google-apis-cloudasset_v1p1beta1 0.1.0 → 0.6.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: bfbc94fddd0e564109b436de4edbee208133c92b9bbfd63943e03e9ab1dc5946
4
- data.tar.gz: fd12aa14828ddefa3cc65cbce55c41d8a98185cf214f09f4bda237d847174442
3
+ metadata.gz: cd688fc7f5aa71dc192fa28eff8ed8a5bad3127db8e837d681a4c97a226b8a29
4
+ data.tar.gz: bd32a941950fb4f8bf983ee7246ac3a523c8a3279677d0c2e78588a6c4a08f68
5
5
  SHA512:
6
- metadata.gz: 0de797a797b7529045509c4fbce4d53ee61783f42468ad3857861d26a5b0e64d80f20c07a57ea2178d82245fc8a3db9b444727dc7c50849b6a67ee23048e64d2
7
- data.tar.gz: 8093a4b7a763e1ecbcccd8877c2a1d9fdd22a55d4e57aed4bab772b6688d28b56eaf4e6fcbc7b95b40eaac3bf5e0ccbd5346475c7fa48153af1def8f09f2d754
6
+ metadata.gz: ee3589eab1833d1daf490f5e3d542a5e0043ba91e15fe9a7fba86049f158d109ed446d8d01dae6560058f35a22b4a1299ef65c23bc8629ee570b36de4ed9dab1
7
+ data.tar.gz: 9d4b22d7eac117164cfbc75cd1ac01096bf8a1381f4a15461d0a176a70fa522c4eede39cd72c43e5c517e18773f523e8e05270ccf0db4a53b40453530aa83a17
data/CHANGELOG.md CHANGED
@@ -1,5 +1,27 @@
1
1
  # Release history for google-apis-cloudasset_v1p1beta1
2
2
 
3
+ ### v0.6.0 (2021-05-19)
4
+
5
+ * Unspecified changes
6
+
7
+ ### v0.5.0 (2021-04-22)
8
+
9
+ * Regenerated from discovery document revision 20210416
10
+
11
+ ### v0.4.0 (2021-03-31)
12
+
13
+ * Regenerated from discovery document revision 20210326
14
+
15
+ ### v0.3.0 (2021-03-09)
16
+
17
+ * Regenerated from discovery document revision 20210305
18
+ * Regenerated using generator version 0.2.0
19
+
20
+ ### v0.2.0 (2021-03-04)
21
+
22
+ * Regenerated from discovery document revision 20210226
23
+ * Regenerated using generator version 0.1.2
24
+
3
25
  ### v0.1.0 (2021-01-07)
4
26
 
5
27
  * Regenerated using generator version 0.1.1
@@ -29,7 +29,7 @@ module Google
29
29
  # This is NOT the gem version.
30
30
  VERSION = 'V1p1beta1'
31
31
 
32
- # View and manage your data across Google Cloud Platform services
32
+ # See, edit, configure, and delete your Google Cloud Platform data
33
33
  AUTH_CLOUD_PLATFORM = 'https://www.googleapis.com/auth/cloud-platform'
34
34
  end
35
35
  end
@@ -22,6 +22,19 @@ module Google
22
22
  module Apis
23
23
  module CloudassetV1p1beta1
24
24
 
25
+ # A response message for AssetService.AnalyzeIamPolicyLongrunning.
26
+ class AnalyzeIamPolicyLongrunningResponse
27
+ include Google::Apis::Core::Hashable
28
+
29
+ def initialize(**args)
30
+ update!(**args)
31
+ end
32
+
33
+ # Update properties of this object
34
+ def update!(**args)
35
+ end
36
+ end
37
+
25
38
  # Specifies the audit configuration for a service. The configuration determines
26
39
  # which permission types are logged, and what identities, if any, are exempted
27
40
  # from logging. An AuditConfig must have one or more AuditLogConfigs. If there
@@ -241,6 +254,1430 @@ module Google
241
254
  end
242
255
  end
243
256
 
257
+ # An asset in Google Cloud. An asset can be any resource in the Google Cloud [
258
+ # resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-
259
+ # platform-resource-hierarchy), a resource outside the Google Cloud resource
260
+ # hierarchy (such as Google Kubernetes Engine clusters and objects), or a policy
261
+ # (e.g. Cloud IAM policy). See [Supported asset types](https://cloud.google.com/
262
+ # asset-inventory/docs/supported-asset-types) for more information.
263
+ class GoogleCloudAssetV1p7beta1Asset
264
+ include Google::Apis::Core::Hashable
265
+
266
+ # An `AccessLevel` is a label that can be applied to requests to Google Cloud
267
+ # services, along with a list of requirements necessary for the label to be
268
+ # applied.
269
+ # Corresponds to the JSON property `accessLevel`
270
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1AccessLevel]
271
+ attr_accessor :access_level
272
+
273
+ # `AccessPolicy` is a container for `AccessLevels` (which define the necessary
274
+ # attributes to use Google Cloud services) and `ServicePerimeters` (which define
275
+ # regions of services able to freely pass data within a perimeter). An access
276
+ # policy is globally visible within an organization, and the restrictions it
277
+ # specifies apply to all projects within an organization.
278
+ # Corresponds to the JSON property `accessPolicy`
279
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1AccessPolicy]
280
+ attr_accessor :access_policy
281
+
282
+ # The ancestry path of an asset in Google Cloud [resource hierarchy](https://
283
+ # cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy),
284
+ # represented as a list of relative resource names. An ancestry path starts with
285
+ # the closest ancestor in the hierarchy and ends at root. If the asset is a
286
+ # project, folder, or organization, the ancestry path starts from the asset
287
+ # itself. Example: `["projects/123456789", "folders/5432", "organizations/1234"]`
288
+ # Corresponds to the JSON property `ancestors`
289
+ # @return [Array<String>]
290
+ attr_accessor :ancestors
291
+
292
+ # The type of the asset. Example: `compute.googleapis.com/Disk` See [Supported
293
+ # asset types](https://cloud.google.com/asset-inventory/docs/supported-asset-
294
+ # types) for more information.
295
+ # Corresponds to the JSON property `assetType`
296
+ # @return [String]
297
+ attr_accessor :asset_type
298
+
299
+ # An Identity and Access Management (IAM) policy, which specifies access
300
+ # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
301
+ # A `binding` binds one or more `members` to a single `role`. Members can be
302
+ # user accounts, service accounts, Google groups, and domains (such as G Suite).
303
+ # A `role` is a named list of permissions; each `role` can be an IAM predefined
304
+ # role or a user-created custom role. For some types of Google Cloud resources,
305
+ # a `binding` can also specify a `condition`, which is a logical expression that
306
+ # allows access to a resource only if the expression evaluates to `true`. A
307
+ # condition can add constraints based on attributes of the request, the resource,
308
+ # or both. To learn which resources support conditions in their IAM policies,
309
+ # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
310
+ # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
311
+ # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
312
+ # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
313
+ # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
314
+ # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
315
+ # title": "expirable access", "description": "Does not grant access after Sep
316
+ # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
317
+ # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
318
+ # members: - user:mike@example.com - group:admins@example.com - domain:google.
319
+ # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
320
+ # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
321
+ # roles/resourcemanager.organizationViewer condition: title: expirable access
322
+ # description: Does not grant access after Sep 2020 expression: request.time <
323
+ # timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
324
+ # description of IAM and its features, see the [IAM documentation](https://cloud.
325
+ # google.com/iam/docs/).
326
+ # Corresponds to the JSON property `iamPolicy`
327
+ # @return [Google::Apis::CloudassetV1p1beta1::Policy]
328
+ attr_accessor :iam_policy
329
+
330
+ # The full name of the asset. Example: `//compute.googleapis.com/projects/
331
+ # my_project_123/zones/zone1/instances/instance1` See [Resource names](https://
332
+ # cloud.google.com/apis/design/resource_names#full_resource_name) for more
333
+ # information.
334
+ # Corresponds to the JSON property `name`
335
+ # @return [String]
336
+ attr_accessor :name
337
+
338
+ # A representation of an [organization policy](https://cloud.google.com/resource-
339
+ # manager/docs/organization-policy/overview#organization_policy). There can be
340
+ # more than one organization policy with different constraints set on a given
341
+ # resource.
342
+ # Corresponds to the JSON property `orgPolicy`
343
+ # @return [Array<Google::Apis::CloudassetV1p1beta1::GoogleCloudOrgpolicyV1Policy>]
344
+ attr_accessor :org_policy
345
+
346
+ # The detailed related assets with the `relationship_type`.
347
+ # Corresponds to the JSON property `relatedAssets`
348
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleCloudAssetV1p7beta1RelatedAssets]
349
+ attr_accessor :related_assets
350
+
351
+ # A representation of a Google Cloud resource.
352
+ # Corresponds to the JSON property `resource`
353
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleCloudAssetV1p7beta1Resource]
354
+ attr_accessor :resource
355
+
356
+ # `ServicePerimeter` describes a set of Google Cloud resources which can freely
357
+ # import and export data amongst themselves, but not export outside of the `
358
+ # ServicePerimeter`. If a request with a source within this `ServicePerimeter`
359
+ # has a target outside of the `ServicePerimeter`, the request will be blocked.
360
+ # Otherwise the request is allowed. There are two types of Service Perimeter -
361
+ # Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google
362
+ # Cloud project can only belong to a single regular Service Perimeter. Service
363
+ # Perimeter Bridges can contain only Google Cloud projects as members, a single
364
+ # Google Cloud project may belong to multiple Service Perimeter Bridges.
365
+ # Corresponds to the JSON property `servicePerimeter`
366
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1ServicePerimeter]
367
+ attr_accessor :service_perimeter
368
+
369
+ # The last update timestamp of an asset. update_time is updated when create/
370
+ # update/delete operation is performed.
371
+ # Corresponds to the JSON property `updateTime`
372
+ # @return [String]
373
+ attr_accessor :update_time
374
+
375
+ def initialize(**args)
376
+ update!(**args)
377
+ end
378
+
379
+ # Update properties of this object
380
+ def update!(**args)
381
+ @access_level = args[:access_level] if args.key?(:access_level)
382
+ @access_policy = args[:access_policy] if args.key?(:access_policy)
383
+ @ancestors = args[:ancestors] if args.key?(:ancestors)
384
+ @asset_type = args[:asset_type] if args.key?(:asset_type)
385
+ @iam_policy = args[:iam_policy] if args.key?(:iam_policy)
386
+ @name = args[:name] if args.key?(:name)
387
+ @org_policy = args[:org_policy] if args.key?(:org_policy)
388
+ @related_assets = args[:related_assets] if args.key?(:related_assets)
389
+ @resource = args[:resource] if args.key?(:resource)
390
+ @service_perimeter = args[:service_perimeter] if args.key?(:service_perimeter)
391
+ @update_time = args[:update_time] if args.key?(:update_time)
392
+ end
393
+ end
394
+
395
+ # An asset identify in Google Cloud which contains its name, type and ancestors.
396
+ # An asset can be any resource in the Google Cloud [resource hierarchy](https://
397
+ # cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy), a
398
+ # resource outside the Google Cloud resource hierarchy (such as Google
399
+ # Kubernetes Engine clusters and objects), or a policy (e.g. Cloud IAM policy).
400
+ # See [Supported asset types](https://cloud.google.com/asset-inventory/docs/
401
+ # supported-asset-types) for more information.
402
+ class GoogleCloudAssetV1p7beta1RelatedAsset
403
+ include Google::Apis::Core::Hashable
404
+
405
+ # The ancestors of an asset in Google Cloud [resource hierarchy](https://cloud.
406
+ # google.com/resource-manager/docs/cloud-platform-resource-hierarchy),
407
+ # represented as a list of relative resource names. An ancestry path starts with
408
+ # the closest ancestor in the hierarchy and ends at root. Example: `["projects/
409
+ # 123456789", "folders/5432", "organizations/1234"]`
410
+ # Corresponds to the JSON property `ancestors`
411
+ # @return [Array<String>]
412
+ attr_accessor :ancestors
413
+
414
+ # The full name of the asset. Example: `//compute.googleapis.com/projects/
415
+ # my_project_123/zones/zone1/instances/instance1` See [Resource names](https://
416
+ # cloud.google.com/apis/design/resource_names#full_resource_name) for more
417
+ # information.
418
+ # Corresponds to the JSON property `asset`
419
+ # @return [String]
420
+ attr_accessor :asset
421
+
422
+ # The type of the asset. Example: `compute.googleapis.com/Disk` See [Supported
423
+ # asset types](https://cloud.google.com/asset-inventory/docs/supported-asset-
424
+ # types) for more information.
425
+ # Corresponds to the JSON property `assetType`
426
+ # @return [String]
427
+ attr_accessor :asset_type
428
+
429
+ def initialize(**args)
430
+ update!(**args)
431
+ end
432
+
433
+ # Update properties of this object
434
+ def update!(**args)
435
+ @ancestors = args[:ancestors] if args.key?(:ancestors)
436
+ @asset = args[:asset] if args.key?(:asset)
437
+ @asset_type = args[:asset_type] if args.key?(:asset_type)
438
+ end
439
+ end
440
+
441
+ # The detailed related assets with the `relationship_type`.
442
+ class GoogleCloudAssetV1p7beta1RelatedAssets
443
+ include Google::Apis::Core::Hashable
444
+
445
+ # The peer resources of the relationship.
446
+ # Corresponds to the JSON property `assets`
447
+ # @return [Array<Google::Apis::CloudassetV1p1beta1::GoogleCloudAssetV1p7beta1RelatedAsset>]
448
+ attr_accessor :assets
449
+
450
+ # The relationship attributes which include `type`, `source_resource_type`, `
451
+ # target_resource_type` and `action`.
452
+ # Corresponds to the JSON property `relationshipAttributes`
453
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleCloudAssetV1p7beta1RelationshipAttributes]
454
+ attr_accessor :relationship_attributes
455
+
456
+ def initialize(**args)
457
+ update!(**args)
458
+ end
459
+
460
+ # Update properties of this object
461
+ def update!(**args)
462
+ @assets = args[:assets] if args.key?(:assets)
463
+ @relationship_attributes = args[:relationship_attributes] if args.key?(:relationship_attributes)
464
+ end
465
+ end
466
+
467
+ # The relationship attributes which include `type`, `source_resource_type`, `
468
+ # target_resource_type` and `action`.
469
+ class GoogleCloudAssetV1p7beta1RelationshipAttributes
470
+ include Google::Apis::Core::Hashable
471
+
472
+ # The detail of the relationship, e.g. `contains`, `attaches`
473
+ # Corresponds to the JSON property `action`
474
+ # @return [String]
475
+ attr_accessor :action
476
+
477
+ # The source asset type. Example: `compute.googleapis.com/Instance`
478
+ # Corresponds to the JSON property `sourceResourceType`
479
+ # @return [String]
480
+ attr_accessor :source_resource_type
481
+
482
+ # The target asset type. Example: `compute.googleapis.com/Disk`
483
+ # Corresponds to the JSON property `targetResourceType`
484
+ # @return [String]
485
+ attr_accessor :target_resource_type
486
+
487
+ # The unique identifier of the relationship type. Example: `
488
+ # INSTANCE_TO_INSTANCEGROUP`
489
+ # Corresponds to the JSON property `type`
490
+ # @return [String]
491
+ attr_accessor :type
492
+
493
+ def initialize(**args)
494
+ update!(**args)
495
+ end
496
+
497
+ # Update properties of this object
498
+ def update!(**args)
499
+ @action = args[:action] if args.key?(:action)
500
+ @source_resource_type = args[:source_resource_type] if args.key?(:source_resource_type)
501
+ @target_resource_type = args[:target_resource_type] if args.key?(:target_resource_type)
502
+ @type = args[:type] if args.key?(:type)
503
+ end
504
+ end
505
+
506
+ # A representation of a Google Cloud resource.
507
+ class GoogleCloudAssetV1p7beta1Resource
508
+ include Google::Apis::Core::Hashable
509
+
510
+ # The content of the resource, in which some sensitive fields are removed and
511
+ # may not be present.
512
+ # Corresponds to the JSON property `data`
513
+ # @return [Hash<String,Object>]
514
+ attr_accessor :data
515
+
516
+ # The URL of the discovery document containing the resource's JSON schema.
517
+ # Example: `https://www.googleapis.com/discovery/v1/apis/compute/v1/rest` This
518
+ # value is unspecified for resources that do not have an API based on a
519
+ # discovery document, such as Cloud Bigtable.
520
+ # Corresponds to the JSON property `discoveryDocumentUri`
521
+ # @return [String]
522
+ attr_accessor :discovery_document_uri
523
+
524
+ # The JSON schema name listed in the discovery document. Example: `Project` This
525
+ # value is unspecified for resources that do not have an API based on a
526
+ # discovery document, such as Cloud Bigtable.
527
+ # Corresponds to the JSON property `discoveryName`
528
+ # @return [String]
529
+ attr_accessor :discovery_name
530
+
531
+ # The location of the resource in Google Cloud, such as its zone and region. For
532
+ # more information, see https://cloud.google.com/about/locations/.
533
+ # Corresponds to the JSON property `location`
534
+ # @return [String]
535
+ attr_accessor :location
536
+
537
+ # The full name of the immediate parent of this resource. See [Resource Names](
538
+ # https://cloud.google.com/apis/design/resource_names#full_resource_name) for
539
+ # more information. For Google Cloud assets, this value is the parent resource
540
+ # defined in the [Cloud IAM policy hierarchy](https://cloud.google.com/iam/docs/
541
+ # overview#policy_hierarchy). Example: `//cloudresourcemanager.googleapis.com/
542
+ # projects/my_project_123` For third-party assets, this field may be set
543
+ # differently.
544
+ # Corresponds to the JSON property `parent`
545
+ # @return [String]
546
+ attr_accessor :parent
547
+
548
+ # The REST URL for accessing the resource. An HTTP `GET` request using this URL
549
+ # returns the resource itself. Example: `https://cloudresourcemanager.googleapis.
550
+ # com/v1/projects/my-project-123` This value is unspecified for resources
551
+ # without a REST API.
552
+ # Corresponds to the JSON property `resourceUrl`
553
+ # @return [String]
554
+ attr_accessor :resource_url
555
+
556
+ # The API version. Example: `v1`
557
+ # Corresponds to the JSON property `version`
558
+ # @return [String]
559
+ attr_accessor :version
560
+
561
+ def initialize(**args)
562
+ update!(**args)
563
+ end
564
+
565
+ # Update properties of this object
566
+ def update!(**args)
567
+ @data = args[:data] if args.key?(:data)
568
+ @discovery_document_uri = args[:discovery_document_uri] if args.key?(:discovery_document_uri)
569
+ @discovery_name = args[:discovery_name] if args.key?(:discovery_name)
570
+ @location = args[:location] if args.key?(:location)
571
+ @parent = args[:parent] if args.key?(:parent)
572
+ @resource_url = args[:resource_url] if args.key?(:resource_url)
573
+ @version = args[:version] if args.key?(:version)
574
+ end
575
+ end
576
+
577
+ # Used in `policy_type` to specify how `boolean_policy` will behave at this
578
+ # resource.
579
+ class GoogleCloudOrgpolicyV1BooleanPolicy
580
+ include Google::Apis::Core::Hashable
581
+
582
+ # If `true`, then the `Policy` is enforced. If `false`, then any configuration
583
+ # is acceptable. Suppose you have a `Constraint` `constraints/compute.
584
+ # disableSerialPortAccess` with `constraint_default` set to `ALLOW`. A `Policy`
585
+ # for that `Constraint` exhibits the following behavior: - If the `Policy` at
586
+ # this resource has enforced set to `false`, serial port connection attempts
587
+ # will be allowed. - If the `Policy` at this resource has enforced set to `true`,
588
+ # serial port connection attempts will be refused. - If the `Policy` at this
589
+ # resource is `RestoreDefault`, serial port connection attempts will be allowed.
590
+ # - If no `Policy` is set at this resource or anywhere higher in the resource
591
+ # hierarchy, serial port connection attempts will be allowed. - If no `Policy`
592
+ # is set at this resource, but one exists higher in the resource hierarchy, the
593
+ # behavior is as if the`Policy` were set at this resource. The following
594
+ # examples demonstrate the different possible layerings: Example 1 (nearest `
595
+ # Constraint` wins): `organizations/foo` has a `Policy` with: `enforced: false` `
596
+ # projects/bar` has no `Policy` set. The constraint at `projects/bar` and `
597
+ # organizations/foo` will not be enforced. Example 2 (enforcement gets replaced):
598
+ # `organizations/foo` has a `Policy` with: `enforced: false` `projects/bar` has
599
+ # a `Policy` with: `enforced: true` The constraint at `organizations/foo` is not
600
+ # enforced. The constraint at `projects/bar` is enforced. Example 3 (
601
+ # RestoreDefault): `organizations/foo` has a `Policy` with: `enforced: true` `
602
+ # projects/bar` has a `Policy` with: `RestoreDefault: ``` The constraint at `
603
+ # organizations/foo` is enforced. The constraint at `projects/bar` is not
604
+ # enforced, because `constraint_default` for the `Constraint` is `ALLOW`.
605
+ # Corresponds to the JSON property `enforced`
606
+ # @return [Boolean]
607
+ attr_accessor :enforced
608
+ alias_method :enforced?, :enforced
609
+
610
+ def initialize(**args)
611
+ update!(**args)
612
+ end
613
+
614
+ # Update properties of this object
615
+ def update!(**args)
616
+ @enforced = args[:enforced] if args.key?(:enforced)
617
+ end
618
+ end
619
+
620
+ # Used in `policy_type` to specify how `list_policy` behaves at this resource. `
621
+ # ListPolicy` can define specific values and subtrees of Cloud Resource Manager
622
+ # resource hierarchy (`Organizations`, `Folders`, `Projects`) that are allowed
623
+ # or denied by setting the `allowed_values` and `denied_values` fields. This is
624
+ # achieved by using the `under:` and optional `is:` prefixes. The `under:`
625
+ # prefix is used to denote resource subtree values. The `is:` prefix is used to
626
+ # denote specific values, and is required only if the value contains a ":".
627
+ # Values prefixed with "is:" are treated the same as values with no prefix.
628
+ # Ancestry subtrees must be in one of the following formats: - "projects/", e.g.
629
+ # "projects/tokyo-rain-123" - "folders/", e.g. "folders/1234" - "organizations/",
630
+ # e.g. "organizations/1234" The `supports_under` field of the associated `
631
+ # Constraint` defines whether ancestry prefixes can be used. You can set `
632
+ # allowed_values` and `denied_values` in the same `Policy` if `all_values` is `
633
+ # ALL_VALUES_UNSPECIFIED`. `ALLOW` or `DENY` are used to allow or deny all
634
+ # values. If `all_values` is set to either `ALLOW` or `DENY`, `allowed_values`
635
+ # and `denied_values` must be unset.
636
+ class GoogleCloudOrgpolicyV1ListPolicy
637
+ include Google::Apis::Core::Hashable
638
+
639
+ # The policy all_values state.
640
+ # Corresponds to the JSON property `allValues`
641
+ # @return [String]
642
+ attr_accessor :all_values
643
+
644
+ # List of values allowed at this resource. Can only be set if `all_values` is
645
+ # set to `ALL_VALUES_UNSPECIFIED`.
646
+ # Corresponds to the JSON property `allowedValues`
647
+ # @return [Array<String>]
648
+ attr_accessor :allowed_values
649
+
650
+ # List of values denied at this resource. Can only be set if `all_values` is set
651
+ # to `ALL_VALUES_UNSPECIFIED`.
652
+ # Corresponds to the JSON property `deniedValues`
653
+ # @return [Array<String>]
654
+ attr_accessor :denied_values
655
+
656
+ # Determines the inheritance behavior for this `Policy`. By default, a `
657
+ # ListPolicy` set at a resource supersedes any `Policy` set anywhere up the
658
+ # resource hierarchy. However, if `inherit_from_parent` is set to `true`, then
659
+ # the values from the effective `Policy` of the parent resource are inherited,
660
+ # meaning the values set in this `Policy` are added to the values inherited up
661
+ # the hierarchy. Setting `Policy` hierarchies that inherit both allowed values
662
+ # and denied values isn't recommended in most circumstances to keep the
663
+ # configuration simple and understandable. However, it is possible to set a `
664
+ # Policy` with `allowed_values` set that inherits a `Policy` with `denied_values`
665
+ # set. In this case, the values that are allowed must be in `allowed_values`
666
+ # and not present in `denied_values`. For example, suppose you have a `
667
+ # Constraint` `constraints/serviceuser.services`, which has a `constraint_type`
668
+ # of `list_constraint`, and with `constraint_default` set to `ALLOW`. Suppose
669
+ # that at the Organization level, a `Policy` is applied that restricts the
670
+ # allowed API activations to ``E1`, `E2``. Then, if a `Policy` is applied to a
671
+ # project below the Organization that has `inherit_from_parent` set to `false`
672
+ # and field all_values set to DENY, then an attempt to activate any API will be
673
+ # denied. The following examples demonstrate different possible layerings for `
674
+ # projects/bar` parented by `organizations/foo`: Example 1 (no inherited values):
675
+ # `organizations/foo` has a `Policy` with values: `allowed_values: "E1"
676
+ # allowed_values:"E2"` `projects/bar` has `inherit_from_parent` `false` and
677
+ # values: `allowed_values: "E3" allowed_values: "E4"` The accepted values at `
678
+ # organizations/foo` are `E1`, `E2`. The accepted values at `projects/bar` are `
679
+ # E3`, and `E4`. Example 2 (inherited values): `organizations/foo` has a `Policy`
680
+ # with values: `allowed_values: "E1" allowed_values:"E2"` `projects/bar` has a `
681
+ # Policy` with values: `value: "E3" value: "E4" inherit_from_parent: true` The
682
+ # accepted values at `organizations/foo` are `E1`, `E2`. The accepted values at `
683
+ # projects/bar` are `E1`, `E2`, `E3`, and `E4`. Example 3 (inheriting both
684
+ # allowed and denied values): `organizations/foo` has a `Policy` with values: `
685
+ # allowed_values: "E1" allowed_values: "E2"` `projects/bar` has a `Policy` with:
686
+ # `denied_values: "E1"` The accepted values at `organizations/foo` are `E1`, `E2`
687
+ # . The value accepted at `projects/bar` is `E2`. Example 4 (RestoreDefault): `
688
+ # organizations/foo` has a `Policy` with values: `allowed_values: "E1"
689
+ # allowed_values:"E2"` `projects/bar` has a `Policy` with values: `
690
+ # RestoreDefault: ``` The accepted values at `organizations/foo` are `E1`, `E2`.
691
+ # The accepted values at `projects/bar` are either all or none depending on the
692
+ # value of `constraint_default` (if `ALLOW`, all; if `DENY`, none). Example 5 (
693
+ # no policy inherits parent policy): `organizations/foo` has no `Policy` set. `
694
+ # projects/bar` has no `Policy` set. The accepted values at both levels are
695
+ # either all or none depending on the value of `constraint_default` (if `ALLOW`,
696
+ # all; if `DENY`, none). Example 6 (ListConstraint allowing all): `organizations/
697
+ # foo` has a `Policy` with values: `allowed_values: "E1" allowed_values: "E2"` `
698
+ # projects/bar` has a `Policy` with: `all: ALLOW` The accepted values at `
699
+ # organizations/foo` are `E1`, E2`. Any value is accepted at `projects/bar`.
700
+ # Example 7 (ListConstraint allowing none): `organizations/foo` has a `Policy`
701
+ # with values: `allowed_values: "E1" allowed_values: "E2"` `projects/bar` has a `
702
+ # Policy` with: `all: DENY` The accepted values at `organizations/foo` are `E1`,
703
+ # E2`. No value is accepted at `projects/bar`. Example 10 (allowed and denied
704
+ # subtrees of Resource Manager hierarchy): Given the following resource
705
+ # hierarchy O1->`F1, F2`; F1->`P1`; F2->`P2, P3`, `organizations/foo` has a `
706
+ # Policy` with values: `allowed_values: "under:organizations/O1"` `projects/bar`
707
+ # has a `Policy` with: `allowed_values: "under:projects/P3"` `denied_values: "
708
+ # under:folders/F2"` The accepted values at `organizations/foo` are `
709
+ # organizations/O1`, `folders/F1`, `folders/F2`, `projects/P1`, `projects/P2`, `
710
+ # projects/P3`. The accepted values at `projects/bar` are `organizations/O1`, `
711
+ # folders/F1`, `projects/P1`.
712
+ # Corresponds to the JSON property `inheritFromParent`
713
+ # @return [Boolean]
714
+ attr_accessor :inherit_from_parent
715
+ alias_method :inherit_from_parent?, :inherit_from_parent
716
+
717
+ # Optional. The Google Cloud Console will try to default to a configuration that
718
+ # matches the value specified in this `Policy`. If `suggested_value` is not set,
719
+ # it will inherit the value specified higher in the hierarchy, unless `
720
+ # inherit_from_parent` is `false`.
721
+ # Corresponds to the JSON property `suggestedValue`
722
+ # @return [String]
723
+ attr_accessor :suggested_value
724
+
725
+ def initialize(**args)
726
+ update!(**args)
727
+ end
728
+
729
+ # Update properties of this object
730
+ def update!(**args)
731
+ @all_values = args[:all_values] if args.key?(:all_values)
732
+ @allowed_values = args[:allowed_values] if args.key?(:allowed_values)
733
+ @denied_values = args[:denied_values] if args.key?(:denied_values)
734
+ @inherit_from_parent = args[:inherit_from_parent] if args.key?(:inherit_from_parent)
735
+ @suggested_value = args[:suggested_value] if args.key?(:suggested_value)
736
+ end
737
+ end
738
+
739
+ # Defines a Cloud Organization `Policy` which is used to specify `Constraints`
740
+ # for configurations of Cloud Platform resources.
741
+ class GoogleCloudOrgpolicyV1Policy
742
+ include Google::Apis::Core::Hashable
743
+
744
+ # Used in `policy_type` to specify how `boolean_policy` will behave at this
745
+ # resource.
746
+ # Corresponds to the JSON property `booleanPolicy`
747
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleCloudOrgpolicyV1BooleanPolicy]
748
+ attr_accessor :boolean_policy
749
+
750
+ # The name of the `Constraint` the `Policy` is configuring, for example, `
751
+ # constraints/serviceuser.services`. A [list of available constraints](/resource-
752
+ # manager/docs/organization-policy/org-policy-constraints) is available.
753
+ # Immutable after creation.
754
+ # Corresponds to the JSON property `constraint`
755
+ # @return [String]
756
+ attr_accessor :constraint
757
+
758
+ # An opaque tag indicating the current version of the `Policy`, used for
759
+ # concurrency control. When the `Policy` is returned from either a `GetPolicy`
760
+ # or a `ListOrgPolicy` request, this `etag` indicates the version of the current
761
+ # `Policy` to use when executing a read-modify-write loop. When the `Policy` is
762
+ # returned from a `GetEffectivePolicy` request, the `etag` will be unset. When
763
+ # the `Policy` is used in a `SetOrgPolicy` method, use the `etag` value that was
764
+ # returned from a `GetOrgPolicy` request as part of a read-modify-write loop for
765
+ # concurrency control. Not setting the `etag`in a `SetOrgPolicy` request will
766
+ # result in an unconditional write of the `Policy`.
767
+ # Corresponds to the JSON property `etag`
768
+ # NOTE: Values are automatically base64 encoded/decoded in the client library.
769
+ # @return [String]
770
+ attr_accessor :etag
771
+
772
+ # Used in `policy_type` to specify how `list_policy` behaves at this resource. `
773
+ # ListPolicy` can define specific values and subtrees of Cloud Resource Manager
774
+ # resource hierarchy (`Organizations`, `Folders`, `Projects`) that are allowed
775
+ # or denied by setting the `allowed_values` and `denied_values` fields. This is
776
+ # achieved by using the `under:` and optional `is:` prefixes. The `under:`
777
+ # prefix is used to denote resource subtree values. The `is:` prefix is used to
778
+ # denote specific values, and is required only if the value contains a ":".
779
+ # Values prefixed with "is:" are treated the same as values with no prefix.
780
+ # Ancestry subtrees must be in one of the following formats: - "projects/", e.g.
781
+ # "projects/tokyo-rain-123" - "folders/", e.g. "folders/1234" - "organizations/",
782
+ # e.g. "organizations/1234" The `supports_under` field of the associated `
783
+ # Constraint` defines whether ancestry prefixes can be used. You can set `
784
+ # allowed_values` and `denied_values` in the same `Policy` if `all_values` is `
785
+ # ALL_VALUES_UNSPECIFIED`. `ALLOW` or `DENY` are used to allow or deny all
786
+ # values. If `all_values` is set to either `ALLOW` or `DENY`, `allowed_values`
787
+ # and `denied_values` must be unset.
788
+ # Corresponds to the JSON property `listPolicy`
789
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleCloudOrgpolicyV1ListPolicy]
790
+ attr_accessor :list_policy
791
+
792
+ # Ignores policies set above this resource and restores the `constraint_default`
793
+ # enforcement behavior of the specific `Constraint` at this resource. Suppose
794
+ # that `constraint_default` is set to `ALLOW` for the `Constraint` `constraints/
795
+ # serviceuser.services`. Suppose that organization foo.com sets a `Policy` at
796
+ # their Organization resource node that restricts the allowed service
797
+ # activations to deny all service activations. They could then set a `Policy`
798
+ # with the `policy_type` `restore_default` on several experimental projects,
799
+ # restoring the `constraint_default` enforcement of the `Constraint` for only
800
+ # those projects, allowing those projects to have all services activated.
801
+ # Corresponds to the JSON property `restoreDefault`
802
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleCloudOrgpolicyV1RestoreDefault]
803
+ attr_accessor :restore_default
804
+
805
+ # The time stamp the `Policy` was previously updated. This is set by the server,
806
+ # not specified by the caller, and represents the last time a call to `
807
+ # SetOrgPolicy` was made for that `Policy`. Any value set by the client will be
808
+ # ignored.
809
+ # Corresponds to the JSON property `updateTime`
810
+ # @return [String]
811
+ attr_accessor :update_time
812
+
813
+ # Version of the `Policy`. Default version is 0;
814
+ # Corresponds to the JSON property `version`
815
+ # @return [Fixnum]
816
+ attr_accessor :version
817
+
818
+ def initialize(**args)
819
+ update!(**args)
820
+ end
821
+
822
+ # Update properties of this object
823
+ def update!(**args)
824
+ @boolean_policy = args[:boolean_policy] if args.key?(:boolean_policy)
825
+ @constraint = args[:constraint] if args.key?(:constraint)
826
+ @etag = args[:etag] if args.key?(:etag)
827
+ @list_policy = args[:list_policy] if args.key?(:list_policy)
828
+ @restore_default = args[:restore_default] if args.key?(:restore_default)
829
+ @update_time = args[:update_time] if args.key?(:update_time)
830
+ @version = args[:version] if args.key?(:version)
831
+ end
832
+ end
833
+
834
+ # Ignores policies set above this resource and restores the `constraint_default`
835
+ # enforcement behavior of the specific `Constraint` at this resource. Suppose
836
+ # that `constraint_default` is set to `ALLOW` for the `Constraint` `constraints/
837
+ # serviceuser.services`. Suppose that organization foo.com sets a `Policy` at
838
+ # their Organization resource node that restricts the allowed service
839
+ # activations to deny all service activations. They could then set a `Policy`
840
+ # with the `policy_type` `restore_default` on several experimental projects,
841
+ # restoring the `constraint_default` enforcement of the `Constraint` for only
842
+ # those projects, allowing those projects to have all services activated.
843
+ class GoogleCloudOrgpolicyV1RestoreDefault
844
+ include Google::Apis::Core::Hashable
845
+
846
+ def initialize(**args)
847
+ update!(**args)
848
+ end
849
+
850
+ # Update properties of this object
851
+ def update!(**args)
852
+ end
853
+ end
854
+
855
+ # An `AccessLevel` is a label that can be applied to requests to Google Cloud
856
+ # services, along with a list of requirements necessary for the label to be
857
+ # applied.
858
+ class GoogleIdentityAccesscontextmanagerV1AccessLevel
859
+ include Google::Apis::Core::Hashable
860
+
861
+ # `BasicLevel` is an `AccessLevel` using a set of recommended features.
862
+ # Corresponds to the JSON property `basic`
863
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1BasicLevel]
864
+ attr_accessor :basic
865
+
866
+ # `CustomLevel` is an `AccessLevel` using the Cloud Common Expression Language
867
+ # to represent the necessary conditions for the level to apply to a request. See
868
+ # CEL spec at: https://github.com/google/cel-spec
869
+ # Corresponds to the JSON property `custom`
870
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1CustomLevel]
871
+ attr_accessor :custom
872
+
873
+ # Description of the `AccessLevel` and its use. Does not affect behavior.
874
+ # Corresponds to the JSON property `description`
875
+ # @return [String]
876
+ attr_accessor :description
877
+
878
+ # Required. Resource name for the Access Level. The `short_name` component must
879
+ # begin with a letter and only include alphanumeric and '_'. Format: `
880
+ # accessPolicies/`policy_id`/accessLevels/`short_name``. The maximum length of
881
+ # the `short_name` component is 50 characters.
882
+ # Corresponds to the JSON property `name`
883
+ # @return [String]
884
+ attr_accessor :name
885
+
886
+ # Human readable title. Must be unique within the Policy.
887
+ # Corresponds to the JSON property `title`
888
+ # @return [String]
889
+ attr_accessor :title
890
+
891
+ def initialize(**args)
892
+ update!(**args)
893
+ end
894
+
895
+ # Update properties of this object
896
+ def update!(**args)
897
+ @basic = args[:basic] if args.key?(:basic)
898
+ @custom = args[:custom] if args.key?(:custom)
899
+ @description = args[:description] if args.key?(:description)
900
+ @name = args[:name] if args.key?(:name)
901
+ @title = args[:title] if args.key?(:title)
902
+ end
903
+ end
904
+
905
+ # `AccessPolicy` is a container for `AccessLevels` (which define the necessary
906
+ # attributes to use Google Cloud services) and `ServicePerimeters` (which define
907
+ # regions of services able to freely pass data within a perimeter). An access
908
+ # policy is globally visible within an organization, and the restrictions it
909
+ # specifies apply to all projects within an organization.
910
+ class GoogleIdentityAccesscontextmanagerV1AccessPolicy
911
+ include Google::Apis::Core::Hashable
912
+
913
+ # Output only. An opaque identifier for the current version of the `AccessPolicy`
914
+ # . This will always be a strongly validated etag, meaning that two Access
915
+ # Polices will be identical if and only if their etags are identical. Clients
916
+ # should not expect this to be in any specific format.
917
+ # Corresponds to the JSON property `etag`
918
+ # @return [String]
919
+ attr_accessor :etag
920
+
921
+ # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/`
922
+ # policy_id``
923
+ # Corresponds to the JSON property `name`
924
+ # @return [String]
925
+ attr_accessor :name
926
+
927
+ # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy.
928
+ # Currently immutable once created. Format: `organizations/`organization_id``
929
+ # Corresponds to the JSON property `parent`
930
+ # @return [String]
931
+ attr_accessor :parent
932
+
933
+ # Required. Human readable title. Does not affect behavior.
934
+ # Corresponds to the JSON property `title`
935
+ # @return [String]
936
+ attr_accessor :title
937
+
938
+ def initialize(**args)
939
+ update!(**args)
940
+ end
941
+
942
+ # Update properties of this object
943
+ def update!(**args)
944
+ @etag = args[:etag] if args.key?(:etag)
945
+ @name = args[:name] if args.key?(:name)
946
+ @parent = args[:parent] if args.key?(:parent)
947
+ @title = args[:title] if args.key?(:title)
948
+ end
949
+ end
950
+
951
+ # Identification for an API Operation.
952
+ class GoogleIdentityAccesscontextmanagerV1ApiOperation
953
+ include Google::Apis::Core::Hashable
954
+
955
+ # API methods or permissions to allow. Method or permission must belong to the
956
+ # service specified by `service_name` field. A single MethodSelector entry with `
957
+ # *` specified for the `method` field will allow all methods AND permissions for
958
+ # the service specified in `service_name`.
959
+ # Corresponds to the JSON property `methodSelectors`
960
+ # @return [Array<Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1MethodSelector>]
961
+ attr_accessor :method_selectors
962
+
963
+ # The name of the API whose methods or permissions the IngressPolicy or
964
+ # EgressPolicy want to allow. A single ApiOperation with `service_name` field
965
+ # set to `*` will allow all methods AND permissions for all services.
966
+ # Corresponds to the JSON property `serviceName`
967
+ # @return [String]
968
+ attr_accessor :service_name
969
+
970
+ def initialize(**args)
971
+ update!(**args)
972
+ end
973
+
974
+ # Update properties of this object
975
+ def update!(**args)
976
+ @method_selectors = args[:method_selectors] if args.key?(:method_selectors)
977
+ @service_name = args[:service_name] if args.key?(:service_name)
978
+ end
979
+ end
980
+
981
+ # `BasicLevel` is an `AccessLevel` using a set of recommended features.
982
+ class GoogleIdentityAccesscontextmanagerV1BasicLevel
983
+ include Google::Apis::Core::Hashable
984
+
985
+ # How the `conditions` list should be combined to determine if a request is
986
+ # granted this `AccessLevel`. If AND is used, each `Condition` in `conditions`
987
+ # must be satisfied for the `AccessLevel` to be applied. If OR is used, at least
988
+ # one `Condition` in `conditions` must be satisfied for the `AccessLevel` to be
989
+ # applied. Default behavior is AND.
990
+ # Corresponds to the JSON property `combiningFunction`
991
+ # @return [String]
992
+ attr_accessor :combining_function
993
+
994
+ # Required. A list of requirements for the `AccessLevel` to be granted.
995
+ # Corresponds to the JSON property `conditions`
996
+ # @return [Array<Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1Condition>]
997
+ attr_accessor :conditions
998
+
999
+ def initialize(**args)
1000
+ update!(**args)
1001
+ end
1002
+
1003
+ # Update properties of this object
1004
+ def update!(**args)
1005
+ @combining_function = args[:combining_function] if args.key?(:combining_function)
1006
+ @conditions = args[:conditions] if args.key?(:conditions)
1007
+ end
1008
+ end
1009
+
1010
+ # A condition necessary for an `AccessLevel` to be granted. The Condition is an
1011
+ # AND over its fields. So a Condition is true if: 1) the request IP is from one
1012
+ # of the listed subnetworks AND 2) the originating device complies with the
1013
+ # listed device policy AND 3) all listed access levels are granted AND 4) the
1014
+ # request was sent at a time allowed by the DateTimeRestriction.
1015
+ class GoogleIdentityAccesscontextmanagerV1Condition
1016
+ include Google::Apis::Core::Hashable
1017
+
1018
+ # `DevicePolicy` specifies device specific restrictions necessary to acquire a
1019
+ # given access level. A `DevicePolicy` specifies requirements for requests from
1020
+ # devices to be granted access levels, it does not do any enforcement on the
1021
+ # device. `DevicePolicy` acts as an AND over all specified fields, and each
1022
+ # repeated field is an OR over its elements. Any unset fields are ignored. For
1023
+ # example, if the proto is ` os_type : DESKTOP_WINDOWS, os_type : DESKTOP_LINUX,
1024
+ # encryption_status: ENCRYPTED`, then the DevicePolicy will be true for requests
1025
+ # originating from encrypted Linux desktops and encrypted Windows desktops.
1026
+ # Corresponds to the JSON property `devicePolicy`
1027
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1DevicePolicy]
1028
+ attr_accessor :device_policy
1029
+
1030
+ # CIDR block IP subnetwork specification. May be IPv4 or IPv6. Note that for a
1031
+ # CIDR IP address block, the specified IP address portion must be properly
1032
+ # truncated (i.e. all the host bits must be zero) or the input is considered
1033
+ # malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is not.
1034
+ # Similarly, for IPv6, "2001:db8::/32" is accepted whereas "2001:db8::1/32" is
1035
+ # not. The originating IP of a request must be in one of the listed subnets in
1036
+ # order for this Condition to be true. If empty, all IP addresses are allowed.
1037
+ # Corresponds to the JSON property `ipSubnetworks`
1038
+ # @return [Array<String>]
1039
+ attr_accessor :ip_subnetworks
1040
+
1041
+ # The request must be made by one of the provided user or service accounts.
1042
+ # Groups are not supported. Syntax: `user:`emailid`` `serviceAccount:`emailid``
1043
+ # If not specified, a request may come from any user.
1044
+ # Corresponds to the JSON property `members`
1045
+ # @return [Array<String>]
1046
+ attr_accessor :members
1047
+
1048
+ # Whether to negate the Condition. If true, the Condition becomes a NAND over
1049
+ # its non-empty fields, each field must be false for the Condition overall to be
1050
+ # satisfied. Defaults to false.
1051
+ # Corresponds to the JSON property `negate`
1052
+ # @return [Boolean]
1053
+ attr_accessor :negate
1054
+ alias_method :negate?, :negate
1055
+
1056
+ # The request must originate from one of the provided countries/regions. Must be
1057
+ # valid ISO 3166-1 alpha-2 codes.
1058
+ # Corresponds to the JSON property `regions`
1059
+ # @return [Array<String>]
1060
+ attr_accessor :regions
1061
+
1062
+ # A list of other access levels defined in the same `Policy`, referenced by
1063
+ # resource name. Referencing an `AccessLevel` which does not exist is an error.
1064
+ # All access levels listed must be granted for the Condition to be true. Example:
1065
+ # "`accessPolicies/MY_POLICY/accessLevels/LEVEL_NAME"`
1066
+ # Corresponds to the JSON property `requiredAccessLevels`
1067
+ # @return [Array<String>]
1068
+ attr_accessor :required_access_levels
1069
+
1070
+ def initialize(**args)
1071
+ update!(**args)
1072
+ end
1073
+
1074
+ # Update properties of this object
1075
+ def update!(**args)
1076
+ @device_policy = args[:device_policy] if args.key?(:device_policy)
1077
+ @ip_subnetworks = args[:ip_subnetworks] if args.key?(:ip_subnetworks)
1078
+ @members = args[:members] if args.key?(:members)
1079
+ @negate = args[:negate] if args.key?(:negate)
1080
+ @regions = args[:regions] if args.key?(:regions)
1081
+ @required_access_levels = args[:required_access_levels] if args.key?(:required_access_levels)
1082
+ end
1083
+ end
1084
+
1085
+ # `CustomLevel` is an `AccessLevel` using the Cloud Common Expression Language
1086
+ # to represent the necessary conditions for the level to apply to a request. See
1087
+ # CEL spec at: https://github.com/google/cel-spec
1088
+ class GoogleIdentityAccesscontextmanagerV1CustomLevel
1089
+ include Google::Apis::Core::Hashable
1090
+
1091
+ # Represents a textual expression in the Common Expression Language (CEL) syntax.
1092
+ # CEL is a C-like expression language. The syntax and semantics of CEL are
1093
+ # documented at https://github.com/google/cel-spec. Example (Comparison): title:
1094
+ # "Summary size limit" description: "Determines if a summary is less than 100
1095
+ # chars" expression: "document.summary.size() < 100" Example (Equality): title: "
1096
+ # Requestor is owner" description: "Determines if requestor is the document
1097
+ # owner" expression: "document.owner == request.auth.claims.email" Example (
1098
+ # Logic): title: "Public documents" description: "Determine whether the document
1099
+ # should be publicly visible" expression: "document.type != 'private' &&
1100
+ # document.type != 'internal'" Example (Data Manipulation): title: "Notification
1101
+ # string" description: "Create a notification string with a timestamp."
1102
+ # expression: "'New message received at ' + string(document.create_time)" The
1103
+ # exact variables and functions that may be referenced within an expression are
1104
+ # determined by the service that evaluates it. See the service documentation for
1105
+ # additional information.
1106
+ # Corresponds to the JSON property `expr`
1107
+ # @return [Google::Apis::CloudassetV1p1beta1::Expr]
1108
+ attr_accessor :expr
1109
+
1110
+ def initialize(**args)
1111
+ update!(**args)
1112
+ end
1113
+
1114
+ # Update properties of this object
1115
+ def update!(**args)
1116
+ @expr = args[:expr] if args.key?(:expr)
1117
+ end
1118
+ end
1119
+
1120
+ # `DevicePolicy` specifies device specific restrictions necessary to acquire a
1121
+ # given access level. A `DevicePolicy` specifies requirements for requests from
1122
+ # devices to be granted access levels, it does not do any enforcement on the
1123
+ # device. `DevicePolicy` acts as an AND over all specified fields, and each
1124
+ # repeated field is an OR over its elements. Any unset fields are ignored. For
1125
+ # example, if the proto is ` os_type : DESKTOP_WINDOWS, os_type : DESKTOP_LINUX,
1126
+ # encryption_status: ENCRYPTED`, then the DevicePolicy will be true for requests
1127
+ # originating from encrypted Linux desktops and encrypted Windows desktops.
1128
+ class GoogleIdentityAccesscontextmanagerV1DevicePolicy
1129
+ include Google::Apis::Core::Hashable
1130
+
1131
+ # Allowed device management levels, an empty list allows all management levels.
1132
+ # Corresponds to the JSON property `allowedDeviceManagementLevels`
1133
+ # @return [Array<String>]
1134
+ attr_accessor :allowed_device_management_levels
1135
+
1136
+ # Allowed encryptions statuses, an empty list allows all statuses.
1137
+ # Corresponds to the JSON property `allowedEncryptionStatuses`
1138
+ # @return [Array<String>]
1139
+ attr_accessor :allowed_encryption_statuses
1140
+
1141
+ # Allowed OS versions, an empty list allows all types and all versions.
1142
+ # Corresponds to the JSON property `osConstraints`
1143
+ # @return [Array<Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1OsConstraint>]
1144
+ attr_accessor :os_constraints
1145
+
1146
+ # Whether the device needs to be approved by the customer admin.
1147
+ # Corresponds to the JSON property `requireAdminApproval`
1148
+ # @return [Boolean]
1149
+ attr_accessor :require_admin_approval
1150
+ alias_method :require_admin_approval?, :require_admin_approval
1151
+
1152
+ # Whether the device needs to be corp owned.
1153
+ # Corresponds to the JSON property `requireCorpOwned`
1154
+ # @return [Boolean]
1155
+ attr_accessor :require_corp_owned
1156
+ alias_method :require_corp_owned?, :require_corp_owned
1157
+
1158
+ # Whether or not screenlock is required for the DevicePolicy to be true.
1159
+ # Defaults to `false`.
1160
+ # Corresponds to the JSON property `requireScreenlock`
1161
+ # @return [Boolean]
1162
+ attr_accessor :require_screenlock
1163
+ alias_method :require_screenlock?, :require_screenlock
1164
+
1165
+ def initialize(**args)
1166
+ update!(**args)
1167
+ end
1168
+
1169
+ # Update properties of this object
1170
+ def update!(**args)
1171
+ @allowed_device_management_levels = args[:allowed_device_management_levels] if args.key?(:allowed_device_management_levels)
1172
+ @allowed_encryption_statuses = args[:allowed_encryption_statuses] if args.key?(:allowed_encryption_statuses)
1173
+ @os_constraints = args[:os_constraints] if args.key?(:os_constraints)
1174
+ @require_admin_approval = args[:require_admin_approval] if args.key?(:require_admin_approval)
1175
+ @require_corp_owned = args[:require_corp_owned] if args.key?(:require_corp_owned)
1176
+ @require_screenlock = args[:require_screenlock] if args.key?(:require_screenlock)
1177
+ end
1178
+ end
1179
+
1180
+ # Defines the conditions under which an EgressPolicy matches a request.
1181
+ # Conditions based on information about the source of the request. Note that if
1182
+ # the destination of the request is also protected by a ServicePerimeter, then
1183
+ # that ServicePerimeter must have an IngressPolicy which allows access in order
1184
+ # for this request to succeed.
1185
+ class GoogleIdentityAccesscontextmanagerV1EgressFrom
1186
+ include Google::Apis::Core::Hashable
1187
+
1188
+ # A list of identities that are allowed access through this [EgressPolicy].
1189
+ # Should be in the format of email address. The email address should represent
1190
+ # individual user or service account only.
1191
+ # Corresponds to the JSON property `identities`
1192
+ # @return [Array<String>]
1193
+ attr_accessor :identities
1194
+
1195
+ # Specifies the type of identities that are allowed access to outside the
1196
+ # perimeter. If left unspecified, then members of `identities` field will be
1197
+ # allowed access.
1198
+ # Corresponds to the JSON property `identityType`
1199
+ # @return [String]
1200
+ attr_accessor :identity_type
1201
+
1202
+ def initialize(**args)
1203
+ update!(**args)
1204
+ end
1205
+
1206
+ # Update properties of this object
1207
+ def update!(**args)
1208
+ @identities = args[:identities] if args.key?(:identities)
1209
+ @identity_type = args[:identity_type] if args.key?(:identity_type)
1210
+ end
1211
+ end
1212
+
1213
+ # Policy for egress from perimeter. EgressPolicies match requests based on `
1214
+ # egress_from` and `egress_to` stanzas. For an EgressPolicy to match, both `
1215
+ # egress_from` and `egress_to` stanzas must be matched. If an EgressPolicy
1216
+ # matches a request, the request is allowed to span the ServicePerimeter
1217
+ # boundary. For example, an EgressPolicy can be used to allow VMs on networks
1218
+ # within the ServicePerimeter to access a defined set of projects outside the
1219
+ # perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket
1220
+ # or query against a BigQuery dataset). EgressPolicies are concerned with the *
1221
+ # resources* that a request relates as well as the API services and API actions
1222
+ # being used. They do not related to the direction of data movement. More
1223
+ # detailed documentation for this concept can be found in the descriptions of
1224
+ # EgressFrom and EgressTo.
1225
+ class GoogleIdentityAccesscontextmanagerV1EgressPolicy
1226
+ include Google::Apis::Core::Hashable
1227
+
1228
+ # Defines the conditions under which an EgressPolicy matches a request.
1229
+ # Conditions based on information about the source of the request. Note that if
1230
+ # the destination of the request is also protected by a ServicePerimeter, then
1231
+ # that ServicePerimeter must have an IngressPolicy which allows access in order
1232
+ # for this request to succeed.
1233
+ # Corresponds to the JSON property `egressFrom`
1234
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1EgressFrom]
1235
+ attr_accessor :egress_from
1236
+
1237
+ # Defines the conditions under which an EgressPolicy matches a request.
1238
+ # Conditions are based on information about the ApiOperation intended to be
1239
+ # performed on the `resources` specified. Note that if the destination of the
1240
+ # request is also protected by a ServicePerimeter, then that ServicePerimeter
1241
+ # must have an IngressPolicy which allows access in order for this request to
1242
+ # succeed. The request must match `operations` AND `resources` fields in order
1243
+ # to be allowed egress out of the perimeter.
1244
+ # Corresponds to the JSON property `egressTo`
1245
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1EgressTo]
1246
+ attr_accessor :egress_to
1247
+
1248
+ def initialize(**args)
1249
+ update!(**args)
1250
+ end
1251
+
1252
+ # Update properties of this object
1253
+ def update!(**args)
1254
+ @egress_from = args[:egress_from] if args.key?(:egress_from)
1255
+ @egress_to = args[:egress_to] if args.key?(:egress_to)
1256
+ end
1257
+ end
1258
+
1259
+ # Defines the conditions under which an EgressPolicy matches a request.
1260
+ # Conditions are based on information about the ApiOperation intended to be
1261
+ # performed on the `resources` specified. Note that if the destination of the
1262
+ # request is also protected by a ServicePerimeter, then that ServicePerimeter
1263
+ # must have an IngressPolicy which allows access in order for this request to
1264
+ # succeed. The request must match `operations` AND `resources` fields in order
1265
+ # to be allowed egress out of the perimeter.
1266
+ class GoogleIdentityAccesscontextmanagerV1EgressTo
1267
+ include Google::Apis::Core::Hashable
1268
+
1269
+ # A list of ApiOperations allowed to be performed by the sources specified in
1270
+ # the corresponding EgressFrom. A request matches if it uses an operation/
1271
+ # service in this list.
1272
+ # Corresponds to the JSON property `operations`
1273
+ # @return [Array<Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1ApiOperation>]
1274
+ attr_accessor :operations
1275
+
1276
+ # A list of resources, currently only projects in the form `projects/`, that are
1277
+ # allowed to be accessed by sources defined in the corresponding EgressFrom. A
1278
+ # request matches if it contains a resource in this list. If `*` is specified
1279
+ # for `resources`, then this EgressTo rule will authorize access to all
1280
+ # resources outside the perimeter.
1281
+ # Corresponds to the JSON property `resources`
1282
+ # @return [Array<String>]
1283
+ attr_accessor :resources
1284
+
1285
+ def initialize(**args)
1286
+ update!(**args)
1287
+ end
1288
+
1289
+ # Update properties of this object
1290
+ def update!(**args)
1291
+ @operations = args[:operations] if args.key?(:operations)
1292
+ @resources = args[:resources] if args.key?(:resources)
1293
+ end
1294
+ end
1295
+
1296
+ # Defines the conditions under which an IngressPolicy matches a request.
1297
+ # Conditions are based on information about the source of the request. The
1298
+ # request must satisfy what is defined in `sources` AND identity related fields
1299
+ # in order to match.
1300
+ class GoogleIdentityAccesscontextmanagerV1IngressFrom
1301
+ include Google::Apis::Core::Hashable
1302
+
1303
+ # A list of identities that are allowed access through this ingress policy.
1304
+ # Should be in the format of email address. The email address should represent
1305
+ # individual user or service account only.
1306
+ # Corresponds to the JSON property `identities`
1307
+ # @return [Array<String>]
1308
+ attr_accessor :identities
1309
+
1310
+ # Specifies the type of identities that are allowed access from outside the
1311
+ # perimeter. If left unspecified, then members of `identities` field will be
1312
+ # allowed access.
1313
+ # Corresponds to the JSON property `identityType`
1314
+ # @return [String]
1315
+ attr_accessor :identity_type
1316
+
1317
+ # Sources that this IngressPolicy authorizes access from.
1318
+ # Corresponds to the JSON property `sources`
1319
+ # @return [Array<Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1IngressSource>]
1320
+ attr_accessor :sources
1321
+
1322
+ def initialize(**args)
1323
+ update!(**args)
1324
+ end
1325
+
1326
+ # Update properties of this object
1327
+ def update!(**args)
1328
+ @identities = args[:identities] if args.key?(:identities)
1329
+ @identity_type = args[:identity_type] if args.key?(:identity_type)
1330
+ @sources = args[:sources] if args.key?(:sources)
1331
+ end
1332
+ end
1333
+
1334
+ # Policy for ingress into ServicePerimeter. IngressPolicies match requests based
1335
+ # on `ingress_from` and `ingress_to` stanzas. For an ingress policy to match,
1336
+ # both the `ingress_from` and `ingress_to` stanzas must be matched. If an
1337
+ # IngressPolicy matches a request, the request is allowed through the perimeter
1338
+ # boundary from outside the perimeter. For example, access from the internet can
1339
+ # be allowed either based on an AccessLevel or, for traffic hosted on Google
1340
+ # Cloud, the project of the source network. For access from private networks,
1341
+ # using the project of the hosting network is required. Individual ingress
1342
+ # policies can be limited by restricting which services and/or actions they
1343
+ # match using the `ingress_to` field.
1344
+ class GoogleIdentityAccesscontextmanagerV1IngressPolicy
1345
+ include Google::Apis::Core::Hashable
1346
+
1347
+ # Defines the conditions under which an IngressPolicy matches a request.
1348
+ # Conditions are based on information about the source of the request. The
1349
+ # request must satisfy what is defined in `sources` AND identity related fields
1350
+ # in order to match.
1351
+ # Corresponds to the JSON property `ingressFrom`
1352
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1IngressFrom]
1353
+ attr_accessor :ingress_from
1354
+
1355
+ # Defines the conditions under which an IngressPolicy matches a request.
1356
+ # Conditions are based on information about the ApiOperation intended to be
1357
+ # performed on the target resource of the request. The request must satisfy what
1358
+ # is defined in `operations` AND `resources` in order to match.
1359
+ # Corresponds to the JSON property `ingressTo`
1360
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1IngressTo]
1361
+ attr_accessor :ingress_to
1362
+
1363
+ def initialize(**args)
1364
+ update!(**args)
1365
+ end
1366
+
1367
+ # Update properties of this object
1368
+ def update!(**args)
1369
+ @ingress_from = args[:ingress_from] if args.key?(:ingress_from)
1370
+ @ingress_to = args[:ingress_to] if args.key?(:ingress_to)
1371
+ end
1372
+ end
1373
+
1374
+ # The source that IngressPolicy authorizes access from.
1375
+ class GoogleIdentityAccesscontextmanagerV1IngressSource
1376
+ include Google::Apis::Core::Hashable
1377
+
1378
+ # An AccessLevel resource name that allow resources within the ServicePerimeters
1379
+ # to be accessed from the internet. AccessLevels listed must be in the same
1380
+ # policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will
1381
+ # cause an error. If no AccessLevel names are listed, resources within the
1382
+ # perimeter can only be accessed via Google Cloud calls with request origins
1383
+ # within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`
1384
+ # . If a single `*` is specified for `access_level`, then all IngressSources
1385
+ # will be allowed.
1386
+ # Corresponds to the JSON property `accessLevel`
1387
+ # @return [String]
1388
+ attr_accessor :access_level
1389
+
1390
+ # A Google Cloud resource that is allowed to ingress the perimeter. Requests
1391
+ # from these resources will be allowed to access perimeter data. Currently only
1392
+ # projects are allowed. Format: `projects/`project_number`` The project may be
1393
+ # in any Google Cloud organization, not just the organization that the perimeter
1394
+ # is defined in. `*` is not allowed, the case of allowing all Google Cloud
1395
+ # resources only is not supported.
1396
+ # Corresponds to the JSON property `resource`
1397
+ # @return [String]
1398
+ attr_accessor :resource
1399
+
1400
+ def initialize(**args)
1401
+ update!(**args)
1402
+ end
1403
+
1404
+ # Update properties of this object
1405
+ def update!(**args)
1406
+ @access_level = args[:access_level] if args.key?(:access_level)
1407
+ @resource = args[:resource] if args.key?(:resource)
1408
+ end
1409
+ end
1410
+
1411
+ # Defines the conditions under which an IngressPolicy matches a request.
1412
+ # Conditions are based on information about the ApiOperation intended to be
1413
+ # performed on the target resource of the request. The request must satisfy what
1414
+ # is defined in `operations` AND `resources` in order to match.
1415
+ class GoogleIdentityAccesscontextmanagerV1IngressTo
1416
+ include Google::Apis::Core::Hashable
1417
+
1418
+ # A list of ApiOperations allowed to be performed by the sources specified in
1419
+ # corresponding IngressFrom in this ServicePerimeter.
1420
+ # Corresponds to the JSON property `operations`
1421
+ # @return [Array<Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1ApiOperation>]
1422
+ attr_accessor :operations
1423
+
1424
+ # A list of resources, currently only projects in the form `projects/`,
1425
+ # protected by this ServicePerimeter that are allowed to be accessed by sources
1426
+ # defined in the corresponding IngressFrom. If a single `*` is specified, then
1427
+ # access to all resources inside the perimeter are allowed.
1428
+ # Corresponds to the JSON property `resources`
1429
+ # @return [Array<String>]
1430
+ attr_accessor :resources
1431
+
1432
+ def initialize(**args)
1433
+ update!(**args)
1434
+ end
1435
+
1436
+ # Update properties of this object
1437
+ def update!(**args)
1438
+ @operations = args[:operations] if args.key?(:operations)
1439
+ @resources = args[:resources] if args.key?(:resources)
1440
+ end
1441
+ end
1442
+
1443
+ # An allowed method or permission of a service specified in ApiOperation.
1444
+ class GoogleIdentityAccesscontextmanagerV1MethodSelector
1445
+ include Google::Apis::Core::Hashable
1446
+
1447
+ # Value for `method` should be a valid method name for the corresponding `
1448
+ # service_name` in ApiOperation. If `*` used as value for `method`, then ALL
1449
+ # methods and permissions are allowed.
1450
+ # Corresponds to the JSON property `method`
1451
+ # @return [String]
1452
+ attr_accessor :method_prop
1453
+
1454
+ # Value for `permission` should be a valid Cloud IAM permission for the
1455
+ # corresponding `service_name` in ApiOperation.
1456
+ # Corresponds to the JSON property `permission`
1457
+ # @return [String]
1458
+ attr_accessor :permission
1459
+
1460
+ def initialize(**args)
1461
+ update!(**args)
1462
+ end
1463
+
1464
+ # Update properties of this object
1465
+ def update!(**args)
1466
+ @method_prop = args[:method_prop] if args.key?(:method_prop)
1467
+ @permission = args[:permission] if args.key?(:permission)
1468
+ end
1469
+ end
1470
+
1471
+ # A restriction on the OS type and version of devices making requests.
1472
+ class GoogleIdentityAccesscontextmanagerV1OsConstraint
1473
+ include Google::Apis::Core::Hashable
1474
+
1475
+ # The minimum allowed OS version. If not set, any version of this OS satisfies
1476
+ # the constraint. Format: `"major.minor.patch"`. Examples: `"10.5.301"`, `"9.2.1"
1477
+ # `.
1478
+ # Corresponds to the JSON property `minimumVersion`
1479
+ # @return [String]
1480
+ attr_accessor :minimum_version
1481
+
1482
+ # Required. The allowed OS type.
1483
+ # Corresponds to the JSON property `osType`
1484
+ # @return [String]
1485
+ attr_accessor :os_type
1486
+
1487
+ # Only allows requests from devices with a verified Chrome OS. Verifications
1488
+ # includes requirements that the device is enterprise-managed, conformant to
1489
+ # domain policies, and the caller has permission to call the API targeted by the
1490
+ # request.
1491
+ # Corresponds to the JSON property `requireVerifiedChromeOs`
1492
+ # @return [Boolean]
1493
+ attr_accessor :require_verified_chrome_os
1494
+ alias_method :require_verified_chrome_os?, :require_verified_chrome_os
1495
+
1496
+ def initialize(**args)
1497
+ update!(**args)
1498
+ end
1499
+
1500
+ # Update properties of this object
1501
+ def update!(**args)
1502
+ @minimum_version = args[:minimum_version] if args.key?(:minimum_version)
1503
+ @os_type = args[:os_type] if args.key?(:os_type)
1504
+ @require_verified_chrome_os = args[:require_verified_chrome_os] if args.key?(:require_verified_chrome_os)
1505
+ end
1506
+ end
1507
+
1508
+ # `ServicePerimeter` describes a set of Google Cloud resources which can freely
1509
+ # import and export data amongst themselves, but not export outside of the `
1510
+ # ServicePerimeter`. If a request with a source within this `ServicePerimeter`
1511
+ # has a target outside of the `ServicePerimeter`, the request will be blocked.
1512
+ # Otherwise the request is allowed. There are two types of Service Perimeter -
1513
+ # Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google
1514
+ # Cloud project can only belong to a single regular Service Perimeter. Service
1515
+ # Perimeter Bridges can contain only Google Cloud projects as members, a single
1516
+ # Google Cloud project may belong to multiple Service Perimeter Bridges.
1517
+ class GoogleIdentityAccesscontextmanagerV1ServicePerimeter
1518
+ include Google::Apis::Core::Hashable
1519
+
1520
+ # Description of the `ServicePerimeter` and its use. Does not affect behavior.
1521
+ # Corresponds to the JSON property `description`
1522
+ # @return [String]
1523
+ attr_accessor :description
1524
+
1525
+ # Required. Resource name for the ServicePerimeter. The `short_name` component
1526
+ # must begin with a letter and only include alphanumeric and '_'. Format: `
1527
+ # accessPolicies/`policy_id`/servicePerimeters/`short_name``
1528
+ # Corresponds to the JSON property `name`
1529
+ # @return [String]
1530
+ attr_accessor :name
1531
+
1532
+ # Perimeter type indicator. A single project is allowed to be a member of single
1533
+ # regular perimeter, but multiple service perimeter bridges. A project cannot be
1534
+ # a included in a perimeter bridge without being included in regular perimeter.
1535
+ # For perimeter bridges, the restricted service list as well as access level
1536
+ # lists must be empty.
1537
+ # Corresponds to the JSON property `perimeterType`
1538
+ # @return [String]
1539
+ attr_accessor :perimeter_type
1540
+
1541
+ # `ServicePerimeterConfig` specifies a set of Google Cloud resources that
1542
+ # describe specific Service Perimeter configuration.
1543
+ # Corresponds to the JSON property `spec`
1544
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig]
1545
+ attr_accessor :spec
1546
+
1547
+ # `ServicePerimeterConfig` specifies a set of Google Cloud resources that
1548
+ # describe specific Service Perimeter configuration.
1549
+ # Corresponds to the JSON property `status`
1550
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig]
1551
+ attr_accessor :status
1552
+
1553
+ # Human readable title. Must be unique within the Policy.
1554
+ # Corresponds to the JSON property `title`
1555
+ # @return [String]
1556
+ attr_accessor :title
1557
+
1558
+ # Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly exists
1559
+ # for all Service Perimeters, and that spec is identical to the status for those
1560
+ # Service Perimeters. When this flag is set, it inhibits the generation of the
1561
+ # implicit spec, thereby allowing the user to explicitly provide a configuration
1562
+ # ("spec") to use in a dry-run version of the Service Perimeter. This allows the
1563
+ # user to test changes to the enforced config ("status") without actually
1564
+ # enforcing them. This testing is done through analyzing the differences between
1565
+ # currently enforced and suggested restrictions. use_explicit_dry_run_spec must
1566
+ # bet set to True if any of the fields in the spec are set to non-default values.
1567
+ # Corresponds to the JSON property `useExplicitDryRunSpec`
1568
+ # @return [Boolean]
1569
+ attr_accessor :use_explicit_dry_run_spec
1570
+ alias_method :use_explicit_dry_run_spec?, :use_explicit_dry_run_spec
1571
+
1572
+ def initialize(**args)
1573
+ update!(**args)
1574
+ end
1575
+
1576
+ # Update properties of this object
1577
+ def update!(**args)
1578
+ @description = args[:description] if args.key?(:description)
1579
+ @name = args[:name] if args.key?(:name)
1580
+ @perimeter_type = args[:perimeter_type] if args.key?(:perimeter_type)
1581
+ @spec = args[:spec] if args.key?(:spec)
1582
+ @status = args[:status] if args.key?(:status)
1583
+ @title = args[:title] if args.key?(:title)
1584
+ @use_explicit_dry_run_spec = args[:use_explicit_dry_run_spec] if args.key?(:use_explicit_dry_run_spec)
1585
+ end
1586
+ end
1587
+
1588
+ # `ServicePerimeterConfig` specifies a set of Google Cloud resources that
1589
+ # describe specific Service Perimeter configuration.
1590
+ class GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig
1591
+ include Google::Apis::Core::Hashable
1592
+
1593
+ # A list of `AccessLevel` resource names that allow resources within the `
1594
+ # ServicePerimeter` to be accessed from the internet. `AccessLevels` listed must
1595
+ # be in the same policy as this `ServicePerimeter`. Referencing a nonexistent `
1596
+ # AccessLevel` is a syntax error. If no `AccessLevel` names are listed,
1597
+ # resources within the perimeter can only be accessed via Google Cloud calls
1598
+ # with request origins within the perimeter. Example: `"accessPolicies/MY_POLICY/
1599
+ # accessLevels/MY_LEVEL"`. For Service Perimeter Bridge, must be empty.
1600
+ # Corresponds to the JSON property `accessLevels`
1601
+ # @return [Array<String>]
1602
+ attr_accessor :access_levels
1603
+
1604
+ # List of EgressPolicies to apply to the perimeter. A perimeter may have
1605
+ # multiple EgressPolicies, each of which is evaluated separately. Access is
1606
+ # granted if any EgressPolicy grants it. Must be empty for a perimeter bridge.
1607
+ # Corresponds to the JSON property `egressPolicies`
1608
+ # @return [Array<Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1EgressPolicy>]
1609
+ attr_accessor :egress_policies
1610
+
1611
+ # List of IngressPolicies to apply to the perimeter. A perimeter may have
1612
+ # multiple IngressPolicies, each of which is evaluated separately. Access is
1613
+ # granted if any Ingress Policy grants it. Must be empty for a perimeter bridge.
1614
+ # Corresponds to the JSON property `ingressPolicies`
1615
+ # @return [Array<Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1IngressPolicy>]
1616
+ attr_accessor :ingress_policies
1617
+
1618
+ # A list of Google Cloud resources that are inside of the service perimeter.
1619
+ # Currently only projects are allowed. Format: `projects/`project_number``
1620
+ # Corresponds to the JSON property `resources`
1621
+ # @return [Array<String>]
1622
+ attr_accessor :resources
1623
+
1624
+ # Google Cloud services that are subject to the Service Perimeter restrictions.
1625
+ # For example, if `storage.googleapis.com` is specified, access to the storage
1626
+ # buckets inside the perimeter must meet the perimeter's access restrictions.
1627
+ # Corresponds to the JSON property `restrictedServices`
1628
+ # @return [Array<String>]
1629
+ attr_accessor :restricted_services
1630
+
1631
+ # Specifies how APIs are allowed to communicate within the Service Perimeter.
1632
+ # Corresponds to the JSON property `vpcAccessibleServices`
1633
+ # @return [Google::Apis::CloudassetV1p1beta1::GoogleIdentityAccesscontextmanagerV1VpcAccessibleServices]
1634
+ attr_accessor :vpc_accessible_services
1635
+
1636
+ def initialize(**args)
1637
+ update!(**args)
1638
+ end
1639
+
1640
+ # Update properties of this object
1641
+ def update!(**args)
1642
+ @access_levels = args[:access_levels] if args.key?(:access_levels)
1643
+ @egress_policies = args[:egress_policies] if args.key?(:egress_policies)
1644
+ @ingress_policies = args[:ingress_policies] if args.key?(:ingress_policies)
1645
+ @resources = args[:resources] if args.key?(:resources)
1646
+ @restricted_services = args[:restricted_services] if args.key?(:restricted_services)
1647
+ @vpc_accessible_services = args[:vpc_accessible_services] if args.key?(:vpc_accessible_services)
1648
+ end
1649
+ end
1650
+
1651
+ # Specifies how APIs are allowed to communicate within the Service Perimeter.
1652
+ class GoogleIdentityAccesscontextmanagerV1VpcAccessibleServices
1653
+ include Google::Apis::Core::Hashable
1654
+
1655
+ # The list of APIs usable within the Service Perimeter. Must be empty unless '
1656
+ # enable_restriction' is True. You can specify a list of individual services, as
1657
+ # well as include the 'RESTRICTED-SERVICES' value, which automatically includes
1658
+ # all of the services protected by the perimeter.
1659
+ # Corresponds to the JSON property `allowedServices`
1660
+ # @return [Array<String>]
1661
+ attr_accessor :allowed_services
1662
+
1663
+ # Whether to restrict API calls within the Service Perimeter to the list of APIs
1664
+ # specified in 'allowed_services'.
1665
+ # Corresponds to the JSON property `enableRestriction`
1666
+ # @return [Boolean]
1667
+ attr_accessor :enable_restriction
1668
+ alias_method :enable_restriction?, :enable_restriction
1669
+
1670
+ def initialize(**args)
1671
+ update!(**args)
1672
+ end
1673
+
1674
+ # Update properties of this object
1675
+ def update!(**args)
1676
+ @allowed_services = args[:allowed_services] if args.key?(:allowed_services)
1677
+ @enable_restriction = args[:enable_restriction] if args.key?(:enable_restriction)
1678
+ end
1679
+ end
1680
+
244
1681
  # The result for a IAM Policy search.
245
1682
  class IamPolicySearchResult
246
1683
  include Google::Apis::Core::Hashable