google-cloud-asset-v1 0.22.0 → 0.23.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -79,7 +79,7 @@ module Google
79
79
  # [resource
80
80
  # hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy),
81
81
  # a resource outside the Google Cloud resource hierarchy (such as Google
82
- # Kubernetes Engine clusters and objects), or a policy (e.g. Cloud IAM policy),
82
+ # Kubernetes Engine clusters and objects), or a policy (e.g. IAM policy),
83
83
  # or a relationship (e.g. an INSTANCE_TO_INSTANCEGROUP relationship).
84
84
  # See [Supported asset
85
85
  # types](https://cloud.google.com/asset-inventory/docs/supported-asset-types)
@@ -108,9 +108,9 @@ module Google
108
108
  # A representation of the resource.
109
109
  # @!attribute [rw] iam_policy
110
110
  # @return [::Google::Iam::V1::Policy]
111
- # A representation of the Cloud IAM policy set on a Google Cloud resource.
112
- # There can be a maximum of one Cloud IAM policy set on any given resource.
113
- # In addition, Cloud IAM policies inherit their granted access scope from any
111
+ # A representation of the IAM policy set on a Google Cloud resource.
112
+ # There can be a maximum of one IAM policy set on any given resource.
113
+ # In addition, IAM policies inherit their granted access scope from any
114
114
  # policies set on parent resources in the resource hierarchy. Therefore, the
115
115
  # effectively policy is the union of both the policy set on this resource
116
116
  # and each policy set on all of the resource's ancestry resource levels in
@@ -199,7 +199,7 @@ module Google
199
199
  # for more information.
200
200
  #
201
201
  # For Google Cloud assets, this value is the parent resource defined in the
202
- # [Cloud IAM policy
202
+ # [IAM policy
203
203
  # hierarchy](https://cloud.google.com/iam/docs/overview#policy_hierarchy).
204
204
  # Example:
205
205
  # `//cloudresourcemanager.googleapis.com/projects/my_project_123`
@@ -260,7 +260,7 @@ module Google
260
260
  # ancestors. An asset can be any resource in the Google Cloud [resource
261
261
  # hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy),
262
262
  # a resource outside the Google Cloud resource hierarchy (such as Google
263
- # Kubernetes Engine clusters and objects), or a policy (e.g. Cloud IAM policy).
263
+ # Kubernetes Engine clusters and objects), or a policy (e.g. IAM policy).
264
264
  # See [Supported asset
265
265
  # types](https://cloud.google.com/asset-inventory/docs/supported-asset-types)
266
266
  # for more information.
@@ -381,7 +381,8 @@ module Google
381
381
  # * Use a free text query. Example: `us-west*`
382
382
  # @!attribute [rw] labels
383
383
  # @return [::Google::Protobuf::Map{::String => ::String}]
384
- # Labels associated with this resource. See [Labelling and grouping GCP
384
+ # Labels associated with this resource. See [Labelling and grouping Google
385
+ # Cloud
385
386
  # resources](https://cloud.google.com/blog/products/gcp/labelling-and-grouping-your-google-cloud-platform-resources)
386
387
  # for more information. This field is available only when the resource's
387
388
  # Protobuf contains it.
@@ -396,7 +397,8 @@ module Google
396
397
  # @!attribute [rw] network_tags
397
398
  # @return [::Array<::String>]
398
399
  # Network tags associated with this resource. Like labels, network tags are a
399
- # type of annotations used to group GCP resources. See [Labelling GCP
400
+ # type of annotations used to group Google Cloud resources. See [Labelling
401
+ # Google Cloud
400
402
  # resources](https://cloud.google.com/blog/products/gcp/labelling-and-grouping-your-google-cloud-platform-resources)
401
403
  # for more information. This field is available only when the resource's
402
404
  # Protobuf contains it.
@@ -414,8 +416,8 @@ module Google
414
416
  # name.
415
417
  #
416
418
  # This field only presents for the purpose of backward compatibility. Please
417
- # use the `kms_keys` field to retrieve KMS key information. This field is
418
- # available only when the resource's Protobuf contains it and will only be
419
+ # use the `kms_keys` field to retrieve Cloud KMS key information. This field
420
+ # is available only when the resource's Protobuf contains it and will only be
419
421
  # populated for [these resource
420
422
  # types](https://cloud.google.com/asset-inventory/docs/legacy-field-names#resource_types_with_the_to_be_deprecated_kmskey_field)
421
423
  # for backward compatible purposes.
@@ -477,7 +479,7 @@ module Google
477
479
  # SUSPENDING, SUSPENDED, REPAIRING, and TERMINATED. See `status` definition
478
480
  # in [API
479
481
  # Reference](https://cloud.google.com/compute/docs/reference/rest/v1/instances).
480
- # If the resource is a project provided by Cloud Resource Manager, its state
482
+ # If the resource is a project provided by Resource Manager, its state
481
483
  # will include LIFECYCLE_STATE_UNSPECIFIED, ACTIVE, DELETE_REQUESTED and
482
484
  # DELETE_IN_PROGRESS. See `lifecycleState` definition in [API
483
485
  # Reference](https://cloud.google.com/resource-manager/reference/rest/v1/projects).
@@ -492,15 +494,15 @@ module Google
492
494
  # vary from one resource type to another. Examples: `projectId` for Project,
493
495
  # `dnsName` for DNS ManagedZone. This field contains a subset of the resource
494
496
  # metadata fields that are returned by the List or Get APIs provided by the
495
- # corresponding GCP service (e.g., Compute Engine). see [API references and
496
- # supported searchable
497
+ # corresponding Google Cloud service (e.g., Compute Engine). see [API
498
+ # references and supported searchable
497
499
  # attributes](https://cloud.google.com/asset-inventory/docs/supported-asset-types#searchable_asset_types)
498
500
  # to see which fields are included.
499
501
  #
500
502
  # You can search values of these fields through free text search. However,
501
503
  # you should not consume the field programically as the field names and
502
- # values may change as the GCP service updates to a new incompatible API
503
- # version.
504
+ # values may change as the Google Cloud service updates to a new incompatible
505
+ # API version.
504
506
  #
505
507
  # To search against the `additional_attributes`:
506
508
  #
@@ -707,11 +709,11 @@ module Google
707
709
  # * specify the `asset_types` field in your search request.
708
710
  # @!attribute [rw] project
709
711
  # @return [::String]
710
- # The project that the associated GCP resource belongs to, in the form of
711
- # projects/\\{PROJECT_NUMBER}. If an IAM policy is set on a resource (like VM
712
- # instance, Cloud Storage bucket), the project field will indicate the
713
- # project that contains the resource. If an IAM policy is set on a folder or
714
- # orgnization, this field will be empty.
712
+ # The project that the associated Google Cloud resource belongs to, in the
713
+ # form of projects/\\{PROJECT_NUMBER}. If an IAM policy is set on a resource
714
+ # (like VM instance, Cloud Storage bucket), the project field will indicate
715
+ # the project that contains the resource. If an IAM policy is set on a folder
716
+ # or orgnization, this field will be empty.
715
717
  #
716
718
  # To search against the `project`:
717
719
  #
@@ -846,22 +848,28 @@ module Google
846
848
  # @return [::String]
847
849
  # The [full resource
848
850
  # name](https://cloud.google.com/asset-inventory/docs/resource-name-format)
849
- # of the resource to which the {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult#iam_binding iam_binding} policy attaches.
851
+ # of the resource to which the
852
+ # {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult#iam_binding iam_binding}
853
+ # policy attaches.
850
854
  # @!attribute [rw] iam_binding
851
855
  # @return [::Google::Iam::V1::Binding]
852
- # The Cloud IAM policy binding under analysis.
856
+ # The IAM policy binding under analysis.
853
857
  # @!attribute [rw] access_control_lists
854
858
  # @return [::Array<::Google::Cloud::Asset::V1::IamPolicyAnalysisResult::AccessControlList>]
855
- # The access control lists derived from the {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult#iam_binding iam_binding} that match or
856
- # potentially match resource and access selectors specified in the request.
859
+ # The access control lists derived from the
860
+ # {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult#iam_binding iam_binding}
861
+ # that match or potentially match resource and access selectors specified in
862
+ # the request.
857
863
  # @!attribute [rw] identity_list
858
864
  # @return [::Google::Cloud::Asset::V1::IamPolicyAnalysisResult::IdentityList]
859
- # The identity list derived from members of the {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult#iam_binding iam_binding} that match or
860
- # potentially match identity selector specified in the request.
865
+ # The identity list derived from members of the
866
+ # {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult#iam_binding iam_binding}
867
+ # that match or potentially match identity selector specified in the request.
861
868
  # @!attribute [rw] fully_explored
862
869
  # @return [::Boolean]
863
- # Represents whether all analyses on the {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult#iam_binding iam_binding} have successfully
864
- # finished.
870
+ # Represents whether all analyses on the
871
+ # {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult#iam_binding iam_binding}
872
+ # have successfully finished.
865
873
  class IamPolicyAnalysisResult
866
874
  include ::Google::Protobuf::MessageExts
867
875
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -958,8 +966,10 @@ module Google
958
966
  # @!attribute [rw] resource_edges
959
967
  # @return [::Array<::Google::Cloud::Asset::V1::IamPolicyAnalysisResult::Edge>]
960
968
  # Resource edges of the graph starting from the policy attached
961
- # resource to any descendant resources. The {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult::Edge#source_node Edge.source_node} contains
962
- # the full resource name of a parent resource and {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult::Edge#target_node Edge.target_node}
969
+ # resource to any descendant resources. The
970
+ # {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult::Edge#source_node Edge.source_node}
971
+ # contains the full resource name of a parent resource and
972
+ # {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult::Edge#target_node Edge.target_node}
963
973
  # contains the full resource name of a child resource. This field is
964
974
  # present only if the output_resource_edges option is enabled in request.
965
975
  # @!attribute [rw] condition_evaluation
@@ -981,12 +991,15 @@ module Google
981
991
  # @!attribute [rw] group_edges
982
992
  # @return [::Array<::Google::Cloud::Asset::V1::IamPolicyAnalysisResult::Edge>]
983
993
  # Group identity edges of the graph starting from the binding's
984
- # group members to any node of the {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult::IdentityList#identities identities}. The {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult::Edge#source_node Edge.source_node}
994
+ # group members to any node of the
995
+ # {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult::IdentityList#identities identities}.
996
+ # The
997
+ # {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult::Edge#source_node Edge.source_node}
985
998
  # contains a group, such as `group:parent@google.com`. The
986
- # {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult::Edge#target_node Edge.target_node} contains a member of the group,
987
- # such as `group:child@google.com` or `user:foo@google.com`.
988
- # This field is present only if the output_group_edges option is enabled in
989
- # request.
999
+ # {::Google::Cloud::Asset::V1::IamPolicyAnalysisResult::Edge#target_node Edge.target_node}
1000
+ # contains a member of the group, such as `group:child@google.com` or
1001
+ # `user:foo@google.com`. This field is present only if the
1002
+ # output_group_edges option is enabled in request.
990
1003
  class IdentityList
991
1004
  include ::Google::Protobuf::MessageExts
992
1005
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -38,6 +38,22 @@ module Google
38
38
  # @!attribute [rw] title
39
39
  # @return [::String]
40
40
  # Required. Human readable title. Does not affect behavior.
41
+ # @!attribute [rw] scopes
42
+ # @return [::Array<::String>]
43
+ # The scopes of a policy define which resources an ACM policy can restrict,
44
+ # and where ACM resources can be referenced.
45
+ # For example, a policy with scopes=["folders/123"] has the following
46
+ # behavior:
47
+ # - vpcsc perimeters can only restrict projects within folders/123
48
+ # - access levels can only be referenced by resources within folders/123.
49
+ # If empty, there are no limitations on which resources can be restricted by
50
+ # an ACM policy, and there are no limitations on where ACM resources can be
51
+ # referenced.
52
+ # Only one policy can include a given scope (attempting to create a second
53
+ # policy which includes "folders/123" will result in an error).
54
+ # Currently, scopes cannot be modified after a policy is created.
55
+ # Currently, policies can only have a single scope.
56
+ # Format: list of `folders/{folder_number}` or `projects/{project_number}`
41
57
  # @!attribute [rw] create_time
42
58
  # @return [::Google::Protobuf::Timestamp]
43
59
  # Output only. Time the `AccessPolicy` was created in UTC.
@@ -254,44 +254,6 @@ module Google
254
254
  extend ::Google::Protobuf::MessageExts::ClassMethods
255
255
  end
256
256
 
257
- # Defines the conditions under which an [EgressPolicy]
258
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
259
- # matches a request. Conditions are based on information about the
260
- # [ApiOperation]
261
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
262
- # intended to be performed on the `resources` specified. Note that if the
263
- # destination of the request is also protected by a [ServicePerimeter]
264
- # [google.identity.accesscontextmanager.v1.ServicePerimeter], then that
265
- # [ServicePerimeter]
266
- # [google.identity.accesscontextmanager.v1.ServicePerimeter] must have
267
- # an [IngressPolicy]
268
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
269
- # which allows access in order for this request to succeed. The request must
270
- # match `operations` AND `resources` fields in order to be allowed egress out
271
- # of the perimeter.
272
- # @!attribute [rw] resources
273
- # @return [::Array<::String>]
274
- # A list of resources, currently only projects in the form
275
- # `projects/<projectnumber>`, that are allowed to be accessed by sources
276
- # defined in the corresponding [EgressFrom]
277
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom].
278
- # A request matches if it contains a resource in this list. If `*` is
279
- # specified for `resources`, then this [EgressTo]
280
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo]
281
- # rule will authorize access to all resources outside the perimeter.
282
- # @!attribute [rw] operations
283
- # @return [::Array<::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::ApiOperation>]
284
- # A list of [ApiOperations]
285
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
286
- # allowed to be performed by the sources specified in the corresponding
287
- # [EgressFrom]
288
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom].
289
- # A request matches if it uses an operation/service in this list.
290
- class EgressTo
291
- include ::Google::Protobuf::MessageExts
292
- extend ::Google::Protobuf::MessageExts::ClassMethods
293
- end
294
-
295
257
  # Defines the conditions under which an [IngressPolicy]
296
258
  # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
297
259
  # matches a request. Conditions are based on information about the source of
@@ -387,6 +349,78 @@ module Google
387
349
  extend ::Google::Protobuf::MessageExts::ClassMethods
388
350
  end
389
351
 
352
+ # Defines the conditions under which an [EgressPolicy]
353
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
354
+ # matches a request. Conditions based on information about the source of the
355
+ # request. Note that if the destination of the request is also protected by a
356
+ # [ServicePerimeter]
357
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter], then that
358
+ # [ServicePerimeter]
359
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] must have
360
+ # an [IngressPolicy]
361
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
362
+ # which allows access in order for this request to succeed.
363
+ # @!attribute [rw] identities
364
+ # @return [::Array<::String>]
365
+ # A list of identities that are allowed access through this [EgressPolicy].
366
+ # Should be in the format of email address. The email address should
367
+ # represent individual user or service account only.
368
+ # @!attribute [rw] identity_type
369
+ # @return [::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::IdentityType]
370
+ # Specifies the type of identities that are allowed access to outside the
371
+ # perimeter. If left unspecified, then members of `identities` field will
372
+ # be allowed access.
373
+ class EgressFrom
374
+ include ::Google::Protobuf::MessageExts
375
+ extend ::Google::Protobuf::MessageExts::ClassMethods
376
+ end
377
+
378
+ # Defines the conditions under which an [EgressPolicy]
379
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
380
+ # matches a request. Conditions are based on information about the
381
+ # [ApiOperation]
382
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
383
+ # intended to be performed on the `resources` specified. Note that if the
384
+ # destination of the request is also protected by a [ServicePerimeter]
385
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter], then that
386
+ # [ServicePerimeter]
387
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] must have
388
+ # an [IngressPolicy]
389
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
390
+ # which allows access in order for this request to succeed. The request must
391
+ # match `operations` AND `resources` fields in order to be allowed egress out
392
+ # of the perimeter.
393
+ # @!attribute [rw] resources
394
+ # @return [::Array<::String>]
395
+ # A list of resources, currently only projects in the form
396
+ # `projects/<projectnumber>`, that are allowed to be accessed by sources
397
+ # defined in the corresponding [EgressFrom]
398
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom].
399
+ # A request matches if it contains a resource in this list. If `*` is
400
+ # specified for `resources`, then this [EgressTo]
401
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo]
402
+ # rule will authorize access to all resources outside the perimeter.
403
+ # @!attribute [rw] operations
404
+ # @return [::Array<::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::ApiOperation>]
405
+ # A list of [ApiOperations]
406
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
407
+ # allowed to be performed by the sources specified in the corresponding
408
+ # [EgressFrom]
409
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom].
410
+ # A request matches if it uses an operation/service in this list.
411
+ # @!attribute [rw] external_resources
412
+ # @return [::Array<::String>]
413
+ # A list of external resources that are allowed to be accessed. Only AWS
414
+ # and Azure resources are supported. For Amazon S3, the supported format is
415
+ # s3://BUCKET_NAME. For Azure Storage, the supported format is
416
+ # azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches
417
+ # if it contains an external resource in this list (Example:
418
+ # s3://bucket/path). Currently '*' is not allowed.
419
+ class EgressTo
420
+ include ::Google::Protobuf::MessageExts
421
+ extend ::Google::Protobuf::MessageExts::ClassMethods
422
+ end
423
+
390
424
  # Policy for egress from perimeter.
391
425
  #
392
426
  # [EgressPolicies]
@@ -432,32 +466,6 @@ module Google
432
466
  extend ::Google::Protobuf::MessageExts::ClassMethods
433
467
  end
434
468
 
435
- # Defines the conditions under which an [EgressPolicy]
436
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
437
- # matches a request. Conditions based on information about the source of the
438
- # request. Note that if the destination of the request is also protected by a
439
- # [ServicePerimeter]
440
- # [google.identity.accesscontextmanager.v1.ServicePerimeter], then that
441
- # [ServicePerimeter]
442
- # [google.identity.accesscontextmanager.v1.ServicePerimeter] must have
443
- # an [IngressPolicy]
444
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
445
- # which allows access in order for this request to succeed.
446
- # @!attribute [rw] identities
447
- # @return [::Array<::String>]
448
- # A list of identities that are allowed access through this [EgressPolicy].
449
- # Should be in the format of email address. The email address should
450
- # represent individual user or service account only.
451
- # @!attribute [rw] identity_type
452
- # @return [::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::IdentityType]
453
- # Specifies the type of identities that are allowed access to outside the
454
- # perimeter. If left unspecified, then members of `identities` field will
455
- # be allowed access.
456
- class EgressFrom
457
- include ::Google::Protobuf::MessageExts
458
- extend ::Google::Protobuf::MessageExts::ClassMethods
459
- end
460
-
461
469
  # Specifies the types of identities that are allowed access in either
462
470
  # [IngressFrom]
463
471
  # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressFrom]
@@ -27,7 +27,7 @@ module Google
27
27
  # `OUT_OF_RANGE` over `FAILED_PRECONDITION` if both codes apply.
28
28
  # Similarly prefer `NOT_FOUND` or `ALREADY_EXISTS` over `FAILED_PRECONDITION`.
29
29
  module Code
30
- # Not an error; returned on success
30
+ # Not an error; returned on success.
31
31
  #
32
32
  # HTTP Mapping: 200 OK
33
33
  OK = 0
@@ -66,7 +66,7 @@ module Google
66
66
  # Some requested entity (e.g., file or directory) was not found.
67
67
  #
68
68
  # Note to server developers: if a request is denied for an entire class
69
- # of users, such as gradual feature rollout or undocumented whitelist,
69
+ # of users, such as gradual feature rollout or undocumented allowlist,
70
70
  # `NOT_FOUND` may be used. If a request is denied for some users within
71
71
  # a class of users, such as user-based access control, `PERMISSION_DENIED`
72
72
  # must be used.
@@ -112,11 +112,11 @@ module Google
112
112
  # Service implementors can use the following guidelines to decide
113
113
  # between `FAILED_PRECONDITION`, `ABORTED`, and `UNAVAILABLE`:
114
114
  # (a) Use `UNAVAILABLE` if the client can retry just the failing call.
115
- # (b) Use `ABORTED` if the client should retry at a higher level
116
- # (e.g., when a client-specified test-and-set fails, indicating the
117
- # client should restart a read-modify-write sequence).
115
+ # (b) Use `ABORTED` if the client should retry at a higher level. For
116
+ # example, when a client-specified test-and-set fails, indicating the
117
+ # client should restart a read-modify-write sequence.
118
118
  # (c) Use `FAILED_PRECONDITION` if the client should not retry until
119
- # the system state has been explicitly fixed. E.g., if an "rmdir"
119
+ # the system state has been explicitly fixed. For example, if an "rmdir"
120
120
  # fails because the directory is non-empty, `FAILED_PRECONDITION`
121
121
  # should be returned since the client should not retry unless
122
122
  # the files are deleted from the directory.
@@ -28,12 +28,14 @@ module Google
28
28
  # [API Design Guide](https://cloud.google.com/apis/design/errors).
29
29
  # @!attribute [rw] code
30
30
  # @return [::Integer]
31
- # The status code, which should be an enum value of {::Google::Rpc::Code google.rpc.Code}.
31
+ # The status code, which should be an enum value of
32
+ # {::Google::Rpc::Code google.rpc.Code}.
32
33
  # @!attribute [rw] message
33
34
  # @return [::String]
34
35
  # A developer-facing error message, which should be in English. Any
35
36
  # user-facing error message should be localized and sent in the
36
- # {::Google::Rpc::Status#details google.rpc.Status.details} field, or localized by the client.
37
+ # {::Google::Rpc::Status#details google.rpc.Status.details} field, or localized
38
+ # by the client.
37
39
  # @!attribute [rw] details
38
40
  # @return [::Array<::Google::Protobuf::Any>]
39
41
  # A list of messages that carry the error details. There is a common set of
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-asset-v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.22.0
4
+ version: 0.23.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-10-18 00:00:00.000000000 Z
11
+ date: 2023-01-16 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: gapic-common
@@ -16,7 +16,7 @@ dependencies:
16
16
  requirements:
17
17
  - - ">="
18
18
  - !ruby/object:Gem::Version
19
- version: '0.12'
19
+ version: 0.16.0
20
20
  - - "<"
21
21
  - !ruby/object:Gem::Version
22
22
  version: 2.a
@@ -26,7 +26,7 @@ dependencies:
26
26
  requirements:
27
27
  - - ">="
28
28
  - !ruby/object:Gem::Version
29
- version: '0.12'
29
+ version: 0.16.0
30
30
  - - "<"
31
31
  - !ruby/object:Gem::Version
32
32
  version: 2.a
@@ -237,7 +237,9 @@ files:
237
237
  - lib/google/cloud/asset/v1/version.rb
238
238
  - lib/google/cloud/orgpolicy/v1/orgpolicy_pb.rb
239
239
  - proto_docs/README.md
240
+ - proto_docs/google/api/client.rb
240
241
  - proto_docs/google/api/field_behavior.rb
242
+ - proto_docs/google/api/launch_stage.rb
241
243
  - proto_docs/google/api/resource.rb
242
244
  - proto_docs/google/cloud/asset/v1/asset_service.rb
243
245
  - proto_docs/google/cloud/asset/v1/assets.rb
@@ -278,7 +280,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
278
280
  - !ruby/object:Gem::Version
279
281
  version: '0'
280
282
  requirements: []
281
- rubygems_version: 3.3.14
283
+ rubygems_version: 3.4.2
282
284
  signing_key:
283
285
  specification_version: 4
284
286
  summary: API Client library for the Cloud Asset V1 API