google-identity-access_context_manager-v1 0.1.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (38) hide show
  1. checksums.yaml +7 -0
  2. data/.yardopts +12 -0
  3. data/AUTHENTICATION.md +167 -0
  4. data/LICENSE.md +201 -0
  5. data/README.md +139 -0
  6. data/lib/google/identity/access_context_manager/v1/access_context_manager/client.rb +2358 -0
  7. data/lib/google/identity/access_context_manager/v1/access_context_manager/credentials.rb +47 -0
  8. data/lib/google/identity/access_context_manager/v1/access_context_manager/operations.rb +664 -0
  9. data/lib/google/identity/access_context_manager/v1/access_context_manager/paths.rb +112 -0
  10. data/lib/google/identity/access_context_manager/v1/access_context_manager.rb +60 -0
  11. data/lib/google/identity/access_context_manager/v1/version.rb +28 -0
  12. data/lib/google/identity/access_context_manager/v1.rb +38 -0
  13. data/lib/google/identity/accesscontextmanager/type/device_resources_pb.rb +43 -0
  14. data/lib/google/identity/accesscontextmanager/v1/access_context_manager_pb.rb +182 -0
  15. data/lib/google/identity/accesscontextmanager/v1/access_context_manager_services_pb.rb +224 -0
  16. data/lib/google/identity/accesscontextmanager/v1/access_level_pb.rb +73 -0
  17. data/lib/google/identity/accesscontextmanager/v1/access_policy_pb.rb +30 -0
  18. data/lib/google/identity/accesscontextmanager/v1/gcp_user_access_binding_pb.rb +27 -0
  19. data/lib/google/identity/accesscontextmanager/v1/service_perimeter_pb.rb +109 -0
  20. data/lib/google-identity-access_context_manager-v1.rb +21 -0
  21. data/proto_docs/README.md +4 -0
  22. data/proto_docs/google/api/field_behavior.rb +71 -0
  23. data/proto_docs/google/api/resource.rb +283 -0
  24. data/proto_docs/google/identity/accesscontextmanager/type/device_resources.rb +84 -0
  25. data/proto_docs/google/identity/accesscontextmanager/v1/access_context_manager.rb +539 -0
  26. data/proto_docs/google/identity/accesscontextmanager/v1/access_level.rb +197 -0
  27. data/proto_docs/google/identity/accesscontextmanager/v1/access_policy.rb +60 -0
  28. data/proto_docs/google/identity/accesscontextmanager/v1/gcp_user_access_binding.rb +55 -0
  29. data/proto_docs/google/identity/accesscontextmanager/v1/service_perimeter.rb +484 -0
  30. data/proto_docs/google/longrunning/operations.rb +164 -0
  31. data/proto_docs/google/protobuf/any.rb +141 -0
  32. data/proto_docs/google/protobuf/duration.rb +98 -0
  33. data/proto_docs/google/protobuf/empty.rb +36 -0
  34. data/proto_docs/google/protobuf/field_mask.rb +229 -0
  35. data/proto_docs/google/protobuf/timestamp.rb +129 -0
  36. data/proto_docs/google/rpc/status.rb +46 -0
  37. data/proto_docs/google/type/expr.rb +75 -0
  38. metadata +228 -0
@@ -0,0 +1,224 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # Source: google/identity/accesscontextmanager/v1/access_context_manager.proto for package 'Google.Identity.AccessContextManager.V1'
3
+ # Original file comments:
4
+ # Copyright 2021 Google LLC
5
+ #
6
+ # Licensed under the Apache License, Version 2.0 (the "License");
7
+ # you may not use this file except in compliance with the License.
8
+ # You may obtain a copy of the License at
9
+ #
10
+ # http://www.apache.org/licenses/LICENSE-2.0
11
+ #
12
+ # Unless required by applicable law or agreed to in writing, software
13
+ # distributed under the License is distributed on an "AS IS" BASIS,
14
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15
+ # See the License for the specific language governing permissions and
16
+ # limitations under the License.
17
+ #
18
+
19
+ require 'grpc'
20
+ require 'google/identity/accesscontextmanager/v1/access_context_manager_pb'
21
+
22
+ module Google
23
+ module Identity
24
+ module AccessContextManager
25
+ module V1
26
+ module AccessContextManager
27
+ # API for setting [Access Levels]
28
+ # [google.identity.accesscontextmanager.v1.AccessLevel] and [Service
29
+ # Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
30
+ # for Google Cloud Projects. Each organization has one [AccessPolicy]
31
+ # [google.identity.accesscontextmanager.v1.AccessPolicy] containing the
32
+ # [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel]
33
+ # and [Service Perimeters]
34
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter]. This
35
+ # [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
36
+ # applicable to all resources in the organization.
37
+ # AccessPolicies
38
+ class Service
39
+
40
+ include ::GRPC::GenericService
41
+
42
+ self.marshal_class_method = :encode
43
+ self.unmarshal_class_method = :decode
44
+ self.service_name = 'google.identity.accesscontextmanager.v1.AccessContextManager'
45
+
46
+ # List all [AccessPolicies]
47
+ # [google.identity.accesscontextmanager.v1.AccessPolicy] under a
48
+ # container.
49
+ rpc :ListAccessPolicies, ::Google::Identity::AccessContextManager::V1::ListAccessPoliciesRequest, ::Google::Identity::AccessContextManager::V1::ListAccessPoliciesResponse
50
+ # Get an [AccessPolicy]
51
+ # [google.identity.accesscontextmanager.v1.AccessPolicy] by name.
52
+ rpc :GetAccessPolicy, ::Google::Identity::AccessContextManager::V1::GetAccessPolicyRequest, ::Google::Identity::AccessContextManager::V1::AccessPolicy
53
+ # Create an `AccessPolicy`. Fails if this organization already has a
54
+ # `AccessPolicy`. The longrunning Operation will have a successful status
55
+ # once the `AccessPolicy` has propagated to long-lasting storage.
56
+ # Syntactic and basic semantic errors will be returned in `metadata` as a
57
+ # BadRequest proto.
58
+ rpc :CreateAccessPolicy, ::Google::Identity::AccessContextManager::V1::AccessPolicy, ::Google::Longrunning::Operation
59
+ # Update an [AccessPolicy]
60
+ # [google.identity.accesscontextmanager.v1.AccessPolicy]. The
61
+ # longrunning Operation from this RPC will have a successful status once the
62
+ # changes to the [AccessPolicy]
63
+ # [google.identity.accesscontextmanager.v1.AccessPolicy] have propagated
64
+ # to long-lasting storage. Syntactic and basic semantic errors will be
65
+ # returned in `metadata` as a BadRequest proto.
66
+ rpc :UpdateAccessPolicy, ::Google::Identity::AccessContextManager::V1::UpdateAccessPolicyRequest, ::Google::Longrunning::Operation
67
+ # Delete an [AccessPolicy]
68
+ # [google.identity.accesscontextmanager.v1.AccessPolicy] by resource
69
+ # name. The longrunning Operation will have a successful status once the
70
+ # [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy]
71
+ # has been removed from long-lasting storage.
72
+ rpc :DeleteAccessPolicy, ::Google::Identity::AccessContextManager::V1::DeleteAccessPolicyRequest, ::Google::Longrunning::Operation
73
+ # List all [Access Levels]
74
+ # [google.identity.accesscontextmanager.v1.AccessLevel] for an access
75
+ # policy.
76
+ rpc :ListAccessLevels, ::Google::Identity::AccessContextManager::V1::ListAccessLevelsRequest, ::Google::Identity::AccessContextManager::V1::ListAccessLevelsResponse
77
+ # Get an [Access Level]
78
+ # [google.identity.accesscontextmanager.v1.AccessLevel] by resource
79
+ # name.
80
+ rpc :GetAccessLevel, ::Google::Identity::AccessContextManager::V1::GetAccessLevelRequest, ::Google::Identity::AccessContextManager::V1::AccessLevel
81
+ # Create an [Access Level]
82
+ # [google.identity.accesscontextmanager.v1.AccessLevel]. The longrunning
83
+ # operation from this RPC will have a successful status once the [Access
84
+ # Level] [google.identity.accesscontextmanager.v1.AccessLevel] has
85
+ # propagated to long-lasting storage. [Access Levels]
86
+ # [google.identity.accesscontextmanager.v1.AccessLevel] containing
87
+ # errors will result in an error response for the first error encountered.
88
+ rpc :CreateAccessLevel, ::Google::Identity::AccessContextManager::V1::CreateAccessLevelRequest, ::Google::Longrunning::Operation
89
+ # Update an [Access Level]
90
+ # [google.identity.accesscontextmanager.v1.AccessLevel]. The longrunning
91
+ # operation from this RPC will have a successful status once the changes to
92
+ # the [Access Level]
93
+ # [google.identity.accesscontextmanager.v1.AccessLevel] have propagated
94
+ # to long-lasting storage. [Access Levels]
95
+ # [google.identity.accesscontextmanager.v1.AccessLevel] containing
96
+ # errors will result in an error response for the first error encountered.
97
+ rpc :UpdateAccessLevel, ::Google::Identity::AccessContextManager::V1::UpdateAccessLevelRequest, ::Google::Longrunning::Operation
98
+ # Delete an [Access Level]
99
+ # [google.identity.accesscontextmanager.v1.AccessLevel] by resource
100
+ # name. The longrunning operation from this RPC will have a successful status
101
+ # once the [Access Level]
102
+ # [google.identity.accesscontextmanager.v1.AccessLevel] has been removed
103
+ # from long-lasting storage.
104
+ rpc :DeleteAccessLevel, ::Google::Identity::AccessContextManager::V1::DeleteAccessLevelRequest, ::Google::Longrunning::Operation
105
+ # Replace all existing [Access Levels]
106
+ # [google.identity.accesscontextmanager.v1.AccessLevel] in an [Access
107
+ # Policy] [google.identity.accesscontextmanager.v1.AccessPolicy] with
108
+ # the [Access Levels]
109
+ # [google.identity.accesscontextmanager.v1.AccessLevel] provided. This
110
+ # is done atomically. The longrunning operation from this RPC will have a
111
+ # successful status once all replacements have propagated to long-lasting
112
+ # storage. Replacements containing errors will result in an error response
113
+ # for the first error encountered. Replacement will be cancelled on error,
114
+ # existing [Access Levels]
115
+ # [google.identity.accesscontextmanager.v1.AccessLevel] will not be
116
+ # affected. Operation.response field will contain
117
+ # ReplaceAccessLevelsResponse. Removing [Access Levels]
118
+ # [google.identity.accesscontextmanager.v1.AccessLevel] contained in existing
119
+ # [Service Perimeters]
120
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] will result in
121
+ # error.
122
+ rpc :ReplaceAccessLevels, ::Google::Identity::AccessContextManager::V1::ReplaceAccessLevelsRequest, ::Google::Longrunning::Operation
123
+ # List all [Service Perimeters]
124
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] for an
125
+ # access policy.
126
+ rpc :ListServicePerimeters, ::Google::Identity::AccessContextManager::V1::ListServicePerimetersRequest, ::Google::Identity::AccessContextManager::V1::ListServicePerimetersResponse
127
+ # Get a [Service Perimeter]
128
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] by resource
129
+ # name.
130
+ rpc :GetServicePerimeter, ::Google::Identity::AccessContextManager::V1::GetServicePerimeterRequest, ::Google::Identity::AccessContextManager::V1::ServicePerimeter
131
+ # Create a [Service Perimeter]
132
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
133
+ # longrunning operation from this RPC will have a successful status once the
134
+ # [Service Perimeter]
135
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] has
136
+ # propagated to long-lasting storage. [Service Perimeters]
137
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] containing
138
+ # errors will result in an error response for the first error encountered.
139
+ rpc :CreateServicePerimeter, ::Google::Identity::AccessContextManager::V1::CreateServicePerimeterRequest, ::Google::Longrunning::Operation
140
+ # Update a [Service Perimeter]
141
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
142
+ # longrunning operation from this RPC will have a successful status once the
143
+ # changes to the [Service Perimeter]
144
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] have
145
+ # propagated to long-lasting storage. [Service Perimeter]
146
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] containing
147
+ # errors will result in an error response for the first error encountered.
148
+ rpc :UpdateServicePerimeter, ::Google::Identity::AccessContextManager::V1::UpdateServicePerimeterRequest, ::Google::Longrunning::Operation
149
+ # Delete a [Service Perimeter]
150
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] by resource
151
+ # name. The longrunning operation from this RPC will have a successful status
152
+ # once the [Service Perimeter]
153
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] has been
154
+ # removed from long-lasting storage.
155
+ rpc :DeleteServicePerimeter, ::Google::Identity::AccessContextManager::V1::DeleteServicePerimeterRequest, ::Google::Longrunning::Operation
156
+ # Replace all existing [Service Perimeters]
157
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] in an
158
+ # [Access Policy] [google.identity.accesscontextmanager.v1.AccessPolicy]
159
+ # with the [Service Perimeters]
160
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] provided.
161
+ # This is done atomically. The longrunning operation from this
162
+ # RPC will have a successful status once all replacements have propagated to
163
+ # long-lasting storage. Replacements containing errors will result in an
164
+ # error response for the first error encountered. Replacement will be
165
+ # cancelled on error, existing [Service Perimeters]
166
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] will not be
167
+ # affected. Operation.response field will contain
168
+ # ReplaceServicePerimetersResponse.
169
+ rpc :ReplaceServicePerimeters, ::Google::Identity::AccessContextManager::V1::ReplaceServicePerimetersRequest, ::Google::Longrunning::Operation
170
+ # Commit the dry-run spec for all the [Service Perimeters]
171
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] in an
172
+ # [Access Policy][google.identity.accesscontextmanager.v1.AccessPolicy].
173
+ # A commit operation on a Service Perimeter involves copying its `spec` field
174
+ # to that Service Perimeter's `status` field. Only [Service Perimeters]
175
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] with
176
+ # `use_explicit_dry_run_spec` field set to true are affected by a commit
177
+ # operation. The longrunning operation from this RPC will have a successful
178
+ # status once the dry-run specs for all the [Service Perimeters]
179
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] have been
180
+ # committed. If a commit fails, it will cause the longrunning operation to
181
+ # return an error response and the entire commit operation will be cancelled.
182
+ # When successful, Operation.response field will contain
183
+ # CommitServicePerimetersResponse. The `dry_run` and the `spec` fields will
184
+ # be cleared after a successful commit operation.
185
+ rpc :CommitServicePerimeters, ::Google::Identity::AccessContextManager::V1::CommitServicePerimetersRequest, ::Google::Longrunning::Operation
186
+ # Lists all [GcpUserAccessBindings]
187
+ # [google.identity.accesscontextmanager.v1.GcpUserAccessBinding] for a
188
+ # Google Cloud organization.
189
+ rpc :ListGcpUserAccessBindings, ::Google::Identity::AccessContextManager::V1::ListGcpUserAccessBindingsRequest, ::Google::Identity::AccessContextManager::V1::ListGcpUserAccessBindingsResponse
190
+ # Gets the [GcpUserAccessBinding]
191
+ # [google.identity.accesscontextmanager.v1.GcpUserAccessBinding] with
192
+ # the given name.
193
+ rpc :GetGcpUserAccessBinding, ::Google::Identity::AccessContextManager::V1::GetGcpUserAccessBindingRequest, ::Google::Identity::AccessContextManager::V1::GcpUserAccessBinding
194
+ # Creates a [GcpUserAccessBinding]
195
+ # [google.identity.accesscontextmanager.v1.GcpUserAccessBinding]. If the
196
+ # client specifies a [name]
197
+ # [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.name],
198
+ # the server will ignore it. Fails if a resource already exists with the same
199
+ # [group_key]
200
+ # [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.group_key].
201
+ # Completion of this long-running operation does not necessarily signify that
202
+ # the new binding is deployed onto all affected users, which may take more
203
+ # time.
204
+ rpc :CreateGcpUserAccessBinding, ::Google::Identity::AccessContextManager::V1::CreateGcpUserAccessBindingRequest, ::Google::Longrunning::Operation
205
+ # Updates a [GcpUserAccessBinding]
206
+ # [google.identity.accesscontextmanager.v1.GcpUserAccessBinding].
207
+ # Completion of this long-running operation does not necessarily signify that
208
+ # the changed binding is deployed onto all affected users, which may take
209
+ # more time.
210
+ rpc :UpdateGcpUserAccessBinding, ::Google::Identity::AccessContextManager::V1::UpdateGcpUserAccessBindingRequest, ::Google::Longrunning::Operation
211
+ # Deletes a [GcpUserAccessBinding]
212
+ # [google.identity.accesscontextmanager.v1.GcpUserAccessBinding].
213
+ # Completion of this long-running operation does not necessarily signify that
214
+ # the binding deletion is deployed onto all affected users, which may take
215
+ # more time.
216
+ rpc :DeleteGcpUserAccessBinding, ::Google::Identity::AccessContextManager::V1::DeleteGcpUserAccessBindingRequest, ::Google::Longrunning::Operation
217
+ end
218
+
219
+ Stub = Service.rpc_stub_class
220
+ end
221
+ end
222
+ end
223
+ end
224
+ end
@@ -0,0 +1,73 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # source: google/identity/accesscontextmanager/v1/access_level.proto
3
+
4
+ require 'google/protobuf'
5
+
6
+ require 'google/api/resource_pb'
7
+ require 'google/identity/accesscontextmanager/type/device_resources_pb'
8
+ require 'google/protobuf/timestamp_pb'
9
+ require 'google/type/expr_pb'
10
+ require 'google/api/annotations_pb'
11
+ Google::Protobuf::DescriptorPool.generated_pool.build do
12
+ add_file("google/identity/accesscontextmanager/v1/access_level.proto", :syntax => :proto3) do
13
+ add_message "google.identity.accesscontextmanager.v1.AccessLevel" do
14
+ optional :name, :string, 1
15
+ optional :title, :string, 2
16
+ optional :description, :string, 3
17
+ optional :create_time, :message, 6, "google.protobuf.Timestamp"
18
+ optional :update_time, :message, 7, "google.protobuf.Timestamp"
19
+ oneof :level do
20
+ optional :basic, :message, 4, "google.identity.accesscontextmanager.v1.BasicLevel"
21
+ optional :custom, :message, 5, "google.identity.accesscontextmanager.v1.CustomLevel"
22
+ end
23
+ end
24
+ add_message "google.identity.accesscontextmanager.v1.BasicLevel" do
25
+ repeated :conditions, :message, 1, "google.identity.accesscontextmanager.v1.Condition"
26
+ optional :combining_function, :enum, 2, "google.identity.accesscontextmanager.v1.BasicLevel.ConditionCombiningFunction"
27
+ end
28
+ add_enum "google.identity.accesscontextmanager.v1.BasicLevel.ConditionCombiningFunction" do
29
+ value :AND, 0
30
+ value :OR, 1
31
+ end
32
+ add_message "google.identity.accesscontextmanager.v1.Condition" do
33
+ repeated :ip_subnetworks, :string, 1
34
+ optional :device_policy, :message, 2, "google.identity.accesscontextmanager.v1.DevicePolicy"
35
+ repeated :required_access_levels, :string, 3
36
+ optional :negate, :bool, 5
37
+ repeated :members, :string, 6
38
+ repeated :regions, :string, 7
39
+ end
40
+ add_message "google.identity.accesscontextmanager.v1.CustomLevel" do
41
+ optional :expr, :message, 1, "google.type.Expr"
42
+ end
43
+ add_message "google.identity.accesscontextmanager.v1.DevicePolicy" do
44
+ optional :require_screenlock, :bool, 1
45
+ repeated :allowed_encryption_statuses, :enum, 2, "google.identity.accesscontextmanager.type.DeviceEncryptionStatus"
46
+ repeated :os_constraints, :message, 3, "google.identity.accesscontextmanager.v1.OsConstraint"
47
+ repeated :allowed_device_management_levels, :enum, 6, "google.identity.accesscontextmanager.type.DeviceManagementLevel"
48
+ optional :require_admin_approval, :bool, 7
49
+ optional :require_corp_owned, :bool, 8
50
+ end
51
+ add_message "google.identity.accesscontextmanager.v1.OsConstraint" do
52
+ optional :os_type, :enum, 1, "google.identity.accesscontextmanager.type.OsType"
53
+ optional :minimum_version, :string, 2
54
+ optional :require_verified_chrome_os, :bool, 3
55
+ end
56
+ end
57
+ end
58
+
59
+ module Google
60
+ module Identity
61
+ module AccessContextManager
62
+ module V1
63
+ AccessLevel = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.AccessLevel").msgclass
64
+ BasicLevel = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.BasicLevel").msgclass
65
+ BasicLevel::ConditionCombiningFunction = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.BasicLevel.ConditionCombiningFunction").enummodule
66
+ Condition = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.Condition").msgclass
67
+ CustomLevel = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.CustomLevel").msgclass
68
+ DevicePolicy = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.DevicePolicy").msgclass
69
+ OsConstraint = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.OsConstraint").msgclass
70
+ end
71
+ end
72
+ end
73
+ end
@@ -0,0 +1,30 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # source: google/identity/accesscontextmanager/v1/access_policy.proto
3
+
4
+ require 'google/protobuf'
5
+
6
+ require 'google/api/resource_pb'
7
+ require 'google/protobuf/timestamp_pb'
8
+ require 'google/api/annotations_pb'
9
+ Google::Protobuf::DescriptorPool.generated_pool.build do
10
+ add_file("google/identity/accesscontextmanager/v1/access_policy.proto", :syntax => :proto3) do
11
+ add_message "google.identity.accesscontextmanager.v1.AccessPolicy" do
12
+ optional :name, :string, 1
13
+ optional :parent, :string, 2
14
+ optional :title, :string, 3
15
+ optional :create_time, :message, 4, "google.protobuf.Timestamp"
16
+ optional :update_time, :message, 5, "google.protobuf.Timestamp"
17
+ optional :etag, :string, 6
18
+ end
19
+ end
20
+ end
21
+
22
+ module Google
23
+ module Identity
24
+ module AccessContextManager
25
+ module V1
26
+ AccessPolicy = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.AccessPolicy").msgclass
27
+ end
28
+ end
29
+ end
30
+ end
@@ -0,0 +1,27 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # source: google/identity/accesscontextmanager/v1/gcp_user_access_binding.proto
3
+
4
+ require 'google/protobuf'
5
+
6
+ require 'google/api/field_behavior_pb'
7
+ require 'google/api/resource_pb'
8
+ require 'google/api/annotations_pb'
9
+ Google::Protobuf::DescriptorPool.generated_pool.build do
10
+ add_file("google/identity/accesscontextmanager/v1/gcp_user_access_binding.proto", :syntax => :proto3) do
11
+ add_message "google.identity.accesscontextmanager.v1.GcpUserAccessBinding" do
12
+ optional :name, :string, 1
13
+ optional :group_key, :string, 2
14
+ repeated :access_levels, :string, 3
15
+ end
16
+ end
17
+ end
18
+
19
+ module Google
20
+ module Identity
21
+ module AccessContextManager
22
+ module V1
23
+ GcpUserAccessBinding = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.GcpUserAccessBinding").msgclass
24
+ end
25
+ end
26
+ end
27
+ end
@@ -0,0 +1,109 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # source: google/identity/accesscontextmanager/v1/service_perimeter.proto
3
+
4
+ require 'google/protobuf'
5
+
6
+ require 'google/api/resource_pb'
7
+ require 'google/protobuf/timestamp_pb'
8
+ require 'google/api/annotations_pb'
9
+ Google::Protobuf::DescriptorPool.generated_pool.build do
10
+ add_file("google/identity/accesscontextmanager/v1/service_perimeter.proto", :syntax => :proto3) do
11
+ add_message "google.identity.accesscontextmanager.v1.ServicePerimeter" do
12
+ optional :name, :string, 1
13
+ optional :title, :string, 2
14
+ optional :description, :string, 3
15
+ optional :create_time, :message, 4, "google.protobuf.Timestamp"
16
+ optional :update_time, :message, 5, "google.protobuf.Timestamp"
17
+ optional :perimeter_type, :enum, 6, "google.identity.accesscontextmanager.v1.ServicePerimeter.PerimeterType"
18
+ optional :status, :message, 7, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig"
19
+ optional :spec, :message, 8, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig"
20
+ optional :use_explicit_dry_run_spec, :bool, 9
21
+ end
22
+ add_enum "google.identity.accesscontextmanager.v1.ServicePerimeter.PerimeterType" do
23
+ value :PERIMETER_TYPE_REGULAR, 0
24
+ value :PERIMETER_TYPE_BRIDGE, 1
25
+ end
26
+ add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig" do
27
+ repeated :resources, :string, 1
28
+ repeated :access_levels, :string, 2
29
+ repeated :restricted_services, :string, 4
30
+ optional :vpc_accessible_services, :message, 10, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.VpcAccessibleServices"
31
+ repeated :ingress_policies, :message, 8, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy"
32
+ repeated :egress_policies, :message, 9, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy"
33
+ end
34
+ add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.VpcAccessibleServices" do
35
+ optional :enable_restriction, :bool, 1
36
+ repeated :allowed_services, :string, 2
37
+ end
38
+ add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.MethodSelector" do
39
+ oneof :kind do
40
+ optional :method, :string, 1
41
+ optional :permission, :string, 2
42
+ end
43
+ end
44
+ add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation" do
45
+ optional :service_name, :string, 1
46
+ repeated :method_selectors, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.MethodSelector"
47
+ end
48
+ add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource" do
49
+ oneof :source do
50
+ optional :access_level, :string, 1
51
+ optional :resource, :string, 2
52
+ end
53
+ end
54
+ add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo" do
55
+ repeated :resources, :string, 1
56
+ repeated :operations, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation"
57
+ end
58
+ add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressFrom" do
59
+ repeated :sources, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource"
60
+ repeated :identities, :string, 2
61
+ optional :identity_type, :enum, 3, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IdentityType"
62
+ end
63
+ add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressTo" do
64
+ repeated :operations, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation"
65
+ repeated :resources, :string, 2
66
+ end
67
+ add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy" do
68
+ optional :ingress_from, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressFrom"
69
+ optional :ingress_to, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressTo"
70
+ end
71
+ add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy" do
72
+ optional :egress_from, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom"
73
+ optional :egress_to, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo"
74
+ end
75
+ add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom" do
76
+ repeated :identities, :string, 1
77
+ optional :identity_type, :enum, 2, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IdentityType"
78
+ end
79
+ add_enum "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IdentityType" do
80
+ value :IDENTITY_TYPE_UNSPECIFIED, 0
81
+ value :ANY_IDENTITY, 1
82
+ value :ANY_USER_ACCOUNT, 2
83
+ value :ANY_SERVICE_ACCOUNT, 3
84
+ end
85
+ end
86
+ end
87
+
88
+ module Google
89
+ module Identity
90
+ module AccessContextManager
91
+ module V1
92
+ ServicePerimeter = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ServicePerimeter").msgclass
93
+ ServicePerimeter::PerimeterType = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ServicePerimeter.PerimeterType").enummodule
94
+ ServicePerimeterConfig = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ServicePerimeterConfig").msgclass
95
+ ServicePerimeterConfig::VpcAccessibleServices = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ServicePerimeterConfig.VpcAccessibleServices").msgclass
96
+ ServicePerimeterConfig::MethodSelector = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ServicePerimeterConfig.MethodSelector").msgclass
97
+ ServicePerimeterConfig::ApiOperation = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation").msgclass
98
+ ServicePerimeterConfig::IngressSource = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource").msgclass
99
+ ServicePerimeterConfig::EgressTo = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo").msgclass
100
+ ServicePerimeterConfig::IngressFrom = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressFrom").msgclass
101
+ ServicePerimeterConfig::IngressTo = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressTo").msgclass
102
+ ServicePerimeterConfig::IngressPolicy = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy").msgclass
103
+ ServicePerimeterConfig::EgressPolicy = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy").msgclass
104
+ ServicePerimeterConfig::EgressFrom = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom").msgclass
105
+ ServicePerimeterConfig::IdentityType = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IdentityType").enummodule
106
+ end
107
+ end
108
+ end
109
+ end
@@ -0,0 +1,21 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2021 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+ # This gem does not autoload during Bundler.require. To load this gem,
20
+ # issue explicit require statements for the packages desired, e.g.:
21
+ # require "google/identity/access_context_manager/v1"
@@ -0,0 +1,4 @@
1
+ # Access Context Manager V1 Protocol Buffer Documentation
2
+
3
+ These files are for the YARD documentation of the generated protobuf files.
4
+ They are not intended to be required or loaded at runtime.
@@ -0,0 +1,71 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2021 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+
20
+ module Google
21
+ module Api
22
+ # An indicator of the behavior of a given field (for example, that a field
23
+ # is required in requests, or given as output but ignored as input).
24
+ # This **does not** change the behavior in protocol buffers itself; it only
25
+ # denotes the behavior and may affect how API tooling handles the field.
26
+ #
27
+ # Note: This enum **may** receive new values in the future.
28
+ module FieldBehavior
29
+ # Conventional default for enums. Do not use this.
30
+ FIELD_BEHAVIOR_UNSPECIFIED = 0
31
+
32
+ # Specifically denotes a field as optional.
33
+ # While all fields in protocol buffers are optional, this may be specified
34
+ # for emphasis if appropriate.
35
+ OPTIONAL = 1
36
+
37
+ # Denotes a field as required.
38
+ # This indicates that the field **must** be provided as part of the request,
39
+ # and failure to do so will cause an error (usually `INVALID_ARGUMENT`).
40
+ REQUIRED = 2
41
+
42
+ # Denotes a field as output only.
43
+ # This indicates that the field is provided in responses, but including the
44
+ # field in a request does nothing (the server *must* ignore it and
45
+ # *must not* throw an error as a result of the field's presence).
46
+ OUTPUT_ONLY = 3
47
+
48
+ # Denotes a field as input only.
49
+ # This indicates that the field is provided in requests, and the
50
+ # corresponding field is not included in output.
51
+ INPUT_ONLY = 4
52
+
53
+ # Denotes a field as immutable.
54
+ # This indicates that the field may be set once in a request to create a
55
+ # resource, but may not be changed thereafter.
56
+ IMMUTABLE = 5
57
+
58
+ # Denotes that a (repeated) field is an unordered list.
59
+ # This indicates that the service may provide the elements of the list
60
+ # in any arbitrary order, rather than the order the user originally
61
+ # provided. Additionally, the list's order may or may not be stable.
62
+ UNORDERED_LIST = 6
63
+
64
+ # Denotes that this field returns a non-empty default value if not set.
65
+ # This indicates that if the user provides the empty value in a request,
66
+ # a non-empty value will be returned. The user will not be aware of what
67
+ # non-empty value to expect.
68
+ NON_EMPTY_DEFAULT = 7
69
+ end
70
+ end
71
+ end