google-apis-accesscontextmanager_v1 0.26.0 → 0.27.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e15d24c42e1bb60e748d1f9835ec9902a52b03601366642571b3556c1930b6c2
4
- data.tar.gz: 31af635b3818d17c1e7f8f974558bd72c44d466aca6cbea070d67c771823ceab
3
+ metadata.gz: 58fa7e865f2c86db504a6ab7d5538349b62664545d8643ea8f481a17a7514796
4
+ data.tar.gz: '058059c637418a093059f95d0accc4d28b933c67d9ef18fd203bd48c1234e4b4'
5
5
  SHA512:
6
- metadata.gz: 5512e2ac726f3f417e0422341094d13f215058757e1dd550e96bcffa7be2781ae95feeb41aeee63edbeb61a1542fe1c083da86cc6f3559bc5d680971dfb652e7
7
- data.tar.gz: a64b576b506f67d6b424b4161986c2b23568c013258a4094c0d0d59998a382c438f0e0f765927b91494d4fe9165700ab1912b5728a431de28b64a2d19c8a5e9d
6
+ metadata.gz: fba53db8fb7232cc81d3b4fffa009222bd08f412a81680a3e41832d85e4ba205676b8258524de4786a37ec9efaaced54cfde0f9b0eab3b7a596b4c250c88193d
7
+ data.tar.gz: 38685a9b30181faed96a68b2b3d3afe8be25825453924ba171def3cb5c327bb70738c00371de9195d22c6f2d6291d6bf03f804af8de466cce7c229d6d0c00406
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-accesscontextmanager_v1
2
2
 
3
+ ### v0.27.0 (2023-02-05)
4
+
5
+ * Regenerated from discovery document revision 20230130
6
+
3
7
  ### v0.26.0 (2023-01-15)
4
8
 
5
9
  * Regenerated from discovery document revision 20230109
@@ -248,47 +248,49 @@ module Google
248
248
  end
249
249
  end
250
250
 
251
- # `AuthorizedOrgsDesc` is a resource that contains a list of organizations for a
252
- # authorization type and asset type and its authorization direction.
251
+ # `AuthorizedOrgsDesc` contains data for an organization's authorization policy.
253
252
  class AuthorizedOrgsDesc
254
253
  include Google::Apis::Core::Hashable
255
254
 
256
- # The asset type of this authorized orgs desc. e.g. device, credential strength.
255
+ # The asset type of this authorized orgs desc. Valid values are `
256
+ # ASSET_TYPE_DEVICE`, and `ASSET_TYPE_CREDENTIAL_STRENGTH`.
257
257
  # Corresponds to the JSON property `assetType`
258
258
  # @return [String]
259
259
  attr_accessor :asset_type
260
260
 
261
- # Authorization direction of this authorization relationship. i.e. Whether to
262
- # allow specified orgs to evaluate this org's traffic, or allow specified orgs'
263
- # traffic to be evaluated by this org. Orgs specified as `
264
- # AUTHORIZATION_DIRECTION_TO` in this AuthorizedOrgsDesc[com.google.identity.
265
- # accesscontextmanager.v1.AuthorizedOrgsDesc] must also specify this org as the `
266
- # AUTHORIZATION_DIRECTION_FROM` in their own AuthorizedOrgsDesc in order for
267
- # this relationship to take effect. Orgs specified as `
268
- # AUTHORIZATION_DIRECTION_FROM` in this AuthorizedOrgsDesc[com.google.identity.
269
- # accesscontextmanager.v1.AuthorizedOrgsDesc] must also specify this org as the `
270
- # AUTHORIZATION_DIRECTION_TO` in their own AuthorizedOrgsDesc in order for this
271
- # relationship to take effect.
261
+ # The direction of the authorization relationship between this organization and
262
+ # the organizations listed in the `orgs` field. The valid values for this field
263
+ # include the following: `AUTHORIZATION_DIRECTION_FROM`: Allows this
264
+ # organization to evaluate traffic in the organizations listed in the `orgs`
265
+ # field. `AUTHORIZATION_DIRECTION_TO`: Allows the organizations listed in the `
266
+ # orgs` field to evaluate the traffic in this organization. For the
267
+ # authorization relationship to take effect, all of the organizations must
268
+ # authorize and specify the appropriate relationship direction. For example, if
269
+ # organization A authorized organization B and C to evaluate its traffic, by
270
+ # specifying `AUTHORIZATION_DIRECTION_TO` as the authorization direction,
271
+ # organizations B and C must specify `AUTHORIZATION_DIRECTION_FROM` as the
272
+ # authorization direction in their `AuthorizedOrgsDesc` resource.
272
273
  # Corresponds to the JSON property `authorizationDirection`
273
274
  # @return [String]
274
275
  attr_accessor :authorization_direction
275
276
 
276
- # The authorization type of this authorized orgs desc. e.g.authorization,
277
- # troubleshooting or logging.
277
+ # A granular control type for authorization levels. Valid value is `
278
+ # AUTHORIZATION_TYPE_TRUST`.
278
279
  # Corresponds to the JSON property `authorizationType`
279
280
  # @return [String]
280
281
  attr_accessor :authorization_type
281
282
 
282
- # Assigned by the server during creation. The last segment has an arbitrary
283
- # length and has only URI unreserved characters (as defined by [RFC 3986 Section
284
- # 2.3](https://tools.ietf.org/html/rfc3986#section-2.3)). Should not be
285
- # specified by the client during creation. Example: "accessPolicies/122256/
286
- # authorizedOrgs/b3-BhcX_Ud5N"
283
+ # Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/`
284
+ # access_policy`/authorizedOrgsDescs/`authorized_orgs_desc``. The `
285
+ # authorized_orgs_desc` component must begin with a letter, followed by
286
+ # alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you
287
+ # cannot change its `name`.
287
288
  # Corresponds to the JSON property `name`
288
289
  # @return [String]
289
290
  attr_accessor :name
290
291
 
291
- # The list of organization ids in this AuthorizedOrgsDesc.
292
+ # The list of organization ids in this AuthorizedOrgsDesc. Format: `
293
+ # organizations/` Example: `organizations/123456`
292
294
  # Corresponds to the JSON property `orgs`
293
295
  # @return [Array<String>]
294
296
  attr_accessor :orgs
@@ -374,22 +376,22 @@ module Google
374
376
  # kubernetes-engine/docs/how-to/kubernetes-service-accounts). For example, `my-
375
377
  # project.svc.id.goog[my-namespace/my-kubernetes-sa]`. * `group:`emailid``: An
376
378
  # email address that represents a Google group. For example, `admins@example.com`
377
- # . * `deleted:user:`emailid`?uid=`uniqueid``: An email address (plus unique
378
- # identifier) representing a user that has been recently deleted. For example, `
379
- # alice@example.com?uid=123456789012345678901`. If the user is recovered, this
380
- # value reverts to `user:`emailid`` and the recovered user retains the role in
381
- # the binding. * `deleted:serviceAccount:`emailid`?uid=`uniqueid``: An email
382
- # address (plus unique identifier) representing a service account that has been
383
- # recently deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=
379
+ # . * `domain:`domain``: The G Suite domain (primary) that represents all the
380
+ # users of that domain. For example, `google.com` or `example.com`. * `deleted:
381
+ # user:`emailid`?uid=`uniqueid``: An email address (plus unique identifier)
382
+ # representing a user that has been recently deleted. For example, `alice@
383
+ # example.com?uid=123456789012345678901`. If the user is recovered, this value
384
+ # reverts to `user:`emailid`` and the recovered user retains the role in the
385
+ # binding. * `deleted:serviceAccount:`emailid`?uid=`uniqueid``: An email address
386
+ # (plus unique identifier) representing a service account that has been recently
387
+ # deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=
384
388
  # 123456789012345678901`. If the service account is undeleted, this value
385
389
  # reverts to `serviceAccount:`emailid`` and the undeleted service account
386
390
  # retains the role in the binding. * `deleted:group:`emailid`?uid=`uniqueid``:
387
391
  # An email address (plus unique identifier) representing a Google group that has
388
392
  # been recently deleted. For example, `admins@example.com?uid=
389
393
  # 123456789012345678901`. If the group is recovered, this value reverts to `
390
- # group:`emailid`` and the recovered group retains the role in the binding. * `
391
- # domain:`domain``: The G Suite domain (primary) that represents all the users
392
- # of that domain. For example, `google.com` or `example.com`.
394
+ # group:`emailid`` and the recovered group retains the role in the binding.
393
395
  # Corresponds to the JSON property `members`
394
396
  # @return [Array<String>]
395
397
  attr_accessor :members
@@ -1039,10 +1041,10 @@ module Google
1039
1041
  # A Google Cloud resource that is allowed to ingress the perimeter. Requests
1040
1042
  # from these resources will be allowed to access perimeter data. Currently only
1041
1043
  # projects and VPCs are allowed. Project format: `projects/`project_number`` VPC
1042
- # format: `//compute.googleapis.com/projects/`PROJECT_ID`/global/networks/`NAME``
1043
- # . The project may be in any Google Cloud organization, not just the
1044
- # organization that the perimeter is defined in. `*` is not allowed, the case of
1045
- # allowing all Google Cloud resources only is not supported.
1044
+ # network format: `//compute.googleapis.com/projects/`PROJECT_ID`/global/
1045
+ # networks/`NAME``. The project may be in any Google Cloud organization, not
1046
+ # just the organization that the perimeter is defined in. `*` is not allowed,
1047
+ # the case of allowing all Google Cloud resources only is not supported.
1046
1048
  # Corresponds to the JSON property `resource`
1047
1049
  # @return [String]
1048
1050
  attr_accessor :resource
@@ -1146,7 +1148,7 @@ module Google
1146
1148
  class ListAuthorizedOrgsDescsResponse
1147
1149
  include Google::Apis::Core::Hashable
1148
1150
 
1149
- # List of the Authorized Orgs Desc instances.
1151
+ # List of all the Authorized Orgs Desc instances.
1150
1152
  # Corresponds to the JSON property `authorizedOrgsDescs`
1151
1153
  # @return [Array<Google::Apis::AccesscontextmanagerV1::AuthorizedOrgsDesc>]
1152
1154
  attr_accessor :authorized_orgs_descs
@@ -1576,9 +1578,10 @@ module Google
1576
1578
  # has a target outside of the `ServicePerimeter`, the request will be blocked.
1577
1579
  # Otherwise the request is allowed. There are two types of Service Perimeter -
1578
1580
  # Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google
1579
- # Cloud project can only belong to a single regular Service Perimeter. Service
1580
- # Perimeter Bridges can contain only Google Cloud projects as members, a single
1581
- # Google Cloud project may belong to multiple Service Perimeter Bridges.
1581
+ # Cloud project or VPC network can only belong to a single regular Service
1582
+ # Perimeter. Service Perimeter Bridges can contain only Google Cloud projects as
1583
+ # members, a single Google Cloud project may belong to multiple Service
1584
+ # Perimeter Bridges.
1582
1585
  class ServicePerimeter
1583
1586
  include Google::Apis::Core::Hashable
1584
1587
 
@@ -1595,11 +1598,11 @@ module Google
1595
1598
  # @return [String]
1596
1599
  attr_accessor :name
1597
1600
 
1598
- # Perimeter type indicator. A single project is allowed to be a member of single
1599
- # regular perimeter, but multiple service perimeter bridges. A project cannot be
1600
- # a included in a perimeter bridge without being included in regular perimeter.
1601
- # For perimeter bridges, the restricted service list as well as access level
1602
- # lists must be empty.
1601
+ # Perimeter type indicator. A single project or VPC network is allowed to be a
1602
+ # member of single regular perimeter, but multiple service perimeter bridges. A
1603
+ # project cannot be a included in a perimeter bridge without being included in
1604
+ # regular perimeter. For perimeter bridges, the restricted service list as well
1605
+ # as access level lists must be empty.
1603
1606
  # Corresponds to the JSON property `perimeterType`
1604
1607
  # @return [String]
1605
1608
  attr_accessor :perimeter_type
@@ -1683,8 +1686,8 @@ module Google
1683
1686
 
1684
1687
  # A list of Google Cloud resources that are inside of the service perimeter.
1685
1688
  # Currently only projects and VPCs are allowed. Project format: `projects/`
1686
- # project_number`` VPC format: `//compute.googleapis.com/projects/`PROJECT_ID`/
1687
- # global/networks/`NAME``.
1689
+ # project_number`` VPC network format: `//compute.googleapis.com/projects/`
1690
+ # PROJECT_ID`/global/networks/`NAME``.
1688
1691
  # Corresponds to the JSON property `resources`
1689
1692
  # @return [Array<String>]
1690
1693
  attr_accessor :resources
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module AccesscontextmanagerV1
18
18
  # Version of the google-apis-accesscontextmanager_v1 gem
19
- GEM_VERSION = "0.26.0"
19
+ GEM_VERSION = "0.27.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.11.1"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20230109"
25
+ REVISION = "20230130"
26
26
  end
27
27
  end
28
28
  end
@@ -22,7 +22,8 @@ module Google
22
22
  module AccesscontextmanagerV1
23
23
  # Access Context Manager API
24
24
  #
25
- # An API for setting attribute based access control to requests to GCP services.
25
+ # An API for setting attribute based access control to requests to Google Cloud
26
+ # services.
26
27
  #
27
28
  # @example
28
29
  # require 'google/apis/accesscontextmanager_v1'
@@ -604,8 +605,8 @@ module Google
604
605
  execute_or_queue_command(command, &block)
605
606
  end
606
607
 
607
- # Creates a authorized orgs desc. The long-running operation from this RPC has a
608
- # successful status after the authorized orgs desc propagates to long-lasting
608
+ # Creates an authorized orgs desc. The long-running operation from this RPC has
609
+ # a successful status after the authorized orgs desc propagates to long-lasting
609
610
  # storage. If a authorized orgs desc contains errors, an error response is
610
611
  # returned for the first error encountered. The name of this `AuthorizedOrgsDesc`
611
612
  # will be assigned during creation.
@@ -642,7 +643,7 @@ module Google
642
643
  execute_or_queue_command(command, &block)
643
644
  end
644
645
 
645
- # Deletes a authorized orgs desc based on the resource name. The long-running
646
+ # Deletes an authorized orgs desc based on the resource name. The long-running
646
647
  # operation from this RPC has a successful status after the authorized orgs desc
647
648
  # is removed from long-lasting storage.
648
649
  # @param [String] name
@@ -675,7 +676,7 @@ module Google
675
676
  execute_or_queue_command(command, &block)
676
677
  end
677
678
 
678
- # Gets a authorized orgs desc based on the resource name.
679
+ # Gets an authorized orgs desc based on the resource name.
679
680
  # @param [String] name
680
681
  # Required. Resource name for the Authorized Orgs Desc. Format: `accessPolicies/`
681
682
  # policy_id`/authorizedOrgsDescs/`authorized_orgs_descs_id``
@@ -744,18 +745,18 @@ module Google
744
745
  execute_or_queue_command(command, &block)
745
746
  end
746
747
 
747
- # Updates a authorized orgs desc. The long-running operation from this RPC has a
748
- # successful status after the authorized orgs desc propagates to long-lasting
748
+ # Updates an authorized orgs desc. The long-running operation from this RPC has
749
+ # a successful status after the authorized orgs desc propagates to long-lasting
749
750
  # storage. If a authorized orgs desc contains errors, an error response is
750
751
  # returned for the first error encountered. Only the organization list in `
751
752
  # AuthorizedOrgsDesc` can be updated. The name, authorization_type, asset_type
752
753
  # and authorization_direction cannot be updated.
753
754
  # @param [String] name
754
- # Assigned by the server during creation. The last segment has an arbitrary
755
- # length and has only URI unreserved characters (as defined by [RFC 3986 Section
756
- # 2.3](https://tools.ietf.org/html/rfc3986#section-2.3)). Should not be
757
- # specified by the client during creation. Example: "accessPolicies/122256/
758
- # authorizedOrgs/b3-BhcX_Ud5N"
755
+ # Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/`
756
+ # access_policy`/authorizedOrgsDescs/`authorized_orgs_desc``. The `
757
+ # authorized_orgs_desc` component must begin with a letter, followed by
758
+ # alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you
759
+ # cannot change its `name`.
759
760
  # @param [Google::Apis::AccesscontextmanagerV1::AuthorizedOrgsDesc] authorized_orgs_desc_object
760
761
  # @param [String] update_mask
761
762
  # Required. Mask to control which fields get updated. Must be non-empty.
@@ -21,7 +21,8 @@ module Google
21
21
  module Apis
22
22
  # Access Context Manager API
23
23
  #
24
- # An API for setting attribute based access control to requests to GCP services.
24
+ # An API for setting attribute based access control to requests to Google Cloud
25
+ # services.
25
26
  #
26
27
  # @see https://cloud.google.com/access-context-manager/docs/reference/rest/
27
28
  module AccesscontextmanagerV1
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-accesscontextmanager_v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.26.0
4
+ version: 0.27.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-01-15 00:00:00.000000000 Z
11
+ date: 2023-02-05 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-accesscontextmanager_v1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-accesscontextmanager_v1/v0.26.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-accesscontextmanager_v1/v0.27.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-accesscontextmanager_v1
63
63
  post_install_message:
64
64
  rdoc_options: []