google-identity-access_context_manager-v1 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.yardopts +12 -0
- data/AUTHENTICATION.md +167 -0
- data/LICENSE.md +201 -0
- data/README.md +139 -0
- data/lib/google/identity/access_context_manager/v1/access_context_manager/client.rb +2358 -0
- data/lib/google/identity/access_context_manager/v1/access_context_manager/credentials.rb +47 -0
- data/lib/google/identity/access_context_manager/v1/access_context_manager/operations.rb +664 -0
- data/lib/google/identity/access_context_manager/v1/access_context_manager/paths.rb +112 -0
- data/lib/google/identity/access_context_manager/v1/access_context_manager.rb +60 -0
- data/lib/google/identity/access_context_manager/v1/version.rb +28 -0
- data/lib/google/identity/access_context_manager/v1.rb +38 -0
- data/lib/google/identity/accesscontextmanager/type/device_resources_pb.rb +43 -0
- data/lib/google/identity/accesscontextmanager/v1/access_context_manager_pb.rb +182 -0
- data/lib/google/identity/accesscontextmanager/v1/access_context_manager_services_pb.rb +224 -0
- data/lib/google/identity/accesscontextmanager/v1/access_level_pb.rb +73 -0
- data/lib/google/identity/accesscontextmanager/v1/access_policy_pb.rb +30 -0
- data/lib/google/identity/accesscontextmanager/v1/gcp_user_access_binding_pb.rb +27 -0
- data/lib/google/identity/accesscontextmanager/v1/service_perimeter_pb.rb +109 -0
- data/lib/google-identity-access_context_manager-v1.rb +21 -0
- data/proto_docs/README.md +4 -0
- data/proto_docs/google/api/field_behavior.rb +71 -0
- data/proto_docs/google/api/resource.rb +283 -0
- data/proto_docs/google/identity/accesscontextmanager/type/device_resources.rb +84 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/access_context_manager.rb +539 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/access_level.rb +197 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/access_policy.rb +60 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/gcp_user_access_binding.rb +55 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/service_perimeter.rb +484 -0
- data/proto_docs/google/longrunning/operations.rb +164 -0
- data/proto_docs/google/protobuf/any.rb +141 -0
- data/proto_docs/google/protobuf/duration.rb +98 -0
- data/proto_docs/google/protobuf/empty.rb +36 -0
- data/proto_docs/google/protobuf/field_mask.rb +229 -0
- data/proto_docs/google/protobuf/timestamp.rb +129 -0
- data/proto_docs/google/rpc/status.rb +46 -0
- data/proto_docs/google/type/expr.rb +75 -0
- metadata +228 -0
@@ -0,0 +1,112 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2021 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Identity
|
22
|
+
module AccessContextManager
|
23
|
+
module V1
|
24
|
+
module AccessContextManager
|
25
|
+
# Path helper methods for the AccessContextManager API.
|
26
|
+
module Paths
|
27
|
+
##
|
28
|
+
# Create a fully-qualified AccessLevel resource string.
|
29
|
+
#
|
30
|
+
# The resource will be in the following format:
|
31
|
+
#
|
32
|
+
# `accessPolicies/{access_policy}/accessLevels/{access_level}`
|
33
|
+
#
|
34
|
+
# @param access_policy [String]
|
35
|
+
# @param access_level [String]
|
36
|
+
#
|
37
|
+
# @return [::String]
|
38
|
+
def access_level_path access_policy:, access_level:
|
39
|
+
raise ::ArgumentError, "access_policy cannot contain /" if access_policy.to_s.include? "/"
|
40
|
+
|
41
|
+
"accessPolicies/#{access_policy}/accessLevels/#{access_level}"
|
42
|
+
end
|
43
|
+
|
44
|
+
##
|
45
|
+
# Create a fully-qualified AccessPolicy resource string.
|
46
|
+
#
|
47
|
+
# The resource will be in the following format:
|
48
|
+
#
|
49
|
+
# `accessPolicies/{access_policy}`
|
50
|
+
#
|
51
|
+
# @param access_policy [String]
|
52
|
+
#
|
53
|
+
# @return [::String]
|
54
|
+
def access_policy_path access_policy:
|
55
|
+
"accessPolicies/#{access_policy}"
|
56
|
+
end
|
57
|
+
|
58
|
+
##
|
59
|
+
# Create a fully-qualified GcpUserAccessBinding resource string.
|
60
|
+
#
|
61
|
+
# The resource will be in the following format:
|
62
|
+
#
|
63
|
+
# `organizations/{organization}/gcpUserAccessBindings/{gcp_user_access_binding}`
|
64
|
+
#
|
65
|
+
# @param organization [String]
|
66
|
+
# @param gcp_user_access_binding [String]
|
67
|
+
#
|
68
|
+
# @return [::String]
|
69
|
+
def gcp_user_access_binding_path organization:, gcp_user_access_binding:
|
70
|
+
raise ::ArgumentError, "organization cannot contain /" if organization.to_s.include? "/"
|
71
|
+
|
72
|
+
"organizations/#{organization}/gcpUserAccessBindings/#{gcp_user_access_binding}"
|
73
|
+
end
|
74
|
+
|
75
|
+
##
|
76
|
+
# Create a fully-qualified Organization resource string.
|
77
|
+
#
|
78
|
+
# The resource will be in the following format:
|
79
|
+
#
|
80
|
+
# `organizations/{organization}`
|
81
|
+
#
|
82
|
+
# @param organization [String]
|
83
|
+
#
|
84
|
+
# @return [::String]
|
85
|
+
def organization_path organization:
|
86
|
+
"organizations/#{organization}"
|
87
|
+
end
|
88
|
+
|
89
|
+
##
|
90
|
+
# Create a fully-qualified ServicePerimeter resource string.
|
91
|
+
#
|
92
|
+
# The resource will be in the following format:
|
93
|
+
#
|
94
|
+
# `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`
|
95
|
+
#
|
96
|
+
# @param access_policy [String]
|
97
|
+
# @param service_perimeter [String]
|
98
|
+
#
|
99
|
+
# @return [::String]
|
100
|
+
def service_perimeter_path access_policy:, service_perimeter:
|
101
|
+
raise ::ArgumentError, "access_policy cannot contain /" if access_policy.to_s.include? "/"
|
102
|
+
|
103
|
+
"accessPolicies/#{access_policy}/servicePerimeters/#{service_perimeter}"
|
104
|
+
end
|
105
|
+
|
106
|
+
extend self
|
107
|
+
end
|
108
|
+
end
|
109
|
+
end
|
110
|
+
end
|
111
|
+
end
|
112
|
+
end
|
@@ -0,0 +1,60 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2021 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
require "gapic/common"
|
20
|
+
require "gapic/config"
|
21
|
+
require "gapic/config/method"
|
22
|
+
|
23
|
+
require "google/identity/access_context_manager/v1/version"
|
24
|
+
|
25
|
+
require "google/identity/access_context_manager/v1/access_context_manager/credentials"
|
26
|
+
require "google/identity/access_context_manager/v1/access_context_manager/paths"
|
27
|
+
require "google/identity/access_context_manager/v1/access_context_manager/operations"
|
28
|
+
require "google/identity/access_context_manager/v1/access_context_manager/client"
|
29
|
+
|
30
|
+
module Google
|
31
|
+
module Identity
|
32
|
+
module AccessContextManager
|
33
|
+
module V1
|
34
|
+
##
|
35
|
+
# API for setting [Access Levels]
|
36
|
+
# [google.identity.accesscontextmanager.v1.AccessLevel] and [Service
|
37
|
+
# Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
|
38
|
+
# for Google Cloud Projects. Each organization has one [AccessPolicy]
|
39
|
+
# [google.identity.accesscontextmanager.v1.AccessPolicy] containing the
|
40
|
+
# [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel]
|
41
|
+
# and [Service Perimeters]
|
42
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeter]. This
|
43
|
+
# [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
|
44
|
+
# applicable to all resources in the organization.
|
45
|
+
# AccessPolicies
|
46
|
+
#
|
47
|
+
# To load this service and instantiate a client:
|
48
|
+
#
|
49
|
+
# require "google/identity/access_context_manager/v1/access_context_manager"
|
50
|
+
# client = ::Google::Identity::AccessContextManager::V1::AccessContextManager::Client.new
|
51
|
+
#
|
52
|
+
module AccessContextManager
|
53
|
+
end
|
54
|
+
end
|
55
|
+
end
|
56
|
+
end
|
57
|
+
end
|
58
|
+
|
59
|
+
helper_path = ::File.join __dir__, "access_context_manager", "helpers.rb"
|
60
|
+
require "google/identity/access_context_manager/v1/access_context_manager/helpers" if ::File.file? helper_path
|
@@ -0,0 +1,28 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2021 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Identity
|
22
|
+
module AccessContextManager
|
23
|
+
module V1
|
24
|
+
VERSION = "0.1.0"
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
@@ -0,0 +1,38 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2021 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
require "google/identity/access_context_manager/v1/access_context_manager"
|
20
|
+
require "google/identity/access_context_manager/v1/version"
|
21
|
+
|
22
|
+
module Google
|
23
|
+
module Identity
|
24
|
+
module AccessContextManager
|
25
|
+
##
|
26
|
+
# To load this package, including all its services, and instantiate a client:
|
27
|
+
#
|
28
|
+
# require "google/identity/access_context_manager/v1"
|
29
|
+
# client = ::Google::Identity::AccessContextManager::V1::AccessContextManager::Client.new
|
30
|
+
#
|
31
|
+
module V1
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
35
|
+
end
|
36
|
+
|
37
|
+
helper_path = ::File.join __dir__, "v1", "_helpers.rb"
|
38
|
+
require "google/identity/access_context_manager/v1/_helpers" if ::File.file? helper_path
|
@@ -0,0 +1,43 @@
|
|
1
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
|
+
# source: google/identity/accesscontextmanager/type/device_resources.proto
|
3
|
+
|
4
|
+
require 'google/protobuf'
|
5
|
+
|
6
|
+
require 'google/api/annotations_pb'
|
7
|
+
Google::Protobuf::DescriptorPool.generated_pool.build do
|
8
|
+
add_file("google/identity/accesscontextmanager/type/device_resources.proto", :syntax => :proto3) do
|
9
|
+
add_enum "google.identity.accesscontextmanager.type.DeviceEncryptionStatus" do
|
10
|
+
value :ENCRYPTION_UNSPECIFIED, 0
|
11
|
+
value :ENCRYPTION_UNSUPPORTED, 1
|
12
|
+
value :UNENCRYPTED, 2
|
13
|
+
value :ENCRYPTED, 3
|
14
|
+
end
|
15
|
+
add_enum "google.identity.accesscontextmanager.type.OsType" do
|
16
|
+
value :OS_UNSPECIFIED, 0
|
17
|
+
value :DESKTOP_MAC, 1
|
18
|
+
value :DESKTOP_WINDOWS, 2
|
19
|
+
value :DESKTOP_LINUX, 3
|
20
|
+
value :DESKTOP_CHROME_OS, 6
|
21
|
+
value :ANDROID, 4
|
22
|
+
value :IOS, 5
|
23
|
+
end
|
24
|
+
add_enum "google.identity.accesscontextmanager.type.DeviceManagementLevel" do
|
25
|
+
value :MANAGEMENT_UNSPECIFIED, 0
|
26
|
+
value :NONE, 1
|
27
|
+
value :BASIC, 2
|
28
|
+
value :COMPLETE, 3
|
29
|
+
end
|
30
|
+
end
|
31
|
+
end
|
32
|
+
|
33
|
+
module Google
|
34
|
+
module Identity
|
35
|
+
module AccessContextManager
|
36
|
+
module Type
|
37
|
+
DeviceEncryptionStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.type.DeviceEncryptionStatus").enummodule
|
38
|
+
OsType = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.type.OsType").enummodule
|
39
|
+
DeviceManagementLevel = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.type.DeviceManagementLevel").enummodule
|
40
|
+
end
|
41
|
+
end
|
42
|
+
end
|
43
|
+
end
|
@@ -0,0 +1,182 @@
|
|
1
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
|
+
# source: google/identity/accesscontextmanager/v1/access_context_manager.proto
|
3
|
+
|
4
|
+
require 'google/protobuf'
|
5
|
+
|
6
|
+
require 'google/api/annotations_pb'
|
7
|
+
require 'google/api/client_pb'
|
8
|
+
require 'google/api/field_behavior_pb'
|
9
|
+
require 'google/api/resource_pb'
|
10
|
+
require 'google/identity/accesscontextmanager/v1/access_level_pb'
|
11
|
+
require 'google/identity/accesscontextmanager/v1/access_policy_pb'
|
12
|
+
require 'google/identity/accesscontextmanager/v1/gcp_user_access_binding_pb'
|
13
|
+
require 'google/identity/accesscontextmanager/v1/service_perimeter_pb'
|
14
|
+
require 'google/longrunning/operations_pb'
|
15
|
+
require 'google/protobuf/field_mask_pb'
|
16
|
+
Google::Protobuf::DescriptorPool.generated_pool.build do
|
17
|
+
add_file("google/identity/accesscontextmanager/v1/access_context_manager.proto", :syntax => :proto3) do
|
18
|
+
add_message "google.identity.accesscontextmanager.v1.ListAccessPoliciesRequest" do
|
19
|
+
optional :parent, :string, 1
|
20
|
+
optional :page_size, :int32, 2
|
21
|
+
optional :page_token, :string, 3
|
22
|
+
end
|
23
|
+
add_message "google.identity.accesscontextmanager.v1.ListAccessPoliciesResponse" do
|
24
|
+
repeated :access_policies, :message, 1, "google.identity.accesscontextmanager.v1.AccessPolicy"
|
25
|
+
optional :next_page_token, :string, 2
|
26
|
+
end
|
27
|
+
add_message "google.identity.accesscontextmanager.v1.GetAccessPolicyRequest" do
|
28
|
+
optional :name, :string, 1
|
29
|
+
end
|
30
|
+
add_message "google.identity.accesscontextmanager.v1.UpdateAccessPolicyRequest" do
|
31
|
+
optional :policy, :message, 1, "google.identity.accesscontextmanager.v1.AccessPolicy"
|
32
|
+
optional :update_mask, :message, 2, "google.protobuf.FieldMask"
|
33
|
+
end
|
34
|
+
add_message "google.identity.accesscontextmanager.v1.DeleteAccessPolicyRequest" do
|
35
|
+
optional :name, :string, 1
|
36
|
+
end
|
37
|
+
add_message "google.identity.accesscontextmanager.v1.ListAccessLevelsRequest" do
|
38
|
+
optional :parent, :string, 1
|
39
|
+
optional :page_size, :int32, 2
|
40
|
+
optional :page_token, :string, 3
|
41
|
+
optional :access_level_format, :enum, 4, "google.identity.accesscontextmanager.v1.LevelFormat"
|
42
|
+
end
|
43
|
+
add_message "google.identity.accesscontextmanager.v1.ListAccessLevelsResponse" do
|
44
|
+
repeated :access_levels, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
|
45
|
+
optional :next_page_token, :string, 2
|
46
|
+
end
|
47
|
+
add_message "google.identity.accesscontextmanager.v1.GetAccessLevelRequest" do
|
48
|
+
optional :name, :string, 1
|
49
|
+
optional :access_level_format, :enum, 2, "google.identity.accesscontextmanager.v1.LevelFormat"
|
50
|
+
end
|
51
|
+
add_message "google.identity.accesscontextmanager.v1.CreateAccessLevelRequest" do
|
52
|
+
optional :parent, :string, 1
|
53
|
+
optional :access_level, :message, 2, "google.identity.accesscontextmanager.v1.AccessLevel"
|
54
|
+
end
|
55
|
+
add_message "google.identity.accesscontextmanager.v1.UpdateAccessLevelRequest" do
|
56
|
+
optional :access_level, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
|
57
|
+
optional :update_mask, :message, 2, "google.protobuf.FieldMask"
|
58
|
+
end
|
59
|
+
add_message "google.identity.accesscontextmanager.v1.DeleteAccessLevelRequest" do
|
60
|
+
optional :name, :string, 1
|
61
|
+
end
|
62
|
+
add_message "google.identity.accesscontextmanager.v1.ReplaceAccessLevelsRequest" do
|
63
|
+
optional :parent, :string, 1
|
64
|
+
repeated :access_levels, :message, 2, "google.identity.accesscontextmanager.v1.AccessLevel"
|
65
|
+
optional :etag, :string, 4
|
66
|
+
end
|
67
|
+
add_message "google.identity.accesscontextmanager.v1.ReplaceAccessLevelsResponse" do
|
68
|
+
repeated :access_levels, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
|
69
|
+
end
|
70
|
+
add_message "google.identity.accesscontextmanager.v1.ListServicePerimetersRequest" do
|
71
|
+
optional :parent, :string, 1
|
72
|
+
optional :page_size, :int32, 2
|
73
|
+
optional :page_token, :string, 3
|
74
|
+
end
|
75
|
+
add_message "google.identity.accesscontextmanager.v1.ListServicePerimetersResponse" do
|
76
|
+
repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
|
77
|
+
optional :next_page_token, :string, 2
|
78
|
+
end
|
79
|
+
add_message "google.identity.accesscontextmanager.v1.GetServicePerimeterRequest" do
|
80
|
+
optional :name, :string, 1
|
81
|
+
end
|
82
|
+
add_message "google.identity.accesscontextmanager.v1.CreateServicePerimeterRequest" do
|
83
|
+
optional :parent, :string, 1
|
84
|
+
optional :service_perimeter, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeter"
|
85
|
+
end
|
86
|
+
add_message "google.identity.accesscontextmanager.v1.UpdateServicePerimeterRequest" do
|
87
|
+
optional :service_perimeter, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
|
88
|
+
optional :update_mask, :message, 2, "google.protobuf.FieldMask"
|
89
|
+
end
|
90
|
+
add_message "google.identity.accesscontextmanager.v1.DeleteServicePerimeterRequest" do
|
91
|
+
optional :name, :string, 1
|
92
|
+
end
|
93
|
+
add_message "google.identity.accesscontextmanager.v1.ReplaceServicePerimetersRequest" do
|
94
|
+
optional :parent, :string, 1
|
95
|
+
repeated :service_perimeters, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeter"
|
96
|
+
optional :etag, :string, 3
|
97
|
+
end
|
98
|
+
add_message "google.identity.accesscontextmanager.v1.ReplaceServicePerimetersResponse" do
|
99
|
+
repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
|
100
|
+
end
|
101
|
+
add_message "google.identity.accesscontextmanager.v1.CommitServicePerimetersRequest" do
|
102
|
+
optional :parent, :string, 1
|
103
|
+
optional :etag, :string, 2
|
104
|
+
end
|
105
|
+
add_message "google.identity.accesscontextmanager.v1.CommitServicePerimetersResponse" do
|
106
|
+
repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
|
107
|
+
end
|
108
|
+
add_message "google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsRequest" do
|
109
|
+
optional :parent, :string, 1
|
110
|
+
optional :page_size, :int32, 2
|
111
|
+
optional :page_token, :string, 3
|
112
|
+
end
|
113
|
+
add_message "google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsResponse" do
|
114
|
+
repeated :gcp_user_access_bindings, :message, 1, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
|
115
|
+
optional :next_page_token, :string, 2
|
116
|
+
end
|
117
|
+
add_message "google.identity.accesscontextmanager.v1.GetGcpUserAccessBindingRequest" do
|
118
|
+
optional :name, :string, 1
|
119
|
+
end
|
120
|
+
add_message "google.identity.accesscontextmanager.v1.CreateGcpUserAccessBindingRequest" do
|
121
|
+
optional :parent, :string, 1
|
122
|
+
optional :gcp_user_access_binding, :message, 2, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
|
123
|
+
end
|
124
|
+
add_message "google.identity.accesscontextmanager.v1.UpdateGcpUserAccessBindingRequest" do
|
125
|
+
optional :gcp_user_access_binding, :message, 1, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
|
126
|
+
optional :update_mask, :message, 2, "google.protobuf.FieldMask"
|
127
|
+
end
|
128
|
+
add_message "google.identity.accesscontextmanager.v1.DeleteGcpUserAccessBindingRequest" do
|
129
|
+
optional :name, :string, 1
|
130
|
+
end
|
131
|
+
add_message "google.identity.accesscontextmanager.v1.GcpUserAccessBindingOperationMetadata" do
|
132
|
+
end
|
133
|
+
add_message "google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata" do
|
134
|
+
end
|
135
|
+
add_enum "google.identity.accesscontextmanager.v1.LevelFormat" do
|
136
|
+
value :LEVEL_FORMAT_UNSPECIFIED, 0
|
137
|
+
value :AS_DEFINED, 1
|
138
|
+
value :CEL, 2
|
139
|
+
end
|
140
|
+
end
|
141
|
+
end
|
142
|
+
|
143
|
+
module Google
|
144
|
+
module Identity
|
145
|
+
module AccessContextManager
|
146
|
+
module V1
|
147
|
+
ListAccessPoliciesRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessPoliciesRequest").msgclass
|
148
|
+
ListAccessPoliciesResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessPoliciesResponse").msgclass
|
149
|
+
GetAccessPolicyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetAccessPolicyRequest").msgclass
|
150
|
+
UpdateAccessPolicyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateAccessPolicyRequest").msgclass
|
151
|
+
DeleteAccessPolicyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteAccessPolicyRequest").msgclass
|
152
|
+
ListAccessLevelsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessLevelsRequest").msgclass
|
153
|
+
ListAccessLevelsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessLevelsResponse").msgclass
|
154
|
+
GetAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetAccessLevelRequest").msgclass
|
155
|
+
CreateAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CreateAccessLevelRequest").msgclass
|
156
|
+
UpdateAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateAccessLevelRequest").msgclass
|
157
|
+
DeleteAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteAccessLevelRequest").msgclass
|
158
|
+
ReplaceAccessLevelsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceAccessLevelsRequest").msgclass
|
159
|
+
ReplaceAccessLevelsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceAccessLevelsResponse").msgclass
|
160
|
+
ListServicePerimetersRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListServicePerimetersRequest").msgclass
|
161
|
+
ListServicePerimetersResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListServicePerimetersResponse").msgclass
|
162
|
+
GetServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetServicePerimeterRequest").msgclass
|
163
|
+
CreateServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CreateServicePerimeterRequest").msgclass
|
164
|
+
UpdateServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateServicePerimeterRequest").msgclass
|
165
|
+
DeleteServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteServicePerimeterRequest").msgclass
|
166
|
+
ReplaceServicePerimetersRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceServicePerimetersRequest").msgclass
|
167
|
+
ReplaceServicePerimetersResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceServicePerimetersResponse").msgclass
|
168
|
+
CommitServicePerimetersRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CommitServicePerimetersRequest").msgclass
|
169
|
+
CommitServicePerimetersResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CommitServicePerimetersResponse").msgclass
|
170
|
+
ListGcpUserAccessBindingsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsRequest").msgclass
|
171
|
+
ListGcpUserAccessBindingsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsResponse").msgclass
|
172
|
+
GetGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetGcpUserAccessBindingRequest").msgclass
|
173
|
+
CreateGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CreateGcpUserAccessBindingRequest").msgclass
|
174
|
+
UpdateGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateGcpUserAccessBindingRequest").msgclass
|
175
|
+
DeleteGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteGcpUserAccessBindingRequest").msgclass
|
176
|
+
GcpUserAccessBindingOperationMetadata = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GcpUserAccessBindingOperationMetadata").msgclass
|
177
|
+
AccessContextManagerOperationMetadata = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata").msgclass
|
178
|
+
LevelFormat = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.LevelFormat").enummodule
|
179
|
+
end
|
180
|
+
end
|
181
|
+
end
|
182
|
+
end
|