google-cloud-privileged_access_manager-v1 0.a → 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.yardopts +12 -0
- data/AUTHENTICATION.md +122 -0
- data/README.md +144 -8
- data/lib/google/cloud/privileged_access_manager/v1/bindings_override.rb +134 -0
- data/lib/google/cloud/privileged_access_manager/v1/privileged_access_manager/client.rb +1895 -0
- data/lib/google/cloud/privileged_access_manager/v1/privileged_access_manager/credentials.rb +47 -0
- data/lib/google/cloud/privileged_access_manager/v1/privileged_access_manager/operations.rb +809 -0
- data/lib/google/cloud/privileged_access_manager/v1/privileged_access_manager/paths.rb +206 -0
- data/lib/google/cloud/privileged_access_manager/v1/privileged_access_manager/rest/client.rb +1777 -0
- data/lib/google/cloud/privileged_access_manager/v1/privileged_access_manager/rest/operations.rb +944 -0
- data/lib/google/cloud/privileged_access_manager/v1/privileged_access_manager/rest/service_stub.rb +1109 -0
- data/lib/google/cloud/privileged_access_manager/v1/privileged_access_manager/rest.rb +73 -0
- data/lib/google/cloud/privileged_access_manager/v1/privileged_access_manager.rb +75 -0
- data/lib/google/cloud/privileged_access_manager/v1/rest.rb +38 -0
- data/lib/google/cloud/privileged_access_manager/v1/version.rb +7 -2
- data/lib/google/cloud/privileged_access_manager/v1.rb +45 -0
- data/lib/google/cloud/privilegedaccessmanager/v1/privilegedaccessmanager_pb.rb +108 -0
- data/lib/google/cloud/privilegedaccessmanager/v1/privilegedaccessmanager_services_pb.rb +121 -0
- data/lib/google-cloud-privileged_access_manager-v1.rb +21 -0
- data/proto_docs/README.md +4 -0
- data/proto_docs/google/api/client.rb +403 -0
- data/proto_docs/google/api/field_behavior.rb +85 -0
- data/proto_docs/google/api/launch_stage.rb +71 -0
- data/proto_docs/google/api/resource.rb +227 -0
- data/proto_docs/google/cloud/privilegedaccessmanager/v1/privilegedaccessmanager.rb +966 -0
- data/proto_docs/google/longrunning/operations.rb +164 -0
- data/proto_docs/google/protobuf/any.rb +145 -0
- data/proto_docs/google/protobuf/duration.rb +98 -0
- data/proto_docs/google/protobuf/empty.rb +34 -0
- data/proto_docs/google/protobuf/field_mask.rb +229 -0
- data/proto_docs/google/protobuf/timestamp.rb +127 -0
- data/proto_docs/google/rpc/status.rb +48 -0
- metadata +125 -10
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: f9a7b93cb9358e100e9d6dc0050caa27bb441bfc809d31523ee0167c429fb13a
|
4
|
+
data.tar.gz: 127152267b8f67e412a59455180c72bf6be85d790a1f4361e3fbecb9c193b93d
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 578414c4bf0dd366d702736d4dddea910d0b6b3a6391383a50d1644451748ca7963f937ac61b1e17626118eb7fe53478b169dd2500b58ba6f7bf3afdd514cf19
|
7
|
+
data.tar.gz: 382ff4c508894d1f85c276a4a5dd59ad328d5dbb99c284ce3c2bf53c5888a59c07009e1388bdbee88f6b2dc58dd14cda03ba68e071640e7568922f54b036aa8a
|
data/.yardopts
ADDED
data/AUTHENTICATION.md
ADDED
@@ -0,0 +1,122 @@
|
|
1
|
+
# Authentication
|
2
|
+
|
3
|
+
The recommended way to authenticate to the google-cloud-privileged_access_manager-v1 library is to use
|
4
|
+
[Application Default Credentials (ADC)](https://cloud.google.com/docs/authentication/application-default-credentials).
|
5
|
+
To review all of your authentication options, see [Credentials lookup](#credential-lookup).
|
6
|
+
|
7
|
+
## Quickstart
|
8
|
+
|
9
|
+
The following example shows how to set up authentication for a local development
|
10
|
+
environment with your user credentials.
|
11
|
+
|
12
|
+
**NOTE:** This method is _not_ recommended for running in production. User credentials
|
13
|
+
should be used only during development.
|
14
|
+
|
15
|
+
1. [Download and install the Google Cloud CLI](https://cloud.google.com/sdk).
|
16
|
+
2. Set up a local ADC file with your user credentials:
|
17
|
+
|
18
|
+
```sh
|
19
|
+
gcloud auth application-default login
|
20
|
+
```
|
21
|
+
|
22
|
+
3. Write code as if already authenticated.
|
23
|
+
|
24
|
+
For more information about setting up authentication for a local development environment, see
|
25
|
+
[Set up Application Default Credentials](https://cloud.google.com/docs/authentication/provide-credentials-adc#local-dev).
|
26
|
+
|
27
|
+
## Credential Lookup
|
28
|
+
|
29
|
+
The google-cloud-privileged_access_manager-v1 library provides several mechanisms to configure your system.
|
30
|
+
Generally, using Application Default Credentials to facilitate automatic
|
31
|
+
credentials discovery is the easist method. But if you need to explicitly specify
|
32
|
+
credentials, there are several methods available to you.
|
33
|
+
|
34
|
+
Credentials are accepted in the following ways, in the following order or precedence:
|
35
|
+
|
36
|
+
1. Credentials specified in method arguments
|
37
|
+
2. Credentials specified in configuration
|
38
|
+
3. Credentials pointed to or included in environment variables
|
39
|
+
4. Credentials found in local ADC file
|
40
|
+
5. Credentials returned by the metadata server for the attached service account (GCP)
|
41
|
+
|
42
|
+
### Configuration
|
43
|
+
|
44
|
+
You can configure a path to a JSON credentials file, either for an individual client object or
|
45
|
+
globally, for all client objects. The JSON file can contain credentials created for
|
46
|
+
[workload identity federation](https://cloud.google.com/iam/docs/workload-identity-federation),
|
47
|
+
[workforce identity federation](https://cloud.google.com/iam/docs/workforce-identity-federation), or a
|
48
|
+
[service account key](https://cloud.google.com/docs/authentication/provide-credentials-adc#local-key).
|
49
|
+
|
50
|
+
Note: Service account keys are a security risk if not managed correctly. You should
|
51
|
+
[choose a more secure alternative to service account keys](https://cloud.google.com/docs/authentication#auth-decision-tree)
|
52
|
+
whenever possible.
|
53
|
+
|
54
|
+
To configure a credentials file for an individual client initialization:
|
55
|
+
|
56
|
+
```ruby
|
57
|
+
require "google/cloud/privileged_access_manager/v1"
|
58
|
+
|
59
|
+
client = ::Google::Cloud::PrivilegedAccessManager::V1::PrivilegedAccessManager::Client.new do |config|
|
60
|
+
config.credentials = "path/to/credentialfile.json"
|
61
|
+
end
|
62
|
+
```
|
63
|
+
|
64
|
+
To configure a credentials file globally for all clients:
|
65
|
+
|
66
|
+
```ruby
|
67
|
+
require "google/cloud/privileged_access_manager/v1"
|
68
|
+
|
69
|
+
::Google::Cloud::PrivilegedAccessManager::V1::PrivilegedAccessManager::Client.configure do |config|
|
70
|
+
config.credentials = "path/to/credentialfile.json"
|
71
|
+
end
|
72
|
+
|
73
|
+
client = ::Google::Cloud::PrivilegedAccessManager::V1::PrivilegedAccessManager::Client.new
|
74
|
+
```
|
75
|
+
|
76
|
+
### Environment Variables
|
77
|
+
|
78
|
+
You can also use an environment variable to provide a JSON credentials file.
|
79
|
+
The environment variable can contain a path to the credentials file or, for
|
80
|
+
environments such as Docker containers where writing files is not encouraged,
|
81
|
+
you can include the credentials file itself.
|
82
|
+
|
83
|
+
The JSON file can contain credentials created for
|
84
|
+
[workload identity federation](https://cloud.google.com/iam/docs/workload-identity-federation),
|
85
|
+
[workforce identity federation](https://cloud.google.com/iam/docs/workforce-identity-federation), or a
|
86
|
+
[service account key](https://cloud.google.com/docs/authentication/provide-credentials-adc#local-key).
|
87
|
+
|
88
|
+
Note: Service account keys are a security risk if not managed correctly. You should
|
89
|
+
[choose a more secure alternative to service account keys](https://cloud.google.com/docs/authentication#auth-decision-tree)
|
90
|
+
whenever possible.
|
91
|
+
|
92
|
+
The environment variables that google-cloud-privileged_access_manager-v1
|
93
|
+
checks for credentials are:
|
94
|
+
|
95
|
+
* `GOOGLE_CLOUD_CREDENTIALS` - Path to JSON file, or JSON contents
|
96
|
+
* `GOOGLE_APPLICATION_CREDENTIALS` - Path to JSON file
|
97
|
+
|
98
|
+
```ruby
|
99
|
+
require "google/cloud/privileged_access_manager/v1"
|
100
|
+
|
101
|
+
ENV["GOOGLE_APPLICATION_CREDENTIALS"] = "path/to/credentialfile.json"
|
102
|
+
|
103
|
+
client = ::Google::Cloud::PrivilegedAccessManager::V1::PrivilegedAccessManager::Client.new
|
104
|
+
```
|
105
|
+
|
106
|
+
### Local ADC file
|
107
|
+
|
108
|
+
You can set up a local ADC file with your user credentials for authentication during
|
109
|
+
development. If credentials are not provided in code or in environment variables,
|
110
|
+
then the local ADC credentials are discovered.
|
111
|
+
|
112
|
+
Follow the steps in [Quickstart](#quickstart) to set up a local ADC file.
|
113
|
+
|
114
|
+
### Google Cloud Platform environments
|
115
|
+
|
116
|
+
When running on Google Cloud Platform (GCP), including Google Compute Engine
|
117
|
+
(GCE), Google Kubernetes Engine (GKE), Google App Engine (GAE), Google Cloud
|
118
|
+
Functions (GCF) and Cloud Run, credentials are retrieved from the attached
|
119
|
+
service account automatically. Code should be written as if already authenticated.
|
120
|
+
|
121
|
+
For more information, see
|
122
|
+
[Set up ADC for Google Cloud services](https://cloud.google.com/docs/authentication/provide-credentials-adc#attached-sa).
|
data/README.md
CHANGED
@@ -1,8 +1,144 @@
|
|
1
|
-
#
|
2
|
-
|
3
|
-
|
4
|
-
|
5
|
-
|
6
|
-
|
7
|
-
|
8
|
-
|
1
|
+
# Ruby Client for the Privileged Access Manager V1 API
|
2
|
+
|
3
|
+
Privileged Access Manager (PAM) helps you on your journey towards least privilege and helps mitigate risks tied to privileged access misuse or abuse. PAM allows you to shift from always-on standing privileges towards on-demand access with just-in-time, time-bound, and approval-based access elevations. PAM allows IAM administrators to create entitlements that can grant just-in-time, temporary access to any resource scope. Requesters can explore eligible entitlements and request the access needed for their task. Approvers are notified when approvals await their decision. Streamlined workflows facilitated by using PAM can support various use cases, including emergency access for incident responders, time-boxed access for developers for critical deployment or maintenance, temporary access for operators for data ingestion and audits, JIT access to service accounts for automated tasks, and more.
|
4
|
+
|
5
|
+
## Overview Privileged Access Manager (PAM) is a Google Cloud native, managed solution to secure, manage and audit privileged access while ensuring operational velocity and developer productivity. PAM enables just-in-time, time-bound, approval-based access elevations, and auditing of privileged access elevations and activity. PAM lets you define the rules of who can request access, what they can request access to, and if they should be granted access with or without approvals based on the sensitivity of the access and emergency of the situation. ## Concepts ### Entitlement An entitlement is an eligibility or license that allows specified users (requesters) to request and obtain access to specified resources subject to a set of conditions such as duration, etc. entitlements can be granted to both human and non-human principals. ### Grant A grant is an instance of active usage against the entitlement. A user can place a request for a grant against an entitlement. The request may be forwarded to an approver for their decision. Once approved, the grant is activated, ultimately giving the user access (roles/permissions) on a resource per the criteria specified in entitlement. ### How does PAM work PAM creates and uses a service agent (Google-managed service account) to perform the required IAM policy changes for granting access at a specific resource/access scope. The service agent requires getIAMPolicy and setIAMPolicy permissions at the appropriate (or higher) access scope - Organization/Folder/Project to make policy changes on the resources listed in PAM entitlements. When enabling PAM for a resource scope, the user/ principal performing that action should have the appropriate permissions at that resource scope (`resourcemanager.{projects|folders|organizations}.setIamPolicy`, `resourcemanager.{projects|folders|organizations}.getIamPolicy`, and `resourcemanager.{projects|folders|organizations}.get`) to list and grant the service agent/account the required access to perform IAM policy changes.
|
6
|
+
|
7
|
+
https://github.com/googleapis/google-cloud-ruby
|
8
|
+
|
9
|
+
This gem is a _versioned_ client. It provides basic client classes for a
|
10
|
+
specific version of the Privileged Access Manager V1 API. Most users should consider using
|
11
|
+
the main client gem,
|
12
|
+
[google-cloud-privileged_access_manager](https://rubygems.org/gems/google-cloud-privileged_access_manager).
|
13
|
+
See the section below titled *Which client should I use?* for more information.
|
14
|
+
|
15
|
+
## Installation
|
16
|
+
|
17
|
+
```
|
18
|
+
$ gem install google-cloud-privileged_access_manager-v1
|
19
|
+
```
|
20
|
+
|
21
|
+
## Before You Begin
|
22
|
+
|
23
|
+
In order to use this library, you first need to go through the following steps:
|
24
|
+
|
25
|
+
1. [Select or create a Cloud Platform project.](https://console.cloud.google.com/project)
|
26
|
+
1. [Enable billing for your project.](https://cloud.google.com/billing/docs/how-to/modify-project#enable_billing_for_a_project)
|
27
|
+
1. [Enable the API.](https://console.cloud.google.com/apis/library/privilegedaccessmanager.googleapis.com)
|
28
|
+
1. {file:AUTHENTICATION.md Set up authentication.}
|
29
|
+
|
30
|
+
## Quick Start
|
31
|
+
|
32
|
+
```ruby
|
33
|
+
require "google/cloud/privileged_access_manager/v1"
|
34
|
+
|
35
|
+
client = ::Google::Cloud::PrivilegedAccessManager::V1::PrivilegedAccessManager::Client.new
|
36
|
+
request = ::Google::Cloud::PrivilegedAccessManager::V1::CheckOnboardingStatusRequest.new # (request fields as keyword arguments...)
|
37
|
+
response = client.check_onboarding_status request
|
38
|
+
```
|
39
|
+
|
40
|
+
View the [Client Library Documentation](https://cloud.google.com/ruby/docs/reference/google-cloud-privileged_access_manager-v1/latest)
|
41
|
+
for class and method documentation.
|
42
|
+
|
43
|
+
See also the [Product Documentation](https://cloud.google.com/iam/docs/pam-overview)
|
44
|
+
for general usage information.
|
45
|
+
|
46
|
+
## Enabling Logging
|
47
|
+
|
48
|
+
To enable logging for this library, set the logger for the underlying [gRPC](https://github.com/grpc/grpc/tree/master/src/ruby) library.
|
49
|
+
The logger that you set may be a Ruby stdlib [`Logger`](https://ruby-doc.org/current/stdlibs/logger/Logger.html) as shown below,
|
50
|
+
or a [`Google::Cloud::Logging::Logger`](https://cloud.google.com/ruby/docs/reference/google-cloud-logging/latest)
|
51
|
+
that will write logs to [Cloud Logging](https://cloud.google.com/logging/). See [grpc/logconfig.rb](https://github.com/grpc/grpc/blob/master/src/ruby/lib/grpc/logconfig.rb)
|
52
|
+
and the gRPC [spec_helper.rb](https://github.com/grpc/grpc/blob/master/src/ruby/spec/spec_helper.rb) for additional information.
|
53
|
+
|
54
|
+
Configuring a Ruby stdlib logger:
|
55
|
+
|
56
|
+
```ruby
|
57
|
+
require "logger"
|
58
|
+
|
59
|
+
module MyLogger
|
60
|
+
LOGGER = Logger.new $stderr, level: Logger::WARN
|
61
|
+
def logger
|
62
|
+
LOGGER
|
63
|
+
end
|
64
|
+
end
|
65
|
+
|
66
|
+
# Define a gRPC module-level logger method before grpc/logconfig.rb loads.
|
67
|
+
module GRPC
|
68
|
+
extend MyLogger
|
69
|
+
end
|
70
|
+
```
|
71
|
+
|
72
|
+
|
73
|
+
## Google Cloud Samples
|
74
|
+
|
75
|
+
To browse ready to use code samples check [Google Cloud Samples](https://cloud.google.com/docs/samples).
|
76
|
+
|
77
|
+
## Supported Ruby Versions
|
78
|
+
|
79
|
+
This library is supported on Ruby 2.7+.
|
80
|
+
|
81
|
+
Google provides official support for Ruby versions that are actively supported
|
82
|
+
by Ruby Core—that is, Ruby versions that are either in normal maintenance or
|
83
|
+
in security maintenance, and not end of life. Older versions of Ruby _may_
|
84
|
+
still work, but are unsupported and not recommended. See
|
85
|
+
https://www.ruby-lang.org/en/downloads/branches/ for details about the Ruby
|
86
|
+
support schedule.
|
87
|
+
|
88
|
+
## Which client should I use?
|
89
|
+
|
90
|
+
Most modern Ruby client libraries for Google APIs come in two flavors: the main
|
91
|
+
client library with a name such as `google-cloud-privileged_access_manager`,
|
92
|
+
and lower-level _versioned_ client libraries with names such as
|
93
|
+
`google-cloud-privileged_access_manager-v1`.
|
94
|
+
_In most cases, you should install the main client._
|
95
|
+
|
96
|
+
### What's the difference between the main client and a versioned client?
|
97
|
+
|
98
|
+
A _versioned client_ provides a basic set of data types and client classes for
|
99
|
+
a _single version_ of a specific service. (That is, for a service with multiple
|
100
|
+
versions, there might be a separate versioned client for each service version.)
|
101
|
+
Most versioned clients are written and maintained by a code generator.
|
102
|
+
|
103
|
+
The _main client_ is designed to provide you with the _recommended_ client
|
104
|
+
interfaces for the service. There will be only one main client for any given
|
105
|
+
service, even a service with multiple versions. The main client includes
|
106
|
+
factory methods for constructing the client objects we recommend for most
|
107
|
+
users. In some cases, those will be classes provided by an underlying versioned
|
108
|
+
client; in other cases, they will be handwritten higher-level client objects
|
109
|
+
with additional capabilities, convenience methods, or best practices built in.
|
110
|
+
Generally, the main client will default to a recommended service version,
|
111
|
+
although in some cases you can override this if you need to talk to a specific
|
112
|
+
service version.
|
113
|
+
|
114
|
+
### Why would I want to use the main client?
|
115
|
+
|
116
|
+
We recommend that most users install the main client gem for a service. You can
|
117
|
+
identify this gem as the one _without_ a version in its name, e.g.
|
118
|
+
`google-cloud-privileged_access_manager`.
|
119
|
+
The main client is recommended because it will embody the best practices for
|
120
|
+
accessing the service, and may also provide more convenient interfaces or
|
121
|
+
tighter integration into frameworks and third-party libraries. In addition, the
|
122
|
+
documentation and samples published by Google will generally demonstrate use of
|
123
|
+
the main client.
|
124
|
+
|
125
|
+
### Why would I want to use a versioned client?
|
126
|
+
|
127
|
+
You can use a versioned client if you are content with a possibly lower-level
|
128
|
+
class interface, you explicitly want to avoid features provided by the main
|
129
|
+
client, or you want to access a specific service version not be covered by the
|
130
|
+
main client. You can identify versioned client gems because the service version
|
131
|
+
is part of the name, e.g. `google-cloud-privileged_access_manager-v1`.
|
132
|
+
|
133
|
+
### What about the google-apis-<name> clients?
|
134
|
+
|
135
|
+
Client library gems with names that begin with `google-apis-` are based on an
|
136
|
+
older code generation technology. They talk to a REST/JSON backend (whereas
|
137
|
+
most modern clients talk to a [gRPC](https://grpc.io/) backend) and they may
|
138
|
+
not offer the same performance, features, and ease of use provided by more
|
139
|
+
modern clients.
|
140
|
+
|
141
|
+
The `google-apis-` clients have wide coverage across Google services, so you
|
142
|
+
might need to use one if there is no modern client available for the service.
|
143
|
+
However, if a modern client is available, we generally recommend it over the
|
144
|
+
older `google-apis-` clients.
|
@@ -0,0 +1,134 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2024 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
require "gapic/config"
|
20
|
+
|
21
|
+
module Google
|
22
|
+
module Cloud
|
23
|
+
module PrivilegedAccessManager
|
24
|
+
##
|
25
|
+
# @example Loading just the REST part of this package, including all its services, and instantiating a REST client
|
26
|
+
#
|
27
|
+
# require "google/cloud/privileged_access_manager/v1/rest"
|
28
|
+
# client = ::Google::Cloud::PrivilegedAccessManager::V1::PrivilegedAccessManager::Rest::Client.new
|
29
|
+
#
|
30
|
+
module V1
|
31
|
+
##
|
32
|
+
# @private
|
33
|
+
# Initialize the mixin bindings configuration
|
34
|
+
#
|
35
|
+
def self.configure
|
36
|
+
@configure ||= begin
|
37
|
+
namespace = ["Google", "Cloud", "PrivilegedAccessManager"]
|
38
|
+
parent_config = while namespace.any?
|
39
|
+
parent_name = namespace.join "::"
|
40
|
+
parent_const = const_get parent_name
|
41
|
+
break parent_const.configure if parent_const.respond_to? :configure
|
42
|
+
namespace.pop
|
43
|
+
end
|
44
|
+
|
45
|
+
default_config = Configuration.new parent_config
|
46
|
+
default_config.bindings_override["google.cloud.location.Locations.GetLocation"] = [
|
47
|
+
Gapic::Rest::GrpcTranscoder::HttpBinding.create_with_validation(
|
48
|
+
uri_method: :get,
|
49
|
+
uri_template: "/v1/{name}",
|
50
|
+
matches: [
|
51
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/?$}, false]
|
52
|
+
],
|
53
|
+
body: nil
|
54
|
+
),
|
55
|
+
Gapic::Rest::GrpcTranscoder::HttpBinding.create_with_validation(
|
56
|
+
uri_method: :get,
|
57
|
+
uri_template: "/v1/{name}",
|
58
|
+
matches: [
|
59
|
+
["name", %r{^organizations/[^/]+/locations/[^/]+/?$}, false]
|
60
|
+
],
|
61
|
+
body: nil
|
62
|
+
),
|
63
|
+
Gapic::Rest::GrpcTranscoder::HttpBinding.create_with_validation(
|
64
|
+
uri_method: :get,
|
65
|
+
uri_template: "/v1/{name}",
|
66
|
+
matches: [
|
67
|
+
["name", %r{^folders/[^/]+/locations/[^/]+/?$}, false]
|
68
|
+
],
|
69
|
+
body: nil
|
70
|
+
)
|
71
|
+
]
|
72
|
+
default_config.bindings_override["google.cloud.location.Locations.ListLocations"] = [
|
73
|
+
|
74
|
+
Gapic::Rest::GrpcTranscoder::HttpBinding.create_with_validation(
|
75
|
+
uri_method: :get,
|
76
|
+
uri_template: "/v1/{name}/locations",
|
77
|
+
matches: [
|
78
|
+
["name", %r{^projects/[^/]+/?$}, false]
|
79
|
+
],
|
80
|
+
body: nil
|
81
|
+
),
|
82
|
+
Gapic::Rest::GrpcTranscoder::HttpBinding.create_with_validation(
|
83
|
+
uri_method: :get,
|
84
|
+
uri_template: "/v1/{name}/locations",
|
85
|
+
matches: [
|
86
|
+
["name", %r{^organizations/[^/]+/?$}, false]
|
87
|
+
],
|
88
|
+
body: nil
|
89
|
+
),
|
90
|
+
Gapic::Rest::GrpcTranscoder::HttpBinding.create_with_validation(
|
91
|
+
uri_method: :get,
|
92
|
+
uri_template: "/v1/{name}/locations",
|
93
|
+
matches: [
|
94
|
+
["name", %r{^folders/[^/]+/?$}, false]
|
95
|
+
],
|
96
|
+
body: nil
|
97
|
+
)
|
98
|
+
]
|
99
|
+
default_config
|
100
|
+
end
|
101
|
+
yield @configure if block_given?
|
102
|
+
@configure
|
103
|
+
end
|
104
|
+
|
105
|
+
##
|
106
|
+
# @private
|
107
|
+
# Configuration class for the google.cloud.privilegedaccessmanager.v1 package.
|
108
|
+
#
|
109
|
+
# This class contains common configuration for all services
|
110
|
+
# of the google.cloud.privilegedaccessmanager.v1 package.
|
111
|
+
#
|
112
|
+
# This configuration is for internal use of the client library classes,
|
113
|
+
# and it is not intended that the end-users will read or change it.
|
114
|
+
#
|
115
|
+
class Configuration
|
116
|
+
extend ::Gapic::Config
|
117
|
+
|
118
|
+
# @private
|
119
|
+
# Overrides for http bindings for the RPC of the mixins for this package.
|
120
|
+
# Services in this package should use these when creating clients for the mixin services.
|
121
|
+
# @return [::Hash{::Symbol=>::Array<::Gapic::Rest::GrpcTranscoder::HttpBinding>}]
|
122
|
+
config_attr :bindings_override, {}, ::Hash, nil
|
123
|
+
|
124
|
+
# @private
|
125
|
+
def initialize parent_config = nil
|
126
|
+
@parent_config = parent_config unless parent_config.nil?
|
127
|
+
|
128
|
+
yield self if block_given?
|
129
|
+
end
|
130
|
+
end
|
131
|
+
end
|
132
|
+
end
|
133
|
+
end
|
134
|
+
end
|