google-apis-accesscontextmanager_v1 0.25.0 → 0.27.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 510e203b19ab13e99f282ed69127a242378b5a0b85dfa8f31ddf2180eca2e202
4
- data.tar.gz: f9408b26369f3c0ae053e203fc9b4fc64fbed3920b3c7c9743c139f712fae1f1
3
+ metadata.gz: 58fa7e865f2c86db504a6ab7d5538349b62664545d8643ea8f481a17a7514796
4
+ data.tar.gz: '058059c637418a093059f95d0accc4d28b933c67d9ef18fd203bd48c1234e4b4'
5
5
  SHA512:
6
- metadata.gz: 38d3e734c1810d535ceab219c2beb0eaa757864e870259fc18cf759e8566076e34b755b1e69facf07b7314e25a3f875fcca551da72d1b3388f4de4cd85813994
7
- data.tar.gz: a96e3a95959d03a95524532064655c0de481ea7c9e945c670b06e6a0ac68cb9e679765cdb6b212910bf88fb8aa20726e66b54b44ee941f28f207abb1e9eefe29
6
+ metadata.gz: fba53db8fb7232cc81d3b4fffa009222bd08f412a81680a3e41832d85e4ba205676b8258524de4786a37ec9efaaced54cfde0f9b0eab3b7a596b4c250c88193d
7
+ data.tar.gz: 38685a9b30181faed96a68b2b3d3afe8be25825453924ba171def3cb5c327bb70738c00371de9195d22c6f2d6291d6bf03f804af8de466cce7c229d6d0c00406
data/CHANGELOG.md CHANGED
@@ -1,5 +1,14 @@
1
1
  # Release history for google-apis-accesscontextmanager_v1
2
2
 
3
+ ### v0.27.0 (2023-02-05)
4
+
5
+ * Regenerated from discovery document revision 20230130
6
+
7
+ ### v0.26.0 (2023-01-15)
8
+
9
+ * Regenerated from discovery document revision 20230109
10
+ * Regenerated using generator version 0.11.1
11
+
3
12
  ### v0.25.0 (2022-12-26)
4
13
 
5
14
  * Regenerated from discovery document revision 20221213
@@ -248,47 +248,49 @@ module Google
248
248
  end
249
249
  end
250
250
 
251
- # `AuthorizedOrgsDesc` is a resource that contains a list of organizations for a
252
- # authorization type and asset type and its authorization direction.
251
+ # `AuthorizedOrgsDesc` contains data for an organization's authorization policy.
253
252
  class AuthorizedOrgsDesc
254
253
  include Google::Apis::Core::Hashable
255
254
 
256
- # The asset type of this authorized orgs desc. e.g. device, credential strength.
255
+ # The asset type of this authorized orgs desc. Valid values are `
256
+ # ASSET_TYPE_DEVICE`, and `ASSET_TYPE_CREDENTIAL_STRENGTH`.
257
257
  # Corresponds to the JSON property `assetType`
258
258
  # @return [String]
259
259
  attr_accessor :asset_type
260
260
 
261
- # Authorization direction of this authorization relationship. i.e. Whether to
262
- # allow specified orgs to evaluate this org's traffic, or allow specified orgs'
263
- # traffic to be evaluated by this org. Orgs specified as `
264
- # AUTHORIZATION_DIRECTION_TO` in this AuthorizedOrgsDesc[com.google.identity.
265
- # accesscontextmanager.v1.AuthorizedOrgsDesc] must also specify this org as the `
266
- # AUTHORIZATION_DIRECTION_FROM` in their own AuthorizedOrgsDesc in order for
267
- # this relationship to take effect. Orgs specified as `
268
- # AUTHORIZATION_DIRECTION_FROM` in this AuthorizedOrgsDesc[com.google.identity.
269
- # accesscontextmanager.v1.AuthorizedOrgsDesc] must also specify this org as the `
270
- # AUTHORIZATION_DIRECTION_TO` in their own AuthorizedOrgsDesc in order for this
271
- # relationship to take effect.
261
+ # The direction of the authorization relationship between this organization and
262
+ # the organizations listed in the `orgs` field. The valid values for this field
263
+ # include the following: `AUTHORIZATION_DIRECTION_FROM`: Allows this
264
+ # organization to evaluate traffic in the organizations listed in the `orgs`
265
+ # field. `AUTHORIZATION_DIRECTION_TO`: Allows the organizations listed in the `
266
+ # orgs` field to evaluate the traffic in this organization. For the
267
+ # authorization relationship to take effect, all of the organizations must
268
+ # authorize and specify the appropriate relationship direction. For example, if
269
+ # organization A authorized organization B and C to evaluate its traffic, by
270
+ # specifying `AUTHORIZATION_DIRECTION_TO` as the authorization direction,
271
+ # organizations B and C must specify `AUTHORIZATION_DIRECTION_FROM` as the
272
+ # authorization direction in their `AuthorizedOrgsDesc` resource.
272
273
  # Corresponds to the JSON property `authorizationDirection`
273
274
  # @return [String]
274
275
  attr_accessor :authorization_direction
275
276
 
276
- # The authorization type of this authorized orgs desc. e.g.authorization,
277
- # troubleshooting or logging.
277
+ # A granular control type for authorization levels. Valid value is `
278
+ # AUTHORIZATION_TYPE_TRUST`.
278
279
  # Corresponds to the JSON property `authorizationType`
279
280
  # @return [String]
280
281
  attr_accessor :authorization_type
281
282
 
282
- # Assigned by the server during creation. The last segment has an arbitrary
283
- # length and has only URI unreserved characters (as defined by [RFC 3986 Section
284
- # 2.3](https://tools.ietf.org/html/rfc3986#section-2.3)). Should not be
285
- # specified by the client during creation. Example: "accessPolicies/122256/
286
- # authorizedOrgs/b3-BhcX_Ud5N"
283
+ # Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/`
284
+ # access_policy`/authorizedOrgsDescs/`authorized_orgs_desc``. The `
285
+ # authorized_orgs_desc` component must begin with a letter, followed by
286
+ # alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you
287
+ # cannot change its `name`.
287
288
  # Corresponds to the JSON property `name`
288
289
  # @return [String]
289
290
  attr_accessor :name
290
291
 
291
- # The list of organization ids in this AuthorizedOrgsDesc.
292
+ # The list of organization ids in this AuthorizedOrgsDesc. Format: `
293
+ # organizations/` Example: `organizations/123456`
292
294
  # Corresponds to the JSON property `orgs`
293
295
  # @return [Array<String>]
294
296
  attr_accessor :orgs
@@ -374,22 +376,22 @@ module Google
374
376
  # kubernetes-engine/docs/how-to/kubernetes-service-accounts). For example, `my-
375
377
  # project.svc.id.goog[my-namespace/my-kubernetes-sa]`. * `group:`emailid``: An
376
378
  # email address that represents a Google group. For example, `admins@example.com`
377
- # . * `deleted:user:`emailid`?uid=`uniqueid``: An email address (plus unique
378
- # identifier) representing a user that has been recently deleted. For example, `
379
- # alice@example.com?uid=123456789012345678901`. If the user is recovered, this
380
- # value reverts to `user:`emailid`` and the recovered user retains the role in
381
- # the binding. * `deleted:serviceAccount:`emailid`?uid=`uniqueid``: An email
382
- # address (plus unique identifier) representing a service account that has been
383
- # recently deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=
379
+ # . * `domain:`domain``: The G Suite domain (primary) that represents all the
380
+ # users of that domain. For example, `google.com` or `example.com`. * `deleted:
381
+ # user:`emailid`?uid=`uniqueid``: An email address (plus unique identifier)
382
+ # representing a user that has been recently deleted. For example, `alice@
383
+ # example.com?uid=123456789012345678901`. If the user is recovered, this value
384
+ # reverts to `user:`emailid`` and the recovered user retains the role in the
385
+ # binding. * `deleted:serviceAccount:`emailid`?uid=`uniqueid``: An email address
386
+ # (plus unique identifier) representing a service account that has been recently
387
+ # deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=
384
388
  # 123456789012345678901`. If the service account is undeleted, this value
385
389
  # reverts to `serviceAccount:`emailid`` and the undeleted service account
386
390
  # retains the role in the binding. * `deleted:group:`emailid`?uid=`uniqueid``:
387
391
  # An email address (plus unique identifier) representing a Google group that has
388
392
  # been recently deleted. For example, `admins@example.com?uid=
389
393
  # 123456789012345678901`. If the group is recovered, this value reverts to `
390
- # group:`emailid`` and the recovered group retains the role in the binding. * `
391
- # domain:`domain``: The G Suite domain (primary) that represents all the users
392
- # of that domain. For example, `google.com` or `example.com`.
394
+ # group:`emailid`` and the recovered group retains the role in the binding.
393
395
  # Corresponds to the JSON property `members`
394
396
  # @return [Array<String>]
395
397
  attr_accessor :members
@@ -1038,10 +1040,11 @@ module Google
1038
1040
 
1039
1041
  # A Google Cloud resource that is allowed to ingress the perimeter. Requests
1040
1042
  # from these resources will be allowed to access perimeter data. Currently only
1041
- # projects are allowed. Format: `projects/`project_number`` The project may be
1042
- # in any Google Cloud organization, not just the organization that the perimeter
1043
- # is defined in. `*` is not allowed, the case of allowing all Google Cloud
1044
- # resources only is not supported.
1043
+ # projects and VPCs are allowed. Project format: `projects/`project_number`` VPC
1044
+ # network format: `//compute.googleapis.com/projects/`PROJECT_ID`/global/
1045
+ # networks/`NAME``. The project may be in any Google Cloud organization, not
1046
+ # just the organization that the perimeter is defined in. `*` is not allowed,
1047
+ # the case of allowing all Google Cloud resources only is not supported.
1045
1048
  # Corresponds to the JSON property `resource`
1046
1049
  # @return [String]
1047
1050
  attr_accessor :resource
@@ -1145,7 +1148,7 @@ module Google
1145
1148
  class ListAuthorizedOrgsDescsResponse
1146
1149
  include Google::Apis::Core::Hashable
1147
1150
 
1148
- # List of the Authorized Orgs Desc instances.
1151
+ # List of all the Authorized Orgs Desc instances.
1149
1152
  # Corresponds to the JSON property `authorizedOrgsDescs`
1150
1153
  # @return [Array<Google::Apis::AccesscontextmanagerV1::AuthorizedOrgsDesc>]
1151
1154
  attr_accessor :authorized_orgs_descs
@@ -1575,9 +1578,10 @@ module Google
1575
1578
  # has a target outside of the `ServicePerimeter`, the request will be blocked.
1576
1579
  # Otherwise the request is allowed. There are two types of Service Perimeter -
1577
1580
  # Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google
1578
- # Cloud project can only belong to a single regular Service Perimeter. Service
1579
- # Perimeter Bridges can contain only Google Cloud projects as members, a single
1580
- # Google Cloud project may belong to multiple Service Perimeter Bridges.
1581
+ # Cloud project or VPC network can only belong to a single regular Service
1582
+ # Perimeter. Service Perimeter Bridges can contain only Google Cloud projects as
1583
+ # members, a single Google Cloud project may belong to multiple Service
1584
+ # Perimeter Bridges.
1581
1585
  class ServicePerimeter
1582
1586
  include Google::Apis::Core::Hashable
1583
1587
 
@@ -1594,11 +1598,11 @@ module Google
1594
1598
  # @return [String]
1595
1599
  attr_accessor :name
1596
1600
 
1597
- # Perimeter type indicator. A single project is allowed to be a member of single
1598
- # regular perimeter, but multiple service perimeter bridges. A project cannot be
1599
- # a included in a perimeter bridge without being included in regular perimeter.
1600
- # For perimeter bridges, the restricted service list as well as access level
1601
- # lists must be empty.
1601
+ # Perimeter type indicator. A single project or VPC network is allowed to be a
1602
+ # member of single regular perimeter, but multiple service perimeter bridges. A
1603
+ # project cannot be a included in a perimeter bridge without being included in
1604
+ # regular perimeter. For perimeter bridges, the restricted service list as well
1605
+ # as access level lists must be empty.
1602
1606
  # Corresponds to the JSON property `perimeterType`
1603
1607
  # @return [String]
1604
1608
  attr_accessor :perimeter_type
@@ -1681,7 +1685,9 @@ module Google
1681
1685
  attr_accessor :ingress_policies
1682
1686
 
1683
1687
  # A list of Google Cloud resources that are inside of the service perimeter.
1684
- # Currently only projects are allowed. Format: `projects/`project_number``
1688
+ # Currently only projects and VPCs are allowed. Project format: `projects/`
1689
+ # project_number`` VPC network format: `//compute.googleapis.com/projects/`
1690
+ # PROJECT_ID`/global/networks/`NAME``.
1685
1691
  # Corresponds to the JSON property `resources`
1686
1692
  # @return [Array<String>]
1687
1693
  attr_accessor :resources
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module AccesscontextmanagerV1
18
18
  # Version of the google-apis-accesscontextmanager_v1 gem
19
- GEM_VERSION = "0.25.0"
19
+ GEM_VERSION = "0.27.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
- GENERATOR_VERSION = "0.11.0"
22
+ GENERATOR_VERSION = "0.11.1"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20221213"
25
+ REVISION = "20230130"
26
26
  end
27
27
  end
28
28
  end
@@ -22,7 +22,8 @@ module Google
22
22
  module AccesscontextmanagerV1
23
23
  # Access Context Manager API
24
24
  #
25
- # An API for setting attribute based access control to requests to GCP services.
25
+ # An API for setting attribute based access control to requests to Google Cloud
26
+ # services.
26
27
  #
27
28
  # @example
28
29
  # require 'google/apis/accesscontextmanager_v1'
@@ -604,8 +605,8 @@ module Google
604
605
  execute_or_queue_command(command, &block)
605
606
  end
606
607
 
607
- # Creates a authorized orgs desc. The long-running operation from this RPC has a
608
- # successful status after the authorized orgs desc propagates to long-lasting
608
+ # Creates an authorized orgs desc. The long-running operation from this RPC has
609
+ # a successful status after the authorized orgs desc propagates to long-lasting
609
610
  # storage. If a authorized orgs desc contains errors, an error response is
610
611
  # returned for the first error encountered. The name of this `AuthorizedOrgsDesc`
611
612
  # will be assigned during creation.
@@ -642,7 +643,7 @@ module Google
642
643
  execute_or_queue_command(command, &block)
643
644
  end
644
645
 
645
- # Deletes a authorized orgs desc based on the resource name. The long-running
646
+ # Deletes an authorized orgs desc based on the resource name. The long-running
646
647
  # operation from this RPC has a successful status after the authorized orgs desc
647
648
  # is removed from long-lasting storage.
648
649
  # @param [String] name
@@ -675,7 +676,7 @@ module Google
675
676
  execute_or_queue_command(command, &block)
676
677
  end
677
678
 
678
- # Gets a authorized orgs desc based on the resource name.
679
+ # Gets an authorized orgs desc based on the resource name.
679
680
  # @param [String] name
680
681
  # Required. Resource name for the Authorized Orgs Desc. Format: `accessPolicies/`
681
682
  # policy_id`/authorizedOrgsDescs/`authorized_orgs_descs_id``
@@ -744,18 +745,18 @@ module Google
744
745
  execute_or_queue_command(command, &block)
745
746
  end
746
747
 
747
- # Updates a authorized orgs desc. The long-running operation from this RPC has a
748
- # successful status after the authorized orgs desc propagates to long-lasting
748
+ # Updates an authorized orgs desc. The long-running operation from this RPC has
749
+ # a successful status after the authorized orgs desc propagates to long-lasting
749
750
  # storage. If a authorized orgs desc contains errors, an error response is
750
751
  # returned for the first error encountered. Only the organization list in `
751
752
  # AuthorizedOrgsDesc` can be updated. The name, authorization_type, asset_type
752
753
  # and authorization_direction cannot be updated.
753
754
  # @param [String] name
754
- # Assigned by the server during creation. The last segment has an arbitrary
755
- # length and has only URI unreserved characters (as defined by [RFC 3986 Section
756
- # 2.3](https://tools.ietf.org/html/rfc3986#section-2.3)). Should not be
757
- # specified by the client during creation. Example: "accessPolicies/122256/
758
- # authorizedOrgs/b3-BhcX_Ud5N"
755
+ # Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/`
756
+ # access_policy`/authorizedOrgsDescs/`authorized_orgs_desc``. The `
757
+ # authorized_orgs_desc` component must begin with a letter, followed by
758
+ # alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you
759
+ # cannot change its `name`.
759
760
  # @param [Google::Apis::AccesscontextmanagerV1::AuthorizedOrgsDesc] authorized_orgs_desc_object
760
761
  # @param [String] update_mask
761
762
  # Required. Mask to control which fields get updated. Must be non-empty.
@@ -21,7 +21,8 @@ module Google
21
21
  module Apis
22
22
  # Access Context Manager API
23
23
  #
24
- # An API for setting attribute based access control to requests to GCP services.
24
+ # An API for setting attribute based access control to requests to Google Cloud
25
+ # services.
25
26
  #
26
27
  # @see https://cloud.google.com/access-context-manager/docs/reference/rest/
27
28
  module AccesscontextmanagerV1
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-accesscontextmanager_v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.25.0
4
+ version: 0.27.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-01-04 00:00:00.000000000 Z
11
+ date: 2023-02-05 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-accesscontextmanager_v1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-accesscontextmanager_v1/v0.25.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-accesscontextmanager_v1/v0.27.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-accesscontextmanager_v1
63
63
  post_install_message:
64
64
  rdoc_options: []
@@ -75,7 +75,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
75
75
  - !ruby/object:Gem::Version
76
76
  version: '0'
77
77
  requirements: []
78
- rubygems_version: 3.3.14
78
+ rubygems_version: 3.4.2
79
79
  signing_key:
80
80
  specification_version: 4
81
81
  summary: Simple REST client for Access Context Manager API V1