google-apis-accesscontextmanager_v1 0.26.0 → 0.27.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +4 -0
- data/lib/google/apis/accesscontextmanager_v1/classes.rb +50 -47
- data/lib/google/apis/accesscontextmanager_v1/gem_version.rb +2 -2
- data/lib/google/apis/accesscontextmanager_v1/service.rb +13 -12
- data/lib/google/apis/accesscontextmanager_v1.rb +2 -1
- metadata +3 -3
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 58fa7e865f2c86db504a6ab7d5538349b62664545d8643ea8f481a17a7514796
|
|
4
|
+
data.tar.gz: '058059c637418a093059f95d0accc4d28b933c67d9ef18fd203bd48c1234e4b4'
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: fba53db8fb7232cc81d3b4fffa009222bd08f412a81680a3e41832d85e4ba205676b8258524de4786a37ec9efaaced54cfde0f9b0eab3b7a596b4c250c88193d
|
|
7
|
+
data.tar.gz: 38685a9b30181faed96a68b2b3d3afe8be25825453924ba171def3cb5c327bb70738c00371de9195d22c6f2d6291d6bf03f804af8de466cce7c229d6d0c00406
|
data/CHANGELOG.md
CHANGED
|
@@ -248,47 +248,49 @@ module Google
|
|
|
248
248
|
end
|
|
249
249
|
end
|
|
250
250
|
|
|
251
|
-
# `AuthorizedOrgsDesc`
|
|
252
|
-
# authorization type and asset type and its authorization direction.
|
|
251
|
+
# `AuthorizedOrgsDesc` contains data for an organization's authorization policy.
|
|
253
252
|
class AuthorizedOrgsDesc
|
|
254
253
|
include Google::Apis::Core::Hashable
|
|
255
254
|
|
|
256
|
-
# The asset type of this authorized orgs desc.
|
|
255
|
+
# The asset type of this authorized orgs desc. Valid values are `
|
|
256
|
+
# ASSET_TYPE_DEVICE`, and `ASSET_TYPE_CREDENTIAL_STRENGTH`.
|
|
257
257
|
# Corresponds to the JSON property `assetType`
|
|
258
258
|
# @return [String]
|
|
259
259
|
attr_accessor :asset_type
|
|
260
260
|
|
|
261
|
-
#
|
|
262
|
-
#
|
|
263
|
-
#
|
|
264
|
-
#
|
|
265
|
-
#
|
|
266
|
-
#
|
|
267
|
-
#
|
|
268
|
-
#
|
|
269
|
-
#
|
|
270
|
-
# AUTHORIZATION_DIRECTION_TO`
|
|
271
|
-
#
|
|
261
|
+
# The direction of the authorization relationship between this organization and
|
|
262
|
+
# the organizations listed in the `orgs` field. The valid values for this field
|
|
263
|
+
# include the following: `AUTHORIZATION_DIRECTION_FROM`: Allows this
|
|
264
|
+
# organization to evaluate traffic in the organizations listed in the `orgs`
|
|
265
|
+
# field. `AUTHORIZATION_DIRECTION_TO`: Allows the organizations listed in the `
|
|
266
|
+
# orgs` field to evaluate the traffic in this organization. For the
|
|
267
|
+
# authorization relationship to take effect, all of the organizations must
|
|
268
|
+
# authorize and specify the appropriate relationship direction. For example, if
|
|
269
|
+
# organization A authorized organization B and C to evaluate its traffic, by
|
|
270
|
+
# specifying `AUTHORIZATION_DIRECTION_TO` as the authorization direction,
|
|
271
|
+
# organizations B and C must specify `AUTHORIZATION_DIRECTION_FROM` as the
|
|
272
|
+
# authorization direction in their `AuthorizedOrgsDesc` resource.
|
|
272
273
|
# Corresponds to the JSON property `authorizationDirection`
|
|
273
274
|
# @return [String]
|
|
274
275
|
attr_accessor :authorization_direction
|
|
275
276
|
|
|
276
|
-
#
|
|
277
|
-
#
|
|
277
|
+
# A granular control type for authorization levels. Valid value is `
|
|
278
|
+
# AUTHORIZATION_TYPE_TRUST`.
|
|
278
279
|
# Corresponds to the JSON property `authorizationType`
|
|
279
280
|
# @return [String]
|
|
280
281
|
attr_accessor :authorization_type
|
|
281
282
|
|
|
282
|
-
#
|
|
283
|
-
#
|
|
284
|
-
#
|
|
285
|
-
#
|
|
286
|
-
#
|
|
283
|
+
# Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/`
|
|
284
|
+
# access_policy`/authorizedOrgsDescs/`authorized_orgs_desc``. The `
|
|
285
|
+
# authorized_orgs_desc` component must begin with a letter, followed by
|
|
286
|
+
# alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you
|
|
287
|
+
# cannot change its `name`.
|
|
287
288
|
# Corresponds to the JSON property `name`
|
|
288
289
|
# @return [String]
|
|
289
290
|
attr_accessor :name
|
|
290
291
|
|
|
291
|
-
# The list of organization ids in this AuthorizedOrgsDesc.
|
|
292
|
+
# The list of organization ids in this AuthorizedOrgsDesc. Format: `
|
|
293
|
+
# organizations/` Example: `organizations/123456`
|
|
292
294
|
# Corresponds to the JSON property `orgs`
|
|
293
295
|
# @return [Array<String>]
|
|
294
296
|
attr_accessor :orgs
|
|
@@ -374,22 +376,22 @@ module Google
|
|
|
374
376
|
# kubernetes-engine/docs/how-to/kubernetes-service-accounts). For example, `my-
|
|
375
377
|
# project.svc.id.goog[my-namespace/my-kubernetes-sa]`. * `group:`emailid``: An
|
|
376
378
|
# email address that represents a Google group. For example, `admins@example.com`
|
|
377
|
-
# . * `
|
|
378
|
-
#
|
|
379
|
-
#
|
|
380
|
-
#
|
|
381
|
-
# the
|
|
382
|
-
#
|
|
383
|
-
#
|
|
379
|
+
# . * `domain:`domain``: The G Suite domain (primary) that represents all the
|
|
380
|
+
# users of that domain. For example, `google.com` or `example.com`. * `deleted:
|
|
381
|
+
# user:`emailid`?uid=`uniqueid``: An email address (plus unique identifier)
|
|
382
|
+
# representing a user that has been recently deleted. For example, `alice@
|
|
383
|
+
# example.com?uid=123456789012345678901`. If the user is recovered, this value
|
|
384
|
+
# reverts to `user:`emailid`` and the recovered user retains the role in the
|
|
385
|
+
# binding. * `deleted:serviceAccount:`emailid`?uid=`uniqueid``: An email address
|
|
386
|
+
# (plus unique identifier) representing a service account that has been recently
|
|
387
|
+
# deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=
|
|
384
388
|
# 123456789012345678901`. If the service account is undeleted, this value
|
|
385
389
|
# reverts to `serviceAccount:`emailid`` and the undeleted service account
|
|
386
390
|
# retains the role in the binding. * `deleted:group:`emailid`?uid=`uniqueid``:
|
|
387
391
|
# An email address (plus unique identifier) representing a Google group that has
|
|
388
392
|
# been recently deleted. For example, `admins@example.com?uid=
|
|
389
393
|
# 123456789012345678901`. If the group is recovered, this value reverts to `
|
|
390
|
-
# group:`emailid`` and the recovered group retains the role in the binding.
|
|
391
|
-
# domain:`domain``: The G Suite domain (primary) that represents all the users
|
|
392
|
-
# of that domain. For example, `google.com` or `example.com`.
|
|
394
|
+
# group:`emailid`` and the recovered group retains the role in the binding.
|
|
393
395
|
# Corresponds to the JSON property `members`
|
|
394
396
|
# @return [Array<String>]
|
|
395
397
|
attr_accessor :members
|
|
@@ -1039,10 +1041,10 @@ module Google
|
|
|
1039
1041
|
# A Google Cloud resource that is allowed to ingress the perimeter. Requests
|
|
1040
1042
|
# from these resources will be allowed to access perimeter data. Currently only
|
|
1041
1043
|
# projects and VPCs are allowed. Project format: `projects/`project_number`` VPC
|
|
1042
|
-
# format: `//compute.googleapis.com/projects/`PROJECT_ID`/global/
|
|
1043
|
-
#
|
|
1044
|
-
# organization that the perimeter is defined in. `*` is not allowed,
|
|
1045
|
-
# allowing all Google Cloud resources only is not supported.
|
|
1044
|
+
# network format: `//compute.googleapis.com/projects/`PROJECT_ID`/global/
|
|
1045
|
+
# networks/`NAME``. The project may be in any Google Cloud organization, not
|
|
1046
|
+
# just the organization that the perimeter is defined in. `*` is not allowed,
|
|
1047
|
+
# the case of allowing all Google Cloud resources only is not supported.
|
|
1046
1048
|
# Corresponds to the JSON property `resource`
|
|
1047
1049
|
# @return [String]
|
|
1048
1050
|
attr_accessor :resource
|
|
@@ -1146,7 +1148,7 @@ module Google
|
|
|
1146
1148
|
class ListAuthorizedOrgsDescsResponse
|
|
1147
1149
|
include Google::Apis::Core::Hashable
|
|
1148
1150
|
|
|
1149
|
-
# List of the Authorized Orgs Desc instances.
|
|
1151
|
+
# List of all the Authorized Orgs Desc instances.
|
|
1150
1152
|
# Corresponds to the JSON property `authorizedOrgsDescs`
|
|
1151
1153
|
# @return [Array<Google::Apis::AccesscontextmanagerV1::AuthorizedOrgsDesc>]
|
|
1152
1154
|
attr_accessor :authorized_orgs_descs
|
|
@@ -1576,9 +1578,10 @@ module Google
|
|
|
1576
1578
|
# has a target outside of the `ServicePerimeter`, the request will be blocked.
|
|
1577
1579
|
# Otherwise the request is allowed. There are two types of Service Perimeter -
|
|
1578
1580
|
# Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google
|
|
1579
|
-
# Cloud project can only belong to a single regular Service
|
|
1580
|
-
# Perimeter Bridges can contain only Google Cloud projects as
|
|
1581
|
-
# Google Cloud project may belong to multiple Service
|
|
1581
|
+
# Cloud project or VPC network can only belong to a single regular Service
|
|
1582
|
+
# Perimeter. Service Perimeter Bridges can contain only Google Cloud projects as
|
|
1583
|
+
# members, a single Google Cloud project may belong to multiple Service
|
|
1584
|
+
# Perimeter Bridges.
|
|
1582
1585
|
class ServicePerimeter
|
|
1583
1586
|
include Google::Apis::Core::Hashable
|
|
1584
1587
|
|
|
@@ -1595,11 +1598,11 @@ module Google
|
|
|
1595
1598
|
# @return [String]
|
|
1596
1599
|
attr_accessor :name
|
|
1597
1600
|
|
|
1598
|
-
# Perimeter type indicator. A single project is allowed to be a
|
|
1599
|
-
# regular perimeter, but multiple service perimeter bridges. A
|
|
1600
|
-
# a included in a perimeter bridge without being included in
|
|
1601
|
-
# For perimeter bridges, the restricted service list as well
|
|
1602
|
-
# lists must be empty.
|
|
1601
|
+
# Perimeter type indicator. A single project or VPC network is allowed to be a
|
|
1602
|
+
# member of single regular perimeter, but multiple service perimeter bridges. A
|
|
1603
|
+
# project cannot be a included in a perimeter bridge without being included in
|
|
1604
|
+
# regular perimeter. For perimeter bridges, the restricted service list as well
|
|
1605
|
+
# as access level lists must be empty.
|
|
1603
1606
|
# Corresponds to the JSON property `perimeterType`
|
|
1604
1607
|
# @return [String]
|
|
1605
1608
|
attr_accessor :perimeter_type
|
|
@@ -1683,8 +1686,8 @@ module Google
|
|
|
1683
1686
|
|
|
1684
1687
|
# A list of Google Cloud resources that are inside of the service perimeter.
|
|
1685
1688
|
# Currently only projects and VPCs are allowed. Project format: `projects/`
|
|
1686
|
-
# project_number`` VPC format: `//compute.googleapis.com/projects/`
|
|
1687
|
-
# global/networks/`NAME``.
|
|
1689
|
+
# project_number`` VPC network format: `//compute.googleapis.com/projects/`
|
|
1690
|
+
# PROJECT_ID`/global/networks/`NAME``.
|
|
1688
1691
|
# Corresponds to the JSON property `resources`
|
|
1689
1692
|
# @return [Array<String>]
|
|
1690
1693
|
attr_accessor :resources
|
|
@@ -16,13 +16,13 @@ module Google
|
|
|
16
16
|
module Apis
|
|
17
17
|
module AccesscontextmanagerV1
|
|
18
18
|
# Version of the google-apis-accesscontextmanager_v1 gem
|
|
19
|
-
GEM_VERSION = "0.
|
|
19
|
+
GEM_VERSION = "0.27.0"
|
|
20
20
|
|
|
21
21
|
# Version of the code generator used to generate this client
|
|
22
22
|
GENERATOR_VERSION = "0.11.1"
|
|
23
23
|
|
|
24
24
|
# Revision of the discovery document this client was generated from
|
|
25
|
-
REVISION = "
|
|
25
|
+
REVISION = "20230130"
|
|
26
26
|
end
|
|
27
27
|
end
|
|
28
28
|
end
|
|
@@ -22,7 +22,8 @@ module Google
|
|
|
22
22
|
module AccesscontextmanagerV1
|
|
23
23
|
# Access Context Manager API
|
|
24
24
|
#
|
|
25
|
-
# An API for setting attribute based access control to requests to
|
|
25
|
+
# An API for setting attribute based access control to requests to Google Cloud
|
|
26
|
+
# services.
|
|
26
27
|
#
|
|
27
28
|
# @example
|
|
28
29
|
# require 'google/apis/accesscontextmanager_v1'
|
|
@@ -604,8 +605,8 @@ module Google
|
|
|
604
605
|
execute_or_queue_command(command, &block)
|
|
605
606
|
end
|
|
606
607
|
|
|
607
|
-
# Creates
|
|
608
|
-
# successful status after the authorized orgs desc propagates to long-lasting
|
|
608
|
+
# Creates an authorized orgs desc. The long-running operation from this RPC has
|
|
609
|
+
# a successful status after the authorized orgs desc propagates to long-lasting
|
|
609
610
|
# storage. If a authorized orgs desc contains errors, an error response is
|
|
610
611
|
# returned for the first error encountered. The name of this `AuthorizedOrgsDesc`
|
|
611
612
|
# will be assigned during creation.
|
|
@@ -642,7 +643,7 @@ module Google
|
|
|
642
643
|
execute_or_queue_command(command, &block)
|
|
643
644
|
end
|
|
644
645
|
|
|
645
|
-
# Deletes
|
|
646
|
+
# Deletes an authorized orgs desc based on the resource name. The long-running
|
|
646
647
|
# operation from this RPC has a successful status after the authorized orgs desc
|
|
647
648
|
# is removed from long-lasting storage.
|
|
648
649
|
# @param [String] name
|
|
@@ -675,7 +676,7 @@ module Google
|
|
|
675
676
|
execute_or_queue_command(command, &block)
|
|
676
677
|
end
|
|
677
678
|
|
|
678
|
-
# Gets
|
|
679
|
+
# Gets an authorized orgs desc based on the resource name.
|
|
679
680
|
# @param [String] name
|
|
680
681
|
# Required. Resource name for the Authorized Orgs Desc. Format: `accessPolicies/`
|
|
681
682
|
# policy_id`/authorizedOrgsDescs/`authorized_orgs_descs_id``
|
|
@@ -744,18 +745,18 @@ module Google
|
|
|
744
745
|
execute_or_queue_command(command, &block)
|
|
745
746
|
end
|
|
746
747
|
|
|
747
|
-
# Updates
|
|
748
|
-
# successful status after the authorized orgs desc propagates to long-lasting
|
|
748
|
+
# Updates an authorized orgs desc. The long-running operation from this RPC has
|
|
749
|
+
# a successful status after the authorized orgs desc propagates to long-lasting
|
|
749
750
|
# storage. If a authorized orgs desc contains errors, an error response is
|
|
750
751
|
# returned for the first error encountered. Only the organization list in `
|
|
751
752
|
# AuthorizedOrgsDesc` can be updated. The name, authorization_type, asset_type
|
|
752
753
|
# and authorization_direction cannot be updated.
|
|
753
754
|
# @param [String] name
|
|
754
|
-
#
|
|
755
|
-
#
|
|
756
|
-
#
|
|
757
|
-
#
|
|
758
|
-
#
|
|
755
|
+
# Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/`
|
|
756
|
+
# access_policy`/authorizedOrgsDescs/`authorized_orgs_desc``. The `
|
|
757
|
+
# authorized_orgs_desc` component must begin with a letter, followed by
|
|
758
|
+
# alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you
|
|
759
|
+
# cannot change its `name`.
|
|
759
760
|
# @param [Google::Apis::AccesscontextmanagerV1::AuthorizedOrgsDesc] authorized_orgs_desc_object
|
|
760
761
|
# @param [String] update_mask
|
|
761
762
|
# Required. Mask to control which fields get updated. Must be non-empty.
|
|
@@ -21,7 +21,8 @@ module Google
|
|
|
21
21
|
module Apis
|
|
22
22
|
# Access Context Manager API
|
|
23
23
|
#
|
|
24
|
-
# An API for setting attribute based access control to requests to
|
|
24
|
+
# An API for setting attribute based access control to requests to Google Cloud
|
|
25
|
+
# services.
|
|
25
26
|
#
|
|
26
27
|
# @see https://cloud.google.com/access-context-manager/docs/reference/rest/
|
|
27
28
|
module AccesscontextmanagerV1
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: google-apis-accesscontextmanager_v1
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 0.
|
|
4
|
+
version: 0.27.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Google LLC
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2023-
|
|
11
|
+
date: 2023-02-05 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: google-apis-core
|
|
@@ -58,7 +58,7 @@ licenses:
|
|
|
58
58
|
metadata:
|
|
59
59
|
bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
|
|
60
60
|
changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-accesscontextmanager_v1/CHANGELOG.md
|
|
61
|
-
documentation_uri: https://googleapis.dev/ruby/google-apis-accesscontextmanager_v1/v0.
|
|
61
|
+
documentation_uri: https://googleapis.dev/ruby/google-apis-accesscontextmanager_v1/v0.27.0
|
|
62
62
|
source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-accesscontextmanager_v1
|
|
63
63
|
post_install_message:
|
|
64
64
|
rdoc_options: []
|