google-identity-access_context_manager-v1 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.yardopts +12 -0
- data/AUTHENTICATION.md +167 -0
- data/LICENSE.md +201 -0
- data/README.md +139 -0
- data/lib/google/identity/access_context_manager/v1/access_context_manager/client.rb +2358 -0
- data/lib/google/identity/access_context_manager/v1/access_context_manager/credentials.rb +47 -0
- data/lib/google/identity/access_context_manager/v1/access_context_manager/operations.rb +664 -0
- data/lib/google/identity/access_context_manager/v1/access_context_manager/paths.rb +112 -0
- data/lib/google/identity/access_context_manager/v1/access_context_manager.rb +60 -0
- data/lib/google/identity/access_context_manager/v1/version.rb +28 -0
- data/lib/google/identity/access_context_manager/v1.rb +38 -0
- data/lib/google/identity/accesscontextmanager/type/device_resources_pb.rb +43 -0
- data/lib/google/identity/accesscontextmanager/v1/access_context_manager_pb.rb +182 -0
- data/lib/google/identity/accesscontextmanager/v1/access_context_manager_services_pb.rb +224 -0
- data/lib/google/identity/accesscontextmanager/v1/access_level_pb.rb +73 -0
- data/lib/google/identity/accesscontextmanager/v1/access_policy_pb.rb +30 -0
- data/lib/google/identity/accesscontextmanager/v1/gcp_user_access_binding_pb.rb +27 -0
- data/lib/google/identity/accesscontextmanager/v1/service_perimeter_pb.rb +109 -0
- data/lib/google-identity-access_context_manager-v1.rb +21 -0
- data/proto_docs/README.md +4 -0
- data/proto_docs/google/api/field_behavior.rb +71 -0
- data/proto_docs/google/api/resource.rb +283 -0
- data/proto_docs/google/identity/accesscontextmanager/type/device_resources.rb +84 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/access_context_manager.rb +539 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/access_level.rb +197 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/access_policy.rb +60 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/gcp_user_access_binding.rb +55 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/service_perimeter.rb +484 -0
- data/proto_docs/google/longrunning/operations.rb +164 -0
- data/proto_docs/google/protobuf/any.rb +141 -0
- data/proto_docs/google/protobuf/duration.rb +98 -0
- data/proto_docs/google/protobuf/empty.rb +36 -0
- data/proto_docs/google/protobuf/field_mask.rb +229 -0
- data/proto_docs/google/protobuf/timestamp.rb +129 -0
- data/proto_docs/google/rpc/status.rb +46 -0
- data/proto_docs/google/type/expr.rb +75 -0
- metadata +228 -0
@@ -0,0 +1,112 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2021 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Identity
|
22
|
+
module AccessContextManager
|
23
|
+
module V1
|
24
|
+
module AccessContextManager
|
25
|
+
# Path helper methods for the AccessContextManager API.
|
26
|
+
module Paths
|
27
|
+
##
|
28
|
+
# Create a fully-qualified AccessLevel resource string.
|
29
|
+
#
|
30
|
+
# The resource will be in the following format:
|
31
|
+
#
|
32
|
+
# `accessPolicies/{access_policy}/accessLevels/{access_level}`
|
33
|
+
#
|
34
|
+
# @param access_policy [String]
|
35
|
+
# @param access_level [String]
|
36
|
+
#
|
37
|
+
# @return [::String]
|
38
|
+
def access_level_path access_policy:, access_level:
|
39
|
+
raise ::ArgumentError, "access_policy cannot contain /" if access_policy.to_s.include? "/"
|
40
|
+
|
41
|
+
"accessPolicies/#{access_policy}/accessLevels/#{access_level}"
|
42
|
+
end
|
43
|
+
|
44
|
+
##
|
45
|
+
# Create a fully-qualified AccessPolicy resource string.
|
46
|
+
#
|
47
|
+
# The resource will be in the following format:
|
48
|
+
#
|
49
|
+
# `accessPolicies/{access_policy}`
|
50
|
+
#
|
51
|
+
# @param access_policy [String]
|
52
|
+
#
|
53
|
+
# @return [::String]
|
54
|
+
def access_policy_path access_policy:
|
55
|
+
"accessPolicies/#{access_policy}"
|
56
|
+
end
|
57
|
+
|
58
|
+
##
|
59
|
+
# Create a fully-qualified GcpUserAccessBinding resource string.
|
60
|
+
#
|
61
|
+
# The resource will be in the following format:
|
62
|
+
#
|
63
|
+
# `organizations/{organization}/gcpUserAccessBindings/{gcp_user_access_binding}`
|
64
|
+
#
|
65
|
+
# @param organization [String]
|
66
|
+
# @param gcp_user_access_binding [String]
|
67
|
+
#
|
68
|
+
# @return [::String]
|
69
|
+
def gcp_user_access_binding_path organization:, gcp_user_access_binding:
|
70
|
+
raise ::ArgumentError, "organization cannot contain /" if organization.to_s.include? "/"
|
71
|
+
|
72
|
+
"organizations/#{organization}/gcpUserAccessBindings/#{gcp_user_access_binding}"
|
73
|
+
end
|
74
|
+
|
75
|
+
##
|
76
|
+
# Create a fully-qualified Organization resource string.
|
77
|
+
#
|
78
|
+
# The resource will be in the following format:
|
79
|
+
#
|
80
|
+
# `organizations/{organization}`
|
81
|
+
#
|
82
|
+
# @param organization [String]
|
83
|
+
#
|
84
|
+
# @return [::String]
|
85
|
+
def organization_path organization:
|
86
|
+
"organizations/#{organization}"
|
87
|
+
end
|
88
|
+
|
89
|
+
##
|
90
|
+
# Create a fully-qualified ServicePerimeter resource string.
|
91
|
+
#
|
92
|
+
# The resource will be in the following format:
|
93
|
+
#
|
94
|
+
# `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`
|
95
|
+
#
|
96
|
+
# @param access_policy [String]
|
97
|
+
# @param service_perimeter [String]
|
98
|
+
#
|
99
|
+
# @return [::String]
|
100
|
+
def service_perimeter_path access_policy:, service_perimeter:
|
101
|
+
raise ::ArgumentError, "access_policy cannot contain /" if access_policy.to_s.include? "/"
|
102
|
+
|
103
|
+
"accessPolicies/#{access_policy}/servicePerimeters/#{service_perimeter}"
|
104
|
+
end
|
105
|
+
|
106
|
+
extend self
|
107
|
+
end
|
108
|
+
end
|
109
|
+
end
|
110
|
+
end
|
111
|
+
end
|
112
|
+
end
|
@@ -0,0 +1,60 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2021 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
require "gapic/common"
|
20
|
+
require "gapic/config"
|
21
|
+
require "gapic/config/method"
|
22
|
+
|
23
|
+
require "google/identity/access_context_manager/v1/version"
|
24
|
+
|
25
|
+
require "google/identity/access_context_manager/v1/access_context_manager/credentials"
|
26
|
+
require "google/identity/access_context_manager/v1/access_context_manager/paths"
|
27
|
+
require "google/identity/access_context_manager/v1/access_context_manager/operations"
|
28
|
+
require "google/identity/access_context_manager/v1/access_context_manager/client"
|
29
|
+
|
30
|
+
module Google
|
31
|
+
module Identity
|
32
|
+
module AccessContextManager
|
33
|
+
module V1
|
34
|
+
##
|
35
|
+
# API for setting [Access Levels]
|
36
|
+
# [google.identity.accesscontextmanager.v1.AccessLevel] and [Service
|
37
|
+
# Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
|
38
|
+
# for Google Cloud Projects. Each organization has one [AccessPolicy]
|
39
|
+
# [google.identity.accesscontextmanager.v1.AccessPolicy] containing the
|
40
|
+
# [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel]
|
41
|
+
# and [Service Perimeters]
|
42
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeter]. This
|
43
|
+
# [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
|
44
|
+
# applicable to all resources in the organization.
|
45
|
+
# AccessPolicies
|
46
|
+
#
|
47
|
+
# To load this service and instantiate a client:
|
48
|
+
#
|
49
|
+
# require "google/identity/access_context_manager/v1/access_context_manager"
|
50
|
+
# client = ::Google::Identity::AccessContextManager::V1::AccessContextManager::Client.new
|
51
|
+
#
|
52
|
+
module AccessContextManager
|
53
|
+
end
|
54
|
+
end
|
55
|
+
end
|
56
|
+
end
|
57
|
+
end
|
58
|
+
|
59
|
+
helper_path = ::File.join __dir__, "access_context_manager", "helpers.rb"
|
60
|
+
require "google/identity/access_context_manager/v1/access_context_manager/helpers" if ::File.file? helper_path
|
@@ -0,0 +1,28 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2021 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Identity
|
22
|
+
module AccessContextManager
|
23
|
+
module V1
|
24
|
+
VERSION = "0.1.0"
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
@@ -0,0 +1,38 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2021 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
require "google/identity/access_context_manager/v1/access_context_manager"
|
20
|
+
require "google/identity/access_context_manager/v1/version"
|
21
|
+
|
22
|
+
module Google
|
23
|
+
module Identity
|
24
|
+
module AccessContextManager
|
25
|
+
##
|
26
|
+
# To load this package, including all its services, and instantiate a client:
|
27
|
+
#
|
28
|
+
# require "google/identity/access_context_manager/v1"
|
29
|
+
# client = ::Google::Identity::AccessContextManager::V1::AccessContextManager::Client.new
|
30
|
+
#
|
31
|
+
module V1
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
35
|
+
end
|
36
|
+
|
37
|
+
helper_path = ::File.join __dir__, "v1", "_helpers.rb"
|
38
|
+
require "google/identity/access_context_manager/v1/_helpers" if ::File.file? helper_path
|
@@ -0,0 +1,43 @@
|
|
1
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
|
+
# source: google/identity/accesscontextmanager/type/device_resources.proto
|
3
|
+
|
4
|
+
require 'google/protobuf'
|
5
|
+
|
6
|
+
require 'google/api/annotations_pb'
|
7
|
+
Google::Protobuf::DescriptorPool.generated_pool.build do
|
8
|
+
add_file("google/identity/accesscontextmanager/type/device_resources.proto", :syntax => :proto3) do
|
9
|
+
add_enum "google.identity.accesscontextmanager.type.DeviceEncryptionStatus" do
|
10
|
+
value :ENCRYPTION_UNSPECIFIED, 0
|
11
|
+
value :ENCRYPTION_UNSUPPORTED, 1
|
12
|
+
value :UNENCRYPTED, 2
|
13
|
+
value :ENCRYPTED, 3
|
14
|
+
end
|
15
|
+
add_enum "google.identity.accesscontextmanager.type.OsType" do
|
16
|
+
value :OS_UNSPECIFIED, 0
|
17
|
+
value :DESKTOP_MAC, 1
|
18
|
+
value :DESKTOP_WINDOWS, 2
|
19
|
+
value :DESKTOP_LINUX, 3
|
20
|
+
value :DESKTOP_CHROME_OS, 6
|
21
|
+
value :ANDROID, 4
|
22
|
+
value :IOS, 5
|
23
|
+
end
|
24
|
+
add_enum "google.identity.accesscontextmanager.type.DeviceManagementLevel" do
|
25
|
+
value :MANAGEMENT_UNSPECIFIED, 0
|
26
|
+
value :NONE, 1
|
27
|
+
value :BASIC, 2
|
28
|
+
value :COMPLETE, 3
|
29
|
+
end
|
30
|
+
end
|
31
|
+
end
|
32
|
+
|
33
|
+
module Google
|
34
|
+
module Identity
|
35
|
+
module AccessContextManager
|
36
|
+
module Type
|
37
|
+
DeviceEncryptionStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.type.DeviceEncryptionStatus").enummodule
|
38
|
+
OsType = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.type.OsType").enummodule
|
39
|
+
DeviceManagementLevel = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.type.DeviceManagementLevel").enummodule
|
40
|
+
end
|
41
|
+
end
|
42
|
+
end
|
43
|
+
end
|
@@ -0,0 +1,182 @@
|
|
1
|
+
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
|
+
# source: google/identity/accesscontextmanager/v1/access_context_manager.proto
|
3
|
+
|
4
|
+
require 'google/protobuf'
|
5
|
+
|
6
|
+
require 'google/api/annotations_pb'
|
7
|
+
require 'google/api/client_pb'
|
8
|
+
require 'google/api/field_behavior_pb'
|
9
|
+
require 'google/api/resource_pb'
|
10
|
+
require 'google/identity/accesscontextmanager/v1/access_level_pb'
|
11
|
+
require 'google/identity/accesscontextmanager/v1/access_policy_pb'
|
12
|
+
require 'google/identity/accesscontextmanager/v1/gcp_user_access_binding_pb'
|
13
|
+
require 'google/identity/accesscontextmanager/v1/service_perimeter_pb'
|
14
|
+
require 'google/longrunning/operations_pb'
|
15
|
+
require 'google/protobuf/field_mask_pb'
|
16
|
+
Google::Protobuf::DescriptorPool.generated_pool.build do
|
17
|
+
add_file("google/identity/accesscontextmanager/v1/access_context_manager.proto", :syntax => :proto3) do
|
18
|
+
add_message "google.identity.accesscontextmanager.v1.ListAccessPoliciesRequest" do
|
19
|
+
optional :parent, :string, 1
|
20
|
+
optional :page_size, :int32, 2
|
21
|
+
optional :page_token, :string, 3
|
22
|
+
end
|
23
|
+
add_message "google.identity.accesscontextmanager.v1.ListAccessPoliciesResponse" do
|
24
|
+
repeated :access_policies, :message, 1, "google.identity.accesscontextmanager.v1.AccessPolicy"
|
25
|
+
optional :next_page_token, :string, 2
|
26
|
+
end
|
27
|
+
add_message "google.identity.accesscontextmanager.v1.GetAccessPolicyRequest" do
|
28
|
+
optional :name, :string, 1
|
29
|
+
end
|
30
|
+
add_message "google.identity.accesscontextmanager.v1.UpdateAccessPolicyRequest" do
|
31
|
+
optional :policy, :message, 1, "google.identity.accesscontextmanager.v1.AccessPolicy"
|
32
|
+
optional :update_mask, :message, 2, "google.protobuf.FieldMask"
|
33
|
+
end
|
34
|
+
add_message "google.identity.accesscontextmanager.v1.DeleteAccessPolicyRequest" do
|
35
|
+
optional :name, :string, 1
|
36
|
+
end
|
37
|
+
add_message "google.identity.accesscontextmanager.v1.ListAccessLevelsRequest" do
|
38
|
+
optional :parent, :string, 1
|
39
|
+
optional :page_size, :int32, 2
|
40
|
+
optional :page_token, :string, 3
|
41
|
+
optional :access_level_format, :enum, 4, "google.identity.accesscontextmanager.v1.LevelFormat"
|
42
|
+
end
|
43
|
+
add_message "google.identity.accesscontextmanager.v1.ListAccessLevelsResponse" do
|
44
|
+
repeated :access_levels, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
|
45
|
+
optional :next_page_token, :string, 2
|
46
|
+
end
|
47
|
+
add_message "google.identity.accesscontextmanager.v1.GetAccessLevelRequest" do
|
48
|
+
optional :name, :string, 1
|
49
|
+
optional :access_level_format, :enum, 2, "google.identity.accesscontextmanager.v1.LevelFormat"
|
50
|
+
end
|
51
|
+
add_message "google.identity.accesscontextmanager.v1.CreateAccessLevelRequest" do
|
52
|
+
optional :parent, :string, 1
|
53
|
+
optional :access_level, :message, 2, "google.identity.accesscontextmanager.v1.AccessLevel"
|
54
|
+
end
|
55
|
+
add_message "google.identity.accesscontextmanager.v1.UpdateAccessLevelRequest" do
|
56
|
+
optional :access_level, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
|
57
|
+
optional :update_mask, :message, 2, "google.protobuf.FieldMask"
|
58
|
+
end
|
59
|
+
add_message "google.identity.accesscontextmanager.v1.DeleteAccessLevelRequest" do
|
60
|
+
optional :name, :string, 1
|
61
|
+
end
|
62
|
+
add_message "google.identity.accesscontextmanager.v1.ReplaceAccessLevelsRequest" do
|
63
|
+
optional :parent, :string, 1
|
64
|
+
repeated :access_levels, :message, 2, "google.identity.accesscontextmanager.v1.AccessLevel"
|
65
|
+
optional :etag, :string, 4
|
66
|
+
end
|
67
|
+
add_message "google.identity.accesscontextmanager.v1.ReplaceAccessLevelsResponse" do
|
68
|
+
repeated :access_levels, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
|
69
|
+
end
|
70
|
+
add_message "google.identity.accesscontextmanager.v1.ListServicePerimetersRequest" do
|
71
|
+
optional :parent, :string, 1
|
72
|
+
optional :page_size, :int32, 2
|
73
|
+
optional :page_token, :string, 3
|
74
|
+
end
|
75
|
+
add_message "google.identity.accesscontextmanager.v1.ListServicePerimetersResponse" do
|
76
|
+
repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
|
77
|
+
optional :next_page_token, :string, 2
|
78
|
+
end
|
79
|
+
add_message "google.identity.accesscontextmanager.v1.GetServicePerimeterRequest" do
|
80
|
+
optional :name, :string, 1
|
81
|
+
end
|
82
|
+
add_message "google.identity.accesscontextmanager.v1.CreateServicePerimeterRequest" do
|
83
|
+
optional :parent, :string, 1
|
84
|
+
optional :service_perimeter, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeter"
|
85
|
+
end
|
86
|
+
add_message "google.identity.accesscontextmanager.v1.UpdateServicePerimeterRequest" do
|
87
|
+
optional :service_perimeter, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
|
88
|
+
optional :update_mask, :message, 2, "google.protobuf.FieldMask"
|
89
|
+
end
|
90
|
+
add_message "google.identity.accesscontextmanager.v1.DeleteServicePerimeterRequest" do
|
91
|
+
optional :name, :string, 1
|
92
|
+
end
|
93
|
+
add_message "google.identity.accesscontextmanager.v1.ReplaceServicePerimetersRequest" do
|
94
|
+
optional :parent, :string, 1
|
95
|
+
repeated :service_perimeters, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeter"
|
96
|
+
optional :etag, :string, 3
|
97
|
+
end
|
98
|
+
add_message "google.identity.accesscontextmanager.v1.ReplaceServicePerimetersResponse" do
|
99
|
+
repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
|
100
|
+
end
|
101
|
+
add_message "google.identity.accesscontextmanager.v1.CommitServicePerimetersRequest" do
|
102
|
+
optional :parent, :string, 1
|
103
|
+
optional :etag, :string, 2
|
104
|
+
end
|
105
|
+
add_message "google.identity.accesscontextmanager.v1.CommitServicePerimetersResponse" do
|
106
|
+
repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
|
107
|
+
end
|
108
|
+
add_message "google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsRequest" do
|
109
|
+
optional :parent, :string, 1
|
110
|
+
optional :page_size, :int32, 2
|
111
|
+
optional :page_token, :string, 3
|
112
|
+
end
|
113
|
+
add_message "google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsResponse" do
|
114
|
+
repeated :gcp_user_access_bindings, :message, 1, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
|
115
|
+
optional :next_page_token, :string, 2
|
116
|
+
end
|
117
|
+
add_message "google.identity.accesscontextmanager.v1.GetGcpUserAccessBindingRequest" do
|
118
|
+
optional :name, :string, 1
|
119
|
+
end
|
120
|
+
add_message "google.identity.accesscontextmanager.v1.CreateGcpUserAccessBindingRequest" do
|
121
|
+
optional :parent, :string, 1
|
122
|
+
optional :gcp_user_access_binding, :message, 2, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
|
123
|
+
end
|
124
|
+
add_message "google.identity.accesscontextmanager.v1.UpdateGcpUserAccessBindingRequest" do
|
125
|
+
optional :gcp_user_access_binding, :message, 1, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
|
126
|
+
optional :update_mask, :message, 2, "google.protobuf.FieldMask"
|
127
|
+
end
|
128
|
+
add_message "google.identity.accesscontextmanager.v1.DeleteGcpUserAccessBindingRequest" do
|
129
|
+
optional :name, :string, 1
|
130
|
+
end
|
131
|
+
add_message "google.identity.accesscontextmanager.v1.GcpUserAccessBindingOperationMetadata" do
|
132
|
+
end
|
133
|
+
add_message "google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata" do
|
134
|
+
end
|
135
|
+
add_enum "google.identity.accesscontextmanager.v1.LevelFormat" do
|
136
|
+
value :LEVEL_FORMAT_UNSPECIFIED, 0
|
137
|
+
value :AS_DEFINED, 1
|
138
|
+
value :CEL, 2
|
139
|
+
end
|
140
|
+
end
|
141
|
+
end
|
142
|
+
|
143
|
+
module Google
|
144
|
+
module Identity
|
145
|
+
module AccessContextManager
|
146
|
+
module V1
|
147
|
+
ListAccessPoliciesRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessPoliciesRequest").msgclass
|
148
|
+
ListAccessPoliciesResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessPoliciesResponse").msgclass
|
149
|
+
GetAccessPolicyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetAccessPolicyRequest").msgclass
|
150
|
+
UpdateAccessPolicyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateAccessPolicyRequest").msgclass
|
151
|
+
DeleteAccessPolicyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteAccessPolicyRequest").msgclass
|
152
|
+
ListAccessLevelsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessLevelsRequest").msgclass
|
153
|
+
ListAccessLevelsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessLevelsResponse").msgclass
|
154
|
+
GetAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetAccessLevelRequest").msgclass
|
155
|
+
CreateAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CreateAccessLevelRequest").msgclass
|
156
|
+
UpdateAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateAccessLevelRequest").msgclass
|
157
|
+
DeleteAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteAccessLevelRequest").msgclass
|
158
|
+
ReplaceAccessLevelsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceAccessLevelsRequest").msgclass
|
159
|
+
ReplaceAccessLevelsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceAccessLevelsResponse").msgclass
|
160
|
+
ListServicePerimetersRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListServicePerimetersRequest").msgclass
|
161
|
+
ListServicePerimetersResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListServicePerimetersResponse").msgclass
|
162
|
+
GetServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetServicePerimeterRequest").msgclass
|
163
|
+
CreateServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CreateServicePerimeterRequest").msgclass
|
164
|
+
UpdateServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateServicePerimeterRequest").msgclass
|
165
|
+
DeleteServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteServicePerimeterRequest").msgclass
|
166
|
+
ReplaceServicePerimetersRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceServicePerimetersRequest").msgclass
|
167
|
+
ReplaceServicePerimetersResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceServicePerimetersResponse").msgclass
|
168
|
+
CommitServicePerimetersRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CommitServicePerimetersRequest").msgclass
|
169
|
+
CommitServicePerimetersResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CommitServicePerimetersResponse").msgclass
|
170
|
+
ListGcpUserAccessBindingsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsRequest").msgclass
|
171
|
+
ListGcpUserAccessBindingsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsResponse").msgclass
|
172
|
+
GetGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetGcpUserAccessBindingRequest").msgclass
|
173
|
+
CreateGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CreateGcpUserAccessBindingRequest").msgclass
|
174
|
+
UpdateGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateGcpUserAccessBindingRequest").msgclass
|
175
|
+
DeleteGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteGcpUserAccessBindingRequest").msgclass
|
176
|
+
GcpUserAccessBindingOperationMetadata = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GcpUserAccessBindingOperationMetadata").msgclass
|
177
|
+
AccessContextManagerOperationMetadata = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata").msgclass
|
178
|
+
LevelFormat = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.LevelFormat").enummodule
|
179
|
+
end
|
180
|
+
end
|
181
|
+
end
|
182
|
+
end
|