google-identity-access_context_manager-v1 0.1.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (38) hide show
  1. checksums.yaml +7 -0
  2. data/.yardopts +12 -0
  3. data/AUTHENTICATION.md +167 -0
  4. data/LICENSE.md +201 -0
  5. data/README.md +139 -0
  6. data/lib/google/identity/access_context_manager/v1/access_context_manager/client.rb +2358 -0
  7. data/lib/google/identity/access_context_manager/v1/access_context_manager/credentials.rb +47 -0
  8. data/lib/google/identity/access_context_manager/v1/access_context_manager/operations.rb +664 -0
  9. data/lib/google/identity/access_context_manager/v1/access_context_manager/paths.rb +112 -0
  10. data/lib/google/identity/access_context_manager/v1/access_context_manager.rb +60 -0
  11. data/lib/google/identity/access_context_manager/v1/version.rb +28 -0
  12. data/lib/google/identity/access_context_manager/v1.rb +38 -0
  13. data/lib/google/identity/accesscontextmanager/type/device_resources_pb.rb +43 -0
  14. data/lib/google/identity/accesscontextmanager/v1/access_context_manager_pb.rb +182 -0
  15. data/lib/google/identity/accesscontextmanager/v1/access_context_manager_services_pb.rb +224 -0
  16. data/lib/google/identity/accesscontextmanager/v1/access_level_pb.rb +73 -0
  17. data/lib/google/identity/accesscontextmanager/v1/access_policy_pb.rb +30 -0
  18. data/lib/google/identity/accesscontextmanager/v1/gcp_user_access_binding_pb.rb +27 -0
  19. data/lib/google/identity/accesscontextmanager/v1/service_perimeter_pb.rb +109 -0
  20. data/lib/google-identity-access_context_manager-v1.rb +21 -0
  21. data/proto_docs/README.md +4 -0
  22. data/proto_docs/google/api/field_behavior.rb +71 -0
  23. data/proto_docs/google/api/resource.rb +283 -0
  24. data/proto_docs/google/identity/accesscontextmanager/type/device_resources.rb +84 -0
  25. data/proto_docs/google/identity/accesscontextmanager/v1/access_context_manager.rb +539 -0
  26. data/proto_docs/google/identity/accesscontextmanager/v1/access_level.rb +197 -0
  27. data/proto_docs/google/identity/accesscontextmanager/v1/access_policy.rb +60 -0
  28. data/proto_docs/google/identity/accesscontextmanager/v1/gcp_user_access_binding.rb +55 -0
  29. data/proto_docs/google/identity/accesscontextmanager/v1/service_perimeter.rb +484 -0
  30. data/proto_docs/google/longrunning/operations.rb +164 -0
  31. data/proto_docs/google/protobuf/any.rb +141 -0
  32. data/proto_docs/google/protobuf/duration.rb +98 -0
  33. data/proto_docs/google/protobuf/empty.rb +36 -0
  34. data/proto_docs/google/protobuf/field_mask.rb +229 -0
  35. data/proto_docs/google/protobuf/timestamp.rb +129 -0
  36. data/proto_docs/google/rpc/status.rb +46 -0
  37. data/proto_docs/google/type/expr.rb +75 -0
  38. metadata +228 -0
@@ -0,0 +1,112 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2021 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+
20
+ module Google
21
+ module Identity
22
+ module AccessContextManager
23
+ module V1
24
+ module AccessContextManager
25
+ # Path helper methods for the AccessContextManager API.
26
+ module Paths
27
+ ##
28
+ # Create a fully-qualified AccessLevel resource string.
29
+ #
30
+ # The resource will be in the following format:
31
+ #
32
+ # `accessPolicies/{access_policy}/accessLevels/{access_level}`
33
+ #
34
+ # @param access_policy [String]
35
+ # @param access_level [String]
36
+ #
37
+ # @return [::String]
38
+ def access_level_path access_policy:, access_level:
39
+ raise ::ArgumentError, "access_policy cannot contain /" if access_policy.to_s.include? "/"
40
+
41
+ "accessPolicies/#{access_policy}/accessLevels/#{access_level}"
42
+ end
43
+
44
+ ##
45
+ # Create a fully-qualified AccessPolicy resource string.
46
+ #
47
+ # The resource will be in the following format:
48
+ #
49
+ # `accessPolicies/{access_policy}`
50
+ #
51
+ # @param access_policy [String]
52
+ #
53
+ # @return [::String]
54
+ def access_policy_path access_policy:
55
+ "accessPolicies/#{access_policy}"
56
+ end
57
+
58
+ ##
59
+ # Create a fully-qualified GcpUserAccessBinding resource string.
60
+ #
61
+ # The resource will be in the following format:
62
+ #
63
+ # `organizations/{organization}/gcpUserAccessBindings/{gcp_user_access_binding}`
64
+ #
65
+ # @param organization [String]
66
+ # @param gcp_user_access_binding [String]
67
+ #
68
+ # @return [::String]
69
+ def gcp_user_access_binding_path organization:, gcp_user_access_binding:
70
+ raise ::ArgumentError, "organization cannot contain /" if organization.to_s.include? "/"
71
+
72
+ "organizations/#{organization}/gcpUserAccessBindings/#{gcp_user_access_binding}"
73
+ end
74
+
75
+ ##
76
+ # Create a fully-qualified Organization resource string.
77
+ #
78
+ # The resource will be in the following format:
79
+ #
80
+ # `organizations/{organization}`
81
+ #
82
+ # @param organization [String]
83
+ #
84
+ # @return [::String]
85
+ def organization_path organization:
86
+ "organizations/#{organization}"
87
+ end
88
+
89
+ ##
90
+ # Create a fully-qualified ServicePerimeter resource string.
91
+ #
92
+ # The resource will be in the following format:
93
+ #
94
+ # `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`
95
+ #
96
+ # @param access_policy [String]
97
+ # @param service_perimeter [String]
98
+ #
99
+ # @return [::String]
100
+ def service_perimeter_path access_policy:, service_perimeter:
101
+ raise ::ArgumentError, "access_policy cannot contain /" if access_policy.to_s.include? "/"
102
+
103
+ "accessPolicies/#{access_policy}/servicePerimeters/#{service_perimeter}"
104
+ end
105
+
106
+ extend self
107
+ end
108
+ end
109
+ end
110
+ end
111
+ end
112
+ end
@@ -0,0 +1,60 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2021 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+ require "gapic/common"
20
+ require "gapic/config"
21
+ require "gapic/config/method"
22
+
23
+ require "google/identity/access_context_manager/v1/version"
24
+
25
+ require "google/identity/access_context_manager/v1/access_context_manager/credentials"
26
+ require "google/identity/access_context_manager/v1/access_context_manager/paths"
27
+ require "google/identity/access_context_manager/v1/access_context_manager/operations"
28
+ require "google/identity/access_context_manager/v1/access_context_manager/client"
29
+
30
+ module Google
31
+ module Identity
32
+ module AccessContextManager
33
+ module V1
34
+ ##
35
+ # API for setting [Access Levels]
36
+ # [google.identity.accesscontextmanager.v1.AccessLevel] and [Service
37
+ # Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
38
+ # for Google Cloud Projects. Each organization has one [AccessPolicy]
39
+ # [google.identity.accesscontextmanager.v1.AccessPolicy] containing the
40
+ # [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel]
41
+ # and [Service Perimeters]
42
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter]. This
43
+ # [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
44
+ # applicable to all resources in the organization.
45
+ # AccessPolicies
46
+ #
47
+ # To load this service and instantiate a client:
48
+ #
49
+ # require "google/identity/access_context_manager/v1/access_context_manager"
50
+ # client = ::Google::Identity::AccessContextManager::V1::AccessContextManager::Client.new
51
+ #
52
+ module AccessContextManager
53
+ end
54
+ end
55
+ end
56
+ end
57
+ end
58
+
59
+ helper_path = ::File.join __dir__, "access_context_manager", "helpers.rb"
60
+ require "google/identity/access_context_manager/v1/access_context_manager/helpers" if ::File.file? helper_path
@@ -0,0 +1,28 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2021 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+
20
+ module Google
21
+ module Identity
22
+ module AccessContextManager
23
+ module V1
24
+ VERSION = "0.1.0"
25
+ end
26
+ end
27
+ end
28
+ end
@@ -0,0 +1,38 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2021 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+ require "google/identity/access_context_manager/v1/access_context_manager"
20
+ require "google/identity/access_context_manager/v1/version"
21
+
22
+ module Google
23
+ module Identity
24
+ module AccessContextManager
25
+ ##
26
+ # To load this package, including all its services, and instantiate a client:
27
+ #
28
+ # require "google/identity/access_context_manager/v1"
29
+ # client = ::Google::Identity::AccessContextManager::V1::AccessContextManager::Client.new
30
+ #
31
+ module V1
32
+ end
33
+ end
34
+ end
35
+ end
36
+
37
+ helper_path = ::File.join __dir__, "v1", "_helpers.rb"
38
+ require "google/identity/access_context_manager/v1/_helpers" if ::File.file? helper_path
@@ -0,0 +1,43 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # source: google/identity/accesscontextmanager/type/device_resources.proto
3
+
4
+ require 'google/protobuf'
5
+
6
+ require 'google/api/annotations_pb'
7
+ Google::Protobuf::DescriptorPool.generated_pool.build do
8
+ add_file("google/identity/accesscontextmanager/type/device_resources.proto", :syntax => :proto3) do
9
+ add_enum "google.identity.accesscontextmanager.type.DeviceEncryptionStatus" do
10
+ value :ENCRYPTION_UNSPECIFIED, 0
11
+ value :ENCRYPTION_UNSUPPORTED, 1
12
+ value :UNENCRYPTED, 2
13
+ value :ENCRYPTED, 3
14
+ end
15
+ add_enum "google.identity.accesscontextmanager.type.OsType" do
16
+ value :OS_UNSPECIFIED, 0
17
+ value :DESKTOP_MAC, 1
18
+ value :DESKTOP_WINDOWS, 2
19
+ value :DESKTOP_LINUX, 3
20
+ value :DESKTOP_CHROME_OS, 6
21
+ value :ANDROID, 4
22
+ value :IOS, 5
23
+ end
24
+ add_enum "google.identity.accesscontextmanager.type.DeviceManagementLevel" do
25
+ value :MANAGEMENT_UNSPECIFIED, 0
26
+ value :NONE, 1
27
+ value :BASIC, 2
28
+ value :COMPLETE, 3
29
+ end
30
+ end
31
+ end
32
+
33
+ module Google
34
+ module Identity
35
+ module AccessContextManager
36
+ module Type
37
+ DeviceEncryptionStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.type.DeviceEncryptionStatus").enummodule
38
+ OsType = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.type.OsType").enummodule
39
+ DeviceManagementLevel = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.type.DeviceManagementLevel").enummodule
40
+ end
41
+ end
42
+ end
43
+ end
@@ -0,0 +1,182 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # source: google/identity/accesscontextmanager/v1/access_context_manager.proto
3
+
4
+ require 'google/protobuf'
5
+
6
+ require 'google/api/annotations_pb'
7
+ require 'google/api/client_pb'
8
+ require 'google/api/field_behavior_pb'
9
+ require 'google/api/resource_pb'
10
+ require 'google/identity/accesscontextmanager/v1/access_level_pb'
11
+ require 'google/identity/accesscontextmanager/v1/access_policy_pb'
12
+ require 'google/identity/accesscontextmanager/v1/gcp_user_access_binding_pb'
13
+ require 'google/identity/accesscontextmanager/v1/service_perimeter_pb'
14
+ require 'google/longrunning/operations_pb'
15
+ require 'google/protobuf/field_mask_pb'
16
+ Google::Protobuf::DescriptorPool.generated_pool.build do
17
+ add_file("google/identity/accesscontextmanager/v1/access_context_manager.proto", :syntax => :proto3) do
18
+ add_message "google.identity.accesscontextmanager.v1.ListAccessPoliciesRequest" do
19
+ optional :parent, :string, 1
20
+ optional :page_size, :int32, 2
21
+ optional :page_token, :string, 3
22
+ end
23
+ add_message "google.identity.accesscontextmanager.v1.ListAccessPoliciesResponse" do
24
+ repeated :access_policies, :message, 1, "google.identity.accesscontextmanager.v1.AccessPolicy"
25
+ optional :next_page_token, :string, 2
26
+ end
27
+ add_message "google.identity.accesscontextmanager.v1.GetAccessPolicyRequest" do
28
+ optional :name, :string, 1
29
+ end
30
+ add_message "google.identity.accesscontextmanager.v1.UpdateAccessPolicyRequest" do
31
+ optional :policy, :message, 1, "google.identity.accesscontextmanager.v1.AccessPolicy"
32
+ optional :update_mask, :message, 2, "google.protobuf.FieldMask"
33
+ end
34
+ add_message "google.identity.accesscontextmanager.v1.DeleteAccessPolicyRequest" do
35
+ optional :name, :string, 1
36
+ end
37
+ add_message "google.identity.accesscontextmanager.v1.ListAccessLevelsRequest" do
38
+ optional :parent, :string, 1
39
+ optional :page_size, :int32, 2
40
+ optional :page_token, :string, 3
41
+ optional :access_level_format, :enum, 4, "google.identity.accesscontextmanager.v1.LevelFormat"
42
+ end
43
+ add_message "google.identity.accesscontextmanager.v1.ListAccessLevelsResponse" do
44
+ repeated :access_levels, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
45
+ optional :next_page_token, :string, 2
46
+ end
47
+ add_message "google.identity.accesscontextmanager.v1.GetAccessLevelRequest" do
48
+ optional :name, :string, 1
49
+ optional :access_level_format, :enum, 2, "google.identity.accesscontextmanager.v1.LevelFormat"
50
+ end
51
+ add_message "google.identity.accesscontextmanager.v1.CreateAccessLevelRequest" do
52
+ optional :parent, :string, 1
53
+ optional :access_level, :message, 2, "google.identity.accesscontextmanager.v1.AccessLevel"
54
+ end
55
+ add_message "google.identity.accesscontextmanager.v1.UpdateAccessLevelRequest" do
56
+ optional :access_level, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
57
+ optional :update_mask, :message, 2, "google.protobuf.FieldMask"
58
+ end
59
+ add_message "google.identity.accesscontextmanager.v1.DeleteAccessLevelRequest" do
60
+ optional :name, :string, 1
61
+ end
62
+ add_message "google.identity.accesscontextmanager.v1.ReplaceAccessLevelsRequest" do
63
+ optional :parent, :string, 1
64
+ repeated :access_levels, :message, 2, "google.identity.accesscontextmanager.v1.AccessLevel"
65
+ optional :etag, :string, 4
66
+ end
67
+ add_message "google.identity.accesscontextmanager.v1.ReplaceAccessLevelsResponse" do
68
+ repeated :access_levels, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
69
+ end
70
+ add_message "google.identity.accesscontextmanager.v1.ListServicePerimetersRequest" do
71
+ optional :parent, :string, 1
72
+ optional :page_size, :int32, 2
73
+ optional :page_token, :string, 3
74
+ end
75
+ add_message "google.identity.accesscontextmanager.v1.ListServicePerimetersResponse" do
76
+ repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
77
+ optional :next_page_token, :string, 2
78
+ end
79
+ add_message "google.identity.accesscontextmanager.v1.GetServicePerimeterRequest" do
80
+ optional :name, :string, 1
81
+ end
82
+ add_message "google.identity.accesscontextmanager.v1.CreateServicePerimeterRequest" do
83
+ optional :parent, :string, 1
84
+ optional :service_perimeter, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeter"
85
+ end
86
+ add_message "google.identity.accesscontextmanager.v1.UpdateServicePerimeterRequest" do
87
+ optional :service_perimeter, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
88
+ optional :update_mask, :message, 2, "google.protobuf.FieldMask"
89
+ end
90
+ add_message "google.identity.accesscontextmanager.v1.DeleteServicePerimeterRequest" do
91
+ optional :name, :string, 1
92
+ end
93
+ add_message "google.identity.accesscontextmanager.v1.ReplaceServicePerimetersRequest" do
94
+ optional :parent, :string, 1
95
+ repeated :service_perimeters, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeter"
96
+ optional :etag, :string, 3
97
+ end
98
+ add_message "google.identity.accesscontextmanager.v1.ReplaceServicePerimetersResponse" do
99
+ repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
100
+ end
101
+ add_message "google.identity.accesscontextmanager.v1.CommitServicePerimetersRequest" do
102
+ optional :parent, :string, 1
103
+ optional :etag, :string, 2
104
+ end
105
+ add_message "google.identity.accesscontextmanager.v1.CommitServicePerimetersResponse" do
106
+ repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
107
+ end
108
+ add_message "google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsRequest" do
109
+ optional :parent, :string, 1
110
+ optional :page_size, :int32, 2
111
+ optional :page_token, :string, 3
112
+ end
113
+ add_message "google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsResponse" do
114
+ repeated :gcp_user_access_bindings, :message, 1, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
115
+ optional :next_page_token, :string, 2
116
+ end
117
+ add_message "google.identity.accesscontextmanager.v1.GetGcpUserAccessBindingRequest" do
118
+ optional :name, :string, 1
119
+ end
120
+ add_message "google.identity.accesscontextmanager.v1.CreateGcpUserAccessBindingRequest" do
121
+ optional :parent, :string, 1
122
+ optional :gcp_user_access_binding, :message, 2, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
123
+ end
124
+ add_message "google.identity.accesscontextmanager.v1.UpdateGcpUserAccessBindingRequest" do
125
+ optional :gcp_user_access_binding, :message, 1, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
126
+ optional :update_mask, :message, 2, "google.protobuf.FieldMask"
127
+ end
128
+ add_message "google.identity.accesscontextmanager.v1.DeleteGcpUserAccessBindingRequest" do
129
+ optional :name, :string, 1
130
+ end
131
+ add_message "google.identity.accesscontextmanager.v1.GcpUserAccessBindingOperationMetadata" do
132
+ end
133
+ add_message "google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata" do
134
+ end
135
+ add_enum "google.identity.accesscontextmanager.v1.LevelFormat" do
136
+ value :LEVEL_FORMAT_UNSPECIFIED, 0
137
+ value :AS_DEFINED, 1
138
+ value :CEL, 2
139
+ end
140
+ end
141
+ end
142
+
143
+ module Google
144
+ module Identity
145
+ module AccessContextManager
146
+ module V1
147
+ ListAccessPoliciesRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessPoliciesRequest").msgclass
148
+ ListAccessPoliciesResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessPoliciesResponse").msgclass
149
+ GetAccessPolicyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetAccessPolicyRequest").msgclass
150
+ UpdateAccessPolicyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateAccessPolicyRequest").msgclass
151
+ DeleteAccessPolicyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteAccessPolicyRequest").msgclass
152
+ ListAccessLevelsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessLevelsRequest").msgclass
153
+ ListAccessLevelsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessLevelsResponse").msgclass
154
+ GetAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetAccessLevelRequest").msgclass
155
+ CreateAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CreateAccessLevelRequest").msgclass
156
+ UpdateAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateAccessLevelRequest").msgclass
157
+ DeleteAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteAccessLevelRequest").msgclass
158
+ ReplaceAccessLevelsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceAccessLevelsRequest").msgclass
159
+ ReplaceAccessLevelsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceAccessLevelsResponse").msgclass
160
+ ListServicePerimetersRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListServicePerimetersRequest").msgclass
161
+ ListServicePerimetersResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListServicePerimetersResponse").msgclass
162
+ GetServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetServicePerimeterRequest").msgclass
163
+ CreateServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CreateServicePerimeterRequest").msgclass
164
+ UpdateServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateServicePerimeterRequest").msgclass
165
+ DeleteServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteServicePerimeterRequest").msgclass
166
+ ReplaceServicePerimetersRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceServicePerimetersRequest").msgclass
167
+ ReplaceServicePerimetersResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceServicePerimetersResponse").msgclass
168
+ CommitServicePerimetersRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CommitServicePerimetersRequest").msgclass
169
+ CommitServicePerimetersResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CommitServicePerimetersResponse").msgclass
170
+ ListGcpUserAccessBindingsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsRequest").msgclass
171
+ ListGcpUserAccessBindingsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsResponse").msgclass
172
+ GetGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetGcpUserAccessBindingRequest").msgclass
173
+ CreateGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CreateGcpUserAccessBindingRequest").msgclass
174
+ UpdateGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateGcpUserAccessBindingRequest").msgclass
175
+ DeleteGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteGcpUserAccessBindingRequest").msgclass
176
+ GcpUserAccessBindingOperationMetadata = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GcpUserAccessBindingOperationMetadata").msgclass
177
+ AccessContextManagerOperationMetadata = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata").msgclass
178
+ LevelFormat = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.LevelFormat").enummodule
179
+ end
180
+ end
181
+ end
182
+ end