google-apis-accesscontextmanager_v1 0.26.0 → 0.27.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e15d24c42e1bb60e748d1f9835ec9902a52b03601366642571b3556c1930b6c2
4
- data.tar.gz: 31af635b3818d17c1e7f8f974558bd72c44d466aca6cbea070d67c771823ceab
3
+ metadata.gz: 58fa7e865f2c86db504a6ab7d5538349b62664545d8643ea8f481a17a7514796
4
+ data.tar.gz: '058059c637418a093059f95d0accc4d28b933c67d9ef18fd203bd48c1234e4b4'
5
5
  SHA512:
6
- metadata.gz: 5512e2ac726f3f417e0422341094d13f215058757e1dd550e96bcffa7be2781ae95feeb41aeee63edbeb61a1542fe1c083da86cc6f3559bc5d680971dfb652e7
7
- data.tar.gz: a64b576b506f67d6b424b4161986c2b23568c013258a4094c0d0d59998a382c438f0e0f765927b91494d4fe9165700ab1912b5728a431de28b64a2d19c8a5e9d
6
+ metadata.gz: fba53db8fb7232cc81d3b4fffa009222bd08f412a81680a3e41832d85e4ba205676b8258524de4786a37ec9efaaced54cfde0f9b0eab3b7a596b4c250c88193d
7
+ data.tar.gz: 38685a9b30181faed96a68b2b3d3afe8be25825453924ba171def3cb5c327bb70738c00371de9195d22c6f2d6291d6bf03f804af8de466cce7c229d6d0c00406
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-accesscontextmanager_v1
2
2
 
3
+ ### v0.27.0 (2023-02-05)
4
+
5
+ * Regenerated from discovery document revision 20230130
6
+
3
7
  ### v0.26.0 (2023-01-15)
4
8
 
5
9
  * Regenerated from discovery document revision 20230109
@@ -248,47 +248,49 @@ module Google
248
248
  end
249
249
  end
250
250
 
251
- # `AuthorizedOrgsDesc` is a resource that contains a list of organizations for a
252
- # authorization type and asset type and its authorization direction.
251
+ # `AuthorizedOrgsDesc` contains data for an organization's authorization policy.
253
252
  class AuthorizedOrgsDesc
254
253
  include Google::Apis::Core::Hashable
255
254
 
256
- # The asset type of this authorized orgs desc. e.g. device, credential strength.
255
+ # The asset type of this authorized orgs desc. Valid values are `
256
+ # ASSET_TYPE_DEVICE`, and `ASSET_TYPE_CREDENTIAL_STRENGTH`.
257
257
  # Corresponds to the JSON property `assetType`
258
258
  # @return [String]
259
259
  attr_accessor :asset_type
260
260
 
261
- # Authorization direction of this authorization relationship. i.e. Whether to
262
- # allow specified orgs to evaluate this org's traffic, or allow specified orgs'
263
- # traffic to be evaluated by this org. Orgs specified as `
264
- # AUTHORIZATION_DIRECTION_TO` in this AuthorizedOrgsDesc[com.google.identity.
265
- # accesscontextmanager.v1.AuthorizedOrgsDesc] must also specify this org as the `
266
- # AUTHORIZATION_DIRECTION_FROM` in their own AuthorizedOrgsDesc in order for
267
- # this relationship to take effect. Orgs specified as `
268
- # AUTHORIZATION_DIRECTION_FROM` in this AuthorizedOrgsDesc[com.google.identity.
269
- # accesscontextmanager.v1.AuthorizedOrgsDesc] must also specify this org as the `
270
- # AUTHORIZATION_DIRECTION_TO` in their own AuthorizedOrgsDesc in order for this
271
- # relationship to take effect.
261
+ # The direction of the authorization relationship between this organization and
262
+ # the organizations listed in the `orgs` field. The valid values for this field
263
+ # include the following: `AUTHORIZATION_DIRECTION_FROM`: Allows this
264
+ # organization to evaluate traffic in the organizations listed in the `orgs`
265
+ # field. `AUTHORIZATION_DIRECTION_TO`: Allows the organizations listed in the `
266
+ # orgs` field to evaluate the traffic in this organization. For the
267
+ # authorization relationship to take effect, all of the organizations must
268
+ # authorize and specify the appropriate relationship direction. For example, if
269
+ # organization A authorized organization B and C to evaluate its traffic, by
270
+ # specifying `AUTHORIZATION_DIRECTION_TO` as the authorization direction,
271
+ # organizations B and C must specify `AUTHORIZATION_DIRECTION_FROM` as the
272
+ # authorization direction in their `AuthorizedOrgsDesc` resource.
272
273
  # Corresponds to the JSON property `authorizationDirection`
273
274
  # @return [String]
274
275
  attr_accessor :authorization_direction
275
276
 
276
- # The authorization type of this authorized orgs desc. e.g.authorization,
277
- # troubleshooting or logging.
277
+ # A granular control type for authorization levels. Valid value is `
278
+ # AUTHORIZATION_TYPE_TRUST`.
278
279
  # Corresponds to the JSON property `authorizationType`
279
280
  # @return [String]
280
281
  attr_accessor :authorization_type
281
282
 
282
- # Assigned by the server during creation. The last segment has an arbitrary
283
- # length and has only URI unreserved characters (as defined by [RFC 3986 Section
284
- # 2.3](https://tools.ietf.org/html/rfc3986#section-2.3)). Should not be
285
- # specified by the client during creation. Example: "accessPolicies/122256/
286
- # authorizedOrgs/b3-BhcX_Ud5N"
283
+ # Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/`
284
+ # access_policy`/authorizedOrgsDescs/`authorized_orgs_desc``. The `
285
+ # authorized_orgs_desc` component must begin with a letter, followed by
286
+ # alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you
287
+ # cannot change its `name`.
287
288
  # Corresponds to the JSON property `name`
288
289
  # @return [String]
289
290
  attr_accessor :name
290
291
 
291
- # The list of organization ids in this AuthorizedOrgsDesc.
292
+ # The list of organization ids in this AuthorizedOrgsDesc. Format: `
293
+ # organizations/` Example: `organizations/123456`
292
294
  # Corresponds to the JSON property `orgs`
293
295
  # @return [Array<String>]
294
296
  attr_accessor :orgs
@@ -374,22 +376,22 @@ module Google
374
376
  # kubernetes-engine/docs/how-to/kubernetes-service-accounts). For example, `my-
375
377
  # project.svc.id.goog[my-namespace/my-kubernetes-sa]`. * `group:`emailid``: An
376
378
  # email address that represents a Google group. For example, `admins@example.com`
377
- # . * `deleted:user:`emailid`?uid=`uniqueid``: An email address (plus unique
378
- # identifier) representing a user that has been recently deleted. For example, `
379
- # alice@example.com?uid=123456789012345678901`. If the user is recovered, this
380
- # value reverts to `user:`emailid`` and the recovered user retains the role in
381
- # the binding. * `deleted:serviceAccount:`emailid`?uid=`uniqueid``: An email
382
- # address (plus unique identifier) representing a service account that has been
383
- # recently deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=
379
+ # . * `domain:`domain``: The G Suite domain (primary) that represents all the
380
+ # users of that domain. For example, `google.com` or `example.com`. * `deleted:
381
+ # user:`emailid`?uid=`uniqueid``: An email address (plus unique identifier)
382
+ # representing a user that has been recently deleted. For example, `alice@
383
+ # example.com?uid=123456789012345678901`. If the user is recovered, this value
384
+ # reverts to `user:`emailid`` and the recovered user retains the role in the
385
+ # binding. * `deleted:serviceAccount:`emailid`?uid=`uniqueid``: An email address
386
+ # (plus unique identifier) representing a service account that has been recently
387
+ # deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=
384
388
  # 123456789012345678901`. If the service account is undeleted, this value
385
389
  # reverts to `serviceAccount:`emailid`` and the undeleted service account
386
390
  # retains the role in the binding. * `deleted:group:`emailid`?uid=`uniqueid``:
387
391
  # An email address (plus unique identifier) representing a Google group that has
388
392
  # been recently deleted. For example, `admins@example.com?uid=
389
393
  # 123456789012345678901`. If the group is recovered, this value reverts to `
390
- # group:`emailid`` and the recovered group retains the role in the binding. * `
391
- # domain:`domain``: The G Suite domain (primary) that represents all the users
392
- # of that domain. For example, `google.com` or `example.com`.
394
+ # group:`emailid`` and the recovered group retains the role in the binding.
393
395
  # Corresponds to the JSON property `members`
394
396
  # @return [Array<String>]
395
397
  attr_accessor :members
@@ -1039,10 +1041,10 @@ module Google
1039
1041
  # A Google Cloud resource that is allowed to ingress the perimeter. Requests
1040
1042
  # from these resources will be allowed to access perimeter data. Currently only
1041
1043
  # projects and VPCs are allowed. Project format: `projects/`project_number`` VPC
1042
- # format: `//compute.googleapis.com/projects/`PROJECT_ID`/global/networks/`NAME``
1043
- # . The project may be in any Google Cloud organization, not just the
1044
- # organization that the perimeter is defined in. `*` is not allowed, the case of
1045
- # allowing all Google Cloud resources only is not supported.
1044
+ # network format: `//compute.googleapis.com/projects/`PROJECT_ID`/global/
1045
+ # networks/`NAME``. The project may be in any Google Cloud organization, not
1046
+ # just the organization that the perimeter is defined in. `*` is not allowed,
1047
+ # the case of allowing all Google Cloud resources only is not supported.
1046
1048
  # Corresponds to the JSON property `resource`
1047
1049
  # @return [String]
1048
1050
  attr_accessor :resource
@@ -1146,7 +1148,7 @@ module Google
1146
1148
  class ListAuthorizedOrgsDescsResponse
1147
1149
  include Google::Apis::Core::Hashable
1148
1150
 
1149
- # List of the Authorized Orgs Desc instances.
1151
+ # List of all the Authorized Orgs Desc instances.
1150
1152
  # Corresponds to the JSON property `authorizedOrgsDescs`
1151
1153
  # @return [Array<Google::Apis::AccesscontextmanagerV1::AuthorizedOrgsDesc>]
1152
1154
  attr_accessor :authorized_orgs_descs
@@ -1576,9 +1578,10 @@ module Google
1576
1578
  # has a target outside of the `ServicePerimeter`, the request will be blocked.
1577
1579
  # Otherwise the request is allowed. There are two types of Service Perimeter -
1578
1580
  # Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google
1579
- # Cloud project can only belong to a single regular Service Perimeter. Service
1580
- # Perimeter Bridges can contain only Google Cloud projects as members, a single
1581
- # Google Cloud project may belong to multiple Service Perimeter Bridges.
1581
+ # Cloud project or VPC network can only belong to a single regular Service
1582
+ # Perimeter. Service Perimeter Bridges can contain only Google Cloud projects as
1583
+ # members, a single Google Cloud project may belong to multiple Service
1584
+ # Perimeter Bridges.
1582
1585
  class ServicePerimeter
1583
1586
  include Google::Apis::Core::Hashable
1584
1587
 
@@ -1595,11 +1598,11 @@ module Google
1595
1598
  # @return [String]
1596
1599
  attr_accessor :name
1597
1600
 
1598
- # Perimeter type indicator. A single project is allowed to be a member of single
1599
- # regular perimeter, but multiple service perimeter bridges. A project cannot be
1600
- # a included in a perimeter bridge without being included in regular perimeter.
1601
- # For perimeter bridges, the restricted service list as well as access level
1602
- # lists must be empty.
1601
+ # Perimeter type indicator. A single project or VPC network is allowed to be a
1602
+ # member of single regular perimeter, but multiple service perimeter bridges. A
1603
+ # project cannot be a included in a perimeter bridge without being included in
1604
+ # regular perimeter. For perimeter bridges, the restricted service list as well
1605
+ # as access level lists must be empty.
1603
1606
  # Corresponds to the JSON property `perimeterType`
1604
1607
  # @return [String]
1605
1608
  attr_accessor :perimeter_type
@@ -1683,8 +1686,8 @@ module Google
1683
1686
 
1684
1687
  # A list of Google Cloud resources that are inside of the service perimeter.
1685
1688
  # Currently only projects and VPCs are allowed. Project format: `projects/`
1686
- # project_number`` VPC format: `//compute.googleapis.com/projects/`PROJECT_ID`/
1687
- # global/networks/`NAME``.
1689
+ # project_number`` VPC network format: `//compute.googleapis.com/projects/`
1690
+ # PROJECT_ID`/global/networks/`NAME``.
1688
1691
  # Corresponds to the JSON property `resources`
1689
1692
  # @return [Array<String>]
1690
1693
  attr_accessor :resources
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module AccesscontextmanagerV1
18
18
  # Version of the google-apis-accesscontextmanager_v1 gem
19
- GEM_VERSION = "0.26.0"
19
+ GEM_VERSION = "0.27.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.11.1"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20230109"
25
+ REVISION = "20230130"
26
26
  end
27
27
  end
28
28
  end
@@ -22,7 +22,8 @@ module Google
22
22
  module AccesscontextmanagerV1
23
23
  # Access Context Manager API
24
24
  #
25
- # An API for setting attribute based access control to requests to GCP services.
25
+ # An API for setting attribute based access control to requests to Google Cloud
26
+ # services.
26
27
  #
27
28
  # @example
28
29
  # require 'google/apis/accesscontextmanager_v1'
@@ -604,8 +605,8 @@ module Google
604
605
  execute_or_queue_command(command, &block)
605
606
  end
606
607
 
607
- # Creates a authorized orgs desc. The long-running operation from this RPC has a
608
- # successful status after the authorized orgs desc propagates to long-lasting
608
+ # Creates an authorized orgs desc. The long-running operation from this RPC has
609
+ # a successful status after the authorized orgs desc propagates to long-lasting
609
610
  # storage. If a authorized orgs desc contains errors, an error response is
610
611
  # returned for the first error encountered. The name of this `AuthorizedOrgsDesc`
611
612
  # will be assigned during creation.
@@ -642,7 +643,7 @@ module Google
642
643
  execute_or_queue_command(command, &block)
643
644
  end
644
645
 
645
- # Deletes a authorized orgs desc based on the resource name. The long-running
646
+ # Deletes an authorized orgs desc based on the resource name. The long-running
646
647
  # operation from this RPC has a successful status after the authorized orgs desc
647
648
  # is removed from long-lasting storage.
648
649
  # @param [String] name
@@ -675,7 +676,7 @@ module Google
675
676
  execute_or_queue_command(command, &block)
676
677
  end
677
678
 
678
- # Gets a authorized orgs desc based on the resource name.
679
+ # Gets an authorized orgs desc based on the resource name.
679
680
  # @param [String] name
680
681
  # Required. Resource name for the Authorized Orgs Desc. Format: `accessPolicies/`
681
682
  # policy_id`/authorizedOrgsDescs/`authorized_orgs_descs_id``
@@ -744,18 +745,18 @@ module Google
744
745
  execute_or_queue_command(command, &block)
745
746
  end
746
747
 
747
- # Updates a authorized orgs desc. The long-running operation from this RPC has a
748
- # successful status after the authorized orgs desc propagates to long-lasting
748
+ # Updates an authorized orgs desc. The long-running operation from this RPC has
749
+ # a successful status after the authorized orgs desc propagates to long-lasting
749
750
  # storage. If a authorized orgs desc contains errors, an error response is
750
751
  # returned for the first error encountered. Only the organization list in `
751
752
  # AuthorizedOrgsDesc` can be updated. The name, authorization_type, asset_type
752
753
  # and authorization_direction cannot be updated.
753
754
  # @param [String] name
754
- # Assigned by the server during creation. The last segment has an arbitrary
755
- # length and has only URI unreserved characters (as defined by [RFC 3986 Section
756
- # 2.3](https://tools.ietf.org/html/rfc3986#section-2.3)). Should not be
757
- # specified by the client during creation. Example: "accessPolicies/122256/
758
- # authorizedOrgs/b3-BhcX_Ud5N"
755
+ # Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/`
756
+ # access_policy`/authorizedOrgsDescs/`authorized_orgs_desc``. The `
757
+ # authorized_orgs_desc` component must begin with a letter, followed by
758
+ # alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you
759
+ # cannot change its `name`.
759
760
  # @param [Google::Apis::AccesscontextmanagerV1::AuthorizedOrgsDesc] authorized_orgs_desc_object
760
761
  # @param [String] update_mask
761
762
  # Required. Mask to control which fields get updated. Must be non-empty.
@@ -21,7 +21,8 @@ module Google
21
21
  module Apis
22
22
  # Access Context Manager API
23
23
  #
24
- # An API for setting attribute based access control to requests to GCP services.
24
+ # An API for setting attribute based access control to requests to Google Cloud
25
+ # services.
25
26
  #
26
27
  # @see https://cloud.google.com/access-context-manager/docs/reference/rest/
27
28
  module AccesscontextmanagerV1
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-accesscontextmanager_v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.26.0
4
+ version: 0.27.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-01-15 00:00:00.000000000 Z
11
+ date: 2023-02-05 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-accesscontextmanager_v1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-accesscontextmanager_v1/v0.26.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-accesscontextmanager_v1/v0.27.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-accesscontextmanager_v1
63
63
  post_install_message:
64
64
  rdoc_options: []