policy`/authorizedOrgsDescs/`authorized_orgs_desc``. The `
|
757
|
+
# authorized_orgs_desc` component must begin with a letter, followed by
|
758
|
+
# alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you
|
759
|
+
# cannot change its `name`.
|
759
760
|
# @param [Google::Apis::AccesscontextmanagerV1::AuthorizedOrgsDesc] authorized_orgs_desc_object
|
760
761
|
# @param [String] update_mask
|
761
762
|
# Required. Mask to control which fields get updated. Must be non-empty.
|
@@ -21,7 +21,8 @@ module Google
|
|
21
21
|
module Apis
|
22
22
|
# Access Context Manager API
|
23
23
|
#
|
24
|
-
# An API for setting attribute based access control to requests to
|
24
|
+
# An API for setting attribute based access control to requests to Google Cloud
|
25
|
+
# services.
|
25
26
|
#
|
26
27
|
# @see https://cloud.google.com/access-context-manager/docs/reference/rest/
|
27
28
|
module AccesscontextmanagerV1
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-apis-accesscontextmanager_v1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.27.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-
|
11
|
+
date: 2023-02-05 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: google-apis-core
|
@@ -58,7 +58,7 @@ licenses:
|
|
58
58
|
metadata:
|
59
59
|
bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
|
60
60
|
changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-accesscontextmanager_v1/CHANGELOG.md
|
61
|
-
documentation_uri: https://googleapis.dev/ruby/google-apis-accesscontextmanager_v1/v0.
|
61
|
+
documentation_uri: https://googleapis.dev/ruby/google-apis-accesscontextmanager_v1/v0.27.0
|
62
62
|
source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-accesscontextmanager_v1
|
63
63
|
post_install_message:
|
64
64
|
rdoc_options: []
|
@@ -75,7 +75,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
75
75
|
- !ruby/object:Gem::Version
|
76
76
|
version: '0'
|
77
77
|
requirements: []
|
78
|
-
rubygems_version: 3.
|
78
|
+
rubygems_version: 3.4.2
|
79
79
|
signing_key:
|
80
80
|
specification_version: 4
|
81
81
|
summary: Simple REST client for Access Context Manager API V1
|