google-identity-access_context_manager-v1 0.2.0 → 0.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,418 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2022 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+
20
+ module Google
21
+ module Iam
22
+ module V1
23
+ # An Identity and Access Management (IAM) policy, which specifies access
24
+ # controls for Google Cloud resources.
25
+ #
26
+ #
27
+ # A `Policy` is a collection of `bindings`. A `binding` binds one or more
28
+ # `members`, or principals, to a single `role`. Principals can be user
29
+ # accounts, service accounts, Google groups, and domains (such as G Suite). A
30
+ # `role` is a named list of permissions; each `role` can be an IAM predefined
31
+ # role or a user-created custom role.
32
+ #
33
+ # For some types of Google Cloud resources, a `binding` can also specify a
34
+ # `condition`, which is a logical expression that allows access to a resource
35
+ # only if the expression evaluates to `true`. A condition can add constraints
36
+ # based on attributes of the request, the resource, or both. To learn which
37
+ # resources support conditions in their IAM policies, see the
38
+ # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
39
+ #
40
+ # **JSON example:**
41
+ #
42
+ # {
43
+ # "bindings": [
44
+ # {
45
+ # "role": "roles/resourcemanager.organizationAdmin",
46
+ # "members": [
47
+ # "user:mike@example.com",
48
+ # "group:admins@example.com",
49
+ # "domain:google.com",
50
+ # "serviceAccount:my-project-id@appspot.gserviceaccount.com"
51
+ # ]
52
+ # },
53
+ # {
54
+ # "role": "roles/resourcemanager.organizationViewer",
55
+ # "members": [
56
+ # "user:eve@example.com"
57
+ # ],
58
+ # "condition": {
59
+ # "title": "expirable access",
60
+ # "description": "Does not grant access after Sep 2020",
61
+ # "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')",
62
+ # }
63
+ # }
64
+ # ],
65
+ # "etag": "BwWWja0YfJA=",
66
+ # "version": 3
67
+ # }
68
+ #
69
+ # **YAML example:**
70
+ #
71
+ # bindings:
72
+ # - members:
73
+ # - user:mike@example.com
74
+ # - group:admins@example.com
75
+ # - domain:google.com
76
+ # - serviceAccount:my-project-id@appspot.gserviceaccount.com
77
+ # role: roles/resourcemanager.organizationAdmin
78
+ # - members:
79
+ # - user:eve@example.com
80
+ # role: roles/resourcemanager.organizationViewer
81
+ # condition:
82
+ # title: expirable access
83
+ # description: Does not grant access after Sep 2020
84
+ # expression: request.time < timestamp('2020-10-01T00:00:00.000Z')
85
+ # etag: BwWWja0YfJA=
86
+ # version: 3
87
+ #
88
+ # For a description of IAM and its features, see the
89
+ # [IAM documentation](https://cloud.google.com/iam/docs/).
90
+ # @!attribute [rw] version
91
+ # @return [::Integer]
92
+ # Specifies the format of the policy.
93
+ #
94
+ # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
95
+ # are rejected.
96
+ #
97
+ # Any operation that affects conditional role bindings must specify version
98
+ # `3`. This requirement applies to the following operations:
99
+ #
100
+ # * Getting a policy that includes a conditional role binding
101
+ # * Adding a conditional role binding to a policy
102
+ # * Changing a conditional role binding in a policy
103
+ # * Removing any role binding, with or without a condition, from a policy
104
+ # that includes conditions
105
+ #
106
+ # **Important:** If you use IAM Conditions, you must include the `etag` field
107
+ # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
108
+ # you to overwrite a version `3` policy with a version `1` policy, and all of
109
+ # the conditions in the version `3` policy are lost.
110
+ #
111
+ # If a policy does not include any conditions, operations on that policy may
112
+ # specify any valid version or leave the field unset.
113
+ #
114
+ # To learn which resources support conditions in their IAM policies, see the
115
+ # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
116
+ # @!attribute [rw] bindings
117
+ # @return [::Array<::Google::Iam::V1::Binding>]
118
+ # Associates a list of `members`, or principals, with a `role`. Optionally,
119
+ # may specify a `condition` that determines how and when the `bindings` are
120
+ # applied. Each of the `bindings` must contain at least one principal.
121
+ #
122
+ # The `bindings` in a `Policy` can refer to up to 1,500 principals; up to 250
123
+ # of these principals can be Google groups. Each occurrence of a principal
124
+ # counts towards these limits. For example, if the `bindings` grant 50
125
+ # different roles to `user:alice@example.com`, and not to any other
126
+ # principal, then you can add another 1,450 principals to the `bindings` in
127
+ # the `Policy`.
128
+ # @!attribute [rw] audit_configs
129
+ # @return [::Array<::Google::Iam::V1::AuditConfig>]
130
+ # Specifies cloud audit logging configuration for this policy.
131
+ # @!attribute [rw] etag
132
+ # @return [::String]
133
+ # `etag` is used for optimistic concurrency control as a way to help
134
+ # prevent simultaneous updates of a policy from overwriting each other.
135
+ # It is strongly suggested that systems make use of the `etag` in the
136
+ # read-modify-write cycle to perform policy updates in order to avoid race
137
+ # conditions: An `etag` is returned in the response to `getIamPolicy`, and
138
+ # systems are expected to put that etag in the request to `setIamPolicy` to
139
+ # ensure that their change will be applied to the same version of the policy.
140
+ #
141
+ # **Important:** If you use IAM Conditions, you must include the `etag` field
142
+ # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
143
+ # you to overwrite a version `3` policy with a version `1` policy, and all of
144
+ # the conditions in the version `3` policy are lost.
145
+ class Policy
146
+ include ::Google::Protobuf::MessageExts
147
+ extend ::Google::Protobuf::MessageExts::ClassMethods
148
+ end
149
+
150
+ # Associates `members`, or principals, with a `role`.
151
+ # @!attribute [rw] role
152
+ # @return [::String]
153
+ # Role that is assigned to the list of `members`, or principals.
154
+ # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
155
+ # @!attribute [rw] members
156
+ # @return [::Array<::String>]
157
+ # Specifies the principals requesting access for a Cloud Platform resource.
158
+ # `members` can have the following values:
159
+ #
160
+ # * `allUsers`: A special identifier that represents anyone who is
161
+ # on the internet; with or without a Google account.
162
+ #
163
+ # * `allAuthenticatedUsers`: A special identifier that represents anyone
164
+ # who is authenticated with a Google account or a service account.
165
+ #
166
+ # * `user:{emailid}`: An email address that represents a specific Google
167
+ # account. For example, `alice@example.com` .
168
+ #
169
+ #
170
+ # * `serviceAccount:{emailid}`: An email address that represents a service
171
+ # account. For example, `my-other-app@appspot.gserviceaccount.com`.
172
+ #
173
+ # * `group:{emailid}`: An email address that represents a Google group.
174
+ # For example, `admins@example.com`.
175
+ #
176
+ # * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique
177
+ # identifier) representing a user that has been recently deleted. For
178
+ # example, `alice@example.com?uid=123456789012345678901`. If the user is
179
+ # recovered, this value reverts to `user:{emailid}` and the recovered user
180
+ # retains the role in the binding.
181
+ #
182
+ # * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus
183
+ # unique identifier) representing a service account that has been recently
184
+ # deleted. For example,
185
+ # `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`.
186
+ # If the service account is undeleted, this value reverts to
187
+ # `serviceAccount:{emailid}` and the undeleted service account retains the
188
+ # role in the binding.
189
+ #
190
+ # * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique
191
+ # identifier) representing a Google group that has been recently
192
+ # deleted. For example, `admins@example.com?uid=123456789012345678901`. If
193
+ # the group is recovered, this value reverts to `group:{emailid}` and the
194
+ # recovered group retains the role in the binding.
195
+ #
196
+ #
197
+ # * `domain:{domain}`: The G Suite domain (primary) that represents all the
198
+ # users of that domain. For example, `google.com` or `example.com`.
199
+ # @!attribute [rw] condition
200
+ # @return [::Google::Type::Expr]
201
+ # The condition that is associated with this binding.
202
+ #
203
+ # If the condition evaluates to `true`, then this binding applies to the
204
+ # current request.
205
+ #
206
+ # If the condition evaluates to `false`, then this binding does not apply to
207
+ # the current request. However, a different role binding might grant the same
208
+ # role to one or more of the principals in this binding.
209
+ #
210
+ # To learn which resources support conditions in their IAM policies, see the
211
+ # [IAM
212
+ # documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
213
+ class Binding
214
+ include ::Google::Protobuf::MessageExts
215
+ extend ::Google::Protobuf::MessageExts::ClassMethods
216
+ end
217
+
218
+ # Specifies the audit configuration for a service.
219
+ # The configuration determines which permission types are logged, and what
220
+ # identities, if any, are exempted from logging.
221
+ # An AuditConfig must have one or more AuditLogConfigs.
222
+ #
223
+ # If there are AuditConfigs for both `allServices` and a specific service,
224
+ # the union of the two AuditConfigs is used for that service: the log_types
225
+ # specified in each AuditConfig are enabled, and the exempted_members in each
226
+ # AuditLogConfig are exempted.
227
+ #
228
+ # Example Policy with multiple AuditConfigs:
229
+ #
230
+ # {
231
+ # "audit_configs": [
232
+ # {
233
+ # "service": "allServices",
234
+ # "audit_log_configs": [
235
+ # {
236
+ # "log_type": "DATA_READ",
237
+ # "exempted_members": [
238
+ # "user:jose@example.com"
239
+ # ]
240
+ # },
241
+ # {
242
+ # "log_type": "DATA_WRITE"
243
+ # },
244
+ # {
245
+ # "log_type": "ADMIN_READ"
246
+ # }
247
+ # ]
248
+ # },
249
+ # {
250
+ # "service": "sampleservice.googleapis.com",
251
+ # "audit_log_configs": [
252
+ # {
253
+ # "log_type": "DATA_READ"
254
+ # },
255
+ # {
256
+ # "log_type": "DATA_WRITE",
257
+ # "exempted_members": [
258
+ # "user:aliya@example.com"
259
+ # ]
260
+ # }
261
+ # ]
262
+ # }
263
+ # ]
264
+ # }
265
+ #
266
+ # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
267
+ # logging. It also exempts jose@example.com from DATA_READ logging, and
268
+ # aliya@example.com from DATA_WRITE logging.
269
+ # @!attribute [rw] service
270
+ # @return [::String]
271
+ # Specifies a service that will be enabled for audit logging.
272
+ # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
273
+ # `allServices` is a special value that covers all services.
274
+ # @!attribute [rw] audit_log_configs
275
+ # @return [::Array<::Google::Iam::V1::AuditLogConfig>]
276
+ # The configuration for logging of each type of permission.
277
+ class AuditConfig
278
+ include ::Google::Protobuf::MessageExts
279
+ extend ::Google::Protobuf::MessageExts::ClassMethods
280
+ end
281
+
282
+ # Provides the configuration for logging a type of permissions.
283
+ # Example:
284
+ #
285
+ # {
286
+ # "audit_log_configs": [
287
+ # {
288
+ # "log_type": "DATA_READ",
289
+ # "exempted_members": [
290
+ # "user:jose@example.com"
291
+ # ]
292
+ # },
293
+ # {
294
+ # "log_type": "DATA_WRITE"
295
+ # }
296
+ # ]
297
+ # }
298
+ #
299
+ # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
300
+ # jose@example.com from DATA_READ logging.
301
+ # @!attribute [rw] log_type
302
+ # @return [::Google::Iam::V1::AuditLogConfig::LogType]
303
+ # The log type that this config enables.
304
+ # @!attribute [rw] exempted_members
305
+ # @return [::Array<::String>]
306
+ # Specifies the identities that do not cause logging for this type of
307
+ # permission.
308
+ # Follows the same format of {::Google::Iam::V1::Binding#members Binding.members}.
309
+ class AuditLogConfig
310
+ include ::Google::Protobuf::MessageExts
311
+ extend ::Google::Protobuf::MessageExts::ClassMethods
312
+
313
+ # The list of valid permission types for which logging can be configured.
314
+ # Admin writes are always logged, and are not configurable.
315
+ module LogType
316
+ # Default case. Should never be this.
317
+ LOG_TYPE_UNSPECIFIED = 0
318
+
319
+ # Admin reads. Example: CloudIAM getIamPolicy
320
+ ADMIN_READ = 1
321
+
322
+ # Data writes. Example: CloudSQL Users create
323
+ DATA_WRITE = 2
324
+
325
+ # Data reads. Example: CloudSQL Users list
326
+ DATA_READ = 3
327
+ end
328
+ end
329
+
330
+ # The difference delta between two policies.
331
+ # @!attribute [rw] binding_deltas
332
+ # @return [::Array<::Google::Iam::V1::BindingDelta>]
333
+ # The delta for Bindings between two policies.
334
+ # @!attribute [rw] audit_config_deltas
335
+ # @return [::Array<::Google::Iam::V1::AuditConfigDelta>]
336
+ # The delta for AuditConfigs between two policies.
337
+ class PolicyDelta
338
+ include ::Google::Protobuf::MessageExts
339
+ extend ::Google::Protobuf::MessageExts::ClassMethods
340
+ end
341
+
342
+ # One delta entry for Binding. Each individual change (only one member in each
343
+ # entry) to a binding will be a separate entry.
344
+ # @!attribute [rw] action
345
+ # @return [::Google::Iam::V1::BindingDelta::Action]
346
+ # The action that was performed on a Binding.
347
+ # Required
348
+ # @!attribute [rw] role
349
+ # @return [::String]
350
+ # Role that is assigned to `members`.
351
+ # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
352
+ # Required
353
+ # @!attribute [rw] member
354
+ # @return [::String]
355
+ # A single identity requesting access for a Cloud Platform resource.
356
+ # Follows the same format of Binding.members.
357
+ # Required
358
+ # @!attribute [rw] condition
359
+ # @return [::Google::Type::Expr]
360
+ # The condition that is associated with this binding.
361
+ class BindingDelta
362
+ include ::Google::Protobuf::MessageExts
363
+ extend ::Google::Protobuf::MessageExts::ClassMethods
364
+
365
+ # The type of action performed on a Binding in a policy.
366
+ module Action
367
+ # Unspecified.
368
+ ACTION_UNSPECIFIED = 0
369
+
370
+ # Addition of a Binding.
371
+ ADD = 1
372
+
373
+ # Removal of a Binding.
374
+ REMOVE = 2
375
+ end
376
+ end
377
+
378
+ # One delta entry for AuditConfig. Each individual change (only one
379
+ # exempted_member in each entry) to a AuditConfig will be a separate entry.
380
+ # @!attribute [rw] action
381
+ # @return [::Google::Iam::V1::AuditConfigDelta::Action]
382
+ # The action that was performed on an audit configuration in a policy.
383
+ # Required
384
+ # @!attribute [rw] service
385
+ # @return [::String]
386
+ # Specifies a service that was configured for Cloud Audit Logging.
387
+ # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
388
+ # `allServices` is a special value that covers all services.
389
+ # Required
390
+ # @!attribute [rw] exempted_member
391
+ # @return [::String]
392
+ # A single identity that is exempted from "data access" audit
393
+ # logging for the `service` specified above.
394
+ # Follows the same format of Binding.members.
395
+ # @!attribute [rw] log_type
396
+ # @return [::String]
397
+ # Specifies the log_type that was be enabled. ADMIN_ACTIVITY is always
398
+ # enabled, and cannot be configured.
399
+ # Required
400
+ class AuditConfigDelta
401
+ include ::Google::Protobuf::MessageExts
402
+ extend ::Google::Protobuf::MessageExts::ClassMethods
403
+
404
+ # The type of action performed on an audit configuration in a policy.
405
+ module Action
406
+ # Unspecified.
407
+ ACTION_UNSPECIFIED = 0
408
+
409
+ # Addition of an audit configuration.
410
+ ADD = 1
411
+
412
+ # Removal of an audit configuration.
413
+ REMOVE = 2
414
+ end
415
+ end
416
+ end
417
+ end
418
+ end
@@ -395,7 +395,7 @@ module Google
395
395
  # @!attribute [rw] etag
396
396
  # @return [::String]
397
397
  # Optional. The etag for the version of the [Access Policy]
398
- # [google.identity.accesscontextmanager.v1alpha.AccessPolicy] that this
398
+ # [google.identity.accesscontextmanager.v1.AccessPolicy] that this
399
399
  # commit operation is to be performed on. If, at the time of commit, the
400
400
  # etag for the Access Policy stored in Access Context Manager is different
401
401
  # from the specified etag, then the commit operation will not be performed
@@ -38,6 +38,22 @@ module Google
38
38
  # @!attribute [rw] title
39
39
  # @return [::String]
40
40
  # Required. Human readable title. Does not affect behavior.
41
+ # @!attribute [rw] scopes
42
+ # @return [::Array<::String>]
43
+ # The scopes of a policy define which resources an ACM policy can restrict,
44
+ # and where ACM resources can be referenced.
45
+ # For example, a policy with scopes=["folders/123"] has the following
46
+ # behavior:
47
+ # - vpcsc perimeters can only restrict projects within folders/123
48
+ # - access levels can only be referenced by resources within folders/123.
49
+ # If empty, there are no limitations on which resources can be restricted by
50
+ # an ACM policy, and there are no limitations on where ACM resources can be
51
+ # referenced.
52
+ # Only one policy can include a given scope (attempting to create a second
53
+ # policy which includes "folders/123" will result in an error).
54
+ # Currently, scopes cannot be modified after a policy is created.
55
+ # Currently, policies can only have a single scope.
56
+ # Format: list of `folders/{folder_number}` or `projects/{project_number}`
41
57
  # @!attribute [rw] create_time
42
58
  # @return [::Google::Protobuf::Timestamp]
43
59
  # Output only. Time the `AccessPolicy` was created in UTC.
@@ -254,44 +254,6 @@ module Google
254
254
  extend ::Google::Protobuf::MessageExts::ClassMethods
255
255
  end
256
256
 
257
- # Defines the conditions under which an [EgressPolicy]
258
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
259
- # matches a request. Conditions are based on information about the
260
- # [ApiOperation]
261
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
262
- # intended to be performed on the `resources` specified. Note that if the
263
- # destination of the request is also protected by a [ServicePerimeter]
264
- # [google.identity.accesscontextmanager.v1.ServicePerimeter], then that
265
- # [ServicePerimeter]
266
- # [google.identity.accesscontextmanager.v1.ServicePerimeter] must have
267
- # an [IngressPolicy]
268
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
269
- # which allows access in order for this request to succeed. The request must
270
- # match `operations` AND `resources` fields in order to be allowed egress out
271
- # of the perimeter.
272
- # @!attribute [rw] resources
273
- # @return [::Array<::String>]
274
- # A list of resources, currently only projects in the form
275
- # `projects/<projectnumber>`, that are allowed to be accessed by sources
276
- # defined in the corresponding [EgressFrom]
277
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom].
278
- # A request matches if it contains a resource in this list. If `*` is
279
- # specified for `resources`, then this [EgressTo]
280
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo]
281
- # rule will authorize access to all resources outside the perimeter.
282
- # @!attribute [rw] operations
283
- # @return [::Array<::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::ApiOperation>]
284
- # A list of [ApiOperations]
285
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
286
- # allowed to be performed by the sources specified in the corresponding
287
- # [EgressFrom]
288
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom].
289
- # A request matches if it uses an operation/service in this list.
290
- class EgressTo
291
- include ::Google::Protobuf::MessageExts
292
- extend ::Google::Protobuf::MessageExts::ClassMethods
293
- end
294
-
295
257
  # Defines the conditions under which an [IngressPolicy]
296
258
  # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
297
259
  # matches a request. Conditions are based on information about the source of
@@ -387,6 +349,78 @@ module Google
387
349
  extend ::Google::Protobuf::MessageExts::ClassMethods
388
350
  end
389
351
 
352
+ # Defines the conditions under which an [EgressPolicy]
353
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
354
+ # matches a request. Conditions based on information about the source of the
355
+ # request. Note that if the destination of the request is also protected by a
356
+ # [ServicePerimeter]
357
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter], then that
358
+ # [ServicePerimeter]
359
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] must have
360
+ # an [IngressPolicy]
361
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
362
+ # which allows access in order for this request to succeed.
363
+ # @!attribute [rw] identities
364
+ # @return [::Array<::String>]
365
+ # A list of identities that are allowed access through this [EgressPolicy].
366
+ # Should be in the format of email address. The email address should
367
+ # represent individual user or service account only.
368
+ # @!attribute [rw] identity_type
369
+ # @return [::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::IdentityType]
370
+ # Specifies the type of identities that are allowed access to outside the
371
+ # perimeter. If left unspecified, then members of `identities` field will
372
+ # be allowed access.
373
+ class EgressFrom
374
+ include ::Google::Protobuf::MessageExts
375
+ extend ::Google::Protobuf::MessageExts::ClassMethods
376
+ end
377
+
378
+ # Defines the conditions under which an [EgressPolicy]
379
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
380
+ # matches a request. Conditions are based on information about the
381
+ # [ApiOperation]
382
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
383
+ # intended to be performed on the `resources` specified. Note that if the
384
+ # destination of the request is also protected by a [ServicePerimeter]
385
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter], then that
386
+ # [ServicePerimeter]
387
+ # [google.identity.accesscontextmanager.v1.ServicePerimeter] must have
388
+ # an [IngressPolicy]
389
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
390
+ # which allows access in order for this request to succeed. The request must
391
+ # match `operations` AND `resources` fields in order to be allowed egress out
392
+ # of the perimeter.
393
+ # @!attribute [rw] resources
394
+ # @return [::Array<::String>]
395
+ # A list of resources, currently only projects in the form
396
+ # `projects/<projectnumber>`, that are allowed to be accessed by sources
397
+ # defined in the corresponding [EgressFrom]
398
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom].
399
+ # A request matches if it contains a resource in this list. If `*` is
400
+ # specified for `resources`, then this [EgressTo]
401
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo]
402
+ # rule will authorize access to all resources outside the perimeter.
403
+ # @!attribute [rw] operations
404
+ # @return [::Array<::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::ApiOperation>]
405
+ # A list of [ApiOperations]
406
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation]
407
+ # allowed to be performed by the sources specified in the corresponding
408
+ # [EgressFrom]
409
+ # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom].
410
+ # A request matches if it uses an operation/service in this list.
411
+ # @!attribute [rw] external_resources
412
+ # @return [::Array<::String>]
413
+ # A list of external resources that are allowed to be accessed. Only AWS
414
+ # and Azure resources are supported. For Amazon S3, the supported format is
415
+ # s3://BUCKET_NAME. For Azure Storage, the supported format is
416
+ # azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches
417
+ # if it contains an external resource in this list (Example:
418
+ # s3://bucket/path). Currently '*' is not allowed.
419
+ class EgressTo
420
+ include ::Google::Protobuf::MessageExts
421
+ extend ::Google::Protobuf::MessageExts::ClassMethods
422
+ end
423
+
390
424
  # Policy for egress from perimeter.
391
425
  #
392
426
  # [EgressPolicies]
@@ -432,32 +466,6 @@ module Google
432
466
  extend ::Google::Protobuf::MessageExts::ClassMethods
433
467
  end
434
468
 
435
- # Defines the conditions under which an [EgressPolicy]
436
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy]
437
- # matches a request. Conditions based on information about the source of the
438
- # request. Note that if the destination of the request is also protected by a
439
- # [ServicePerimeter]
440
- # [google.identity.accesscontextmanager.v1.ServicePerimeter], then that
441
- # [ServicePerimeter]
442
- # [google.identity.accesscontextmanager.v1.ServicePerimeter] must have
443
- # an [IngressPolicy]
444
- # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
445
- # which allows access in order for this request to succeed.
446
- # @!attribute [rw] identities
447
- # @return [::Array<::String>]
448
- # A list of identities that are allowed access through this [EgressPolicy].
449
- # Should be in the format of email address. The email address should
450
- # represent individual user or service account only.
451
- # @!attribute [rw] identity_type
452
- # @return [::Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::IdentityType]
453
- # Specifies the type of identities that are allowed access to outside the
454
- # perimeter. If left unspecified, then members of `identities` field will
455
- # be allowed access.
456
- class EgressFrom
457
- include ::Google::Protobuf::MessageExts
458
- extend ::Google::Protobuf::MessageExts::ClassMethods
459
- end
460
-
461
469
  # Specifies the types of identities that are allowed access in either
462
470
  # [IngressFrom]
463
471
  # [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressFrom]
@@ -26,8 +26,6 @@ module Google
26
26
  # service Foo {
27
27
  # rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty);
28
28
  # }
29
- #
30
- # The JSON representation for `Empty` is empty JSON object `{}`.
31
29
  class Empty
32
30
  include ::Google::Protobuf::MessageExts
33
31
  extend ::Google::Protobuf::MessageExts::ClassMethods
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-identity-access_context_manager-v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.2.0
4
+ version: 0.3.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-07-08 00:00:00.000000000 Z
11
+ date: 2022-11-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: gapic-common
@@ -16,7 +16,7 @@ dependencies:
16
16
  requirements:
17
17
  - - ">="
18
18
  - !ruby/object:Gem::Version
19
- version: '0.10'
19
+ version: '0.12'
20
20
  - - "<"
21
21
  - !ruby/object:Gem::Version
22
22
  version: 2.a
@@ -26,7 +26,7 @@ dependencies:
26
26
  requirements:
27
27
  - - ">="
28
28
  - !ruby/object:Gem::Version
29
- version: '0.10'
29
+ version: '0.12'
30
30
  - - "<"
31
31
  - !ruby/object:Gem::Version
32
32
  version: 2.a
@@ -44,6 +44,20 @@ dependencies:
44
44
  - - "~>"
45
45
  - !ruby/object:Gem::Version
46
46
  version: '1.0'
47
+ - !ruby/object:Gem::Dependency
48
+ name: grpc-google-iam-v1
49
+ requirement: !ruby/object:Gem::Requirement
50
+ requirements:
51
+ - - "~>"
52
+ - !ruby/object:Gem::Version
53
+ version: '1.1'
54
+ type: :runtime
55
+ prerelease: false
56
+ version_requirements: !ruby/object:Gem::Requirement
57
+ requirements:
58
+ - - "~>"
59
+ - !ruby/object:Gem::Version
60
+ version: '1.1'
47
61
  - !ruby/object:Gem::Dependency
48
62
  name: google-style
49
63
  requirement: !ruby/object:Gem::Requirement
@@ -188,6 +202,9 @@ files:
188
202
  - proto_docs/README.md
189
203
  - proto_docs/google/api/field_behavior.rb
190
204
  - proto_docs/google/api/resource.rb
205
+ - proto_docs/google/iam/v1/iam_policy.rb
206
+ - proto_docs/google/iam/v1/options.rb
207
+ - proto_docs/google/iam/v1/policy.rb
191
208
  - proto_docs/google/identity/accesscontextmanager/type/device_resources.rb
192
209
  - proto_docs/google/identity/accesscontextmanager/v1/access_context_manager.rb
193
210
  - proto_docs/google/identity/accesscontextmanager/v1/access_level.rb