google-identity-access_context_manager-v1 0.1.2 → 0.3.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/AUTHENTICATION.md +1 -1
- data/README.md +11 -6
- data/lib/google/identity/access_context_manager/v1/access_context_manager/client.rb +437 -114
- data/lib/google/identity/access_context_manager/v1/access_context_manager/operations.rb +3 -0
- data/lib/google/identity/access_context_manager/v1/access_context_manager.rb +8 -8
- data/lib/google/identity/access_context_manager/v1/version.rb +1 -1
- data/lib/google/identity/access_context_manager/v1.rb +2 -0
- data/lib/google/identity/accesscontextmanager/type/device_resources_pb.rb +0 -1
- data/lib/google/identity/accesscontextmanager/v1/access_context_manager_pb.rb +4 -1
- data/lib/google/identity/accesscontextmanager/v1/access_context_manager_services_pb.rb +128 -112
- data/lib/google/identity/accesscontextmanager/v1/access_level_pb.rb +2 -2
- data/lib/google/identity/accesscontextmanager/v1/access_policy_pb.rb +3 -2
- data/lib/google/identity/accesscontextmanager/v1/gcp_user_access_binding_pb.rb +2 -2
- data/lib/google/identity/accesscontextmanager/v1/service_perimeter_pb.rb +13 -12
- data/proto_docs/google/iam/v1/iam_policy.rb +87 -0
- data/proto_docs/google/iam/v1/options.rb +50 -0
- data/proto_docs/google/iam/v1/policy.rb +418 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/access_context_manager.rb +1 -1
- data/proto_docs/google/identity/accesscontextmanager/v1/access_policy.rb +16 -0
- data/proto_docs/google/identity/accesscontextmanager/v1/service_perimeter.rb +72 -64
- data/proto_docs/google/protobuf/any.rb +3 -3
- data/proto_docs/google/protobuf/empty.rb +0 -2
- metadata +29 -12
@@ -0,0 +1,50 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2022 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Iam
|
22
|
+
module V1
|
23
|
+
# Encapsulates settings provided to GetIamPolicy.
|
24
|
+
# @!attribute [rw] requested_policy_version
|
25
|
+
# @return [::Integer]
|
26
|
+
# Optional. The maximum policy version that will be used to format the
|
27
|
+
# policy.
|
28
|
+
#
|
29
|
+
# Valid values are 0, 1, and 3. Requests specifying an invalid value will be
|
30
|
+
# rejected.
|
31
|
+
#
|
32
|
+
# Requests for policies with any conditional role bindings must specify
|
33
|
+
# version 3. Policies with no conditional role bindings may specify any valid
|
34
|
+
# value or leave the field unset.
|
35
|
+
#
|
36
|
+
# The policy in the response might use the policy version that you specified,
|
37
|
+
# or it might use a lower policy version. For example, if you specify version
|
38
|
+
# 3, but the policy has no conditional role bindings, the response uses
|
39
|
+
# version 1.
|
40
|
+
#
|
41
|
+
# To learn which resources support conditions in their IAM policies, see the
|
42
|
+
# [IAM
|
43
|
+
# documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
|
44
|
+
class GetPolicyOptions
|
45
|
+
include ::Google::Protobuf::MessageExts
|
46
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
47
|
+
end
|
48
|
+
end
|
49
|
+
end
|
50
|
+
end
|
@@ -0,0 +1,418 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
# Copyright 2022 Google LLC
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# https://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
|
17
|
+
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
18
|
+
|
19
|
+
|
20
|
+
module Google
|
21
|
+
module Iam
|
22
|
+
module V1
|
23
|
+
# An Identity and Access Management (IAM) policy, which specifies access
|
24
|
+
# controls for Google Cloud resources.
|
25
|
+
#
|
26
|
+
#
|
27
|
+
# A `Policy` is a collection of `bindings`. A `binding` binds one or more
|
28
|
+
# `members`, or principals, to a single `role`. Principals can be user
|
29
|
+
# accounts, service accounts, Google groups, and domains (such as G Suite). A
|
30
|
+
# `role` is a named list of permissions; each `role` can be an IAM predefined
|
31
|
+
# role or a user-created custom role.
|
32
|
+
#
|
33
|
+
# For some types of Google Cloud resources, a `binding` can also specify a
|
34
|
+
# `condition`, which is a logical expression that allows access to a resource
|
35
|
+
# only if the expression evaluates to `true`. A condition can add constraints
|
36
|
+
# based on attributes of the request, the resource, or both. To learn which
|
37
|
+
# resources support conditions in their IAM policies, see the
|
38
|
+
# [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
|
39
|
+
#
|
40
|
+
# **JSON example:**
|
41
|
+
#
|
42
|
+
# {
|
43
|
+
# "bindings": [
|
44
|
+
# {
|
45
|
+
# "role": "roles/resourcemanager.organizationAdmin",
|
46
|
+
# "members": [
|
47
|
+
# "user:mike@example.com",
|
48
|
+
# "group:admins@example.com",
|
49
|
+
# "domain:google.com",
|
50
|
+
# "serviceAccount:my-project-id@appspot.gserviceaccount.com"
|
51
|
+
# ]
|
52
|
+
# },
|
53
|
+
# {
|
54
|
+
# "role": "roles/resourcemanager.organizationViewer",
|
55
|
+
# "members": [
|
56
|
+
# "user:eve@example.com"
|
57
|
+
# ],
|
58
|
+
# "condition": {
|
59
|
+
# "title": "expirable access",
|
60
|
+
# "description": "Does not grant access after Sep 2020",
|
61
|
+
# "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')",
|
62
|
+
# }
|
63
|
+
# }
|
64
|
+
# ],
|
65
|
+
# "etag": "BwWWja0YfJA=",
|
66
|
+
# "version": 3
|
67
|
+
# }
|
68
|
+
#
|
69
|
+
# **YAML example:**
|
70
|
+
#
|
71
|
+
# bindings:
|
72
|
+
# - members:
|
73
|
+
# - user:mike@example.com
|
74
|
+
# - group:admins@example.com
|
75
|
+
# - domain:google.com
|
76
|
+
# - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
77
|
+
# role: roles/resourcemanager.organizationAdmin
|
78
|
+
# - members:
|
79
|
+
# - user:eve@example.com
|
80
|
+
# role: roles/resourcemanager.organizationViewer
|
81
|
+
# condition:
|
82
|
+
# title: expirable access
|
83
|
+
# description: Does not grant access after Sep 2020
|
84
|
+
# expression: request.time < timestamp('2020-10-01T00:00:00.000Z')
|
85
|
+
# etag: BwWWja0YfJA=
|
86
|
+
# version: 3
|
87
|
+
#
|
88
|
+
# For a description of IAM and its features, see the
|
89
|
+
# [IAM documentation](https://cloud.google.com/iam/docs/).
|
90
|
+
# @!attribute [rw] version
|
91
|
+
# @return [::Integer]
|
92
|
+
# Specifies the format of the policy.
|
93
|
+
#
|
94
|
+
# Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
|
95
|
+
# are rejected.
|
96
|
+
#
|
97
|
+
# Any operation that affects conditional role bindings must specify version
|
98
|
+
# `3`. This requirement applies to the following operations:
|
99
|
+
#
|
100
|
+
# * Getting a policy that includes a conditional role binding
|
101
|
+
# * Adding a conditional role binding to a policy
|
102
|
+
# * Changing a conditional role binding in a policy
|
103
|
+
# * Removing any role binding, with or without a condition, from a policy
|
104
|
+
# that includes conditions
|
105
|
+
#
|
106
|
+
# **Important:** If you use IAM Conditions, you must include the `etag` field
|
107
|
+
# whenever you call `setIamPolicy`. If you omit this field, then IAM allows
|
108
|
+
# you to overwrite a version `3` policy with a version `1` policy, and all of
|
109
|
+
# the conditions in the version `3` policy are lost.
|
110
|
+
#
|
111
|
+
# If a policy does not include any conditions, operations on that policy may
|
112
|
+
# specify any valid version or leave the field unset.
|
113
|
+
#
|
114
|
+
# To learn which resources support conditions in their IAM policies, see the
|
115
|
+
# [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
|
116
|
+
# @!attribute [rw] bindings
|
117
|
+
# @return [::Array<::Google::Iam::V1::Binding>]
|
118
|
+
# Associates a list of `members`, or principals, with a `role`. Optionally,
|
119
|
+
# may specify a `condition` that determines how and when the `bindings` are
|
120
|
+
# applied. Each of the `bindings` must contain at least one principal.
|
121
|
+
#
|
122
|
+
# The `bindings` in a `Policy` can refer to up to 1,500 principals; up to 250
|
123
|
+
# of these principals can be Google groups. Each occurrence of a principal
|
124
|
+
# counts towards these limits. For example, if the `bindings` grant 50
|
125
|
+
# different roles to `user:alice@example.com`, and not to any other
|
126
|
+
# principal, then you can add another 1,450 principals to the `bindings` in
|
127
|
+
# the `Policy`.
|
128
|
+
# @!attribute [rw] audit_configs
|
129
|
+
# @return [::Array<::Google::Iam::V1::AuditConfig>]
|
130
|
+
# Specifies cloud audit logging configuration for this policy.
|
131
|
+
# @!attribute [rw] etag
|
132
|
+
# @return [::String]
|
133
|
+
# `etag` is used for optimistic concurrency control as a way to help
|
134
|
+
# prevent simultaneous updates of a policy from overwriting each other.
|
135
|
+
# It is strongly suggested that systems make use of the `etag` in the
|
136
|
+
# read-modify-write cycle to perform policy updates in order to avoid race
|
137
|
+
# conditions: An `etag` is returned in the response to `getIamPolicy`, and
|
138
|
+
# systems are expected to put that etag in the request to `setIamPolicy` to
|
139
|
+
# ensure that their change will be applied to the same version of the policy.
|
140
|
+
#
|
141
|
+
# **Important:** If you use IAM Conditions, you must include the `etag` field
|
142
|
+
# whenever you call `setIamPolicy`. If you omit this field, then IAM allows
|
143
|
+
# you to overwrite a version `3` policy with a version `1` policy, and all of
|
144
|
+
# the conditions in the version `3` policy are lost.
|
145
|
+
class Policy
|
146
|
+
include ::Google::Protobuf::MessageExts
|
147
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
148
|
+
end
|
149
|
+
|
150
|
+
# Associates `members`, or principals, with a `role`.
|
151
|
+
# @!attribute [rw] role
|
152
|
+
# @return [::String]
|
153
|
+
# Role that is assigned to the list of `members`, or principals.
|
154
|
+
# For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
|
155
|
+
# @!attribute [rw] members
|
156
|
+
# @return [::Array<::String>]
|
157
|
+
# Specifies the principals requesting access for a Cloud Platform resource.
|
158
|
+
# `members` can have the following values:
|
159
|
+
#
|
160
|
+
# * `allUsers`: A special identifier that represents anyone who is
|
161
|
+
# on the internet; with or without a Google account.
|
162
|
+
#
|
163
|
+
# * `allAuthenticatedUsers`: A special identifier that represents anyone
|
164
|
+
# who is authenticated with a Google account or a service account.
|
165
|
+
#
|
166
|
+
# * `user:{emailid}`: An email address that represents a specific Google
|
167
|
+
# account. For example, `alice@example.com` .
|
168
|
+
#
|
169
|
+
#
|
170
|
+
# * `serviceAccount:{emailid}`: An email address that represents a service
|
171
|
+
# account. For example, `my-other-app@appspot.gserviceaccount.com`.
|
172
|
+
#
|
173
|
+
# * `group:{emailid}`: An email address that represents a Google group.
|
174
|
+
# For example, `admins@example.com`.
|
175
|
+
#
|
176
|
+
# * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique
|
177
|
+
# identifier) representing a user that has been recently deleted. For
|
178
|
+
# example, `alice@example.com?uid=123456789012345678901`. If the user is
|
179
|
+
# recovered, this value reverts to `user:{emailid}` and the recovered user
|
180
|
+
# retains the role in the binding.
|
181
|
+
#
|
182
|
+
# * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus
|
183
|
+
# unique identifier) representing a service account that has been recently
|
184
|
+
# deleted. For example,
|
185
|
+
# `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`.
|
186
|
+
# If the service account is undeleted, this value reverts to
|
187
|
+
# `serviceAccount:{emailid}` and the undeleted service account retains the
|
188
|
+
# role in the binding.
|
189
|
+
#
|
190
|
+
# * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique
|
191
|
+
# identifier) representing a Google group that has been recently
|
192
|
+
# deleted. For example, `admins@example.com?uid=123456789012345678901`. If
|
193
|
+
# the group is recovered, this value reverts to `group:{emailid}` and the
|
194
|
+
# recovered group retains the role in the binding.
|
195
|
+
#
|
196
|
+
#
|
197
|
+
# * `domain:{domain}`: The G Suite domain (primary) that represents all the
|
198
|
+
# users of that domain. For example, `google.com` or `example.com`.
|
199
|
+
# @!attribute [rw] condition
|
200
|
+
# @return [::Google::Type::Expr]
|
201
|
+
# The condition that is associated with this binding.
|
202
|
+
#
|
203
|
+
# If the condition evaluates to `true`, then this binding applies to the
|
204
|
+
# current request.
|
205
|
+
#
|
206
|
+
# If the condition evaluates to `false`, then this binding does not apply to
|
207
|
+
# the current request. However, a different role binding might grant the same
|
208
|
+
# role to one or more of the principals in this binding.
|
209
|
+
#
|
210
|
+
# To learn which resources support conditions in their IAM policies, see the
|
211
|
+
# [IAM
|
212
|
+
# documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
|
213
|
+
class Binding
|
214
|
+
include ::Google::Protobuf::MessageExts
|
215
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
216
|
+
end
|
217
|
+
|
218
|
+
# Specifies the audit configuration for a service.
|
219
|
+
# The configuration determines which permission types are logged, and what
|
220
|
+
# identities, if any, are exempted from logging.
|
221
|
+
# An AuditConfig must have one or more AuditLogConfigs.
|
222
|
+
#
|
223
|
+
# If there are AuditConfigs for both `allServices` and a specific service,
|
224
|
+
# the union of the two AuditConfigs is used for that service: the log_types
|
225
|
+
# specified in each AuditConfig are enabled, and the exempted_members in each
|
226
|
+
# AuditLogConfig are exempted.
|
227
|
+
#
|
228
|
+
# Example Policy with multiple AuditConfigs:
|
229
|
+
#
|
230
|
+
# {
|
231
|
+
# "audit_configs": [
|
232
|
+
# {
|
233
|
+
# "service": "allServices",
|
234
|
+
# "audit_log_configs": [
|
235
|
+
# {
|
236
|
+
# "log_type": "DATA_READ",
|
237
|
+
# "exempted_members": [
|
238
|
+
# "user:jose@example.com"
|
239
|
+
# ]
|
240
|
+
# },
|
241
|
+
# {
|
242
|
+
# "log_type": "DATA_WRITE"
|
243
|
+
# },
|
244
|
+
# {
|
245
|
+
# "log_type": "ADMIN_READ"
|
246
|
+
# }
|
247
|
+
# ]
|
248
|
+
# },
|
249
|
+
# {
|
250
|
+
# "service": "sampleservice.googleapis.com",
|
251
|
+
# "audit_log_configs": [
|
252
|
+
# {
|
253
|
+
# "log_type": "DATA_READ"
|
254
|
+
# },
|
255
|
+
# {
|
256
|
+
# "log_type": "DATA_WRITE",
|
257
|
+
# "exempted_members": [
|
258
|
+
# "user:aliya@example.com"
|
259
|
+
# ]
|
260
|
+
# }
|
261
|
+
# ]
|
262
|
+
# }
|
263
|
+
# ]
|
264
|
+
# }
|
265
|
+
#
|
266
|
+
# For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
|
267
|
+
# logging. It also exempts jose@example.com from DATA_READ logging, and
|
268
|
+
# aliya@example.com from DATA_WRITE logging.
|
269
|
+
# @!attribute [rw] service
|
270
|
+
# @return [::String]
|
271
|
+
# Specifies a service that will be enabled for audit logging.
|
272
|
+
# For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
|
273
|
+
# `allServices` is a special value that covers all services.
|
274
|
+
# @!attribute [rw] audit_log_configs
|
275
|
+
# @return [::Array<::Google::Iam::V1::AuditLogConfig>]
|
276
|
+
# The configuration for logging of each type of permission.
|
277
|
+
class AuditConfig
|
278
|
+
include ::Google::Protobuf::MessageExts
|
279
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
280
|
+
end
|
281
|
+
|
282
|
+
# Provides the configuration for logging a type of permissions.
|
283
|
+
# Example:
|
284
|
+
#
|
285
|
+
# {
|
286
|
+
# "audit_log_configs": [
|
287
|
+
# {
|
288
|
+
# "log_type": "DATA_READ",
|
289
|
+
# "exempted_members": [
|
290
|
+
# "user:jose@example.com"
|
291
|
+
# ]
|
292
|
+
# },
|
293
|
+
# {
|
294
|
+
# "log_type": "DATA_WRITE"
|
295
|
+
# }
|
296
|
+
# ]
|
297
|
+
# }
|
298
|
+
#
|
299
|
+
# This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
|
300
|
+
# jose@example.com from DATA_READ logging.
|
301
|
+
# @!attribute [rw] log_type
|
302
|
+
# @return [::Google::Iam::V1::AuditLogConfig::LogType]
|
303
|
+
# The log type that this config enables.
|
304
|
+
# @!attribute [rw] exempted_members
|
305
|
+
# @return [::Array<::String>]
|
306
|
+
# Specifies the identities that do not cause logging for this type of
|
307
|
+
# permission.
|
308
|
+
# Follows the same format of {::Google::Iam::V1::Binding#members Binding.members}.
|
309
|
+
class AuditLogConfig
|
310
|
+
include ::Google::Protobuf::MessageExts
|
311
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
312
|
+
|
313
|
+
# The list of valid permission types for which logging can be configured.
|
314
|
+
# Admin writes are always logged, and are not configurable.
|
315
|
+
module LogType
|
316
|
+
# Default case. Should never be this.
|
317
|
+
LOG_TYPE_UNSPECIFIED = 0
|
318
|
+
|
319
|
+
# Admin reads. Example: CloudIAM getIamPolicy
|
320
|
+
ADMIN_READ = 1
|
321
|
+
|
322
|
+
# Data writes. Example: CloudSQL Users create
|
323
|
+
DATA_WRITE = 2
|
324
|
+
|
325
|
+
# Data reads. Example: CloudSQL Users list
|
326
|
+
DATA_READ = 3
|
327
|
+
end
|
328
|
+
end
|
329
|
+
|
330
|
+
# The difference delta between two policies.
|
331
|
+
# @!attribute [rw] binding_deltas
|
332
|
+
# @return [::Array<::Google::Iam::V1::BindingDelta>]
|
333
|
+
# The delta for Bindings between two policies.
|
334
|
+
# @!attribute [rw] audit_config_deltas
|
335
|
+
# @return [::Array<::Google::Iam::V1::AuditConfigDelta>]
|
336
|
+
# The delta for AuditConfigs between two policies.
|
337
|
+
class PolicyDelta
|
338
|
+
include ::Google::Protobuf::MessageExts
|
339
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
340
|
+
end
|
341
|
+
|
342
|
+
# One delta entry for Binding. Each individual change (only one member in each
|
343
|
+
# entry) to a binding will be a separate entry.
|
344
|
+
# @!attribute [rw] action
|
345
|
+
# @return [::Google::Iam::V1::BindingDelta::Action]
|
346
|
+
# The action that was performed on a Binding.
|
347
|
+
# Required
|
348
|
+
# @!attribute [rw] role
|
349
|
+
# @return [::String]
|
350
|
+
# Role that is assigned to `members`.
|
351
|
+
# For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
|
352
|
+
# Required
|
353
|
+
# @!attribute [rw] member
|
354
|
+
# @return [::String]
|
355
|
+
# A single identity requesting access for a Cloud Platform resource.
|
356
|
+
# Follows the same format of Binding.members.
|
357
|
+
# Required
|
358
|
+
# @!attribute [rw] condition
|
359
|
+
# @return [::Google::Type::Expr]
|
360
|
+
# The condition that is associated with this binding.
|
361
|
+
class BindingDelta
|
362
|
+
include ::Google::Protobuf::MessageExts
|
363
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
364
|
+
|
365
|
+
# The type of action performed on a Binding in a policy.
|
366
|
+
module Action
|
367
|
+
# Unspecified.
|
368
|
+
ACTION_UNSPECIFIED = 0
|
369
|
+
|
370
|
+
# Addition of a Binding.
|
371
|
+
ADD = 1
|
372
|
+
|
373
|
+
# Removal of a Binding.
|
374
|
+
REMOVE = 2
|
375
|
+
end
|
376
|
+
end
|
377
|
+
|
378
|
+
# One delta entry for AuditConfig. Each individual change (only one
|
379
|
+
# exempted_member in each entry) to a AuditConfig will be a separate entry.
|
380
|
+
# @!attribute [rw] action
|
381
|
+
# @return [::Google::Iam::V1::AuditConfigDelta::Action]
|
382
|
+
# The action that was performed on an audit configuration in a policy.
|
383
|
+
# Required
|
384
|
+
# @!attribute [rw] service
|
385
|
+
# @return [::String]
|
386
|
+
# Specifies a service that was configured for Cloud Audit Logging.
|
387
|
+
# For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
|
388
|
+
# `allServices` is a special value that covers all services.
|
389
|
+
# Required
|
390
|
+
# @!attribute [rw] exempted_member
|
391
|
+
# @return [::String]
|
392
|
+
# A single identity that is exempted from "data access" audit
|
393
|
+
# logging for the `service` specified above.
|
394
|
+
# Follows the same format of Binding.members.
|
395
|
+
# @!attribute [rw] log_type
|
396
|
+
# @return [::String]
|
397
|
+
# Specifies the log_type that was be enabled. ADMIN_ACTIVITY is always
|
398
|
+
# enabled, and cannot be configured.
|
399
|
+
# Required
|
400
|
+
class AuditConfigDelta
|
401
|
+
include ::Google::Protobuf::MessageExts
|
402
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
403
|
+
|
404
|
+
# The type of action performed on an audit configuration in a policy.
|
405
|
+
module Action
|
406
|
+
# Unspecified.
|
407
|
+
ACTION_UNSPECIFIED = 0
|
408
|
+
|
409
|
+
# Addition of an audit configuration.
|
410
|
+
ADD = 1
|
411
|
+
|
412
|
+
# Removal of an audit configuration.
|
413
|
+
REMOVE = 2
|
414
|
+
end
|
415
|
+
end
|
416
|
+
end
|
417
|
+
end
|
418
|
+
end
|
@@ -395,7 +395,7 @@ module Google
|
|
395
395
|
# @!attribute [rw] etag
|
396
396
|
# @return [::String]
|
397
397
|
# Optional. The etag for the version of the [Access Policy]
|
398
|
-
# [google.identity.accesscontextmanager.
|
398
|
+
# [google.identity.accesscontextmanager.v1.AccessPolicy] that this
|
399
399
|
# commit operation is to be performed on. If, at the time of commit, the
|
400
400
|
# etag for the Access Policy stored in Access Context Manager is different
|
401
401
|
# from the specified etag, then the commit operation will not be performed
|
@@ -38,6 +38,22 @@ module Google
|
|
38
38
|
# @!attribute [rw] title
|
39
39
|
# @return [::String]
|
40
40
|
# Required. Human readable title. Does not affect behavior.
|
41
|
+
# @!attribute [rw] scopes
|
42
|
+
# @return [::Array<::String>]
|
43
|
+
# The scopes of a policy define which resources an ACM policy can restrict,
|
44
|
+
# and where ACM resources can be referenced.
|
45
|
+
# For example, a policy with scopes=["folders/123"] has the following
|
46
|
+
# behavior:
|
47
|
+
# - vpcsc perimeters can only restrict projects within folders/123
|
48
|
+
# - access levels can only be referenced by resources within folders/123.
|
49
|
+
# If empty, there are no limitations on which resources can be restricted by
|
50
|
+
# an ACM policy, and there are no limitations on where ACM resources can be
|
51
|
+
# referenced.
|
52
|
+
# Only one policy can include a given scope (attempting to create a second
|
53
|
+
# policy which includes "folders/123" will result in an error).
|
54
|
+
# Currently, scopes cannot be modified after a policy is created.
|
55
|
+
# Currently, policies can only have a single scope.
|
56
|
+
# Format: list of `folders/{folder_number}` or `projects/{project_number}`
|
41
57
|
# @!attribute [rw] create_time
|
42
58
|
# @return [::Google::Protobuf::Timestamp]
|
43
59
|
# Output only. Time the `AccessPolicy` was created in UTC.
|
@@ -254,44 +254,6 @@ module Google
|
|
254
254
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
255
255
|
end
|
256
256
|
|
257
|
-
# Defines the conditions under which an [EgressPolicy]
|
258
|
-
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
|
259
|
-
# matches a request. Conditions are based on information about the
|
260
|
-
# [ApiOperation]
|
261
|
-
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
|
262
|
-
# intended to be performed on the `resources` specified. Note that if the
|
263
|
-
# destination of the request is also protected by a [ServicePerimeter]
|
264
|
-
# [google.identity.accesscontextmanager.v1.ServicePerimeter], then that
|
265
|
-
# [ServicePerimeter]
|
266
|
-
# [google.identity.accesscontextmanager.v1.ServicePerimeter] must have
|
267
|
-
# an [IngressPolicy]
|
268
|
-
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
|
269
|
-
# which allows access in order for this request to succeed. The request must
|
270
|
-
# match `operations` AND `resources` fields in order to be allowed egress out
|
271
|
-
# of the perimeter.
|
272
|
-
# @!attribute [rw] resources
|
273
|
-
# @return [::Array<::String>]
|
274
|
-
# A list of resources, currently only projects in the form
|
275
|
-
# `projects/<projectnumber>`, that are allowed to be accessed by sources
|
276
|
-
# defined in the corresponding [EgressFrom]
|
277
|
-
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom].
|
278
|
-
# A request matches if it contains a resource in this list. If `*` is
|
279
|
-
# specified for `resources`, then this [EgressTo]
|
280
|
-
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo]
|
281
|
-
# rule will authorize access to all resources outside the perimeter.
|
282
|
-
# @!attribute [rw] operations
|
283
|
-
# @return [::Array<::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::ApiOperation>]
|
284
|
-
# A list of [ApiOperations]
|
285
|
-
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
|
286
|
-
# allowed to be performed by the sources specified in the corresponding
|
287
|
-
# [EgressFrom]
|
288
|
-
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom].
|
289
|
-
# A request matches if it uses an operation/service in this list.
|
290
|
-
class EgressTo
|
291
|
-
include ::Google::Protobuf::MessageExts
|
292
|
-
extend ::Google::Protobuf::MessageExts::ClassMethods
|
293
|
-
end
|
294
|
-
|
295
257
|
# Defines the conditions under which an [IngressPolicy]
|
296
258
|
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
|
297
259
|
# matches a request. Conditions are based on information about the source of
|
@@ -387,6 +349,78 @@ module Google
|
|
387
349
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
388
350
|
end
|
389
351
|
|
352
|
+
# Defines the conditions under which an [EgressPolicy]
|
353
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
|
354
|
+
# matches a request. Conditions based on information about the source of the
|
355
|
+
# request. Note that if the destination of the request is also protected by a
|
356
|
+
# [ServicePerimeter]
|
357
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeter], then that
|
358
|
+
# [ServicePerimeter]
|
359
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeter] must have
|
360
|
+
# an [IngressPolicy]
|
361
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
|
362
|
+
# which allows access in order for this request to succeed.
|
363
|
+
# @!attribute [rw] identities
|
364
|
+
# @return [::Array<::String>]
|
365
|
+
# A list of identities that are allowed access through this [EgressPolicy].
|
366
|
+
# Should be in the format of email address. The email address should
|
367
|
+
# represent individual user or service account only.
|
368
|
+
# @!attribute [rw] identity_type
|
369
|
+
# @return [::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::IdentityType]
|
370
|
+
# Specifies the type of identities that are allowed access to outside the
|
371
|
+
# perimeter. If left unspecified, then members of `identities` field will
|
372
|
+
# be allowed access.
|
373
|
+
class EgressFrom
|
374
|
+
include ::Google::Protobuf::MessageExts
|
375
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
376
|
+
end
|
377
|
+
|
378
|
+
# Defines the conditions under which an [EgressPolicy]
|
379
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
|
380
|
+
# matches a request. Conditions are based on information about the
|
381
|
+
# [ApiOperation]
|
382
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
|
383
|
+
# intended to be performed on the `resources` specified. Note that if the
|
384
|
+
# destination of the request is also protected by a [ServicePerimeter]
|
385
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeter], then that
|
386
|
+
# [ServicePerimeter]
|
387
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeter] must have
|
388
|
+
# an [IngressPolicy]
|
389
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
|
390
|
+
# which allows access in order for this request to succeed. The request must
|
391
|
+
# match `operations` AND `resources` fields in order to be allowed egress out
|
392
|
+
# of the perimeter.
|
393
|
+
# @!attribute [rw] resources
|
394
|
+
# @return [::Array<::String>]
|
395
|
+
# A list of resources, currently only projects in the form
|
396
|
+
# `projects/<projectnumber>`, that are allowed to be accessed by sources
|
397
|
+
# defined in the corresponding [EgressFrom]
|
398
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom].
|
399
|
+
# A request matches if it contains a resource in this list. If `*` is
|
400
|
+
# specified for `resources`, then this [EgressTo]
|
401
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo]
|
402
|
+
# rule will authorize access to all resources outside the perimeter.
|
403
|
+
# @!attribute [rw] operations
|
404
|
+
# @return [::Array<::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::ApiOperation>]
|
405
|
+
# A list of [ApiOperations]
|
406
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
|
407
|
+
# allowed to be performed by the sources specified in the corresponding
|
408
|
+
# [EgressFrom]
|
409
|
+
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom].
|
410
|
+
# A request matches if it uses an operation/service in this list.
|
411
|
+
# @!attribute [rw] external_resources
|
412
|
+
# @return [::Array<::String>]
|
413
|
+
# A list of external resources that are allowed to be accessed. Only AWS
|
414
|
+
# and Azure resources are supported. For Amazon S3, the supported format is
|
415
|
+
# s3://BUCKET_NAME. For Azure Storage, the supported format is
|
416
|
+
# azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches
|
417
|
+
# if it contains an external resource in this list (Example:
|
418
|
+
# s3://bucket/path). Currently '*' is not allowed.
|
419
|
+
class EgressTo
|
420
|
+
include ::Google::Protobuf::MessageExts
|
421
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
422
|
+
end
|
423
|
+
|
390
424
|
# Policy for egress from perimeter.
|
391
425
|
#
|
392
426
|
# [EgressPolicies]
|
@@ -432,32 +466,6 @@ module Google
|
|
432
466
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
433
467
|
end
|
434
468
|
|
435
|
-
# Defines the conditions under which an [EgressPolicy]
|
436
|
-
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
|
437
|
-
# matches a request. Conditions based on information about the source of the
|
438
|
-
# request. Note that if the destination of the request is also protected by a
|
439
|
-
# [ServicePerimeter]
|
440
|
-
# [google.identity.accesscontextmanager.v1.ServicePerimeter], then that
|
441
|
-
# [ServicePerimeter]
|
442
|
-
# [google.identity.accesscontextmanager.v1.ServicePerimeter] must have
|
443
|
-
# an [IngressPolicy]
|
444
|
-
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
|
445
|
-
# which allows access in order for this request to succeed.
|
446
|
-
# @!attribute [rw] identities
|
447
|
-
# @return [::Array<::String>]
|
448
|
-
# A list of identities that are allowed access through this [EgressPolicy].
|
449
|
-
# Should be in the format of email address. The email address should
|
450
|
-
# represent individual user or service account only.
|
451
|
-
# @!attribute [rw] identity_type
|
452
|
-
# @return [::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::IdentityType]
|
453
|
-
# Specifies the type of identities that are allowed access to outside the
|
454
|
-
# perimeter. If left unspecified, then members of `identities` field will
|
455
|
-
# be allowed access.
|
456
|
-
class EgressFrom
|
457
|
-
include ::Google::Protobuf::MessageExts
|
458
|
-
extend ::Google::Protobuf::MessageExts::ClassMethods
|
459
|
-
end
|
460
|
-
|
461
469
|
# Specifies the types of identities that are allowed access in either
|
462
470
|
# [IngressFrom]
|
463
471
|
# [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressFrom]
|