google-identity-access_context_manager-v1 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (38) hide show
  1. checksums.yaml +7 -0
  2. data/.yardopts +12 -0
  3. data/AUTHENTICATION.md +167 -0
  4. data/LICENSE.md +201 -0
  5. data/README.md +139 -0
  6. data/lib/google/identity/access_context_manager/v1/access_context_manager/client.rb +2358 -0
  7. data/lib/google/identity/access_context_manager/v1/access_context_manager/credentials.rb +47 -0
  8. data/lib/google/identity/access_context_manager/v1/access_context_manager/operations.rb +664 -0
  9. data/lib/google/identity/access_context_manager/v1/access_context_manager/paths.rb +112 -0
  10. data/lib/google/identity/access_context_manager/v1/access_context_manager.rb +60 -0
  11. data/lib/google/identity/access_context_manager/v1/version.rb +28 -0
  12. data/lib/google/identity/access_context_manager/v1.rb +38 -0
  13. data/lib/google/identity/accesscontextmanager/type/device_resources_pb.rb +43 -0
  14. data/lib/google/identity/accesscontextmanager/v1/access_context_manager_pb.rb +182 -0
  15. data/lib/google/identity/accesscontextmanager/v1/access_context_manager_services_pb.rb +224 -0
  16. data/lib/google/identity/accesscontextmanager/v1/access_level_pb.rb +73 -0
  17. data/lib/google/identity/accesscontextmanager/v1/access_policy_pb.rb +30 -0
  18. data/lib/google/identity/accesscontextmanager/v1/gcp_user_access_binding_pb.rb +27 -0
  19. data/lib/google/identity/accesscontextmanager/v1/service_perimeter_pb.rb +109 -0
  20. data/lib/google-identity-access_context_manager-v1.rb +21 -0
  21. data/proto_docs/README.md +4 -0
  22. data/proto_docs/google/api/field_behavior.rb +71 -0
  23. data/proto_docs/google/api/resource.rb +283 -0
  24. data/proto_docs/google/identity/accesscontextmanager/type/device_resources.rb +84 -0
  25. data/proto_docs/google/identity/accesscontextmanager/v1/access_context_manager.rb +539 -0
  26. data/proto_docs/google/identity/accesscontextmanager/v1/access_level.rb +197 -0
  27. data/proto_docs/google/identity/accesscontextmanager/v1/access_policy.rb +60 -0
  28. data/proto_docs/google/identity/accesscontextmanager/v1/gcp_user_access_binding.rb +55 -0
  29. data/proto_docs/google/identity/accesscontextmanager/v1/service_perimeter.rb +484 -0
  30. data/proto_docs/google/longrunning/operations.rb +164 -0
  31. data/proto_docs/google/protobuf/any.rb +141 -0
  32. data/proto_docs/google/protobuf/duration.rb +98 -0
  33. data/proto_docs/google/protobuf/empty.rb +36 -0
  34. data/proto_docs/google/protobuf/field_mask.rb +229 -0
  35. data/proto_docs/google/protobuf/timestamp.rb +129 -0
  36. data/proto_docs/google/rpc/status.rb +46 -0
  37. data/proto_docs/google/type/expr.rb +75 -0
  38. metadata +228 -0
@@ -0,0 +1,112 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2021 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+
20
+ module Google
21
+ module Identity
22
+ module AccessContextManager
23
+ module V1
24
+ module AccessContextManager
25
+ # Path helper methods for the AccessContextManager API.
26
+ module Paths
27
+ ##
28
+ # Create a fully-qualified AccessLevel resource string.
29
+ #
30
+ # The resource will be in the following format:
31
+ #
32
+ # `accessPolicies/{access_policy}/accessLevels/{access_level}`
33
+ #
34
+ # @param access_policy [String]
35
+ # @param access_level [String]
36
+ #
37
+ # @return [::String]
38
+ def access_level_path access_policy:, access_level:
39
+ raise ::ArgumentError, "access_policy cannot contain /" if access_policy.to_s.include? "/"
40
+
41
+ "accessPolicies/#{access_policy}/accessLevels/#{access_level}"
42
+ end
43
+
44
+ ##
45
+ # Create a fully-qualified AccessPolicy resource string.
46
+ #
47
+ # The resource will be in the following format:
48
+ #
49
+ # `accessPolicies/{access_policy}`
50
+ #
51
+ # @param access_policy [String]
52
+ #
53
+ # @return [::String]
54
+ def access_policy_path access_policy:
55
+ "accessPolicies/#{access_policy}"
56
+ end
57
+
58
+ ##
59
+ # Create a fully-qualified GcpUserAccessBinding resource string.
60
+ #
61
+ # The resource will be in the following format:
62
+ #
63
+ # `organizations/{organization}/gcpUserAccessBindings/{gcp_user_access_binding}`
64
+ #
65
+ # @param organization [String]
66
+ # @param gcp_user_access_binding [String]
67
+ #
68
+ # @return [::String]
69
+ def gcp_user_access_binding_path organization:, gcp_user_access_binding:
70
+ raise ::ArgumentError, "organization cannot contain /" if organization.to_s.include? "/"
71
+
72
+ "organizations/#{organization}/gcpUserAccessBindings/#{gcp_user_access_binding}"
73
+ end
74
+
75
+ ##
76
+ # Create a fully-qualified Organization resource string.
77
+ #
78
+ # The resource will be in the following format:
79
+ #
80
+ # `organizations/{organization}`
81
+ #
82
+ # @param organization [String]
83
+ #
84
+ # @return [::String]
85
+ def organization_path organization:
86
+ "organizations/#{organization}"
87
+ end
88
+
89
+ ##
90
+ # Create a fully-qualified ServicePerimeter resource string.
91
+ #
92
+ # The resource will be in the following format:
93
+ #
94
+ # `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`
95
+ #
96
+ # @param access_policy [String]
97
+ # @param service_perimeter [String]
98
+ #
99
+ # @return [::String]
100
+ def service_perimeter_path access_policy:, service_perimeter:
101
+ raise ::ArgumentError, "access_policy cannot contain /" if access_policy.to_s.include? "/"
102
+
103
+ "accessPolicies/#{access_policy}/servicePerimeters/#{service_perimeter}"
104
+ end
105
+
106
+ extend self
107
+ end
108
+ end
109
+ end
110
+ end
111
+ end
112
+ end
@@ -0,0 +1,60 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2021 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+ require "gapic/common"
20
+ require "gapic/config"
21
+ require "gapic/config/method"
22
+
23
+ require "google/identity/access_context_manager/v1/version"
24
+
25
+ require "google/identity/access_context_manager/v1/access_context_manager/credentials"
26
+ require "google/identity/access_context_manager/v1/access_context_manager/paths"
27
+ require "google/identity/access_context_manager/v1/access_context_manager/operations"
28
+ require "google/identity/access_context_manager/v1/access_context_manager/client"
29
+
30
+ module Google
31
+ module Identity
32
+ module AccessContextManager
33
+ module V1
34
+ ##
35
+ # API for setting [Access Levels]
36
+ # [google.identity.accesscontextmanager.v1.AccessLevel] and [Service
37
+ # Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
38
+ # for Google Cloud Projects. Each organization has one [AccessPolicy]
39
+ # [google.identity.accesscontextmanager.v1.AccessPolicy] containing the
40
+ # [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel]
41
+ # and [Service Perimeters]
42
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter]. This
43
+ # [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
44
+ # applicable to all resources in the organization.
45
+ # AccessPolicies
46
+ #
47
+ # To load this service and instantiate a client:
48
+ #
49
+ # require "google/identity/access_context_manager/v1/access_context_manager"
50
+ # client = ::Google::Identity::AccessContextManager::V1::AccessContextManager::Client.new
51
+ #
52
+ module AccessContextManager
53
+ end
54
+ end
55
+ end
56
+ end
57
+ end
58
+
59
+ helper_path = ::File.join __dir__, "access_context_manager", "helpers.rb"
60
+ require "google/identity/access_context_manager/v1/access_context_manager/helpers" if ::File.file? helper_path
@@ -0,0 +1,28 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2021 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+
20
+ module Google
21
+ module Identity
22
+ module AccessContextManager
23
+ module V1
24
+ VERSION = "0.1.0"
25
+ end
26
+ end
27
+ end
28
+ end
@@ -0,0 +1,38 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2021 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+ require "google/identity/access_context_manager/v1/access_context_manager"
20
+ require "google/identity/access_context_manager/v1/version"
21
+
22
+ module Google
23
+ module Identity
24
+ module AccessContextManager
25
+ ##
26
+ # To load this package, including all its services, and instantiate a client:
27
+ #
28
+ # require "google/identity/access_context_manager/v1"
29
+ # client = ::Google::Identity::AccessContextManager::V1::AccessContextManager::Client.new
30
+ #
31
+ module V1
32
+ end
33
+ end
34
+ end
35
+ end
36
+
37
+ helper_path = ::File.join __dir__, "v1", "_helpers.rb"
38
+ require "google/identity/access_context_manager/v1/_helpers" if ::File.file? helper_path
@@ -0,0 +1,43 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # source: google/identity/accesscontextmanager/type/device_resources.proto
3
+
4
+ require 'google/protobuf'
5
+
6
+ require 'google/api/annotations_pb'
7
+ Google::Protobuf::DescriptorPool.generated_pool.build do
8
+ add_file("google/identity/accesscontextmanager/type/device_resources.proto", :syntax => :proto3) do
9
+ add_enum "google.identity.accesscontextmanager.type.DeviceEncryptionStatus" do
10
+ value :ENCRYPTION_UNSPECIFIED, 0
11
+ value :ENCRYPTION_UNSUPPORTED, 1
12
+ value :UNENCRYPTED, 2
13
+ value :ENCRYPTED, 3
14
+ end
15
+ add_enum "google.identity.accesscontextmanager.type.OsType" do
16
+ value :OS_UNSPECIFIED, 0
17
+ value :DESKTOP_MAC, 1
18
+ value :DESKTOP_WINDOWS, 2
19
+ value :DESKTOP_LINUX, 3
20
+ value :DESKTOP_CHROME_OS, 6
21
+ value :ANDROID, 4
22
+ value :IOS, 5
23
+ end
24
+ add_enum "google.identity.accesscontextmanager.type.DeviceManagementLevel" do
25
+ value :MANAGEMENT_UNSPECIFIED, 0
26
+ value :NONE, 1
27
+ value :BASIC, 2
28
+ value :COMPLETE, 3
29
+ end
30
+ end
31
+ end
32
+
33
+ module Google
34
+ module Identity
35
+ module AccessContextManager
36
+ module Type
37
+ DeviceEncryptionStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.type.DeviceEncryptionStatus").enummodule
38
+ OsType = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.type.OsType").enummodule
39
+ DeviceManagementLevel = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.type.DeviceManagementLevel").enummodule
40
+ end
41
+ end
42
+ end
43
+ end
@@ -0,0 +1,182 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # source: google/identity/accesscontextmanager/v1/access_context_manager.proto
3
+
4
+ require 'google/protobuf'
5
+
6
+ require 'google/api/annotations_pb'
7
+ require 'google/api/client_pb'
8
+ require 'google/api/field_behavior_pb'
9
+ require 'google/api/resource_pb'
10
+ require 'google/identity/accesscontextmanager/v1/access_level_pb'
11
+ require 'google/identity/accesscontextmanager/v1/access_policy_pb'
12
+ require 'google/identity/accesscontextmanager/v1/gcp_user_access_binding_pb'
13
+ require 'google/identity/accesscontextmanager/v1/service_perimeter_pb'
14
+ require 'google/longrunning/operations_pb'
15
+ require 'google/protobuf/field_mask_pb'
16
+ Google::Protobuf::DescriptorPool.generated_pool.build do
17
+ add_file("google/identity/accesscontextmanager/v1/access_context_manager.proto", :syntax => :proto3) do
18
+ add_message "google.identity.accesscontextmanager.v1.ListAccessPoliciesRequest" do
19
+ optional :parent, :string, 1
20
+ optional :page_size, :int32, 2
21
+ optional :page_token, :string, 3
22
+ end
23
+ add_message "google.identity.accesscontextmanager.v1.ListAccessPoliciesResponse" do
24
+ repeated :access_policies, :message, 1, "google.identity.accesscontextmanager.v1.AccessPolicy"
25
+ optional :next_page_token, :string, 2
26
+ end
27
+ add_message "google.identity.accesscontextmanager.v1.GetAccessPolicyRequest" do
28
+ optional :name, :string, 1
29
+ end
30
+ add_message "google.identity.accesscontextmanager.v1.UpdateAccessPolicyRequest" do
31
+ optional :policy, :message, 1, "google.identity.accesscontextmanager.v1.AccessPolicy"
32
+ optional :update_mask, :message, 2, "google.protobuf.FieldMask"
33
+ end
34
+ add_message "google.identity.accesscontextmanager.v1.DeleteAccessPolicyRequest" do
35
+ optional :name, :string, 1
36
+ end
37
+ add_message "google.identity.accesscontextmanager.v1.ListAccessLevelsRequest" do
38
+ optional :parent, :string, 1
39
+ optional :page_size, :int32, 2
40
+ optional :page_token, :string, 3
41
+ optional :access_level_format, :enum, 4, "google.identity.accesscontextmanager.v1.LevelFormat"
42
+ end
43
+ add_message "google.identity.accesscontextmanager.v1.ListAccessLevelsResponse" do
44
+ repeated :access_levels, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
45
+ optional :next_page_token, :string, 2
46
+ end
47
+ add_message "google.identity.accesscontextmanager.v1.GetAccessLevelRequest" do
48
+ optional :name, :string, 1
49
+ optional :access_level_format, :enum, 2, "google.identity.accesscontextmanager.v1.LevelFormat"
50
+ end
51
+ add_message "google.identity.accesscontextmanager.v1.CreateAccessLevelRequest" do
52
+ optional :parent, :string, 1
53
+ optional :access_level, :message, 2, "google.identity.accesscontextmanager.v1.AccessLevel"
54
+ end
55
+ add_message "google.identity.accesscontextmanager.v1.UpdateAccessLevelRequest" do
56
+ optional :access_level, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
57
+ optional :update_mask, :message, 2, "google.protobuf.FieldMask"
58
+ end
59
+ add_message "google.identity.accesscontextmanager.v1.DeleteAccessLevelRequest" do
60
+ optional :name, :string, 1
61
+ end
62
+ add_message "google.identity.accesscontextmanager.v1.ReplaceAccessLevelsRequest" do
63
+ optional :parent, :string, 1
64
+ repeated :access_levels, :message, 2, "google.identity.accesscontextmanager.v1.AccessLevel"
65
+ optional :etag, :string, 4
66
+ end
67
+ add_message "google.identity.accesscontextmanager.v1.ReplaceAccessLevelsResponse" do
68
+ repeated :access_levels, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
69
+ end
70
+ add_message "google.identity.accesscontextmanager.v1.ListServicePerimetersRequest" do
71
+ optional :parent, :string, 1
72
+ optional :page_size, :int32, 2
73
+ optional :page_token, :string, 3
74
+ end
75
+ add_message "google.identity.accesscontextmanager.v1.ListServicePerimetersResponse" do
76
+ repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
77
+ optional :next_page_token, :string, 2
78
+ end
79
+ add_message "google.identity.accesscontextmanager.v1.GetServicePerimeterRequest" do
80
+ optional :name, :string, 1
81
+ end
82
+ add_message "google.identity.accesscontextmanager.v1.CreateServicePerimeterRequest" do
83
+ optional :parent, :string, 1
84
+ optional :service_perimeter, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeter"
85
+ end
86
+ add_message "google.identity.accesscontextmanager.v1.UpdateServicePerimeterRequest" do
87
+ optional :service_perimeter, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
88
+ optional :update_mask, :message, 2, "google.protobuf.FieldMask"
89
+ end
90
+ add_message "google.identity.accesscontextmanager.v1.DeleteServicePerimeterRequest" do
91
+ optional :name, :string, 1
92
+ end
93
+ add_message "google.identity.accesscontextmanager.v1.ReplaceServicePerimetersRequest" do
94
+ optional :parent, :string, 1
95
+ repeated :service_perimeters, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeter"
96
+ optional :etag, :string, 3
97
+ end
98
+ add_message "google.identity.accesscontextmanager.v1.ReplaceServicePerimetersResponse" do
99
+ repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
100
+ end
101
+ add_message "google.identity.accesscontextmanager.v1.CommitServicePerimetersRequest" do
102
+ optional :parent, :string, 1
103
+ optional :etag, :string, 2
104
+ end
105
+ add_message "google.identity.accesscontextmanager.v1.CommitServicePerimetersResponse" do
106
+ repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
107
+ end
108
+ add_message "google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsRequest" do
109
+ optional :parent, :string, 1
110
+ optional :page_size, :int32, 2
111
+ optional :page_token, :string, 3
112
+ end
113
+ add_message "google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsResponse" do
114
+ repeated :gcp_user_access_bindings, :message, 1, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
115
+ optional :next_page_token, :string, 2
116
+ end
117
+ add_message "google.identity.accesscontextmanager.v1.GetGcpUserAccessBindingRequest" do
118
+ optional :name, :string, 1
119
+ end
120
+ add_message "google.identity.accesscontextmanager.v1.CreateGcpUserAccessBindingRequest" do
121
+ optional :parent, :string, 1
122
+ optional :gcp_user_access_binding, :message, 2, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
123
+ end
124
+ add_message "google.identity.accesscontextmanager.v1.UpdateGcpUserAccessBindingRequest" do
125
+ optional :gcp_user_access_binding, :message, 1, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
126
+ optional :update_mask, :message, 2, "google.protobuf.FieldMask"
127
+ end
128
+ add_message "google.identity.accesscontextmanager.v1.DeleteGcpUserAccessBindingRequest" do
129
+ optional :name, :string, 1
130
+ end
131
+ add_message "google.identity.accesscontextmanager.v1.GcpUserAccessBindingOperationMetadata" do
132
+ end
133
+ add_message "google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata" do
134
+ end
135
+ add_enum "google.identity.accesscontextmanager.v1.LevelFormat" do
136
+ value :LEVEL_FORMAT_UNSPECIFIED, 0
137
+ value :AS_DEFINED, 1
138
+ value :CEL, 2
139
+ end
140
+ end
141
+ end
142
+
143
+ module Google
144
+ module Identity
145
+ module AccessContextManager
146
+ module V1
147
+ ListAccessPoliciesRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessPoliciesRequest").msgclass
148
+ ListAccessPoliciesResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessPoliciesResponse").msgclass
149
+ GetAccessPolicyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetAccessPolicyRequest").msgclass
150
+ UpdateAccessPolicyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateAccessPolicyRequest").msgclass
151
+ DeleteAccessPolicyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteAccessPolicyRequest").msgclass
152
+ ListAccessLevelsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessLevelsRequest").msgclass
153
+ ListAccessLevelsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListAccessLevelsResponse").msgclass
154
+ GetAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetAccessLevelRequest").msgclass
155
+ CreateAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CreateAccessLevelRequest").msgclass
156
+ UpdateAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateAccessLevelRequest").msgclass
157
+ DeleteAccessLevelRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteAccessLevelRequest").msgclass
158
+ ReplaceAccessLevelsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceAccessLevelsRequest").msgclass
159
+ ReplaceAccessLevelsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceAccessLevelsResponse").msgclass
160
+ ListServicePerimetersRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListServicePerimetersRequest").msgclass
161
+ ListServicePerimetersResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListServicePerimetersResponse").msgclass
162
+ GetServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetServicePerimeterRequest").msgclass
163
+ CreateServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CreateServicePerimeterRequest").msgclass
164
+ UpdateServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateServicePerimeterRequest").msgclass
165
+ DeleteServicePerimeterRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteServicePerimeterRequest").msgclass
166
+ ReplaceServicePerimetersRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceServicePerimetersRequest").msgclass
167
+ ReplaceServicePerimetersResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ReplaceServicePerimetersResponse").msgclass
168
+ CommitServicePerimetersRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CommitServicePerimetersRequest").msgclass
169
+ CommitServicePerimetersResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CommitServicePerimetersResponse").msgclass
170
+ ListGcpUserAccessBindingsRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsRequest").msgclass
171
+ ListGcpUserAccessBindingsResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsResponse").msgclass
172
+ GetGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GetGcpUserAccessBindingRequest").msgclass
173
+ CreateGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CreateGcpUserAccessBindingRequest").msgclass
174
+ UpdateGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.UpdateGcpUserAccessBindingRequest").msgclass
175
+ DeleteGcpUserAccessBindingRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DeleteGcpUserAccessBindingRequest").msgclass
176
+ GcpUserAccessBindingOperationMetadata = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GcpUserAccessBindingOperationMetadata").msgclass
177
+ AccessContextManagerOperationMetadata = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata").msgclass
178
+ LevelFormat = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.LevelFormat").enummodule
179
+ end
180
+ end
181
+ end
182
+ end