google-cloud-asset-v1 0.1.0 → 0.2.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/google/cloud/asset/v1/asset_service/client.rb +9 -9
- data/lib/google/cloud/asset/v1/asset_service_pb.rb +1 -0
- data/lib/google/cloud/asset/v1/asset_service_services_pb.rb +1 -2
- data/lib/google/cloud/asset/v1/assets_pb.rb +10 -0
- data/lib/google/cloud/asset/v1/version.rb +1 -1
- data/lib/google/identity/accesscontextmanager/type/device_resources_pb.rb +43 -0
- data/lib/google/identity/accesscontextmanager/v1/access_level_pb.rb +72 -0
- data/lib/google/identity/accesscontextmanager/v1/access_policy_pb.rb +29 -0
- data/lib/google/identity/accesscontextmanager/v1/service_perimeter_pb.rb +49 -0
- data/proto_docs/google/cloud/asset/v1/asset_service.rb +21 -20
- data/proto_docs/google/cloud/asset/v1/assets.rb +71 -38
- data/proto_docs/google/identity/accesscontextmanager/type/device_resources.rb +84 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/access_level.rb +197 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/access_policy.rb +60 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/service_perimeter.rb +158 -0
- data/proto_docs/google/protobuf/any.rb +2 -1
- data/proto_docs/google/protobuf/field_mask.rb +19 -27
- data/proto_docs/google/protobuf/timestamp.rb +20 -16
- data/proto_docs/google/type/expr.rb +52 -0
- metadata +11 -2
@@ -0,0 +1,84 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2020 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Identity
|
22
|
+
module AccessContextManager
|
23
|
+
module Type
|
24
|
+
# The encryption state of the device.
|
25
|
+
module DeviceEncryptionStatus
|
26
|
+
# The encryption status of the device is not specified or not known.
|
27
|
+
ENCRYPTION_UNSPECIFIED = 0
|
28
|
+
|
29
|
+
# The device does not support encryption.
|
30
|
+
ENCRYPTION_UNSUPPORTED = 1
|
31
|
+
|
32
|
+
# The device supports encryption, but is currently unencrypted.
|
33
|
+
UNENCRYPTED = 2
|
34
|
+
|
35
|
+
# The device is encrypted.
|
36
|
+
ENCRYPTED = 3
|
37
|
+
end
|
38
|
+
|
39
|
+
# The operating system type of the device.
|
40
|
+
# Next id: 7
|
41
|
+
module OsType
|
42
|
+
# The operating system of the device is not specified or not known.
|
43
|
+
OS_UNSPECIFIED = 0
|
44
|
+
|
45
|
+
# A desktop Mac operating system.
|
46
|
+
DESKTOP_MAC = 1
|
47
|
+
|
48
|
+
# A desktop Windows operating system.
|
49
|
+
DESKTOP_WINDOWS = 2
|
50
|
+
|
51
|
+
# A desktop Linux operating system.
|
52
|
+
DESKTOP_LINUX = 3
|
53
|
+
|
54
|
+
# A desktop ChromeOS operating system.
|
55
|
+
DESKTOP_CHROME_OS = 6
|
56
|
+
|
57
|
+
# An Android operating system.
|
58
|
+
ANDROID = 4
|
59
|
+
|
60
|
+
# An iOS operating system.
|
61
|
+
IOS = 5
|
62
|
+
end
|
63
|
+
|
64
|
+
# The degree to which the device is managed by the Cloud organization.
|
65
|
+
module DeviceManagementLevel
|
66
|
+
# The device's management level is not specified or not known.
|
67
|
+
MANAGEMENT_UNSPECIFIED = 0
|
68
|
+
|
69
|
+
# The device is not managed.
|
70
|
+
NONE = 1
|
71
|
+
|
72
|
+
# Basic management is enabled, which is generally limited to monitoring and
|
73
|
+
# wiping the corporate account.
|
74
|
+
BASIC = 2
|
75
|
+
|
76
|
+
# Complete device management. This includes more thorough monitoring and the
|
77
|
+
# ability to directly manage the device (such as remote wiping). This can be
|
78
|
+
# enabled through the Android Enterprise Platform.
|
79
|
+
COMPLETE = 3
|
80
|
+
end
|
81
|
+
end
|
82
|
+
end
|
83
|
+
end
|
84
|
+
end
|
@@ -0,0 +1,197 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2020 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Identity
|
22
|
+
module AccessContextManager
|
23
|
+
module V1
|
24
|
+
# An `AccessLevel` is a label that can be applied to requests to Google Cloud
|
25
|
+
# services, along with a list of requirements necessary for the label to be
|
26
|
+
# applied.
|
27
|
+
# @!attribute [rw] name
|
28
|
+
# @return [String]
|
29
|
+
# Required. Resource name for the Access Level. The `short_name` component
|
30
|
+
# must begin with a letter and only include alphanumeric and '_'. Format:
|
31
|
+
# `accessPolicies/{policy_id}/accessLevels/{short_name}`. The maximum length
|
32
|
+
# of the `short_name` component is 50 characters.
|
33
|
+
# @!attribute [rw] title
|
34
|
+
# @return [String]
|
35
|
+
# Human readable title. Must be unique within the Policy.
|
36
|
+
# @!attribute [rw] description
|
37
|
+
# @return [String]
|
38
|
+
# Description of the `AccessLevel` and its use. Does not affect behavior.
|
39
|
+
# @!attribute [rw] basic
|
40
|
+
# @return [Google::Identity::AccessContextManager::V1::BasicLevel]
|
41
|
+
# A `BasicLevel` composed of `Conditions`.
|
42
|
+
# @!attribute [rw] custom
|
43
|
+
# @return [Google::Identity::AccessContextManager::V1::CustomLevel]
|
44
|
+
# A `CustomLevel` written in the Common Expression Language.
|
45
|
+
# @!attribute [rw] create_time
|
46
|
+
# @return [Google::Protobuf::Timestamp]
|
47
|
+
# Output only. Time the `AccessLevel` was created in UTC.
|
48
|
+
# @!attribute [rw] update_time
|
49
|
+
# @return [Google::Protobuf::Timestamp]
|
50
|
+
# Output only. Time the `AccessLevel` was updated in UTC.
|
51
|
+
class AccessLevel
|
52
|
+
include Google::Protobuf::MessageExts
|
53
|
+
extend Google::Protobuf::MessageExts::ClassMethods
|
54
|
+
end
|
55
|
+
|
56
|
+
# `BasicLevel` is an `AccessLevel` using a set of recommended features.
|
57
|
+
# @!attribute [rw] conditions
|
58
|
+
# @return [Array<Google::Identity::AccessContextManager::V1::Condition>]
|
59
|
+
# Required. A list of requirements for the `AccessLevel` to be granted.
|
60
|
+
# @!attribute [rw] combining_function
|
61
|
+
# @return [Google::Identity::AccessContextManager::V1::BasicLevel::ConditionCombiningFunction]
|
62
|
+
# How the `conditions` list should be combined to determine if a request is
|
63
|
+
# granted this `AccessLevel`. If AND is used, each `Condition` in
|
64
|
+
# `conditions` must be satisfied for the `AccessLevel` to be applied. If OR
|
65
|
+
# is used, at least one `Condition` in `conditions` must be satisfied for the
|
66
|
+
# `AccessLevel` to be applied. Default behavior is AND.
|
67
|
+
class BasicLevel
|
68
|
+
include Google::Protobuf::MessageExts
|
69
|
+
extend Google::Protobuf::MessageExts::ClassMethods
|
70
|
+
|
71
|
+
# Options for how the `conditions` list should be combined to determine if
|
72
|
+
# this `AccessLevel` is applied. Default is AND.
|
73
|
+
module ConditionCombiningFunction
|
74
|
+
# All `Conditions` must be true for the `BasicLevel` to be true.
|
75
|
+
AND = 0
|
76
|
+
|
77
|
+
# If at least one `Condition` is true, then the `BasicLevel` is true.
|
78
|
+
OR = 1
|
79
|
+
end
|
80
|
+
end
|
81
|
+
|
82
|
+
# A condition necessary for an `AccessLevel` to be granted. The Condition is an
|
83
|
+
# AND over its fields. So a Condition is true if: 1) the request IP is from one
|
84
|
+
# of the listed subnetworks AND 2) the originating device complies with the
|
85
|
+
# listed device policy AND 3) all listed access levels are granted AND 4) the
|
86
|
+
# request was sent at a time allowed by the DateTimeRestriction.
|
87
|
+
# @!attribute [rw] ip_subnetworks
|
88
|
+
# @return [Array<String>]
|
89
|
+
# CIDR block IP subnetwork specification. May be IPv4 or IPv6. Note that for
|
90
|
+
# a CIDR IP address block, the specified IP address portion must be properly
|
91
|
+
# truncated (i.e. all the host bits must be zero) or the input is considered
|
92
|
+
# malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is
|
93
|
+
# not. Similarly, for IPv6, "2001:db8::/32" is accepted whereas
|
94
|
+
# "2001:db8::1/32" is not. The originating IP of a request must be in one of
|
95
|
+
# the listed subnets in order for this Condition to be true. If empty, all IP
|
96
|
+
# addresses are allowed.
|
97
|
+
# @!attribute [rw] device_policy
|
98
|
+
# @return [Google::Identity::AccessContextManager::V1::DevicePolicy]
|
99
|
+
# Device specific restrictions, all restrictions must hold for the
|
100
|
+
# Condition to be true. If not specified, all devices are allowed.
|
101
|
+
# @!attribute [rw] required_access_levels
|
102
|
+
# @return [Array<String>]
|
103
|
+
# A list of other access levels defined in the same `Policy`, referenced by
|
104
|
+
# resource name. Referencing an `AccessLevel` which does not exist is an
|
105
|
+
# error. All access levels listed must be granted for the Condition
|
106
|
+
# to be true. Example:
|
107
|
+
# "`accessPolicies/MY_POLICY/accessLevels/LEVEL_NAME"`
|
108
|
+
# @!attribute [rw] negate
|
109
|
+
# @return [Boolean]
|
110
|
+
# Whether to negate the Condition. If true, the Condition becomes a NAND over
|
111
|
+
# its non-empty fields, each field must be false for the Condition overall to
|
112
|
+
# be satisfied. Defaults to false.
|
113
|
+
# @!attribute [rw] members
|
114
|
+
# @return [Array<String>]
|
115
|
+
# The request must be made by one of the provided user or service
|
116
|
+
# accounts. Groups are not supported.
|
117
|
+
# Syntax:
|
118
|
+
# `user:{emailid}`
|
119
|
+
# `serviceAccount:{emailid}`
|
120
|
+
# If not specified, a request may come from any user.
|
121
|
+
# @!attribute [rw] regions
|
122
|
+
# @return [Array<String>]
|
123
|
+
# The request must originate from one of the provided countries/regions.
|
124
|
+
# Must be valid ISO 3166-1 alpha-2 codes.
|
125
|
+
class Condition
|
126
|
+
include Google::Protobuf::MessageExts
|
127
|
+
extend Google::Protobuf::MessageExts::ClassMethods
|
128
|
+
end
|
129
|
+
|
130
|
+
# `CustomLevel` is an `AccessLevel` using the Cloud Common Expression Language
|
131
|
+
# to represent the necessary conditions for the level to apply to a request.
|
132
|
+
# See CEL spec at: https://github.com/google/cel-spec
|
133
|
+
# @!attribute [rw] expr
|
134
|
+
# @return [Google::Type::Expr]
|
135
|
+
# Required. A Cloud CEL expression evaluating to a boolean.
|
136
|
+
class CustomLevel
|
137
|
+
include Google::Protobuf::MessageExts
|
138
|
+
extend Google::Protobuf::MessageExts::ClassMethods
|
139
|
+
end
|
140
|
+
|
141
|
+
# `DevicePolicy` specifies device specific restrictions necessary to acquire a
|
142
|
+
# given access level. A `DevicePolicy` specifies requirements for requests from
|
143
|
+
# devices to be granted access levels, it does not do any enforcement on the
|
144
|
+
# device. `DevicePolicy` acts as an AND over all specified fields, and each
|
145
|
+
# repeated field is an OR over its elements. Any unset fields are ignored. For
|
146
|
+
# example, if the proto is { os_type : DESKTOP_WINDOWS, os_type :
|
147
|
+
# DESKTOP_LINUX, encryption_status: ENCRYPTED}, then the DevicePolicy will be
|
148
|
+
# true for requests originating from encrypted Linux desktops and encrypted
|
149
|
+
# Windows desktops.
|
150
|
+
# @!attribute [rw] require_screenlock
|
151
|
+
# @return [Boolean]
|
152
|
+
# Whether or not screenlock is required for the DevicePolicy to be true.
|
153
|
+
# Defaults to `false`.
|
154
|
+
# @!attribute [rw] allowed_encryption_statuses
|
155
|
+
# @return [Array<Google::Identity::AccessContextManager::Type::DeviceEncryptionStatus>]
|
156
|
+
# Allowed encryptions statuses, an empty list allows all statuses.
|
157
|
+
# @!attribute [rw] os_constraints
|
158
|
+
# @return [Array<Google::Identity::AccessContextManager::V1::OsConstraint>]
|
159
|
+
# Allowed OS versions, an empty list allows all types and all versions.
|
160
|
+
# @!attribute [rw] allowed_device_management_levels
|
161
|
+
# @return [Array<Google::Identity::AccessContextManager::Type::DeviceManagementLevel>]
|
162
|
+
# Allowed device management levels, an empty list allows all management
|
163
|
+
# levels.
|
164
|
+
# @!attribute [rw] require_admin_approval
|
165
|
+
# @return [Boolean]
|
166
|
+
# Whether the device needs to be approved by the customer admin.
|
167
|
+
# @!attribute [rw] require_corp_owned
|
168
|
+
# @return [Boolean]
|
169
|
+
# Whether the device needs to be corp owned.
|
170
|
+
class DevicePolicy
|
171
|
+
include Google::Protobuf::MessageExts
|
172
|
+
extend Google::Protobuf::MessageExts::ClassMethods
|
173
|
+
end
|
174
|
+
|
175
|
+
# A restriction on the OS type and version of devices making requests.
|
176
|
+
# @!attribute [rw] os_type
|
177
|
+
# @return [Google::Identity::AccessContextManager::Type::OsType]
|
178
|
+
# Required. The allowed OS type.
|
179
|
+
# @!attribute [rw] minimum_version
|
180
|
+
# @return [String]
|
181
|
+
# The minimum allowed OS version. If not set, any version of this OS
|
182
|
+
# satisfies the constraint. Format: `"major.minor.patch"`.
|
183
|
+
# Examples: `"10.5.301"`, `"9.2.1"`.
|
184
|
+
# @!attribute [rw] require_verified_chrome_os
|
185
|
+
# @return [Boolean]
|
186
|
+
# Only allows requests from devices with a verified Chrome OS.
|
187
|
+
# Verifications includes requirements that the device is enterprise-managed,
|
188
|
+
# conformant to domain policies, and the caller has permission to call
|
189
|
+
# the API targeted by the request.
|
190
|
+
class OsConstraint
|
191
|
+
include Google::Protobuf::MessageExts
|
192
|
+
extend Google::Protobuf::MessageExts::ClassMethods
|
193
|
+
end
|
194
|
+
end
|
195
|
+
end
|
196
|
+
end
|
197
|
+
end
|
@@ -0,0 +1,60 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2020 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Identity
|
22
|
+
module AccessContextManager
|
23
|
+
module V1
|
24
|
+
# `AccessPolicy` is a container for `AccessLevels` (which define the necessary
|
25
|
+
# attributes to use Google Cloud services) and `ServicePerimeters` (which
|
26
|
+
# define regions of services able to freely pass data within a perimeter). An
|
27
|
+
# access policy is globally visible within an organization, and the
|
28
|
+
# restrictions it specifies apply to all projects within an organization.
|
29
|
+
# @!attribute [rw] name
|
30
|
+
# @return [String]
|
31
|
+
# Output only. Resource name of the `AccessPolicy`. Format:
|
32
|
+
# `accessPolicies/{policy_id}`
|
33
|
+
# @!attribute [rw] parent
|
34
|
+
# @return [String]
|
35
|
+
# Required. The parent of this `AccessPolicy` in the Cloud Resource
|
36
|
+
# Hierarchy. Currently immutable once created. Format:
|
37
|
+
# `organizations/{organization_id}`
|
38
|
+
# @!attribute [rw] title
|
39
|
+
# @return [String]
|
40
|
+
# Required. Human readable title. Does not affect behavior.
|
41
|
+
# @!attribute [rw] create_time
|
42
|
+
# @return [Google::Protobuf::Timestamp]
|
43
|
+
# Output only. Time the `AccessPolicy` was created in UTC.
|
44
|
+
# @!attribute [rw] update_time
|
45
|
+
# @return [Google::Protobuf::Timestamp]
|
46
|
+
# Output only. Time the `AccessPolicy` was updated in UTC.
|
47
|
+
# @!attribute [rw] etag
|
48
|
+
# @return [String]
|
49
|
+
# Output only. An opaque identifier for the current version of the
|
50
|
+
# `AccessPolicy`. This will always be a strongly validated etag, meaning that
|
51
|
+
# two Access Polices will be identical if and only if their etags are
|
52
|
+
# identical. Clients should not expect this to be in any specific format.
|
53
|
+
class AccessPolicy
|
54
|
+
include Google::Protobuf::MessageExts
|
55
|
+
extend Google::Protobuf::MessageExts::ClassMethods
|
56
|
+
end
|
57
|
+
end
|
58
|
+
end
|
59
|
+
end
|
60
|
+
end
|
@@ -0,0 +1,158 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2020 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Identity
|
22
|
+
module AccessContextManager
|
23
|
+
module V1
|
24
|
+
# `ServicePerimeter` describes a set of Google Cloud resources which can freely
|
25
|
+
# import and export data amongst themselves, but not export outside of the
|
26
|
+
# `ServicePerimeter`. If a request with a source within this `ServicePerimeter`
|
27
|
+
# has a target outside of the `ServicePerimeter`, the request will be blocked.
|
28
|
+
# Otherwise the request is allowed. There are two types of Service Perimeter -
|
29
|
+
# Regular and Bridge. Regular Service Perimeters cannot overlap, a single
|
30
|
+
# Google Cloud project can only belong to a single regular Service Perimeter.
|
31
|
+
# Service Perimeter Bridges can contain only Google Cloud projects as members,
|
32
|
+
# a single Google Cloud project may belong to multiple Service Perimeter
|
33
|
+
# Bridges.
|
34
|
+
# @!attribute [rw] name
|
35
|
+
# @return [String]
|
36
|
+
# Required. Resource name for the ServicePerimeter. The `short_name`
|
37
|
+
# component must begin with a letter and only include alphanumeric and '_'.
|
38
|
+
# Format: `accessPolicies/{policy_id}/servicePerimeters/{short_name}`
|
39
|
+
# @!attribute [rw] title
|
40
|
+
# @return [String]
|
41
|
+
# Human readable title. Must be unique within the Policy.
|
42
|
+
# @!attribute [rw] description
|
43
|
+
# @return [String]
|
44
|
+
# Description of the `ServicePerimeter` and its use. Does not affect
|
45
|
+
# behavior.
|
46
|
+
# @!attribute [rw] create_time
|
47
|
+
# @return [Google::Protobuf::Timestamp]
|
48
|
+
# Output only. Time the `ServicePerimeter` was created in UTC.
|
49
|
+
# @!attribute [rw] update_time
|
50
|
+
# @return [Google::Protobuf::Timestamp]
|
51
|
+
# Output only. Time the `ServicePerimeter` was updated in UTC.
|
52
|
+
# @!attribute [rw] perimeter_type
|
53
|
+
# @return [Google::Identity::AccessContextManager::V1::ServicePerimeter::PerimeterType]
|
54
|
+
# Perimeter type indicator. A single project is
|
55
|
+
# allowed to be a member of single regular perimeter, but multiple service
|
56
|
+
# perimeter bridges. A project cannot be a included in a perimeter bridge
|
57
|
+
# without being included in regular perimeter. For perimeter bridges,
|
58
|
+
# the restricted service list as well as access level lists must be
|
59
|
+
# empty.
|
60
|
+
# @!attribute [rw] status
|
61
|
+
# @return [Google::Identity::AccessContextManager::V1::ServicePerimeterConfig]
|
62
|
+
# Current ServicePerimeter configuration. Specifies sets of resources,
|
63
|
+
# restricted services and access levels that determine perimeter
|
64
|
+
# content and boundaries.
|
65
|
+
# @!attribute [rw] spec
|
66
|
+
# @return [Google::Identity::AccessContextManager::V1::ServicePerimeterConfig]
|
67
|
+
# Proposed (or dry run) ServicePerimeter configuration. This configuration
|
68
|
+
# allows to specify and test ServicePerimeter configuration without enforcing
|
69
|
+
# actual access restrictions. Only allowed to be set when the
|
70
|
+
# "use_explicit_dry_run_spec" flag is set.
|
71
|
+
# @!attribute [rw] use_explicit_dry_run_spec
|
72
|
+
# @return [Boolean]
|
73
|
+
# Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly
|
74
|
+
# exists for all Service Perimeters, and that spec is identical to the
|
75
|
+
# status for those Service Perimeters. When this flag is set, it inhibits the
|
76
|
+
# generation of the implicit spec, thereby allowing the user to explicitly
|
77
|
+
# provide a configuration ("spec") to use in a dry-run version of the Service
|
78
|
+
# Perimeter. This allows the user to test changes to the enforced config
|
79
|
+
# ("status") without actually enforcing them. This testing is done through
|
80
|
+
# analyzing the differences between currently enforced and suggested
|
81
|
+
# restrictions. use_explicit_dry_run_spec must bet set to True if any of the
|
82
|
+
# fields in the spec are set to non-default values.
|
83
|
+
class ServicePerimeter
|
84
|
+
include Google::Protobuf::MessageExts
|
85
|
+
extend Google::Protobuf::MessageExts::ClassMethods
|
86
|
+
|
87
|
+
# Specifies the type of the Perimeter. There are two types: regular and
|
88
|
+
# bridge. Regular Service Perimeter contains resources, access levels, and
|
89
|
+
# restricted services. Every resource can be in at most ONE
|
90
|
+
# regular Service Perimeter.
|
91
|
+
#
|
92
|
+
# In addition to being in a regular service perimeter, a resource can also
|
93
|
+
# be in zero or more perimeter bridges. A perimeter bridge only contains
|
94
|
+
# resources. Cross project operations are permitted if all effected
|
95
|
+
# resources share some perimeter (whether bridge or regular). Perimeter
|
96
|
+
# Bridge does not contain access levels or services: those are governed
|
97
|
+
# entirely by the regular perimeter that resource is in.
|
98
|
+
#
|
99
|
+
# Perimeter Bridges are typically useful when building more complex toplogies
|
100
|
+
# with many independent perimeters that need to share some data with a common
|
101
|
+
# perimeter, but should not be able to share data among themselves.
|
102
|
+
module PerimeterType
|
103
|
+
# Regular Perimeter.
|
104
|
+
PERIMETER_TYPE_REGULAR = 0
|
105
|
+
|
106
|
+
# Perimeter Bridge.
|
107
|
+
PERIMETER_TYPE_BRIDGE = 1
|
108
|
+
end
|
109
|
+
end
|
110
|
+
|
111
|
+
# `ServicePerimeterConfig` specifies a set of Google Cloud resources that
|
112
|
+
# describe specific Service Perimeter configuration.
|
113
|
+
# @!attribute [rw] resources
|
114
|
+
# @return [Array<String>]
|
115
|
+
# A list of Google Cloud resources that are inside of the service perimeter.
|
116
|
+
# Currently only projects are allowed. Format: `projects/{project_number}`
|
117
|
+
# @!attribute [rw] access_levels
|
118
|
+
# @return [Array<String>]
|
119
|
+
# A list of `AccessLevel` resource names that allow resources within the
|
120
|
+
# `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed
|
121
|
+
# must be in the same policy as this `ServicePerimeter`. Referencing a
|
122
|
+
# nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are
|
123
|
+
# listed, resources within the perimeter can only be accessed via Google
|
124
|
+
# Cloud calls with request origins within the perimeter. Example:
|
125
|
+
# `"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"`.
|
126
|
+
# For Service Perimeter Bridge, must be empty.
|
127
|
+
# @!attribute [rw] restricted_services
|
128
|
+
# @return [Array<String>]
|
129
|
+
# Google Cloud services that are subject to the Service Perimeter
|
130
|
+
# restrictions. For example, if `storage.googleapis.com` is specified, access
|
131
|
+
# to the storage buckets inside the perimeter must meet the perimeter's
|
132
|
+
# access restrictions.
|
133
|
+
# @!attribute [rw] vpc_accessible_services
|
134
|
+
# @return [Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::VpcAccessibleServices]
|
135
|
+
# Configuration for APIs allowed within Perimeter.
|
136
|
+
class ServicePerimeterConfig
|
137
|
+
include Google::Protobuf::MessageExts
|
138
|
+
extend Google::Protobuf::MessageExts::ClassMethods
|
139
|
+
|
140
|
+
# Specifies how APIs are allowed to communicate within the Service
|
141
|
+
# Perimeter.
|
142
|
+
# @!attribute [rw] enable_restriction
|
143
|
+
# @return [Boolean]
|
144
|
+
# Whether to restrict API calls within the Service Perimeter to the list of
|
145
|
+
# APIs specified in 'allowed_services'.
|
146
|
+
# @!attribute [rw] allowed_services
|
147
|
+
# @return [Array<String>]
|
148
|
+
# The list of APIs usable within the Service Perimeter. Must be empty
|
149
|
+
# unless 'enable_restriction' is True.
|
150
|
+
class VpcAccessibleServices
|
151
|
+
include Google::Protobuf::MessageExts
|
152
|
+
extend Google::Protobuf::MessageExts::ClassMethods
|
153
|
+
end
|
154
|
+
end
|
155
|
+
end
|
156
|
+
end
|
157
|
+
end
|
158
|
+
end
|